0:09 brace yourself by clicking on this video
0:10 you just hit the jackpot when it comes
0:14 to IT training courses and guess what
0:16 it's going to cost you absolutely
0:19 nothing that's right this full length
0:23 course is 100% free no hidden fees no
0:25 additional content charges just pure
0:27 concentrated knowledge tailored to teach
0:29 you everything you need to know in order
0:31 to pass the content ITF plus certification
0:33 certification
0:36 exam with that said if this is the first
0:38 time you have heard of us Welcome to our
0:40 certification Synergy community and to
0:42 our CompTIA ITF plus complete training
0:45 course we are excited that you have
0:46 chosen us as your guide while you begin
0:48 your journey into information technology
0:50 and we appreciate the opportunity to
0:52 share our expertise with you and just
0:54 once more in case you didn't believe me
0:56 the first time this complete training
0:58 course is a free self-paced Learning
1:00 Resource here for every everyone's
1:03 benefit that includes you your friends
1:05 and your family just don't tell your
1:08 Archen enemy if they find out about this
1:10 amazing training course they will pass
1:13 too and you don't want
1:16 that now let's explore what makes
1:18 certification Synergy the golden ticket
1:21 to your it success our curriculum is a
1:23 masterpiece of meticulous design not
1:25 just a random assemblage of study
1:27 materials you can think of us as your
1:30 very own treasure map to it mastery
1:31 systematically covering every topic you
1:32 need to
1:35 know so why get lost in a Labyrinth of
1:37 random tutorials scattered across the
1:39 internet when a proven pathway lies
1:42 right in front of you at certification
1:44 Synergy we value your precious time and
1:46 that's precisely why we've bottled a
1:47 vast ocean of learning into a potent
1:50 elixir of knowledge with that in mind
1:52 you could potentially binge watch this
1:55 entire course in as little as one day
1:57 thus arming yourself with the skills and
1:59 self assurance you need to sail smoothly
2:01 through the comp ITF plus certification
2:03 exam and
2:06 onward now what else makes us the best
2:08 IT training in town besides our
2:10 strategic and orderly presentation of
2:14 exam topics easy we make learning Tech
2:17 Concepts feel like a walk in the park
2:18 you can expect to learn from Vivid
2:20 comprehensible video segments all
2:22 seasoned with a dash of humor to keep
2:25 the experience Lively this course isn't
2:28 just a learning pathway it's a guided
2:30 experience if you are still listening it
2:32 is now time to take the Bold step
2:34 forward and benefit from all our invaluable
2:40 insights and off we go for your very
2:42 first step you will need to understand
2:44 the path that lies in front of you by
2:46 choosing to start your journey with the
2:48 CompTIA ITF plus certification and by
2:50 allowing me to be your instructor you
2:52 will be building a strong foundational
2:53 knowledge that will set you up for
2:55 success as you advance into more complex
2:57 it topics and attempt future
3:00 certifications like the the CompTIA a plus
3:01 plus
3:04 certification the CompTIA Network plus
3:07 certification and the CompTIA Security Plus
3:08 Plus
3:11 certification next you need to know what
3:12 it Concepts will be taught in this
3:15 course the CompTIA ITF plus
3:17 certification exam focuses on the
3:19 essential it skills and knowledge needed
3:21 to complete tasks commonly performed by
3:25 entry-level it professionals to pass you
3:26 will need to have the knowledge and
3:28 skills required to understand the basics of
3:30 of
3:32 Computing it
3:36 infrastructure applications and software network
3:37 network
3:40 connectivity software development
3:43 database use and identifying SL
3:45 preventing security
3:47 risks additionally this exam will assess
3:49 knowledge in the areas of
3:51 troubleshooting Theory and preventive
3:53 maintenance the current version of the
3:56 CompTIA ITF plus certification exam
4:00 designated as fc0 d61 was launched on
4:02 September 4th
4:05 2018 the exam consists of 75 multiple
4:07 choice questions that must be completed
4:10 in 60 minutes and the passing score is
4:13 650 on a scale of
4:16 900 now the scoring system can be a bit
4:18 confusing so I will give you a breakdown
4:19 that works well for us here at certification
4:21 certification
4:24 Synergy if you score below 500 you have
4:27 some more studying to do if you score
4:30 between 500 and 64 9 you knew more than
4:32 half the content and just need a bit
4:34 more understanding to get you across the
4:39 Finish Line score between 650 and 749
4:41 and you knew about 2/3 to 3/4 of the
4:44 content and you will now be ITF plus
4:48 certified with a score of 750 to 799 you
4:51 knew most of the exam content go above
4:53 800 and you can tell everyone you
4:56 crushed it anyone scoring 800 plus on a
4:58 CompTIA exam should be very proud of
5:00 their accomplishment
5:02 if you get a perfect 900 score contact
5:06 us immediately we want to hire you okay
5:09 not really but know this even seasoned
5:11 veterans tend to score in the low to mid
5:14 800 range I hope you find this scoring
5:16 breakdown helpful when evaluating your exam
5:18 exam
5:20 results now we need to discuss the heart
5:23 of this exam the exam
5:25 objectives the exam objectives is a
5:27 document that will outline the
5:30 parameters for taking the exam it will
5:33 include exam items like how many
5:36 questions the question format or what
5:38 type of questions you will be asked and
5:41 the requirements to pass the exam the
5:43 exam objectives will also outline the
5:45 topics you will be tested
5:48 on at the highest level the exam is
5:51 broken into domains the domains for the
5:56 CompTIA ITF plus exam FC 0- youth 61 are
5:58 shown here with a percentage value next
6:01 to them the percentage refers to how
6:03 many questions can be expected from each
6:05 domain when you take your
6:07 exam each domain is then broken into
6:10 exam objectives here we can see the
6:12 first domain for the CompTIA ITF plus
6:15 certification exam is it Concepts and
6:17 terminology and the first exam objective
6:19 in this domain is compare and contrast
6:22 notational systems within this exam
6:25 objective are the exam topics exam
6:28 objective 1.1 includes the topics binary
6:32 hexadecimal decimal asky and unicode
6:34 don't worry if you do not understand
6:36 these topics yet as this is the reason
6:37 for this
6:39 course so why have I spent your time
6:41 breaking down the exam
6:43 objectives because they are super
6:45 important and often
6:48 overlooked the exam objectives are a
6:51 road map to success they provide a clear
6:53 path of what to study and keep you on
6:55 track additionally once you have
6:57 completed this training course the exam
6:59 objectives should act as a final check
7:02 checklist taking one last look at the
7:03 official exam objectives before
7:05 attempting the certification exam will
7:07 help Focus your thoughts and point you
7:08 in the direction of any additional study
7:11 you may need to download the exam
7:14 objectives you can visit the CompTIA ITF
7:16 plus product page on our certification
7:19 synergy.com website I will also provide
7:21 a link in the description section of
7:22 this video and in the
7:25 comments now as you continue with this
7:27 training course I encourage you to watch
7:29 each video segment as many times as you
7:32 need to master the topics go as fast or
7:34 as slow as you want it would also be a
7:37 great idea to subscribe now making it
7:39 easier to find us later we are always
7:41 pumping out new free content and you
7:44 don't want to miss out do
7:48 you CompTIA ITF plus complete training
7:52 course exam objective 1.1 compare and
7:53 contrast notational
7:56 systems binary notational
7:59 system the binary notational system is a
8:01 notational system that has only two
8:03 possible numbers for each place
8:06 value these numbers are 0 and
8:10 one the prefix or first two letters by
8:12 in the word binary means two and refers
8:14 to the fact that each place value in a
8:16 binary number is two times greater than
8:19 the place value directly to its
8:21 right at the most fundamental level
8:24 computers receive transmit process and
8:27 store information in binary form
8:29 computers work in this manner because
8:31 they utilize billions of tiny electronic
8:32 switches called
8:35 transistors these transistors can be
8:37 either an off or on state the digits
8:40 zero and one used in binary reflect the
8:42 off and on states of a transistor where
8:45 zero is off and one is on additionally
8:47 binary is great for computer programs to
8:49 store values that can be of either two
8:52 states this would include yes or no
8:54 questions true or false values and
8:57 whether a box is checked or unchecked
9:00 exam objective 1.1 compare and contrast notational
9:01 notational
9:04 systems hexadecimal notational
9:07 system the heximal notational system is
9:09 a notational system that has 16 possible
9:11 values for each place
9:16 value these values range from 0 to
9:18 F the hexadecimal values are a
9:21 combination of the Arabic numbers 0
9:23 through 9 and the Latin alphabet letters
9:26 a through F this can be a bit confusing
9:28 so here is a side by-side comparison
9:30 with the more commonly understood
9:33 Decimal System the decimal numbers
9:34 remain consistent with the hexadecimal
9:37 system up to the value of N9 once a
9:40 value of 10 is reached the decimal
9:41 system requires an additional place
9:44 value to express the value 10 while the
9:47 heximal system continues on to
9:50 a some common use cases for heximal
9:53 notation in Information Technology
9:55 are Mac
10:00 addresses IPv6 addresses
10:02 hex color codes
10:04 and unicode
10:07 references media access control or Mac
10:09 addresses are unique IDs assigned to a
10:12 network interface for use in a localized
10:14 Network these addresses may be
10:16 represented in a few different formats
10:19 but always contain a total of 12 heximal
10:22 characters IPv6 addresses also use
10:26 hexadecimal notation IPv6 addresses
10:28 identify a device in an Internet
10:31 Protocol version 6 or IPv6
10:34 Network hex color codes use six heximal
10:37 characters to specify a color these
10:40 color codes start with a hashtag the
10:42 first two hex characters represent the
10:45 red value and the middle two hex
10:47 characters represent the green value
10:49 while the last two hex characters
10:52 represent the blue value each color
10:54 value varies in intensity on a scale of
10:55 0 to
11:00 255 or in hexadecimal from 0 0 to f F
11:02 when combined these three values can
11:05 create over 16.7 million possible
11:08 colors Unicode is just one more place
11:10 you might find hexadecimal notation
11:13 being used Unicode is an international
11:14 encoding standard that converts each
11:17 letter digit or symbol into a unique
11:19 numeric value in order to be understood
11:22 by a Computing system these unique
11:24 numeric values can be represented in
11:25 binary or for our current learning
11:29 purposes as a hexadecimal value exam
11:31 objective 1.1 compare and contrast notational
11:32 notational
11:35 systems Decimal notational
11:38 System the decimal notational system is
11:40 a notational system that has 10 possible
11:42 numbers for each place
11:45 value these numbers are 0 through
11:49 9 the prefix or first three letters d e
11:52 c in the word decimal means 10 and
11:54 refers to the fact that each place value
11:56 in a decimal number is 10 times greater
11:58 than the place value directly to its right
11:59 right
12:01 decimal notation is used in Information
12:03 Technology mostly for the benefit of the
12:06 human user while binary is used by the
12:08 Computing device an endless string of
12:11 ones and zeros would be very difficult
12:13 for a human to understand that is why
12:15 many computer programs will convert and
12:18 display binary values as a decimal
12:21 value it is worth noting that ipv4
12:23 addresses use a specific type of decimal
12:27 notation called decimal notation ipv4
12:29 addresses identify a device in an inter
12:32 protocol version 4 or ipv4
12:34 network decimal notation is a way of
12:36 displaying a big number in manageable
12:39 chunks in the case of an ipv4 address
12:43 each address is 32 binary digits long
12:44 this is still a bit difficult to
12:47 understand so let's group this 32 binary
12:49 digit address into different containers
12:51 that are separated by dots this will
12:54 create four sets of eight binary digits
12:56 also known as octets next we will
12:58 convert each octet from binary to their
13:01 de deal value equivalence resulting in a
13:03 decimal notation that is much easier to
13:06 read exam objective 1.1 compare and
13:11 contrast notational systems data representation
13:12 representation
13:16 asky asky American Standard code for
13:18 information interchange is the most
13:20 common character encoding standard for
13:22 Text data in computers and on the
13:24 internet character encoding is the
13:26 process of assigning numerical values
13:28 also known as code points to graphical
13:30 characters especially the written
13:33 characters of human language this allows
13:35 characters such as the capital letter M
13:37 of the Latin alphabet to be received
13:40 transmitted processed and stored as
13:42 information in binary
13:45 form the asy character encoding standard
13:47 uses seven binary digits to represent a
13:50 total of 128 character value
13:54 combinations 128 is very limited when
13:56 considering all World languages and
13:59 symbols therefore aski is best suited to
14:00 en code the American English language
14:04 only even still as technology advanced
14:06 ASI was updated to include eight binary
14:08 digits allowing for additional character code
14:09 code
14:11 combinations this updated version is
14:13 known as extended
14:16 ASI exam objective 1.1 compare and
14:20 contrast notational systems data
14:23 representation unic
14:25 code Unicode is an international
14:27 character encoding standard that
14:29 encompasses many different languages
14:31 character encoding is the process of
14:33 assigning numerical values also known as
14:36 code points to graphical characters
14:37 especially the written characters of
14:40 human language Unicode while maintaining
14:43 ASI as a subset of character values
14:45 expands to include languages far beyond
14:47 the American English
14:50 language the Unicode character encoding
14:52 standard uses 16 binary digits by
14:54 default providing more than enough
14:56 character value combinations to include
14:59 encoding for Latin Greek cilic Armenian
15:03 I Hebrew Arabic syak Japanese Chinese
15:05 and Korean languages to name a
15:08 few Unicode May convert any one of these
15:10 languages characters into a 16 binary
15:13 digit value but for human readability it
15:15 will often reference the binary value as
15:17 its hexadecimal
15:19 equivalent unicode's adopted naming
15:21 convention consists of a u followed by a
15:24 plus sign and ending with four heximal
15:26 digits in the case of the capital letter
15:28 M of the Latin alphabet the Unicode
15:31 reference would be U plus
15:34 004d exam objective 1.2 compare and
15:36 contrast fundamental data types and their
15:38 their
15:40 characteristics in the context of
15:42 computer programming and databases a
15:44 data type is a classification or
15:46 category of data that determines the
15:48 type of operations that can be performed
15:50 on the data and the storage format to be
15:52 used for that
15:54 data though many different data types
15:56 exist there are five fundamental data
15:59 types that are a part of the CompTIA ITF
16:02 plus certification exam these data types include
16:03 include Char
16:05 Char strings
16:07 strings integers
16:09 integers
16:12 floats and Boolean each one of these
16:14 data types will be covered in their own separate
16:15 separate
16:17 videos next we will cover some of the
16:19 more common operations that can be
16:21 performed on the different data
16:24 types first up are the mathematical or
16:26 arithmetic operations from left to right
16:29 we have addition subtraction multiplic
16:31 ation division exponentiation floor
16:34 Division and modulus in case you have
16:37 not seen the last two operations before
16:38 here are two
16:41 examples floor division returns only the
16:43 integer value of a division equation
16:44 without any fractional values should they
16:45 they
16:48 exist and modulus only Returns the
16:51 remainder value of a division
16:54 equation next we have relational or comparative
16:55 comparative
16:57 operations from left to right there is
17:00 equal not equal greater than less than
17:02 greater than or equal to and less than
17:05 or equal to these operations are used to
17:08 compare two
17:10 values we will close out this video with
17:13 logical operations logical operations
17:17 use keywords like and or and not to
17:19 combine multiple conditional
17:21 statements these conditional statements
17:24 will result in a true or false output
17:27 for our example if x was set equal to
17:30 6 six would be less than 10 and 6 would
17:32 be greater than
17:35 four so this statement would evaluate to
17:39 True exam objective 1.2 compare and
17:41 contrast fundamental data types and their
17:42 their characteristics
17:44 characteristics
17:47 Char Char which is short for character
17:49 is a single textual character that can
17:52 be a letter of the alphabet a symbol or
17:53 a numerical
17:56 digit for the Char data type if a
17:58 numerical digit is used it will be
18:00 treated as text only and you will be
18:01 unable to perform mathematical
18:03 operations with
18:06 it surprisingly the Char data type will
18:08 support relational operations for a
18:11 comparison to take place all Char values
18:12 will first be converted to their binary
18:15 character code values before comparisons take
18:16 take
18:19 place here we will compare capital A and
18:22 the lowercase a of the Latin alphabet
18:23 once the letters are converted to their
18:26 binary values you can then see that the
18:28 binary value for Capital a is less than
18:31 the binary value for lower case a for
18:34 this example we used the aski encoding
18:37 standard a use case for the Char data
18:38 type would be to store a middle initial
18:40 of a name within a database or as
18:43 variable in a computer program please
18:45 note this information is based on the
18:47 knowledge needed for the CompTIA ITF
18:49 plus certification exam there are
18:51 alternative definitions for the Char
18:53 data type especially when applied to certain
18:54 certain
18:58 databases exam objective 1.2 compare and
19:00 contrast fundamental data types and their
19:01 their characteristics
19:03 characteristics
19:05 strings a string is a collection of
19:08 textual characters that can be composed
19:10 of letters of the alphabet symbols
19:13 numerical digits and spaces in most
19:15 programming languages strings will be
19:17 easy to spot as they are often wrapped
19:20 in quotation
19:22 marks for the string data type if a
19:24 numerical digit is used it will be
19:26 treated as text only and you will be
19:28 unable to perform mathematical
19:31 operations with it however many
19:32 programming languages do use the
19:34 addition symbol with multiple string
19:37 values to perform an operation called
19:40 concatenation concatenation is the
19:41 operation of joining character strings
19:45 end to end by doing so this operation
19:47 converts multiple strings into a single
19:49 string to demonstrate we will take the
19:51 string cyber and concatenate it with the
19:54 string security this will result in a
19:57 single string value of a cyber
19:59 security the string data type also
20:01 supports relational
20:03 operations strings are compared one
20:05 character at a time when different
20:07 characters are found then their binary
20:10 codeo values are compared the character
20:12 with the lower Cod point value is
20:14 considered to be
20:16 smaller here we will compare the string
20:19 hello and the string hi we start at the
20:22 beginning of the strings both have a
20:24 capital H so we move on to the next
20:27 letter in each string we see lowercase e
20:29 and lowercase I are different so we will
20:32 compare their binary code Point
20:35 values the binary value for e is less
20:37 than binary value for I so the string
20:40 hello will be evaluated as less than the
20:43 string High For This example we used the
20:44 ask key encoding
20:47 standard there are many use cases for
20:49 the string data type pretty much any
20:51 information that uses a series of
20:54 textual characters in this example first
20:56 and last name fields would certainly be
20:58 great candidates for the string data type
20:59 type
21:02 exam objective 1.2 compare and contrast
21:05 fundamental data types and their characteristics
21:07 characteristics
21:09 integers integer is a data type used to
21:11 represent real numbers that do not have
21:14 fractional values this includes whole
21:20 equivalents it probably goes without
21:21 saying but you can absolutely use
21:23 mathematical operations with the integer data
21:24 data
21:27 type the integer data type also supports
21:33 ations there are many use cases for the
21:35 integer data type a great example would
21:38 be an age field with something like
21:40 phone numbers data type selection can be
21:43 tricky technically you could use the
21:45 integer data type but using a string
21:46 data type will help preserve phone
21:49 number formatting postal codes are also
21:52 tricky in the United States postal codes
21:54 are five numerical digits but
21:56 internationally codes can be alpha
21:59 numeric so in certain situations and
22:01 integer data type could be used but like
22:03 phone numbers the string data type might
22:06 be the better choice exam objective 1.2
22:08 compare and contrast fundamental data
22:10 types and their characteristics
22:12 characteristics
22:15 floats float is a data type composed of
22:17 a number that is not an integer because
22:19 it includes a fractional value
22:21 represented in decimal format if you see
22:23 a decimal point in the value and no
22:25 quotation marks there is a good chance
22:26 it is a
22:29 float now one thing to be on the lookout
22:31 for is a whole number represented with a
22:33 zero to the right of the decimal point
22:36 do you see the last float example
22:40 22.0 the 0 and 22.0 adds no additional
22:41 value to the number and could easily
22:44 have been represented as just 22 but as
22:46 long as there is a decimal point this
22:47 will belong to the float data type and
22:49 not the integer data
22:52 type with the float data type you can
22:55 absolutely use mathematical operations
22:57 you can even mix float data types with
23:00 integer data types y just be careful of
23:02 integer data types turning into float
23:05 data types as a result of a mathematical
23:08 operation let's use five halves as an
23:11 example the five is an integer and the
23:14 two is an integer once the division
23:15 operation takes place the quotient becomes
23:16 becomes
23:20 2.5 now you have a float depending on
23:21 the programming language this could
23:24 cause an error so be mindful of this in the
23:25 the
23:28 future the float data type also supports relational
23:33 operations a very common use for the
23:36 float data type is currency or monetary
23:38 values the example here is using the
23:40 float data type to keep track of an
23:42 account balance can you think of any
23:46 other uses for the float data type exam
23:48 objective 1.2 compare and contrast
23:51 fundamental data types and their characteristics
23:53 characteristics
23:55 Boolean Boolean is a special numeric
23:57 data type that indicates if a condition
24:00 is true or false the Boolean value is
24:02 stored using a single binary digit of
24:05 either a zero or one so keep on the
24:07 lookout for the words true and false or
24:09 any scenario where only two options
24:12 exist these are great signifiers that
24:14 you are working with the Boolean data
24:17 type with the Boolean data type we will
24:19 be focused primarily on logical
24:23 operations using the and or and not
24:25 operations we are able to combine and
24:27 manipulate conditional statements to
24:30 derive a truth or false output let's
24:31 take a look at each of these logic operations
24:33 operations
24:36 now first up we have the logical and
24:39 operator the N operator returns true if
24:42 both inputs are true and returns false
24:44 otherwise let's try an example and
24:47 compare the inputs to the and operator
24:50 table to find the appropriate output the
24:52 first conditional statement will be my
24:55 shirt is pink well that is a true
24:57 statement so we will use true for input
24:59 a the the second conditional statement
25:03 will be my eyes are brown well that is
25:05 also a true statement so we will use
25:08 true for input B using the an operator
25:09 table we can now see our resulting
25:12 Boolean value for this example would be
25:16 true now for the logical or operator the
25:18 or operator returns true if any input is
25:22 true and returns False only when both
25:25 inputs are false let's try an example
25:27 and compare the inputs to the or
25:29 operator table to find the appropriate
25:31 output the first conditional statement
25:34 will be my shirt is pink well that is a
25:36 true statement so we will use true for
25:39 input a the second conditional statement
25:43 will be my hair is blue well that is a
25:45 false statement so we will use false for
25:48 input B using the or operator table we
25:50 can now see our resulting Boolean value
25:52 for this example would be true as at
25:55 least one of our inputs evaluated to
25:58 True finally The Logical not oper op
26:01 Ator the not operator returns true if
26:03 the input is false and false if the
26:06 input is true there are other logical
26:08 operators but these will serve as a
26:10 great foundation for
26:12 now now that we have discussed some of
26:14 the more common logical operators where
26:17 might we find these in use I got the perfect
26:18 perfect
26:20 example every day we find ourselves
26:22 using a search engine to locate a
26:24 resource on the internet well why not
26:26 use these logical operators to improve
26:29 our searches and Link conditions
26:31 together for my example I will use the
26:34 Google search engine by using logical
26:36 operators in your search you will
26:37 effectively be performing an advanced Google
26:38 Google
26:42 search I am going to start with the and
26:45 operator my example search will have a
26:46 searching for a resource that contains
26:50 the word CompTIA and the word ITF plus
26:52 by using the N operator between these
26:54 two words Google will return results
26:56 containing both
26:59 words my next search will utilize the or
27:01 operator this example will search for
27:06 the word CompTIA or the word ITF plus by
27:08 using the or operator between these two
27:10 words Google will return results
27:11 containing at least one search word or
27:13 the other but will not require both
27:16 words to be present in the resource
27:18 additionally to exclude a specific word
27:20 from a search result just place a
27:22 subtraction symbol or minus sign in
27:24 front of the word then any resource
27:26 containing that word will be omitted
27:28 from your results
27:31 exam objective 1.3 illustrate the basics
27:33 of computing and
27:35 processing this exam objective starts
27:37 with a definition most of us are
27:40 familiar with the definition of a
27:42 computer a computer is an electronic
27:45 device that manipulates information or
27:48 data it has the ability to input process
27:50 output and store
27:52 data within a computer there is a
27:56 traffic flow of binary zeros and ones at
27:58 any given time data is coming into a
28:00 Computing device as an input being
28:01 processed or manipulated by the
28:03 computer's processor being stored for
28:07 later use or distributed as an output in
28:08 the middle of all this we have the
28:11 system memory that serves as a staging
28:12 or holding area for
28:15 data data physically moves about a
28:17 Computing device using the device's
28:19 hardware Hardware refers to the physical
28:22 elements of a computer another common
28:25 word used in it to refer to Hardware is
28:26 the word
28:28 infrastructure so if you hear the word
28:30 infrastructure think Hardware from our
28:33 previous traffic example Hardware would
28:38 roadways so how does a computer decide
28:41 what to do with the data that is what
28:43 software is for software is the
28:45 instructions that tell a computer what
28:48 to do another common word used in it
28:50 that is closely tied to software is the
28:53 word logical so if you hear the word
28:56 logical think software from our previous
28:59 traffic example software would be the
29:02 street signs and traffic
29:04 signals one last term you need to learn
29:07 before moving on is peripheral device a
29:09 peripheral device is an auxiliary device
29:11 that connects to and works with a
29:13 computer and is used to put information
29:15 into and get information out of the
29:19 computer exam objective 1.3 illustrate
29:21 the basics of computing and processing
29:22 input and
29:25 output an input is when the computer
29:26 receives data from a user through a
29:28 peripheral device that conects to and
29:31 works with a
29:33 computer an output is when the computer
29:36 displays plays or distributes data to a
29:38 user through a peripheral device that
29:41 connects to and works with a
29:43 computer now that we know what an input
29:45 and an output are let's classify
29:47 peripheral devices based on whether they
29:50 function as an input device or output
29:53 device I am going to start with input
29:57 devices for inputs we have a keyboard
30:00 which allows a user to input text Data a
30:02 mouse which allows a user to input hand
30:05 movement data a camera which allows a
30:08 user to input visual data and a scanner
30:11 which allows a user to input image data
30:13 there are many more but hopefully you
30:17 are getting the idea now for output
30:20 devices for outputs we have a speaker
30:23 which outputs sound data a monitor which
30:27 outputs visual data a projector which is
30:30 also used to output visual data and a
30:33 printer which outputs image data again
30:35 this is not a complete list of output
30:36 devices but I hope you are getting
30:38 comfortable classifying peripheral
30:40 devices based on their ability to input
30:43 or output Data before I close out this
30:45 video we have one more group some
30:47 devices can perform as both an input and
30:51 as an output device these devices
30:53 include a headset which inputs sound
30:55 data through a microphone and outputs
30:58 data through a speaker a touch screen
31:00 display which inputs a user's hand
31:02 movements or gestures and outputs visual
31:05 data and a multifunction printer which
31:06 can input image data through its scanner
31:08 functions and output image data through
31:09 its printer
31:13 functions exam objective 1.3 illustrate
31:15 the basics of computing and
31:17 processing processing is the
31:21 manipulation of data by a computer's
31:24 processor the computer's processor is
31:26 the brain of the computer it receives
31:29 inputs or previously stored data and
31:31 manipulates that data based on the
31:33 instructions it receives from software
31:36 programs the data is then provided as an
31:38 output for the user or is stored for later
31:39 later
31:42 use exam objective 1.3 illustrate the
31:46 basics of computing and processing
31:48 Storage storage is a process through
31:51 which data is retained for future use
31:53 data retention can be either temporary or
31:55 or
31:58 permanent for temporary storage
31:59 specifically while the Computing device
32:02 is powered on any necessary data for the
32:04 device's operation will be held in the
32:07 system memory unfortunately once the
32:09 device is powered off the system memory
32:12 will no longer retain any data for a
32:14 more permanent data storage solution a
32:17 storage Drive can be used any data
32:18 preserved on a storage Drive can be
32:20 brought back into the system memory as
32:22 needed and will retain data even when a
32:26 Computing device is powered off exam
32:28 objective 1.4 explain exp the value of
32:30 data and
32:32 information an asset is property owned
32:34 by a person or company regarded as
32:37 having value when you think of assets
32:39 things like properties cars and other
32:41 material possessions probably come to
32:44 mind but when you think about Digital
32:46 Data it is important to understand that
32:47 Digital Data is more than a collection
32:50 of zeros and ones Digital Data can
32:53 certainly be of significant value to an
32:55 organization or even an individual and
32:58 is therefore also considered an asset
33:00 just like you would consider a security
33:02 system for your home or car or at least
33:04 lock the doors while away from home or
33:06 parking your car in a bad neighborhood
33:08 you should also invest in securing your
33:10 Digital Data the more valuable the
33:12 Digital Data the more essential it will
33:14 be to put various security control
33:18 measures in place exam objective 1.4
33:20 explain the value of data and
33:22 information relationship of data to creating
33:24 creating
33:26 information for this exam topic we will
33:28 need to distinguish between the
33:30 definitions data information and
33:33 insights data is raw values collected by
33:36 a computer system it is meaningless
33:39 until placed in the correct context for
33:41 an example of this topic I will start
33:43 with the data value of 100 without
33:46 context this 100 could be
33:49 anything information is data that has
33:50 been processed into a form that has
33:53 meaning and is useful information
33:56 provides us with context continuing with
33:58 our example the data value of 100 has
34:00 been given the context of
34:03 Miles our last definition will be
34:06 Insight an Insight is a meaningful and
34:08 deep understanding of something when
34:10 enough quality information is combined
34:13 and analyzed insights can be formed now
34:16 back to our example one more time 100
34:18 miles could be considered a very long
34:21 distance if walking or 100 miles could
34:23 be a very short trip for a
34:26 plane what pieces of information we
34:29 associate together in this case 100
34:31 miles and a transportation method of
34:33 walking or flying by plane will lead to different
34:34 different
34:38 insights exam objective 1.4 explain the
34:40 value of data and information intellectual
34:42 intellectual
34:45 property intellectual property is a
34:46 category of property that includes
34:49 creations of the human intellect there
34:51 are many types of intellectual property
34:53 but for the CompTIA ITF plus
34:55 certification exam we will be focusing
34:59 on trademarks copyrights and patents we
35:01 will discuss their definitions and how
35:02 each might be
35:04 applied a trademark is a type of
35:06 intellectual property consisting of a
35:09 recognizable sign design or expression
35:11 that uniquely identifies one product or
35:14 service from others a few items that
35:15 could be trademarked would include
35:19 company names product names slogans and
35:21 logos copyright is another type of
35:23 intellectual property that protects
35:25 original works of authorship from
35:28 publication distribution and Sal without
35:31 the author's permission one stipulation
35:33 is that the work must be expressed in a
35:36 tangible form in other words a book
35:37 would need to have been written on a
35:39 physical medium like paper or published
35:41 in order to be eligible for copyright
35:44 protections when thinking of copyright
35:45 most people only think of the written
35:48 word but copyright can extend to items
35:50 like graphical images and logos or even
35:52 computer software
35:55 programs the last intellectual property
35:58 we will cover is a patent a patent is a
36:00 type of intellectual property that
36:02 grants exclusive rights to an invention
36:04 which is a product or a process that
36:06 provides a new way of doing something or
36:09 offers a new solution to a problem
36:11 unlike copyrights patents can be applied
36:13 to an idea even if the idea has not yet
36:17 been made tangible exam objective 1.4
36:19 explain the value of data and
36:21 information digital
36:24 products a digital product is a product
36:26 that is sold or distributed as binary
36:29 computer data digital products include
36:32 items like software
36:34 applications video
36:38 downloads computer games and
36:41 ebooks when creating digital products
36:44 there are some upsides and downsides the
36:46 overhead costs to manufacture and
36:48 distribute digital products is very low
36:51 but the effort time and infrastructure
36:53 costs to design and maintain a digital
36:55 product are usually substantial
36:58 something we certainly know well
37:00 this combination of factors is what
37:02 makes digital products so easy to copy
37:05 and steal to combat digital product
37:08 theft various copy protections referred
37:10 to as digital Rights Management systems
37:13 or drms for short have been created DRM
37:15 implementations may require items like
37:17 product keys and license codes or
37:19 account setups with authorization
37:23 requirements exam objective 1.4 explain
37:25 the value of data and information
37:29 datadriven business decisions
37:31 this whole exam topic will be about the
37:33 process of using data to make business
37:35 decisions the first step to making any
37:38 informed decision is to collect data a
37:40 computer can collect data from input
37:43 devices other Computing devices or
37:46 software programs in reality this list
37:49 is endless this data is then stored in
37:52 storage drives as raw data in databases
37:55 or large scale data warehouses and data
37:58 centers once enough data is collected
38:01 correlations can be made in the world of
38:03 it correlations are simply relationships
38:06 between data points the advantage of
38:08 using Computing devices to scan for
38:10 correlations is that a computer can
38:12 perform the analysis of data points
38:15 exponentially faster than a human can as
38:17 of late data analysis has been taken
38:19 even further with the increased use of
38:22 artificial intelligence or AI to give a
38:24 real world example of correlation we
38:26 have found that asking viewers to
38:28 subscribe at the end of each video has a
38:29 positive correlation resulting in an
38:31 increase of viewers taking the time to
38:34 actually smash that subscribe button
38:36 this is a rather obvious correlation but
38:38 hopefully the example helps in your
38:40 understanding of the
38:42 topic once data correlations have been
38:45 found and data analysis is completed the
38:47 data must be presented in a meaningful
38:49 manner that is human readable and
38:52 helpful in making insightful decisions a
38:54 meaningful reporting system will usually
38:55 include search and query functions
38:58 charts and graphs or other methods of
39:00 conveying information pictorially
39:02 creating information such as a report is
39:04 one of the most common uses for business
39:08 data exam objective 1.5 compare and
39:10 contrast common units of
39:12 measure up until now we have been
39:15 referring to a single zero or one as a
39:17 binary digit but a more common name for
39:20 this quantity of data is a bit a bit is
39:22 a single binary digit and is the
39:25 smallest increment of data for a
39:28 computer the next unit of measure we
39:30 will discuss is a bite a bite is a unit
39:33 of measure that contains eight bits or a
39:36 series of eight zeros and ones it is
39:37 also important to note that a bit is
39:39 represented with a lowercase b while a
39:42 bite is represented with an uppercase B
39:45 get these two measures confused and you
39:47 will be off by a factor of
39:51 eight now you are a master of measures
39:54 okay not quite but at least you now
39:55 understand the foundational measures bit
39:58 and bite from here every other measure
39:59 we will need to know will just Add a
40:02 prefix to the front of these two
40:04 measures let's start with a single bit
40:08 and add our first prefix kilo kilo means
40:12 thousand so a kilobit equals 1,000 bits
40:16 our next prefix is mega mega means
40:19 million so a megabit equals 1 million
40:24 bits this is followed by Giga Giga means
40:27 billion so a gigabit equals 1 billion
40:32 bits bits then Tera Tera means trillion
40:35 so a terabit equals 1 trillion bits the
40:37 last prefix we need to know for the
40:42 CompTIA ITF plus exam is PA paa means
40:44 quadrillion so a PAB bit equals 1 quadrillion
40:46 quadrillion
40:49 bits these same exact prefixes also
40:51 apply to the base measure of bite let's
40:53 start with a single bite and add our
40:57 first prefix kilo kilo means thousand
41:01 so a kilobyte equals 1,000 bytes our
41:06 next prefix is mega mega means million
41:08 so a megabyte equals 1 million
41:12 bytes this is followed by Giga Giga
41:15 means billion so a gigabyte equals 1 billion
41:16 billion
41:21 bytes then Tera Tera means trillion so a
41:24 terabyte equals 1 trillion bytes and
41:28 then there is Pa Pa means quadrillion so
41:31 a pte equals 1 quadrillion
41:35 bytes exam objective 1.5 compare and
41:39 contrast common units of measure storage
41:41 units we will get to the units of
41:44 measure used for storage data shortly
41:46 first I want to address the concept of
41:49 data at rest data at rest in information
41:51 technology means data that is housed
41:52 physically on a storage Drive in a
41:55 digital format now with that concept out
41:57 of the way we can now take a look at the
42:00 specific measurements used for storage
42:03 or for that matter data that is at
42:07 rest storage units are measured in bytes
42:09 that is uppercase B for bytes not
42:12 lowercase b for bits the storage unit
42:14 bytes can measure anything from a file a
42:16 group of files or the contents of an
42:19 entire storage Drive the storage drive
42:21 itself will also have a capacity
42:24 measured in bytes anytime you have data
42:26 that is not being accessed and is stored
42:27 on a physical medium like a storage
42:29 Drive the preferred unit of measure will
42:33 be bytes as a few bytes can only store a
42:34 minimal amount of information we will
42:36 have to deal in much larger quantities
42:39 of bytes to meet today's demands some
42:42 relevant quantities are
42:44 kilobytes kilobytes are quantities
42:47 measured in thousands of bytes this is
42:49 an expected size for a text file or smaller
42:50 smaller
42:54 images we also have megabytes megabytes
42:56 are quantities measured in millions of
42:59 bytes this is an expected size for
43:01 larger images or smaller
43:03 videos then there are gigabytes which
43:05 are quantities measured in billions of
43:08 bytes this is a common size for
43:10 fulllength cinematic movies and many
43:11 modern hard drives have storage
43:14 capacities in this range now we are
43:17 getting into some big storage units up
43:20 next is terabytes terabytes are
43:21 quantities measured in trillions of
43:24 bytes newer hard drives are now
43:26 exceeding the terabyte threshold the
43:28 last storage unit we need to know for
43:31 the CompTIA ITF plus exam is pedabytes
43:34 pedabytes are quantities measured in
43:36 quadrillions of bytes you might find
43:38 these units of measure in large company
43:41 servers data centers or other places
43:44 where significant quantities of data are
43:46 stored at some point you will
43:48 undoubtedly have to convert between
43:50 different storage unit sizes this chart
43:53 will help a bit visually but I will also
43:55 talk you through it and hit some key
43:58 points for you first as you study I want
44:00 you to commit the order of sizes to
44:02 memory from smallest to
44:05 largest which would be bite kilobyte
44:09 megabyte gigabyte terabyte and paby and
44:11 now from largest to smallest petabyte
44:14 terabyte gigabyte megabyte kilobyte and
44:17 back to a single bite next you should
44:19 know that moving from any storage unit
44:21 measure to the next closest measure is
44:22 always a factor of 1,000
44:24 1,000
44:27 example 1 kilobyte is 1,000
44:31 bytes 1 Megabyte is 1,000
44:34 kilobytes 1 Gigabyte is 1,000
44:37 megabytes 1 terabyte is 1,000 gabt and so
44:38 so
44:40 on understanding the relationship
44:42 between these storage unit sizes will
44:45 assist and converting between them when
44:48 needed before I wrap this topic up I
44:49 wanted to do at least one measurement
44:52 conversion with you for our example we
44:55 will start with 44.6 megabytes I will
44:57 now convert this to kiloby bytes and
45:00 then gigabytes for those of you who
45:03 don't trust your math skills no problem
45:04 the most important part is to follow the
45:07 decimal point which I will now make red
45:09 as the difference from each storage unit
45:11 size to the next closest size is a
45:14 factor of 1,000 we will see the decimal
45:16 point move three place values to the
45:19 left if going up one storage unit size
45:21 or to the right three place values if we
45:24 go down one storage unit size I will
45:27 start with converting 44.6 megabytes to
45:30 kilobytes as we went down a storage unit
45:32 size we have moved the decimal. 3 place
45:35 values to the right now we can see that
45:38 44.6 megabytes is equivalent to 44,600
45:40 44,600
45:44 Koby now I will convert 44.6 megabytes to
45:45 to
45:47 gigabytes as we went up a storage unit
45:49 size we have moved the decimal. 3 place
45:52 values to the left now we can see that
45:57 44.6 MB is equivalent to 0.0 4
45:59 4 6
46:03 GB exam objective 1.5 compare and
46:05 contrast common units of measure throughput
46:07 throughput
46:10 units throughput units are used for data
46:12 in transit data in transit refers to
46:14 Digital Data that is actively moving
46:16 between two different computer systems
46:19 applications or
46:21 locations throughput units are measured
46:24 in bits per second that is lowercase b
46:27 for bits not uppercase B for bytes
46:30 the throughput unit bits per second can
46:31 measure any Digital Data that is
46:34 traveling from one point to another this
46:36 includes measuring the speed of network
46:38 connections between Computing devices or
46:40 internal connections between Computing
46:42 components anytime you have data on the
46:44 move the preferred unit of measure will
46:47 be bits per second as a couple bits is
46:49 not even enough to store a single asky
46:51 character code point we will have to
46:53 deal in much larger quantities of bits
46:56 to meet today's demands some relevant
46:59 throughput unit quantities are kilobits
47:01 per second kilobits per second are
47:03 quantities measured in thousands of bits
47:06 per second this is a relatively low
47:09 throughput rate for modern Computing we
47:12 also have megabits per second megabits
47:14 per second are quantities measured in
47:17 millions of bits per second throughput
47:18 rates in this range are common for
47:21 internet connections in rural areas that
47:23 are using slightly outdated Technologies
47:25 where throughput rates are limited as a
47:27 cost-saving measure or where Li mited
47:28 Network infrastructure
47:31 exists then there are gigabits per
47:32 second which are quantities measured in
47:35 billions of bits per second this is a
47:37 common throughput rate for modern
47:40 internet connections in urban areas
47:41 gigabit connections are more than
47:43 sufficient for most residential demands
47:45 and many corporate
47:47 environments now we are getting into
47:50 some super fast throughput rates up next
47:53 is terabits per second terabits per
47:54 second are quantities measured in
47:57 trillions of bits per second throughput
47:59 rates in this range are relatively new
48:01 and not very
48:04 common unlike a bit which is a static
48:07 measurement bits per second is a dynamic
48:09 measurement as such I think it is worth
48:12 breaking down this topic a bit further
48:16 yes that was an intended pun now for the
48:19 breakdown let's start with bits this is
48:22 a quantity of binary digits no different
48:24 than we learned about
48:26 prior per second is a measurement of
48:29 time the passage of time is what makes
48:31 this measurement
48:34 Dynamic last the division symbol makes
48:37 this a ratio in this case a ratio of
48:38 bits to
48:41 seconds putting all these pieces back
48:43 together we can conclude that bits per
48:45 second is the number of bits that pass a
48:48 fixed point every
48:51 second time for a measurement conversion
48:53 challenge for this challenge we will
48:54 compare three different throughput
48:56 measures each using a different unit and
48:58 determine which throughput speed is the
49:01 fastest here they
49:06 are in the top we have 0.4 5 8 gbits per
49:09 second in the middle we have
49:13 49,8 196 kilobits per second and down at
49:16 the bottom we have 432 megabits per
49:19 second to compare these measures I find
49:21 it best to convert each value to the
49:23 same throughput unit looking at my three
49:26 values I am going to choose megabits per
49:29 second as my unit of choice back at the
49:31 top we see gigabits per second which has
49:33 a measure that is 1,000 times larger
49:35 than that of megabits per second to
49:37 convert from a larger unit of measure to
49:39 a measure one unit smaller we will move
49:42 the decimal point 3 place values to the
49:46 right this results in 458 megabits per
49:49 second returning to the middle value we
49:51 see kilobits per second which has a
49:53 measure that is 1,000 times smaller than
49:56 that of megabits per second to convert
49:57 from a smaller unit of measure to a
50:00 measure one unit larger we will move the
50:03 decimal 3 place values to the left this
50:05 results in
50:09 49.89 6 megabits per second at the
50:12 bottom 432 megabits per second is
50:14 already in the correct unit of measure
50:17 so no conversion is needed comparing
50:19 these values is now much easier as they
50:20 have all been converted to the same
50:23 throughput unit of measure taking a
50:25 quick peek at our original values we can
50:29 now see 0.4 4 5 8 gbits per second is
50:31 the fastest of the three
50:35 values exam objective 1.5 compare and
50:37 contrast common units of measure Precision
50:39 Precision
50:41 measurements every measurement unit we
50:43 have learned thus far has been based on
50:44 factors of
50:47 1,000 for example with bits lowercase b
50:50 there are 1,000 bits in a kilobit there
50:54 are 1,000 kilobits in a megabit and so
50:57 on the same holds true for bytes
51:00 uppercase b as well there are 1,000
51:03 bytes in a kilobyte there are 1,000
51:07 kilobytes in a megabyte Etc and this is
51:08 great as it makes working with larger
51:11 quantities a little easier but you
51:13 should know that these numbers do not
51:15 represent the exact number of bits or
51:19 bytes for a measure these are rounded
51:21 values while the rounded values you have
51:23 learned are great for most uses in the
51:25 world of Information Technology there
51:27 will be times when Precision
51:29 measurements are needed these
51:31 measurements are based on the binary
51:33 numbering system which makes sense as
51:35 computers work at a fundamental level
51:38 with the binary numbering system too so
51:42 if we multiply by two a total of 10
51:44 times or 2 to the 10th power we will end
51:46 up with
51:50 1,24 1,24 is the precise factor between
51:53 each unit of measure 1,24 is fairly
51:55 close to a th000 but when Precision
51:57 measurements are needed rounding to
51:59 1,000 just won't
52:02 do now let's take a closer look at these
52:04 Precision units of measure for
52:07 Simplicity we will just cover bytes any
52:09 principles we apply here to bytes will
52:12 also apply to bits and bits per
52:15 second first notice that 1,24 bytes
52:18 equals a single kib BTE wait what was
52:21 that unit of measure yes the prefixes
52:23 have changed just a little with these
52:26 Precision measurements for this unit the
52:29 prefix Kibby replaced kilo we were also
52:31 given a new acronym to look out for a
52:36 Kibby bite can be represented as KB or
52:39 kib moving on our next Precision unit of
52:42 measure is mebi a single mebi is equal
52:45 to 1,24 kib
52:49 bytes next we have Gibb b a single Gibby
52:54 B is equal to 1,24 Meb bytes then there
52:56 is TBI and
52:58 and
53:01 finally pabby bite using our new
53:03 knowledge of precision measurements
53:05 let's talk our way through a simple
53:07 conversion we are going to convert 4 kib
53:11 bytes to bytes instead of 1,000 our
53:13 factor is now
53:16 1,24 so we will multiply the four in kib
53:19 bytes by 1,24 and see that 4 ktes equals
53:22 precisely 4,096
53:26 bytes exam objective 1.5 compare and
53:30 cont common units of measure processing
53:33 speeds processing speeds are a unit of
53:36 measure for data in use data in use in
53:38 information technology means data that
53:40 is currently being processed or acted
53:43 upon by a systems processor a computer
53:45 has an internal clock the clock speed
53:47 controls the number of Cycles or
53:49 effectively the number of software
53:51 instructions a processor can execute per
53:53 second the processor speed measurement
53:55 used to express cycles per second is Hertz
53:57 Hertz
53:59 a Hertz is a unit of frequency
54:02 equivalent to one cycle per second now
54:03 that we have a base measurement for
54:05 processing speed we need to apply our
54:07 prefixes as a computer processes way
54:10 more than one instruction each
54:12 second some relevant quantities you will
54:14 most likely encounter for processing
54:18 speeds are megahertz megahertz are
54:20 quantities measured in millions of
54:22 cycles per second the clock rates for
54:24 older computers and their processors
54:27 worked at these processing speeds
54:29 it is more likely though that you will
54:30 encounter the unit gigahertz in modern
54:33 Computing devices and processors
54:35 gigahertz are quantities measured in
54:38 billions of cycles per second exam
54:40 objective 1.6 explain the troubleshooting
54:42 troubleshooting
54:44 methodology troubleshooting is simply
54:47 the process of problem solving in the
54:49 world of it you will be called upon to
54:52 solve problems on a regular basis having
54:53 a step-by-step approach to
54:55 troubleshooting will help make this task
54:59 much easier in exam objective 1.6
55:01 CompTIA has outlined a troubleshooting
55:02 process to
55:04 follow CompTIA troubles shooting
55:07 methodology can be broken into eight
55:12 steps one identify the problem two
55:15 research knowledge base or Internet if
55:18 applicable three establish a theory of
55:22 probable cause four test the theory to
55:25 determine the cause five establish a
55:27 plan of action to resolve the problem
55:31 and identify potential effects six
55:34 implement the solution or escalate as
55:37 necessary seven verify full system
55:39 functionality and if applicable
55:43 Implement preventive measures eight
55:45 document findings or Lessons Learned
55:48 actions and outcomes each of these steps
55:51 will be covered in other videos for now
55:53 I want you to commit these steps to
55:54 memory and be able to place them in
55:57 order not only only will you be asked to
55:59 recall these steps on the CompTIA ITF
56:01 plus exam but you will also see this
56:03 troubleshooting methodology on other
56:06 CompTIA certification exams as well exam
56:09 objective 1.6 explain the
56:12 troubleshooting methodology identify the
56:15 problem the first step in comptus
56:17 troubleshooting process is to identify
56:20 the problem to do this we must turn to
56:22 the left side of our brains and think
56:24 logically fortunately we have a few
56:26 guidelines that can help keep us on on
56:28 track during the stage of
56:30 troubleshooting the main objective at
56:32 this stage in the troubleshooting
56:34 process is to gather information
56:37 information can be gathered in many ways
56:40 you can try duplicating the problem
56:42 observing the issue as it occurs can
56:45 give great Insight you can question the
56:48 users if a user is experiencing the
56:49 problem they will have firsthand
56:52 knowledge of the issue also don't
56:54 discount that the issue could be user
56:56 error Computing systems and their
56:59 programs at times can be complex so
57:01 misuse is always a
57:03 possibility identifying the symptoms
57:05 will help narrow down possible causes
57:07 for an issue symptoms could include
57:10 error messages or physical conditions
57:13 many times we can use our sense of smell
57:16 sight touch or hearing as diagnostic
57:19 tools I would probably avoid taste
57:21 determining if anything has changed is
57:24 another way to identify a problem
57:26 commonly issues arise after Chang es or
57:29 updates have taken place finally if
57:31 there are multiple problems treat them
57:33 as separate issues at least until you're
57:35 certain they are related assuming
57:37 multiple symptoms are related to a
57:41 single cause can lead to occasional
57:44 misdiagnosis exam objective 1.6 explain
57:47 the troubleshooting methodology research knowledge
57:48 knowledge
57:51 base step two Inc compus troubleshooting
57:54 process is to research a knowledge base
57:56 a knowledge base is a self-served li
57:58 library of information about a product
58:01 service or topic a knowledge base could
58:04 be compiled by a company manufacturer or
58:06 simply the internet which would probably
58:08 be the biggest knowledge base of
58:10 all the whole idea behind a knowledge
58:12 base is to pull from the experience of
58:14 those who have come before you so don't
58:17 waste time Reinventing the wheel or in
58:19 other words if someone has already
58:21 experienced the same problem and has
58:23 documented the solution and you trust
58:25 the source then maybe their solution can
58:26 work for you too
58:30 2 exam objective 1.6 explain the troubleshooting
58:31 troubleshooting
58:33 methodology establish a theory of
58:35 probable cause and test the
58:38 theory step three in compus
58:40 troubleshooting process is to establish
58:43 a theory of probable cause this step is
58:45 closely related to step four which is to
58:47 test the theory and determine the cause
58:50 these two steps may also be repeated as
58:52 many times as necessary as sometimes our
58:55 initial theory is wrong if at first you
58:57 don't succeed try
59:00 again if you have completed step one
59:03 identify the problem and step two
59:05 research a knowledge base then you
59:07 hopefully have gathered sufficient
59:09 information about an issue to proceed to
59:10 step three establish a theory of
59:13 probable cause here you will begin to
59:15 think about possible causes to an issue
59:16 with the hopes of narrowing down the
59:17 list of
59:20 suspects when first getting going start
59:22 with theories that are easy to test and
59:24 be sure to question the obvious
59:26 assumptions at this point can be
59:28 catastrophic let's say we receive a
59:30 complaint that a user's laptop is not
59:33 working an example of questioning the
59:35 obvious would be to check if it is even
59:38 charged it also helps to think outside
59:40 the box and consider multiple approaches
59:42 you could even work with another
59:44 technician to attack the problem from
59:46 different angles you could work on one
59:48 Theory while your coworker tries another
59:51 theory this approach is referred to as
59:52 divide and
59:55 conquer step four incomp troubleshooting
59:57 process C is to test the theory to
59:59 determine the cause coming up with a theory was a great start but now you
60:01 theory was a great start but now you need to test it while testing is the
60:04 need to test it while testing is the logical step after establishing a theory
60:06 logical step after establishing a theory we need to remember these two steps are
60:08 we need to remember these two steps are an iterative process and we might need
60:10 an iterative process and we might need to repeat them a number of
60:12 to repeat them a number of times testing a theory will require some
60:15 times testing a theory will require some kind of experiment or action to confirm
60:17 kind of experiment or action to confirm the cause of an issue this can include
60:19 the cause of an issue this can include changing out a component for a known
60:21 changing out a component for a known good component or performing an
60:22 good component or performing an experiment on a test system once your
60:25 experiment on a test system once your theory is confirmed and you have found
60:27 theory is confirmed and you have found the root cause of an issue the next step
60:29 the root cause of an issue the next step is to resolve the problem if testing
60:31 is to resolve the problem if testing does not confirm your theory establish a
60:33 does not confirm your theory establish a new Theory at some point you may run out
60:36 new Theory at some point you may run out of ideas and that is okay at that point
60:39 of ideas and that is okay at that point you need to find a way to escalate the
60:41 you need to find a way to escalate the problem a form of escalation could be
60:43 problem a form of escalation could be seeking help from another technician a
60:45 seeking help from another technician a supervisor or a specialist in the area
60:48 supervisor or a specialist in the area you are having an issue
60:49 you are having an issue with exam objective 1.6 explain the
60:53 with exam objective 1.6 explain the troubleshooting methodology EST Lish a
60:56 troubleshooting methodology EST Lish a plan of action to resolve the problem
60:58 plan of action to resolve the problem and identify potential
61:00 and identify potential effects after determining the root cause
61:02 effects after determining the root cause of an issue you can move on to step five
61:05 of an issue you can move on to step five in comptus troubleshooting process
61:07 in comptus troubleshooting process establish a plan of action to resolve
61:09 establish a plan of action to resolve the problem and identify potential
61:11 the problem and identify potential effects within your plan of action you
61:13 effects within your plan of action you are likely to come to one of three
61:15 are likely to come to one of three solution measures repair replace or
61:19 solution measures repair replace or ignore ignoring a problem as a solution
61:22 ignore ignoring a problem as a solution measure is self-explanatory so I will
61:24 measure is self-explanatory so I will focus on repair and replace
61:26 focus on repair and replace the choice between repair and replace
61:28 the choice between repair and replace will usually come down to cost repairing
61:31 will usually come down to cost repairing is usually a cheaper alternative to
61:33 is usually a cheaper alternative to replacing but not always when
61:35 replacing but not always when establishing your plan start by deciding
61:37 establishing your plan start by deciding if you will repair replace or ignore the
61:40 if you will repair replace or ignore the problem the rest of your plan will fall
61:42 problem the rest of your plan will fall in line after that another item to be
61:45 in line after that another item to be aware of when establishing a plan is to
61:47 aware of when establishing a plan is to identify the potential side effects of
61:49 identify the potential side effects of your plan many times in it systems are
61:53 your plan many times in it systems are interconnected a change to one system
61:55 interconnected a change to one system can often have unintended side effects
61:57 can often have unintended side effects on another system you may not be able to
62:00 on another system you may not be able to prevent every side effect but proper
62:02 prevent every side effect but proper planning can at least keep these to a
62:05 planning can at least keep these to a minimum exam objective 1.6 explain the
62:08 minimum exam objective 1.6 explain the troubleshooting methodology implement
62:11 troubleshooting methodology implement the solution or escalate as
62:13 the solution or escalate as necessary once you have established a
62:16 necessary once you have established a plan of action according to step six in
62:18 plan of action according to step six in comptus troubleshooting process it is
62:20 comptus troubleshooting process it is time to implement Your solution the
62:23 time to implement Your solution the biggest concern with implementing a
62:24 biggest concern with implementing a solution is minimizing disruptions and
62:27 solution is minimizing disruptions and obtaining
62:28 obtaining authorization if you did a thorough job
62:30 authorization if you did a thorough job while establishing your plan it will
62:32 while establishing your plan it will include detailed steps required
62:34 include detailed steps required resources and most importantly a roll
62:37 resources and most importantly a roll back or backout plan should things go
62:39 back or backout plan should things go wrong having these items in place will
62:41 wrong having these items in place will help the implementation process run
62:43 help the implementation process run smoother your job at this step is to
62:46 smoother your job at this step is to cause as little disruption to the
62:47 cause as little disruption to the systems in place and their users as
62:50 systems in place and their users as possible in larger environments it may
62:52 possible in larger environments it may even be necessary to seek authorization
62:54 even be necessary to seek authorization for a change
62:56 for a change this authorization might come from a
62:58 this authorization might come from a supervisor or a change Advisory
63:00 supervisor or a change Advisory board exam objective 1.6 explain the
63:04 board exam objective 1.6 explain the troubleshooting methodology verify full
63:07 troubleshooting methodology verify full system functionality and if applicable
63:09 system functionality and if applicable Implement preventive
63:11 Implement preventive measures after the implementation of a
63:14 measures after the implementation of a solution it is time for step seven of
63:16 solution it is time for step seven of comptus troubleshooting process which is
63:18 comptus troubleshooting process which is to verify full system functionality
63:21 to verify full system functionality while you may have only made a change to
63:22 while you may have only made a change to one system in it it is common that
63:25 one system in it it is common that multiple systems will be
63:27 multiple systems will be interconnected thus in addition to
63:29 interconnected thus in addition to verifying that you resolved the initial
63:31 verifying that you resolved the initial issue you will need to verify the system
63:33 issue you will need to verify the system as a whole continues to function
63:36 as a whole continues to function properly now that you have solved the
63:38 properly now that you have solved the problem we want to make sure it does not
63:40 problem we want to make sure it does not happen again preventing the recurrence
63:42 happen again preventing the recurrence of an issue is where you can truly set
63:44 of an issue is where you can truly set yourself apart from other technicians
63:46 yourself apart from other technicians though not always in your control the
63:48 though not always in your control the recurrence of some issues can be avoided
63:50 recurrence of some issues can be avoided with user education by changing a
63:52 with user education by changing a process or by using an alternate
63:54 process or by using an alternate software or equipment provider horse
63:57 software or equipment provider horse exam objective 1.6 explain the
64:00 exam objective 1.6 explain the troubleshooting methodology document
64:03 troubleshooting methodology document findings Lessons Learned actions and
64:06 findings Lessons Learned actions and outcomes the final and last step in
64:09 outcomes the final and last step in comptus troubleshooting process is to
64:11 comptus troubleshooting process is to document your findings again the last
64:14 document your findings again the last step is to document everything document
64:16 step is to document everything document the symptoms document your actions
64:19 the symptoms document your actions document your outcomes and document any
64:21 document your outcomes and document any lessons learned that way when a problem
64:23 lessons learned that way when a problem is resolved there is a complete record
64:26 is resolved there is a complete record of everything that transpired during the
64:28 of everything that transpired during the entire troubleshooting
64:30 entire troubleshooting process this can be extremely helpful
64:32 process this can be extremely helpful when providing any technical support in
64:34 when providing any technical support in the future do you remember step two
64:37 the future do you remember step two research a knowledge base well where do
64:39 research a knowledge base well where do you think a company's knowledge base
64:41 you think a company's knowledge base comes from knowledge bases evolve and
64:43 comes from knowledge bases evolve and grow over time as issues are experienced
64:46 grow over time as issues are experienced so do your best when documenting any
64:48 so do your best when documenting any issues you resolve as people other than
64:50 issues you resolve as people other than you may come to rely on it in the future
64:53 you may come to rely on it in the future exam objective 2.1 classify common types
64:56 exam objective 2.1 classify common types of input and output device
64:58 of input and output device interfaces when dealing with Computing
65:01 interfaces when dealing with Computing components an interface is a physical
65:03 components an interface is a physical connection across which two or more
65:05 connection across which two or more separate components of a computer system
65:06 separate components of a computer system exchange information each interface type
65:09 exchange information each interface type will conform to a standard these
65:12 will conform to a standard these standards are really what we will be
65:13 standards are really what we will be talking about in this exam objective the
65:16 talking about in this exam objective the interface standards create a uniform way
65:18 interface standards create a uniform way of encoding transmitting receiving and
65:21 of encoding transmitting receiving and decoding the binary bits being sent from
65:23 decoding the binary bits being sent from one Computing device to another
65:27 one Computing device to another for the CompTIA ITF plus exam we will be
65:30 for the CompTIA ITF plus exam we will be grouping device interfaces into three
65:32 grouping device interfaces into three categories these three categories are
65:35 categories these three categories are networking
65:37 networking interfaces networking interfaces will
65:39 interfaces networking interfaces will allow communication from one Computing
65:41 allow communication from one Computing device to another Computing device an
65:44 device to another Computing device an example would be an interface that
65:45 example would be an interface that creates a connection from a laptop to a
65:48 creates a connection from a laptop to a smartphone the second category is
65:50 smartphone the second category is peripheral device
65:52 peripheral device interfaces peripheral device interfaces
65:54 interfaces peripheral device interfaces will allow communication from a
65:56 will allow communication from a Computing device to a peripheral device
65:59 Computing device to a peripheral device an example would be an interface that
66:00 an example would be an interface that creates a connection from a laptop to a
66:03 creates a connection from a laptop to a printer and the third category is
66:05 printer and the third category is graphic device
66:07 graphic device interfaces graphic device interfaces
66:09 interfaces graphic device interfaces will allow you to transmit visual data
66:11 will allow you to transmit visual data for display purposes from a Computing
66:13 for display purposes from a Computing device to a graphic device an example
66:16 device to a graphic device an example would be an interface that creates a
66:17 would be an interface that creates a connection from a desktop PC to a
66:19 connection from a desktop PC to a computer
66:22 computer monitor with our three categories aside
66:24 monitor with our three categories aside we can also classify interfaces as being
66:27 we can also classify interfaces as being either wired or Wireless wired
66:29 either wired or Wireless wired interfaces will require a cable to
66:31 interfaces will require a cable to extend between two devices these cables
66:34 extend between two devices these cables will terminate with a connector and
66:36 will terminate with a connector and these connectors will plug into a port
66:38 these connectors will plug into a port on the device now let us quickly sort
66:40 on the device now let us quickly sort out the difference between connectors
66:42 out the difference between connectors and ports a connector is the side of a
66:45 and ports a connector is the side of a connection with a pin or pins in the
66:48 connection with a pin or pins in the graphic displayed the connectors for
66:49 graphic displayed the connectors for many common Computing interface
66:51 many common Computing interface standards are lined up along the bottom
66:54 standards are lined up along the bottom a port is the side of a connection with
66:56 a port is the side of a connection with a hole or holes in the graphic behind me
66:59 a hole or holes in the graphic behind me the ports for many common Computing
67:01 the ports for many common Computing interface standards are lined up just
67:03 interface standards are lined up just above their corresponding connectors
67:05 above their corresponding connectors plug the connector into its port and we
67:07 plug the connector into its port and we now have a physical connection with
67:09 now have a physical connection with which to transmit data for desktop
67:11 which to transmit data for desktop computers you may have ports on the
67:13 computers you may have ports on the front and back of the case while laptops
67:15 front and back of the case while laptops will typically have ports positioned
67:17 will typically have ports positioned around the edges of the case then there
67:19 around the edges of the case then there are the ports on a smartphone tablet
67:22 are the ports on a smartphone tablet television projector printer and so on
67:25 television projector printer and so on quickly you begin to see Computing ports
67:27 quickly you begin to see Computing ports are everywhere thank goodness there are
67:30 are everywhere thank goodness there are interface standards that keep device
67:32 interface standards that keep device manufacturers all on the same
67:35 manufacturers all on the same page if there is no cable connector or
67:38 page if there is no cable connector or Port we can see then our interface must
67:40 Port we can see then our interface must be Wireless now before going any further
67:43 be Wireless now before going any further I would like to address a big
67:45 I would like to address a big misconception about wireless wireless
67:48 misconception about wireless wireless does not mean a physical connection does
67:50 does not mean a physical connection does not exist wireless connections use radio
67:53 not exist wireless connections use radio frequencies or RF short radio
67:57 frequencies or RF short radio frequencies are an electromagnetic
67:58 frequencies are an electromagnetic signal used to connect Computing devices
68:01 signal used to connect Computing devices without
68:02 without wires this electromagnetic connection
68:05 wires this electromagnetic connection even though invisible to the eye is
68:06 even though invisible to the eye is still a physical property that allows
68:08 still a physical property that allows information to be transmitted from one
68:10 information to be transmitted from one Computing device to another and is
68:12 Computing device to another and is therefore classified as a physical
68:15 therefore classified as a physical interface exam objective 2.1 classify
68:19 interface exam objective 2.1 classify common types of input and output device
68:21 common types of input and output device interfaces electrical
68:24 interfaces electrical signals in in this video I would like to
68:26 signals in in this video I would like to do some bonus teaching while electrical
68:29 do some bonus teaching while electrical signaling is not an official CompTIA ITF
68:32 signaling is not an official CompTIA ITF plus exam topic it will help with your
68:34 plus exam topic it will help with your understanding of interfaces especially
68:36 understanding of interfaces especially graphic
68:37 graphic interfaces so what is an electrical
68:40 interfaces so what is an electrical signal an electrical signal is when
68:42 signal an electrical signal is when electricity is used to convey
68:44 electricity is used to convey information this is usually accomplished
68:47 information this is usually accomplished by manipulating the electrical property
68:49 by manipulating the electrical property voltage up and down as it travels across
68:51 voltage up and down as it travels across a medium such as a copper wire the most
68:54 a medium such as a copper wire the most basic example example of this was
68:56 basic example example of this was sending Morse code across a wire back in
68:58 sending Morse code across a wire back in the day as for the electrical signals
69:01 the day as for the electrical signals themselves there are two main types
69:04 themselves there are two main types analog signals and digital
69:07 analog signals and digital signals an analog signal is a signal
69:10 signals an analog signal is a signal that produces a smooth and continuous
69:12 that produces a smooth and continuous curve in this type of signal the binary
69:15 curve in this type of signal the binary ones and zeros that we transmit are
69:17 ones and zeros that we transmit are represented by the highs and lows of the
69:19 represented by the highs and lows of the signal
69:21 signal voltage here is a visual example of an
69:24 voltage here is a visual example of an analog signal
69:26 analog signal notice how the signal produces smooth
69:28 notice how the signal produces smooth and continuous upward and downward
69:36 curves unlike analog signals a digital signal represents data as a sequence of
69:38 signal represents data as a sequence of discrete values where binary ones and
69:40 discrete values where binary ones and zeros are represented by the presence or
69:43 zeros are represented by the presence or non-presence of voltage an upside to
69:46 non-presence of voltage an upside to digital signals is that they support
69:47 digital signals is that they support higher data throughputs this is probably
69:50 higher data throughputs this is probably why digital signals have mostly replaced
69:52 why digital signals have mostly replaced analog signals in present-day computing
69:57 analog signals in present-day computing here is a visual example of a digital
70:00 here is a visual example of a digital signal we can see that the gradual
70:02 signal we can see that the gradual increases and decreases in voltage are
70:04 increases and decreases in voltage are replaced with discrete values causing
70:06 replaced with discrete values causing the square corners you see in the signal
70:09 the square corners you see in the signal great now you know the basic difference
70:11 great now you know the basic difference between analog and digital signals now
70:14 between analog and digital signals now keep an eye out for analog and digital
70:15 keep an eye out for analog and digital signals as we move forward with this
70:17 signals as we move forward with this exam objective you are sure to see it
70:21 exam objective you are sure to see it again exam objective 2.1 classify common
70:25 again exam objective 2.1 classify common types of input and output device
70:27 types of input and output device interfaces
70:30 interfaces rj11 rj11 is a wired networking
70:33 rj11 rj11 is a wired networking interface standard that has been around
70:34 interface standard that has been around since the
70:35 since the 1970s rj11 where the RJ stands for
70:39 1970s rj11 where the RJ stands for registered Jack is a common connector
70:41 registered Jack is a common connector for telephone Communications and dial up
70:44 for telephone Communications and dial up internet the rj11 connector can support
70:47 internet the rj11 connector can support up to six pins or positions into which
70:49 up to six pins or positions into which wires can be inserted but most used
70:51 wires can be inserted but most used cases for the rj11 connector only
70:53 cases for the rj11 connector only utilize two or four of those
70:57 utilize two or four of those pins for those who may not be familiar
70:59 pins for those who may not be familiar with old school telephones dialup
71:01 with old school telephones dialup internet or even DSL internet here is an
71:04 internet or even DSL internet here is an example installation diagram this
71:06 example installation diagram this diagram in particular depicts how DSL is
71:09 diagram in particular depicts how DSL is commonly installed I will start at the
71:12 commonly installed I will start at the rj1 wall socket this is the connection
71:15 rj1 wall socket this is the connection point in the home or office to the
71:17 point in the home or office to the telecommunication
71:18 telecommunication provider next we have a splitter this is
71:22 provider next we have a splitter this is specific to a DSL installation as it
71:25 specific to a DSL installation as it separates internet and telephone traffic
71:28 separates internet and telephone traffic for telephone or dialup Services you
71:30 for telephone or dialup Services you would not have needed a splitter as you
71:32 would not have needed a splitter as you would just run an rj11 cable directly to
71:34 would just run an rj11 cable directly to the telephone or dialup modem continuing
71:38 the telephone or dialup modem continuing with our DSL installation you would run
71:40 with our DSL installation you would run two separate rj11 cables from the
71:42 two separate rj11 cables from the splitter one to the telephone and one to
71:44 splitter one to the telephone and one to the DSL modem throughout this whole
71:47 the DSL modem throughout this whole installation only the rj1 network
71:50 installation only the rj1 network interface standard was
71:51 interface standard was used exam objective 2.1 classify common
71:55 used exam objective 2.1 classify common types of input and output device
71:57 types of input and output device interfaces
72:00 interfaces RJ45 RJ45 is a wired networking
72:03 RJ45 RJ45 is a wired networking interface standard that has been around
72:05 interface standard that has been around since the late
72:06 since the late 1980s RJ45 where the RJ stands for
72:10 1980s RJ45 where the RJ stands for registered Jack is a common connector
72:12 registered Jack is a common connector used to terminate ethernet cat cables
72:14 used to terminate ethernet cat cables which are the most common internet
72:16 which are the most common internet cables in use today the RJ45 connector
72:19 cables in use today the RJ45 connector has eight pins or positions into which
72:21 has eight pins or positions into which wires can be inserted when placed side
72:24 wires can be inserted when placed side by side with an rj11 connector the RJ45
72:28 by side with an rj11 connector the RJ45 connector will appear similar in design
72:30 connector will appear similar in design to the rj11 connector but will be
72:32 to the rj11 connector but will be noticeably
72:34 noticeably larger just to make sure I didn't lose
72:36 larger just to make sure I didn't lose you when I mentioned cat cables a moment
72:38 you when I mentioned cat cables a moment ago here is a quick breakdown category
72:41 ago here is a quick breakdown category or cat cables are a type of twisted pair
72:43 or cat cables are a type of twisted pair cabling inside a cat cable are eight
72:46 cabling inside a cat cable are eight individual wires these wires are grouped
72:49 individual wires these wires are grouped into four pairs each pair is colorcoded
72:52 into four pairs each pair is colorcoded and then Twisted together the cable is
72:54 and then Twisted together the cable is then terminated with an RJ45
72:58 then terminated with an RJ45 connector most have experienced these
73:00 connector most have experienced these twisted pair cat cables also referred to
73:02 twisted pair cat cables also referred to as ethernet cables when connecting their
73:05 as ethernet cables when connecting their home routers to the internet or their
73:06 home routers to the internet or their Computing devices to the
73:09 Computing devices to the router exam objective 2.1 classify
73:12 router exam objective 2.1 classify common types of input and output device
73:15 common types of input and output device interfaces
73:17 interfaces NFC nearfield communication or NFC is a
73:20 NFC nearfield communication or NFC is a wireless networking interface standard
73:22 wireless networking interface standard that was released in 2003 NFC uses radio
73:26 that was released in 2003 NFC uses radio frequencies to transmit and receive data
73:29 frequencies to transmit and receive data over a short distance of a few
73:30 over a short distance of a few centimeters to be more precise the
73:33 centimeters to be more precise the official CompTIA ITF plus study guide
73:36 official CompTIA ITF plus study guide sets NFC distance limitations at 6 cm or
73:39 sets NFC distance limitations at 6 cm or 2 in and nfc's data throughput rates max
73:42 2 in and nfc's data throughput rates max out at 424 kilobits per second while
73:46 out at 424 kilobits per second while nfc-based connections have many uses by
73:49 nfc-based connections have many uses by far the most common use is contactless
73:51 far the most common use is contactless Payment Processing how many times a day
73:53 Payment Processing how many times a day do you take out your credit card or
73:55 do you take out your credit card or smartphone and tap that payment device
73:58 smartphone and tap that payment device each time you do you are using NFC to
74:00 each time you do you are using NFC to send your credit card information to the
74:02 send your credit card information to the payment
74:04 payment device NFC also provides a onetoone
74:07 device NFC also provides a onetoone connection with bidirectional
74:09 connection with bidirectional communication no oneway traffic here and
74:12 communication no oneway traffic here and if that wasn't enough NFC transmits and
74:15 if that wasn't enough NFC transmits and receives data with built-in security
74:18 receives data with built-in security protocols exam objective 2.1 classify
74:21 protocols exam objective 2.1 classify common types of input and output device
74:24 common types of input and output device interfaces
74:26 interfaces Bluetooth Bluetooth is a wireless
74:28 Bluetooth Bluetooth is a wireless networking interface and peripheral
74:30 networking interface and peripheral device interface standard that was
74:32 device interface standard that was introduced in
74:33 introduced in 1998 Bluetooth uses radio frequencies to
74:36 1998 Bluetooth uses radio frequencies to transmit and receive data over a short
74:38 transmit and receive data over a short distance of a few meters stats
74:41 distance of a few meters stats associated with Bluetooth can be
74:43 associated with Bluetooth can be debatable so I will give you the numbers
74:45 debatable so I will give you the numbers provided in the official CompTIA ITF
74:47 provided in the official CompTIA ITF plus study guide the guide sets
74:49 plus study guide the guide sets Bluetooth distance limitations at 10 m
74:52 Bluetooth distance limitations at 10 m or 30 ft and has Bluetooth data
74:54 or 30 ft and has Bluetooth data throughput rate rates maxing out at 24
74:56 throughput rate rates maxing out at 24 megabits per second in highspeed
74:58 megabits per second in highspeed mode to establish a Bluetooth connection
75:01 mode to establish a Bluetooth connection you will need to head to the setting
75:03 you will need to head to the setting menu this process is consistent no
75:06 menu this process is consistent no matter the device be sure you have the
75:08 matter the device be sure you have the Bluetooth antenna enabled or turned on
75:10 Bluetooth antenna enabled or turned on to allow for Bluetooth radio
75:16 Transmissions next you will need to search for and select the device you
75:18 search for and select the device you would like to pair or Bond withd pairing
75:20 would like to pair or Bond withd pairing is the process of establishing a
75:22 is the process of establishing a Bluetooth connection between two devices
75:29 for last step some devices will use an authentication passcode for security if
75:32 authentication passcode for security if used this passcode will be displayed at
75:34 used this passcode will be displayed at the time the pair request is initiated
75:37 the time the pair request is initiated at this point just enter the passcode to
75:39 at this point just enter the passcode to accept the
75:41 accept the connection Bluetooth is a versatile
75:44 connection Bluetooth is a versatile interface standard if you recall from
75:46 interface standard if you recall from the beginning of this video Bluetooth is
75:48 the beginning of this video Bluetooth is a wireless networking interface and
75:50 a wireless networking interface and peripheral device interface standard two
75:53 peripheral device interface standard two for the price of one
75:55 for the price of one networking interface uses include
75:57 networking interface uses include bluetooth tethering or the sharing of an
75:59 bluetooth tethering or the sharing of an internet connection from one device to
76:01 internet connection from one device to another through a Bluetooth connection
76:04 another through a Bluetooth connection then there is Bluetooth file sharing
76:06 then there is Bluetooth file sharing which allows the transfer of files
76:07 which allows the transfer of files between devices just remember to keep in
76:10 between devices just remember to keep in mind that Bluetooth throughput data
76:12 mind that Bluetooth throughput data rates will be a significant limitation
76:13 rates will be a significant limitation for larger data
76:15 for larger data transfers as for peripheral device
76:17 transfers as for peripheral device interface uses Bluetooth allows you to
76:19 interface uses Bluetooth allows you to wirelessly connect a keyboard mouse
76:22 wirelessly connect a keyboard mouse printer speakers and many other
76:24 printer speakers and many other peripheral devices devices to your
76:25 peripheral devices devices to your Computing device so long as they are
76:27 Computing device so long as they are within a few meters of each
76:29 within a few meters of each other exam objective 2.1 classify common
76:33 other exam objective 2.1 classify common types of input and output device
76:35 types of input and output device interfaces
76:37 interfaces USB USB or Universal serial bus is a
76:40 USB USB or Universal serial bus is a wired peripheral device interface
76:42 wired peripheral device interface standard that was released in
76:44 standard that was released in 1996 USB has been adopted well
76:48 1996 USB has been adopted well universally you can find USB in use just
76:50 universally you can find USB in use just about everywhere USB also has a host of
76:54 about everywhere USB also has a host of features
76:56 features feature number one USB plug-and play USB
77:00 feature number one USB plug-and play USB plug-and playay refers to the ability of
77:02 plug-and playay refers to the ability of a computer system to automatically
77:04 a computer system to automatically detect and configure a USB device Plug
77:06 detect and configure a USB device Plug and Play revolutionized the way we
77:08 and Play revolutionized the way we connect and use peripheral devices by
77:10 connect and use peripheral devices by eliminating the need for complex manual
77:13 eliminating the need for complex manual software
77:14 software installations who doesn't like a
77:16 installations who doesn't like a convenient and userfriendly option just
77:18 convenient and userfriendly option just plug in your device that utilizes the
77:20 plug in your device that utilizes the USB peripheral device standard for
77:22 USB peripheral device standard for connection and you're done
77:25 connection and you're done feature number two hot
77:27 feature number two hot swappable hot swappable for USB means
77:30 swappable hot swappable for USB means that you can plug or unplug USB devices
77:32 that you can plug or unplug USB devices from your computer while it is powered
77:34 from your computer while it is powered on without needing to restart or shut
77:36 on without needing to restart or shut down the system providing convenient and
77:38 down the system providing convenient and seamless
77:40 seamless connectivity feature number three we got
77:44 connectivity feature number three we got power with the USB peripheral device
77:46 power with the USB peripheral device interface connectivity is further
77:48 interface connectivity is further enhanced as it enables the simultaneous
77:50 enhanced as it enables the simultaneous transfer of data and power between
77:53 transfer of data and power between devices to do this a USB cable contains
77:56 devices to do this a USB cable contains four copper wires two wires to send and
77:59 four copper wires two wires to send and receive data and two wires to provide
78:02 receive data and two wires to provide Power and ground with USB's main
78:04 Power and ground with USB's main features explained I will now help you
78:06 features explained I will now help you with understanding the many types of
78:08 with understanding the many types of connectors and ports that USB
78:11 connectors and ports that USB utilizes here is a quick look at the
78:13 utilizes here is a quick look at the ports and connectors for the USB
78:15 ports and connectors for the USB standard most of these should be
78:17 standard most of these should be recognizable all except USB type B this
78:20 recognizable all except USB type B this one doesn't get much love the presence
78:23 one doesn't get much love the presence of USB type B port has mostly been
78:25 of USB type B port has mostly been confined to printers another useful fact
78:28 confined to printers another useful fact is that USB type-c connectors are
78:30 is that USB type-c connectors are reversible or
78:32 reversible or non-keyed meaning you can insert a USB
78:35 non-keyed meaning you can insert a USB type-c connector into its port with
78:37 type-c connector into its port with either side facing
78:39 either side facing up exam objective 2.1 classify common
78:43 up exam objective 2.1 classify common types of input and output device
78:45 types of input and output device interfaces fire
78:48 interfaces fire wire firewire is a wired peripheral
78:51 wire firewire is a wired peripheral device interface standard that was
78:52 device interface standard that was released in 1995
78:54 released in 1995 with fire wire there is not much to talk
78:57 with fire wire there is not much to talk about in fact I am sure a few of you are
79:00 about in fact I am sure a few of you are scratching your heads wondering what
79:01 scratching your heads wondering what fire wire is the fire wire standard came
79:04 fire wire is the fire wire standard came out about the same time as USB but it
79:07 out about the same time as USB but it did not receive wide support from
79:08 did not receive wide support from Computing manufacturers leading to its
79:11 Computing manufacturers leading to its obscurity fire wire provides many of the
79:14 obscurity fire wire provides many of the same features as USB including being
79:16 same features as USB including being plug andplay capable hot swappable and
79:18 plug andplay capable hot swappable and also provides peripheral devices with
79:20 also provides peripheral devices with power in addition to data Transmissions
79:27 connectors for fire wire come with either six or four pins now one last
79:30 either six or four pins now one last word of caution be careful not to
79:32 word of caution be careful not to confuse the six pin connector with that
79:34 confuse the six pin connector with that of the USB type B connector they are
79:37 of the USB type B connector they are very similar in
79:40 very similar in appearance exam objective 2.1 classify
79:43 appearance exam objective 2.1 classify common types of input and output device
79:46 common types of input and output device interfaces
79:54 Thunderbolt Thunderbolt is a newer wired networking interface peripheral device
79:56 networking interface peripheral device interface and graphical device interface
79:58 interface and graphical device interface standard allinone it was developed by
80:01 standard allinone it was developed by Intel and released in
80:03 Intel and released in 2011 Thunderbolt was primarily used with
80:06 2011 Thunderbolt was primarily used with Mac workstations and laptops but has
80:08 Mac workstations and laptops but has continued to grow in popularity
80:10 continued to grow in popularity expanding to all types of computing
80:12 expanding to all types of computing devices Thunderbolt adds to many of the
80:15 devices Thunderbolt adds to many of the Great features already offered by USB
80:18 Great features already offered by USB first and foremost Thunderbolt added the
80:20 first and foremost Thunderbolt added the ability to transmit visual data for
80:22 ability to transmit visual data for display purposes thus making it a Gra
80:24 display purposes thus making it a Gra iCal device interface it also offers
80:27 iCal device interface it also offers throughputs up to 40 gbits per second
80:30 throughputs up to 40 gbits per second wow that is
80:32 wow that is fast another cool feature is
80:34 fast another cool feature is thunderbolts ability to connect two Mac
80:36 thunderbolts ability to connect two Mac devices together by forming a network
80:38 devices together by forming a network connection known as a thunderbolt bridge
80:41 connection known as a thunderbolt bridge this is what makes Thunderbolt a
80:43 this is what makes Thunderbolt a networking
80:44 networking interface Thunderbolts latest versions
80:47 interface Thunderbolts latest versions have even become compatible with USB and
80:49 have even become compatible with USB and even use the USB type-c connector uh-oh
80:53 even use the USB type-c connector uh-oh how do you avoid confusion then easy
80:57 how do you avoid confusion then easy look for the Thunderbolt icon next to
80:59 look for the Thunderbolt icon next to the port without the Thunderbolt icon
81:01 the port without the Thunderbolt icon you will not get Thunderbolts bonus
81:04 you will not get Thunderbolts bonus features one more detail for Thunderbolt
81:07 features one more detail for Thunderbolt like USBC Thunderbolt connectors are
81:09 like USBC Thunderbolt connectors are reversible or non-keyed meaning you can
81:12 reversible or non-keyed meaning you can insert a thunderbolt connector into its
81:14 insert a thunderbolt connector into its port with either side facing up course
81:18 port with either side facing up course exam objective 2.1 classify common types
81:21 exam objective 2.1 classify common types of input and output device interfaces RS
81:24 of input and output device interfaces RS R
81:25 R FID RFID is an acronym for radio
81:28 FID RFID is an acronym for radio frequency identification and is a
81:30 frequency identification and is a wireless peripheral device interface
81:32 wireless peripheral device interface technology used to communicate and
81:34 technology used to communicate and interact with RFID enabled peripherals
81:37 interact with RFID enabled peripherals this interface allows for wireless
81:39 this interface allows for wireless identification tracking and data
81:41 identification tracking and data exchange between the peripheral devices
81:43 exchange between the peripheral devices and a source Computing device this
81:46 and a source Computing device this standard is best suited for enhancing
81:48 standard is best suited for enhancing Automation and efficiency in various
81:50 Automation and efficiency in various Industries and applications
81:57 when using RFID an RFID reader scans a tag the tag then responds back with
82:00 tag the tag then responds back with information that has been programmed
82:02 information that has been programmed into it RFID systems can be either
82:05 into it RFID systems can be either passive or active in nature passive RFID
82:08 passive or active in nature passive RFID systems consist of an RFID tag and
82:10 systems consist of an RFID tag and reader where the tag relies on the
82:12 reader where the tag relies on the reader's energy in the form of
82:14 reader's energy in the form of electrical inductance to power and
82:16 electrical inductance to power and transmit its stored information active
82:19 transmit its stored information active RFID systems on the other hand use
82:21 RFID systems on the other hand use battery powered tags that actively send
82:23 battery powered tags that actively send signals to the reader allowing for
82:25 signals to the reader allowing for longer ranges and continuous tracking
82:28 longer ranges and continuous tracking passive RFID is costeffective and
82:30 passive RFID is costeffective and suitable for short- range applications
82:33 suitable for short- range applications while active RFID offers greater range
82:35 while active RFID offers greater range and real-time tracking capabilities
82:37 and real-time tracking capabilities making it ideal for scenarios like asset
82:39 making it ideal for scenarios like asset management or vehicle
82:42 management or vehicle tracking RFID technology is widely
82:45 tracking RFID technology is widely utilized for inventory control and
82:47 utilized for inventory control and tracking due to its ability to provide
82:49 tracking due to its ability to provide accurate and efficient identification
82:51 accurate and efficient identification and monitoring of assets by tagging
82:54 and monitoring of assets by tagging items with RFID tags and deploying RFID
82:57 items with RFID tags and deploying RFID readers businesses can automate
82:59 readers businesses can automate Inventory management streamline supply
83:01 Inventory management streamline supply chain operations and gain real-time
83:03 chain operations and gain real-time visibility into stock levels location
83:05 visibility into stock levels location tracking and movement
83:08 tracking and movement history RFID technology is also commonly
83:12 history RFID technology is also commonly employed for security access control
83:14 employed for security access control systems by utilizing RFID cards or key
83:17 systems by utilizing RFID cards or key fobs embedded with RFID tags individuals
83:20 fobs embedded with RFID tags individuals can easily gain authorized access to
83:23 can easily gain authorized access to secured areas by presenting their
83:24 secured areas by presenting their credentials to RFID readers using RFID
83:28 credentials to RFID readers using RFID in this manner assists in ensuring only
83:30 in this manner assists in ensuring only authorized Personnel can enter
83:32 authorized Personnel can enter restricted
83:33 restricted areas exam objective 2.1 classify common
83:36 areas exam objective 2.1 classify common types of input and output device
83:39 types of input and output device interfaces
83:41 interfaces VGA VGA is short for video graphics
83:44 VGA VGA is short for video graphics array and is a graphic device interface
83:46 array and is a graphic device interface standard that was released in 1986 and
83:48 standard that was released in 1986 and was very popular with older Computing
83:51 was very popular with older Computing devices this standard is not the oldest
83:53 devices this standard is not the oldest graphic interface standard but is the
83:55 graphic interface standard but is the oldest one we will cover for this
83:57 oldest one we will cover for this CompTIA ITF plus exam some useful facts
84:00 CompTIA ITF plus exam some useful facts about this standard are that it uses a
84:02 about this standard are that it uses a 15 pin connector that is often signified
84:05 15 pin connector that is often signified by the color blue the standard is
84:07 by the color blue the standard is designed to transmit video only so if
84:10 designed to transmit video only so if you want audio to you are going to need
84:12 you want audio to you are going to need another interface and cable for that VGA
84:15 another interface and cable for that VGA also uses analog signals to transmit
84:17 also uses analog signals to transmit data now we discussed in the electrical
84:20 data now we discussed in the electrical signals video that analog signals do not
84:22 signals video that analog signals do not transmit as fast as digital signals as a
84:25 transmit as fast as digital signals as a byproduct the use of analog signals with
84:28 byproduct the use of analog signals with the VGA graphic interface standard
84:30 the VGA graphic interface standard causes it to be incapable of supporting
84:32 causes it to be incapable of supporting higher resolutions or the amazing
84:34 higher resolutions or the amazing Graphics that we have become accustomed
84:36 Graphics that we have become accustomed to no HD or highdefinition images with
84:39 to no HD or highdefinition images with this
84:42 this standard the VGA standard also separated
84:45 standard the VGA standard also separated and individually transmitted the colors
84:47 and individually transmitted the colors of red green and blue or the RGB color
84:50 of red green and blue or the RGB color values this has led to some strange
84:53 values this has led to some strange troubleshooting issues over the years
84:55 troubleshooting issues over the years for example damag cables would cause
84:58 for example damag cables would cause screens to render colors incorrectly in
85:00 screens to render colors incorrectly in the case of this screen image behind me
85:03 the case of this screen image behind me it is very possible that the wire
85:04 it is very possible that the wire responsible for transmitting the green
85:06 responsible for transmitting the green color values has been damaged within the
85:08 color values has been damaged within the VGA cable leaving only the red and blue
85:11 VGA cable leaving only the red and blue values the same issue can also occur if
85:14 values the same issue can also occur if the pins in the connector have become
85:16 the pins in the connector have become bent or broken exam objective 2.1
85:19 bent or broken exam objective 2.1 classify common types of input and
85:21 classify common types of input and output device interfaces DVI
85:25 output device interfaces DVI digital video interface or DVI for short
85:29 digital video interface or DVI for short is a graphic device interface standard
85:31 is a graphic device interface standard that was released in
85:32 that was released in 1999 that was over a decade after the
85:35 1999 that was over a decade after the release of the VGA standard DVI had the
85:38 release of the VGA standard DVI had the main job of Bridging the Gap between old
85:40 main job of Bridging the Gap between old and new older Display Devices were using
85:43 and new older Display Devices were using analog signals while manufacturers were
85:45 analog signals while manufacturers were pushing to release newer Display Devices
85:48 pushing to release newer Display Devices that utilized digital signals in order
85:50 that utilized digital signals in order to provide higher resolutions or output
85:52 to provide higher resolutions or output better quality graphics
85:55 better quality graphics improving upon VGA the DVI connector
85:58 improving upon VGA the DVI connector came with a possible 29 pins with more
86:01 came with a possible 29 pins with more pins came more possibilities including
86:03 pins came more possibilities including the ability to solve the problem
86:04 the ability to solve the problem manufacturers were faced with with these
86:07 manufacturers were faced with with these additional pins DVI was able to transmit
86:10 additional pins DVI was able to transmit and received both analog and digital
86:12 and received both analog and digital signals still no audio
86:16 signals still no audio though with up to 29 pins at its
86:19 though with up to 29 pins at its disposal the DVI standard comes with
86:21 disposal the DVI standard comes with five different variants as I stated prev
86:24 five different variants as I stated prev viously DVI supports both analog and
86:26 viously DVI supports both analog and digital signals so here is how we keep
86:29 digital signals so here is how we keep things
86:30 things organized dvi-a is the analog
86:34 organized dvi-a is the analog variant dvi-a transmits only analog
86:37 variant dvi-a transmits only analog signals it is designed to transmit video
86:40 signals it is designed to transmit video signals in a manner similar to a VGA
86:43 signals in a manner similar to a VGA connection dvi-d is the digital
86:46 connection dvi-d is the digital variant dvi-d transmits digital signals
86:50 variant dvi-d transmits digital signals only and its connectors can come in
86:52 only and its connectors can come in different configurations such as single
86:55 different configurations such as single link or dual link in single link DVI
86:58 link or dual link in single link DVI there is only one channel or pathway
87:00 there is only one channel or pathway available for transmitting data and dual
87:01 available for transmitting data and dual link has two Channels with a second
87:04 link has two Channels with a second Channel higher quality Graphics can be
87:07 Channel higher quality Graphics can be achieved it sure seems like we are
87:09 achieved it sure seems like we are always on a quest for bigger and better
87:12 always on a quest for bigger and better graphics okay now for the last
87:15 graphics okay now for the last variant
87:17 variant dvi-i with dvi-i the second I stands for
87:21 dvi-i with dvi-i the second I stands for integrated this variant is a hybrid
87:23 integrated this variant is a hybrid inter face that combines both analog and
87:26 inter face that combines both analog and digital signals in a single connector
87:28 digital signals in a single connector dvi-i also offers single link and dual
87:31 dvi-i also offers single link and dual link configuration options but these
87:33 link configuration options but these options are only supported by the
87:35 options are only supported by the digital half of this
87:36 digital half of this variant that was a lot of information
87:39 variant that was a lot of information and worthy of a quick summary so
87:42 and worthy of a quick summary so remember dvi-a transmits analog signals
87:47 remember dvi-a transmits analog signals dvi-d transmits digital signals and
87:51 dvi-d transmits digital signals and dvi-i transmits both analog and digital
87:53 dvi-i transmits both analog and digital signals
87:55 signals exam objective 2.1 classify common types
87:58 exam objective 2.1 classify common types of input and output device
88:00 of input and output device interfaces
88:02 interfaces HDMI in 2004 the HDMI graphic device
88:06 HDMI in 2004 the HDMI graphic device interface standard was released HDMI
88:09 interface standard was released HDMI stands for highdef multimedia interface
88:12 stands for highdef multimedia interface and it comes with a 19 pin connector now
88:15 and it comes with a 19 pin connector now the name highdefinition multimedia
88:18 the name highdefinition multimedia really says it all HDMI supports
88:20 really says it all HDMI supports multimedia or Audio and Video in one
88:23 multimedia or Audio and Video in one interface
88:24 interface no longer do we need a second cable to
88:26 no longer do we need a second cable to transmit audio data this standard was
88:29 transmit audio data this standard was immediately adopted by television
88:31 immediately adopted by television manufacturers and then quickly spread to
88:33 manufacturers and then quickly spread to all Display Devices today it is the most
88:36 all Display Devices today it is the most widely used graphic device interface
88:39 widely used graphic device interface also as the name implies it supports
88:41 also as the name implies it supports highdefinition resolutions or high
88:43 highdefinition resolutions or high quality Graphics the HDMI standard also
88:47 quality Graphics the HDMI standard also dropped analog signaling altogether and
88:49 dropped analog signaling altogether and is fully
88:51 is fully digital the HDMI graphic device
88:54 digital the HDMI graphic device interface standards connectors come in
88:56 interface standards connectors come in three different sizes to accommodate
88:58 three different sizes to accommodate various devices and their space
89:01 various devices and their space limitations the standard HDMI connector
89:04 limitations the standard HDMI connector shown on the left is the most common and
89:06 shown on the left is the most common and is found on most consumer electronics
89:08 is found on most consumer electronics such as TVs Blu-ray players and gaming
89:11 such as TVs Blu-ray players and gaming consoles on the other hand smaller
89:14 consoles on the other hand smaller devices like tablets smartphones and
89:16 devices like tablets smartphones and some cameras often use the smaller mini
89:18 some cameras often use the smaller mini HDMI connector shown in the middle or
89:21 HDMI connector shown in the middle or the micro HDMI connector shown on the
89:23 the micro HDMI connector shown on the right
89:29 exam objective 2.1 classify common types of input and output device interfaces
89:32 of input and output device interfaces display port and mini display
89:34 display port and mini display port I have saved the best for last well
89:38 port I have saved the best for last well that is merely an opinion and certainly
89:40 that is merely an opinion and certainly debatable so I will invite you to
89:42 debatable so I will invite you to comment with your personal thoughts so
89:44 comment with your personal thoughts so here we go a few years after the release
89:47 here we go a few years after the release of HDMI in 2008 we were given the
89:50 of HDMI in 2008 we were given the display port graphic device interface
89:52 display port graphic device interface standard since since 2008 display port
89:55 standard since since 2008 display port and HDMI have been battling it out for
89:58 and HDMI have been battling it out for top spot their rivalry is similar to the
90:00 top spot their rivalry is similar to the matchup between USB and fire wire with
90:03 matchup between USB and fire wire with the exception that display port does
90:05 the exception that display port does have a significant manufacturer
90:07 have a significant manufacturer following in fact many manufacturers are
90:10 following in fact many manufacturers are providing both HDMI and display port
90:12 providing both HDMI and display port interfaces on their Computing devices to
90:14 interfaces on their Computing devices to allow users to choose for
90:17 allow users to choose for themselves so let's cover the basics of
90:19 themselves so let's cover the basics of display port it comes with a 20 pin
90:22 display port it comes with a 20 pin connector provides audio video data
90:24 connector provides audio video data streaming and uses digital signaling
90:27 streaming and uses digital signaling sounds a lot like HDMI doesn't it so how
90:31 sounds a lot like HDMI doesn't it so how are these two standards
90:33 are these two standards different well the display port standard
90:35 different well the display port standard is free to use or open source while the
90:39 is free to use or open source while the HDMI standard charges the manufactures a
90:41 HDMI standard charges the manufactures a small fee per device for its use also
90:44 small fee per device for its use also display port has a higher throughput
90:46 display port has a higher throughput speed for now I say for now as updates
90:49 speed for now I say for now as updates to these standards are always in the
90:51 to these standards are always in the works
90:54 works one last note display port has a mini
90:56 one last note display port has a mini cousin the mini display port this
90:59 cousin the mini display port this connector was developed by Apple and
91:01 connector was developed by Apple and provides a smaller physical interface
91:03 provides a smaller physical interface that is great for smaller Computing
91:05 that is great for smaller Computing devices that have very little space for
91:07 devices that have very little space for ports a few examples of devices that use
91:10 ports a few examples of devices that use the mini display port interface are
91:12 the mini display port interface are MacBook Pro MacBook Air and MacBook mini
91:16 MacBook Pro MacBook Air and MacBook mini also worth noting mini display port is
91:18 also worth noting mini display port is gradually being replaced in favor of the
91:20 gradually being replaced in favor of the USBC and Thunderbolt standards which
91:23 USBC and Thunderbolt standards which offer more versatility and compatibility
91:25 offer more versatility and compatibility with a wider range of
91:27 with a wider range of devices however adapters and cables do
91:30 devices however adapters and cables do exist allowing manyi display port
91:32 exist allowing manyi display port devices to connect with newer systems
91:34 devices to connect with newer systems using USBC or
91:36 using USBC or Thunderbolt exam objective 2.2 given a
91:39 Thunderbolt exam objective 2.2 given a scenario set up and install common
91:41 scenario set up and install common peripheral devices to a laptop or
91:44 peripheral devices to a laptop or PC device
91:46 PC device setup with exam objective 2.2 I will be
91:49 setup with exam objective 2.2 I will be teaching you about common peripheral
91:51 teaching you about common peripheral devices basic configuration settings and
91:54 devices basic configuration settings and some installation types you might
91:55 some installation types you might encounter along the way the images I
91:58 encounter along the way the images I will be using will be based on the
91:59 will be using will be based on the Windows 10 operating system this is
92:02 Windows 10 operating system this is because CompTIA exam content and
92:04 because CompTIA exam content and questions will lean more toward Windows
92:06 questions will lean more toward Windows than Mac OS or Linux well with the
92:09 than Mac OS or Linux well with the exception of the Linux plus exam of
92:13 exception of the Linux plus exam of course for device setup Windows 10 has
92:16 course for device setup Windows 10 has two main
92:18 two main utilities control
92:21 utilities control panel and Windows settings
92:24 panel and Windows settings control panel and Windows settings
92:26 control panel and Windows settings provide the ability to view and change
92:28 provide the ability to view and change system settings it consists of a set of
92:31 system settings it consists of a set of applets that include but are not limited
92:33 applets that include but are not limited to controlling user accounts changing
92:35 to controlling user accounts changing accessibility options accessing
92:37 accessibility options accessing networking settings and as it applies to
92:40 networking settings and as it applies to this exam objective we can use these
92:42 this exam objective we can use these tools to add remove and configure
92:44 tools to add remove and configure peripheral
92:45 peripheral devices exam objective 2.2 given a
92:48 devices exam objective 2.2 given a scenario set up and install common
92:50 scenario set up and install common peripheral devices to a laptop or PC
92:54 peripheral devices to a laptop or PC printer and
92:55 printer and scanner we will cover printers and
92:58 scanner we will cover printers and scanners together as they are fairly
93:00 scanners together as they are fairly similar in fact it is very often that
93:03 similar in fact it is very often that printers and scanners come packaged
93:04 printers and scanners come packaged together as a single unit known as a
93:06 together as a single unit known as a multi-function device or MFD for
93:10 multi-function device or MFD for short a printer is a peripheral device
93:13 short a printer is a peripheral device which makes a physical rendering of
93:15 which makes a physical rendering of Digital Data usually on paper or creates
93:17 Digital Data usually on paper or creates a physical object from a
93:19 a physical object from a three-dimensional Digital model in the
93:21 three-dimensional Digital model in the case of a 3D printer some of the most
93:24 case of a 3D printer some of the most common printer types are Laser Printers
93:26 common printer types are Laser Printers inkjet printers thermal printers impact
93:28 inkjet printers thermal printers impact printers and 3D
93:32 printers and 3D printers while a printer outputs Digital
93:34 printers while a printer outputs Digital Data a scanner does the exact opposite a
93:37 Data a scanner does the exact opposite a scanner is a peripheral device that
93:39 scanner is a peripheral device that optically scans images or objects and
93:42 optically scans images or objects and converts them into Digital Data the most
93:44 converts them into Digital Data the most common scanner types are flatbed
93:46 common scanner types are flatbed scanners and sheetfed
93:49 scanners and sheetfed scanners when connecting a printer or a
93:51 scanners when connecting a printer or a scanner we have multiple options of
93:53 scanner we have multiple options of available for a printer or scanner that
93:56 available for a printer or scanner that is directly connected to a computer also
93:58 is directly connected to a computer also referred to as a local connection you
94:00 referred to as a local connection you would most likely use a USB interface
94:03 would most likely use a USB interface and probably a USB typeb connector
94:06 and probably a USB typeb connector though less common the wireless
94:08 though less common the wireless Bluetooth interface can also be used as
94:11 Bluetooth interface can also be used as an alternative for a local connection
94:13 an alternative for a local connection setup if the printer of scanner is to be
94:15 setup if the printer of scanner is to be made available to an entire network of
94:17 made available to an entire network of devices a wired network connection would
94:20 devices a wired network connection would be made with an Ethernet cat cable that
94:21 be made with an Ethernet cat cable that uses RJ45 connector
94:25 uses RJ45 connector and last the wireless alternative for a
94:27 and last the wireless alternative for a network connection would be
94:30 network connection would be Wi-Fi in order to configure a printer or
94:33 Wi-Fi in order to configure a printer or a scanner you would need to open the
94:34 a scanner you would need to open the windows devices and printers applet this
94:37 windows devices and printers applet this can be accessed using either the Windows
94:39 can be accessed using either the Windows settings tool or control panel my
94:42 settings tool or control panel my personal choice just happens to be
94:44 personal choice just happens to be control
94:45 control panel for now I will just cover a few
94:48 panel for now I will just cover a few configuration options starting with
94:51 configuration options starting with duplex duplex is printing on both sides
94:53 duplex duplex is printing on both sides of a piece of paper during the printing
94:56 of a piece of paper during the printing process if your printer has a duplex
94:59 process if your printer has a duplex assembly you would rightclick on the
95:01 assembly you would rightclick on the printer of choice select printer
95:04 printer of choice select printer properties and navigate to the duplex
95:07 properties and navigate to the duplex configuration option there you would
95:09 configuration option there you would select two-sided printing or duplex
95:11 select two-sided printing or duplex printing if your printer does not have a
95:14 printing if your printer does not have a duplex assembly to automatically perform
95:16 duplex assembly to automatically perform two-sided printing duplex printing may
95:18 two-sided printing duplex printing may still be performed manually to go green
95:21 still be performed manually to go green for a moment duplex or two side printing
95:24 for a moment duplex or two side printing does have an added benefit of using half
95:26 does have an added benefit of using half as much paper as Standard Printing this
95:28 as much paper as Standard Printing this is not only an environmentally friendly
95:30 is not only an environmentally friendly option but a cost saving option as
95:33 option but a cost saving option as well another configuration option is the
95:36 well another configuration option is the colate setting in printing colate refers
95:40 colate setting in printing colate refers to the arrangement of printed Pages or
95:41 to the arrangement of printed Pages or documents in a specific order it ensures
95:44 documents in a specific order it ensures that the pages are organized correctly
95:47 that the pages are organized correctly such as when printing multiple copies of
95:48 such as when printing multiple copies of a multi-page document so that each set
95:51 a multi-page document so that each set of pages is in the desired sequence
95:55 of pages is in the desired sequence the last configuration option I will
95:57 the last configuration option I will mention is
95:58 mention is orientation print orientation refers to
96:00 orientation print orientation refers to the direction or alignment in which
96:02 the direction or alignment in which content is printed on a page it
96:05 content is printed on a page it determines whether the content is
96:06 determines whether the content is printed in a portrait orientation
96:08 printed in a portrait orientation meaning vertically or landscape
96:10 meaning vertically or landscape orientation meaning
96:12 orientation meaning horizontally exam objective 2.2 given a
96:15 horizontally exam objective 2.2 given a scenario set up and install common
96:17 scenario set up and install common peripheral devices to a laptop or
96:20 peripheral devices to a laptop or PC
96:22 PC keyboard a keyboard is a peripheral
96:24 keyboard a keyboard is a peripheral device used to input data and commands
96:27 device used to input data and commands into a computer or other electronic
96:30 into a computer or other electronic device when configuring a keyboard you
96:33 device when configuring a keyboard you will notice the configuration options
96:35 will notice the configuration options are spread out between control panel and
96:37 are spread out between control panel and Windows settings I will start with the
96:39 Windows settings I will start with the keyboard properties applet found in the
96:41 keyboard properties applet found in the control panel to open the keyboard
96:44 control panel to open the keyboard properties applet navigate to control
96:46 properties applet navigate to control panel and select
96:48 panel and select keyboard here you can configure the
96:50 keyboard here you can configure the repeat delay repeat rate and sensitivity
96:53 repeat delay repeat rate and sensitivity for your key
96:58 inputs if you were using the Windows settings tool you would navigate to time
97:00 settings tool you would navigate to time and language to access additional
97:02 and language to access additional keyboard configuration options here you
97:05 keyboard configuration options here you will find options for adding a keyboard
97:06 will find options for adding a keyboard or setting a keyboard's default
97:09 or setting a keyboard's default language exam objective 2.2 given a
97:12 language exam objective 2.2 given a scenario set up and install common
97:14 scenario set up and install common peripheral devices to a laptop or
97:17 peripheral devices to a laptop or PC
97:19 PC Mouse a mouse is a handheld pointing
97:21 Mouse a mouse is a handheld pointing device that allows users to control the
97:23 device that allows users to control the movement of a cursor or pointer on a
97:25 movement of a cursor or pointer on a computer
97:27 computer screen when configuring a mouse you will
97:30 screen when configuring a mouse you will be able to access the mouse properties
97:32 be able to access the mouse properties applet from either control panel or the
97:34 applet from either control panel or the Windows settings tool I will start with
97:36 Windows settings tool I will start with control panel to open the mouse
97:39 control panel to open the mouse properties applet navigate to control
97:41 properties applet navigate to control panel and select
97:43 panel and select Mouse here you can adjust button
97:47 Mouse here you can adjust button configurations doubleclick
97:49 configurations doubleclick speed and customize your onscreen cursor
97:52 speed and customize your onscreen cursor or pointer
97:54 or pointer you can also control your pointer speed
97:56 you can also control your pointer speed or how fast the cursor will move across
97:57 or how fast the cursor will move across your
97:59 your screen if you want to use the Windows
98:02 screen if you want to use the Windows settings tool you would navigate to
98:03 settings tool you would navigate to devices and then Mouse last you would
98:07 devices and then Mouse last you would select additional Mouse options to
98:09 select additional Mouse options to access the mouse properties
98:11 access the mouse properties Outlet exam objective 2.2 given a
98:14 Outlet exam objective 2.2 given a scenario set up and install common
98:16 scenario set up and install common peripheral devices to a laptop or
98:18 peripheral devices to a laptop or PC
98:20 PC camera a camera is a peripheral device
98:23 camera a camera is a peripheral device that records video images using a
98:25 that records video images using a digital
98:26 digital sensor they may be an external device
98:29 sensor they may be an external device that is connected through a wired or
98:30 that is connected through a wired or wireless interface or built into the
98:32 wireless interface or built into the case of a device which is common for
98:34 case of a device which is common for smartphones tablets laptops and some
98:38 smartphones tablets laptops and some televisions also cameras will often come
98:40 televisions also cameras will often come with a microphone too in order to
98:42 with a microphone too in order to capture audio
98:44 capture audio data the configuration options for a
98:47 data the configuration options for a camera mostly revolve around privacy in
98:50 camera mostly revolve around privacy in the Windows settings tool navigate to
98:52 the Windows settings tool navigate to privacy and and then camera here you
98:55 privacy and and then camera here you will have the option to allow or deny
98:57 will have the option to allow or deny applications access to your camera
98:59 applications access to your camera device exam objective 2.2 given a
99:02 device exam objective 2.2 given a scenario set up and install common
99:04 scenario set up and install common peripheral devices to a laptop or
99:07 peripheral devices to a laptop or PC external hard
99:09 PC external hard drive an external hard drive is a
99:12 drive an external hard drive is a peripheral storage device that connects
99:14 peripheral storage device that connects to the exterior of a Computing
99:16 to the exterior of a Computing device these external hard drives are
99:19 device these external hard drives are commonly connected using a USB or
99:21 commonly connected using a USB or Thunderbolt interface and are designed
99:23 Thunderbolt interface and are designed to provide additional storage space
99:25 to provide additional storage space above and beyond what a device's
99:26 above and beyond what a device's internal storage can
99:29 internal storage can offer configuration options for an
99:32 offer configuration options for an external hard drive will not be found in
99:34 external hard drive will not be found in control panel or Windows settings like
99:36 control panel or Windows settings like many other devices instead all system
99:39 many other devices instead all system hard drives both internal and external
99:41 hard drives both internal and external are handled by the windows Disk
99:43 are handled by the windows Disk Management utility with Disk Management
99:45 Management utility with Disk Management you can configure an external hard drive
99:48 you can configure an external hard drive however you would
99:49 however you would like exam objective 2.2 given a scenario
99:52 like exam objective 2.2 given a scenario set up and install common peripheral
99:54 set up and install common peripheral devices to a laptop or
99:57 devices to a laptop or PC
99:59 PC speakers speakers are a peripheral
100:01 speakers speakers are a peripheral output device that converts Digital Data
100:03 output device that converts Digital Data to audible sounds speakers may also be
100:06 to audible sounds speakers may also be referred to as a playback
100:09 referred to as a playback device when configuring an audio output
100:12 device when configuring an audio output device like a pair of speakers you will
100:14 device like a pair of speakers you will be able to access the sound outlet from
100:16 be able to access the sound outlet from control panel or use the Windows
100:18 control panel or use the Windows settings tool to make your configuration
100:20 settings tool to make your configuration changes I will start with control panel
100:23 changes I will start with control panel to open the sound applet navigate to
100:26 to open the sound applet navigate to control panel and select
100:28 control panel and select sound here you can adjust which sound
100:31 sound here you can adjust which sound output device or playback device will be
100:33 output device or playback device will be used by the system it is common for a
100:36 used by the system it is common for a Computing device to have multiple
100:37 Computing device to have multiple playback devices so heading to the sound
100:39 playback devices so heading to the sound applet to ensure the correct playback
100:41 applet to ensure the correct playback device has been selected is a fairly
100:43 device has been selected is a fairly common
100:44 common task you can also use the sound applet
100:47 task you can also use the sound applet for selecting which sound input device
100:49 for selecting which sound input device or microphone the system should use
100:51 or microphone the system should use microphones may also be referred ref to
100:53 microphones may also be referred ref to as a recording
100:56 as a recording device if you want to use the Windows
100:58 device if you want to use the Windows settings tool you would navigate to
101:00 settings tool you would navigate to system and then sound the Windows
101:02 system and then sound the Windows settings tool for sound configurations
101:05 settings tool for sound configurations may look a bit different than the sound
101:06 may look a bit different than the sound applet but here you will still be able
101:08 applet but here you will still be able to select the output or playback
101:11 to select the output or playback device and the input or recording device
101:14 device and the input or recording device that should be used by the
101:17 that should be used by the system exam objective 2.2 given a
101:20 system exam objective 2.2 given a scenario set up and install common
101:22 scenario set up and install common peripheral devices to to a laptop or
101:24 peripheral devices to to a laptop or PC
101:26 PC displays a display is a peripheral
101:29 displays a display is a peripheral output device that converts Digital Data
101:31 output device that converts Digital Data into visual images for human
101:34 into visual images for human observation some of the most common
101:36 observation some of the most common display types are computer monitors
101:39 display types are computer monitors which can be connected to a
101:41 which can be connected to a desktop built-in screens like those
101:43 desktop built-in screens like those embedded in laptops tablets and
101:47 embedded in laptops tablets and smartphones projectors which cast images
101:49 smartphones projectors which cast images onto a surface typically a screen or
101:52 onto a surface typically a screen or wall for large scale scale
101:54 wall for large scale scale viewing and
101:59 televisions when connecting a display device we are going to need a graphic
102:01 device we are going to need a graphic device interface luckily we have
102:04 device interface luckily we have multiple options available for older
102:06 multiple options available for older Display Devices we have VGA and DVI and
102:09 Display Devices we have VGA and DVI and for newer Display Devices we have HDMI
102:12 for newer Display Devices we have HDMI and display
102:15 and display port many of today's displays come with
102:17 port many of today's displays come with touchscreen capabilities a touchcreen
102:20 touchscreen capabilities a touchcreen acts as an alternative to a mouse and or
102:22 acts as an alternative to a mouse and or keyboard
102:24 keyboard with a touch screen a user can interact
102:26 with a touch screen a user can interact directly with the display through a
102:28 directly with the display through a series of touches or hand gestures in
102:30 series of touches or hand gestures in order to input
102:32 order to input data when configuring your display or
102:35 data when configuring your display or displays you will be using the Windows
102:37 displays you will be using the Windows settings tool so open Windows settings
102:40 settings tool so open Windows settings navigate to system and then select
102:42 navigate to system and then select display here you will be able to
102:45 display here you will be able to configure scaling
102:47 configure scaling options display
102:50 options display resolution display orientation
102:53 resolution display orientation or configure how your device will
102:55 or configure how your device will utilize multiple
102:57 utilize multiple displays now I will explain a bit about
102:59 displays now I will explain a bit about each of these configuration
103:05 options scaling is a configuration option that adjusts the size of text
103:07 option that adjusts the size of text icons and navigation elements presented
103:10 icons and navigation elements presented to the user this can make a computer
103:12 to the user this can make a computer display easier for people to see and use
103:15 display easier for people to see and use especially for those who are visually
103:18 especially for those who are visually impaired next we have display resolution
103:21 impaired next we have display resolution display resolution is a a configuration
103:24 display resolution is a a configuration option that adjusts the number of pixels
103:26 option that adjusts the number of pixels displayed on a screen thus determining
103:28 displayed on a screen thus determining the level of detail and Clarity in the
103:30 the level of detail and Clarity in the visual content displayed a pixel can be
103:33 visual content displayed a pixel can be thought of as a DOT of color the more
103:35 thought of as a DOT of color the more dots of color included in a fixed area
103:38 dots of color included in a fixed area the more detail we can achieve so to
103:40 the more detail we can achieve so to understand a resolution we need to build
103:42 understand a resolution we need to build upon this idea of pixels looking at the
103:45 upon this idea of pixels looking at the list of display resolutions to my left
103:47 list of display resolutions to my left we see the first resolution on the list
103:49 we see the first resolution on the list is 1920 by 1080 the 1920 is the number
103:53 is 1920 by 1080 the 1920 is the number of pixels or dots of color that a
103:55 of pixels or dots of color that a display will have extending from the
103:57 display will have extending from the left side of the screen to the right
103:59 left side of the screen to the right side of the screen thinking of this in a
104:02 side of the screen thinking of this in a grid or table format the 1920 would be
104:04 grid or table format the 1920 would be the number of pixel columns defining the
104:06 the number of pixel columns defining the width of the screen in pixels the 1080
104:09 width of the screen in pixels the 1080 would then be the number of pixels or
104:11 would then be the number of pixels or dots of color that a display will have
104:13 dots of color that a display will have extending from the top to the bottom of
104:15 extending from the top to the bottom of the screen once again thinking of this
104:18 the screen once again thinking of this in a grid or table format the 1080 would
104:21 in a grid or table format the 1080 would be the number of pixel rows defining the
104:23 be the number of pixel rows defining the height of the screen in pixels put these
104:25 height of the screen in pixels put these two numbers together 1920 by 1080 and
104:28 two numbers together 1920 by 1080 and you have an overall display resolution
104:30 you have an overall display resolution defining the width and height and pixel
104:32 defining the width and height and pixel counts if you multiply the two numbers
104:35 counts if you multiply the two numbers together you will also get the total
104:37 together you will also get the total number of color pixels displayed on the
104:39 number of color pixels displayed on the screen so I hope you are a curious
104:41 screen so I hope you are a curious learner and you are now wondering why
104:43 learner and you are now wondering why the word recommended is displayed next
104:45 the word recommended is displayed next to 1920 by 1080 well that is a great
104:49 to 1920 by 1080 well that is a great question thank you for bringing it up
104:53 question thank you for bringing it up for every display a manufacturer has
104:55 for every display a manufacturer has designed their device to perform
104:57 designed their device to perform optimally at a specific resolution even
105:00 optimally at a specific resolution even though you can select from many
105:01 though you can select from many different display resolutions in order
105:03 different display resolutions in order to suit your needs you will always see
105:05 to suit your needs you will always see the word recommended next to the
105:07 the word recommended next to the intended resolution for that display the
105:09 intended resolution for that display the recommended resolution is also called
105:11 recommended resolution is also called the native
105:14 the native resolution now we have display
105:16 resolution now we have display orientation display orientation refers
105:19 orientation display orientation refers to the direction or alignment in which
105:21 to the direction or alignment in which content is displayed on a screen
105:23 content is displayed on a screen it determines whether the content is
105:25 it determines whether the content is displayed in a portrait orientation
105:27 displayed in a portrait orientation meaning vertically or landscape
105:28 meaning vertically or landscape orientation meaning
105:31 orientation meaning horizontally to wrap this exam topic up
105:34 horizontally to wrap this exam topic up we will discuss the three common
105:35 we will discuss the three common configuration options for multiple
105:38 configuration options for multiple displays the duplicate option mirrors
105:40 displays the duplicate option mirrors the same content on all connected
105:42 the same content on all connected displays this is ideal for presentations
105:45 displays this is ideal for presentations or sharing
105:47 or sharing information the extend option allows a
105:50 information the extend option allows a user to drag and arrange Windows
105:52 user to drag and arrange Windows application
105:53 application and content across multiple screens this
105:56 and content across multiple screens this gives a user the flexibility to
105:58 gives a user the flexibility to customize the arrangement resolution and
106:00 customize the arrangement resolution and orientation of each screen according to
106:02 orientation of each screen according to their individual
106:04 their individual needs there is also the option to
106:07 needs there is also the option to display content on only one display at a
106:09 display content on only one display at a time this allows a user to view content
106:12 time this allows a user to view content on only the primary or PC
106:14 on only the primary or PC display or just the secondary display
106:17 display or just the secondary display even though two displays may be
106:20 even though two displays may be available exam objective 2. 2 given a
106:23 available exam objective 2. 2 given a scenario set up and install common
106:25 scenario set up and install common peripheral devices to a laptop or
106:28 peripheral devices to a laptop or PC installation
106:31 PC installation types our first installation type for
106:33 types our first installation type for peripheral devices is plug- andplay
106:36 peripheral devices is plug- andplay plug- andplay refers to an installation
106:38 plug- andplay refers to an installation type that allows a peripheral device to
106:40 type that allows a peripheral device to be easily connected or installed without
106:42 be easily connected or installed without the need for complex configuration setup
106:45 the need for complex configuration setup processes or software installation it
106:48 processes or software installation it allows for seamless integration and
106:49 allows for seamless integration and immediate functionality reducing the
106:52 immediate functionality reducing the need for an average user to be
106:53 need for an average user to be technically proficient there is a
106:55 technically proficient there is a downside though with a plug-in-play
106:58 downside though with a plug-in-play installation you will only have access
107:00 installation you will only have access to basic peripheral device
107:03 to basic peripheral device features the next installation type is a
107:06 features the next installation type is a device driver a device driver is a
107:09 device driver a device driver is a software program that facilitates
107:10 software program that facilitates communication between a Computing
107:12 communication between a Computing devices operating system and a specific
107:15 devices operating system and a specific peripheral device the device driver acts
107:18 peripheral device the device driver acts as a translator allowing the operating
107:20 as a translator allowing the operating system to understand and utilize the
107:22 system to understand and utilize the feature and functions of our peripheral
107:24 feature and functions of our peripheral device installations requiring a device
107:27 device installations requiring a device driver to be installed results in a
107:29 driver to be installed results in a slower overall installation process and
107:32 slower overall installation process and requires the installer to be technically
107:34 requires the installer to be technically proficient the upside is that you will
107:36 proficient the upside is that you will be able to access a device's complete
107:38 be able to access a device's complete range of
107:40 range of features to help compare a plug-and-play
107:43 features to help compare a plug-and-play installation to a manual driver
107:45 installation to a manual driver installation I have selected the mouse
107:46 installation I have selected the mouse peripheral type and before you ask no
107:49 peripheral type and before you ask no this is not a plug for the HP g160 game
107:52 this is not a plug for the HP g160 game ging Mouse the graphic just fit the
107:55 ging Mouse the graphic just fit the scenario and layout well okay so let's
107:58 scenario and layout well okay so let's start with the mouse on the left it will
108:01 start with the mouse on the left it will have the ability to left click
108:03 have the ability to left click rightclick and scroll these are features
108:05 rightclick and scroll these are features that can be found on most every Mouse so
108:08 that can be found on most every Mouse so why would a peripheral device
108:09 why would a peripheral device manufacturer or operating system
108:11 manufacturer or operating system developer want to make a user go through
108:13 developer want to make a user go through the process of locating and installing a
108:16 the process of locating and installing a custom device driver to get this mouse
108:18 custom device driver to get this mouse to work why not have a strip down
108:20 to work why not have a strip down version of a driver already loaded and
108:22 version of a driver already loaded and available in the operating system voila
108:25 available in the operating system voila that is plug andplay in a nutshell now
108:28 that is plug andplay in a nutshell now the mouse on the right has a bunch of
108:30 the mouse on the right has a bunch of custom features and additional
108:31 custom features and additional programmable buttons well we cannot
108:34 programmable buttons well we cannot expect the operating system to be
108:36 expect the operating system to be prepared with every possible feature for
108:38 prepared with every possible feature for every device on the market so a more
108:40 every device on the market so a more specialized device like the mouse on the
108:42 specialized device like the mouse on the right will come with a device specific
108:44 right will come with a device specific driver that you would need to manually
108:46 driver that you would need to manually install on the operating system in order
108:48 install on the operating system in order to unlock the bonus features without the
108:51 to unlock the bonus features without the custom device driver you you could still
108:53 custom device driver you you could still use the mouse but only those most basic
108:55 use the mouse but only those most basic features of left click rightclick and
108:58 features of left click rightclick and scroll the last installation type we
109:01 scroll the last installation type we will cover is IP based installation the
109:04 will cover is IP based installation the IP stands for Internet Protocol so IP
109:06 IP stands for Internet Protocol so IP based installations take place across an
109:08 based installations take place across an internet network connection this is
109:11 internet network connection this is perfect for setting up and configuring
109:12 perfect for setting up and configuring devices remotely for the example on the
109:15 devices remotely for the example on the screen I have selected a wireless router
109:18 screen I have selected a wireless router with this type of installation the
109:20 with this type of installation the device is accessed using a web browser
109:23 device is accessed using a web browser once connected you will be presented
109:25 once connected you will be presented with a web-based interface here you can
109:28 with a web-based interface here you can interact with and configure the device
109:30 interact with and configure the device in the same manner you interact with any
109:31 in the same manner you interact with any website on the internet exam objective
109:34 website on the internet exam objective 2.3 explain the purpose of common
109:37 2.3 explain the purpose of common internal Computing
109:39 internal Computing components
109:41 components motherboard a motherboard is the main
109:43 motherboard a motherboard is the main circuit board in a Computing device that
109:45 circuit board in a Computing device that connects and allows communication
109:47 connects and allows communication between all the other Computing
109:49 between all the other Computing components another way of saying that is
109:51 components another way of saying that is to refer to the motherboard as the
109:53 to refer to the motherboard as the backbone that ties a computer's
109:54 backbone that ties a computer's components together without it none of
109:57 components together without it none of the computer's components could interact
110:00 the computer's components could interact it sits at the heart of the system and
110:02 it sits at the heart of the system and all other components must align with it
110:04 all other components must align with it in terms of compatibility though not as
110:06 in terms of compatibility though not as common you may hear a motherboard
110:08 common you may hear a motherboard described as a system
110:11 described as a system board the motherboard will have built-in
110:13 board the motherboard will have built-in functions like basic graphic support
110:16 functions like basic graphic support audio support and network adapters it
110:19 audio support and network adapters it will also offer a range of sockets slots
110:22 will also offer a range of sockets slots and ports to to connect all the other
110:23 and ports to to connect all the other components that are needed to make a
110:25 components that are needed to make a fully functioning compute
110:27 fully functioning compute device exam objective 2.3 explain the
110:30 device exam objective 2.3 explain the purpose of common internal Computing
110:33 purpose of common internal Computing components
110:35 components bios the topic of this video is bios but
110:38 bios the topic of this video is bios but before we can understand bios we need
110:40 before we can understand bios we need the definition of firmware firmware
110:43 the definition of firmware firmware refers to a type of software program or
110:45 refers to a type of software program or set of instructions programmed into
110:46 set of instructions programmed into electronic devices and provides the most
110:49 electronic devices and provides the most basic control of a hardware component
110:52 basic control of a hardware component unlike general purpose software
110:53 unlike general purpose software applications that can be installed and
110:55 applications that can be installed and uninstalled firmware is designed to be
110:57 uninstalled firmware is designed to be more permanent and is essential for the
110:59 more permanent and is essential for the basic functioning of the device firmware
111:02 basic functioning of the device firmware is responsible for managing and
111:04 is responsible for managing and controlling various Hardware
111:05 controlling various Hardware functionalities such as booting up the
111:07 functionalities such as booting up the device and controlling input and output
111:10 device and controlling input and output operations overall firmware plays a
111:13 operations overall firmware plays a crucial role in the operation and
111:14 crucial role in the operation and functionality of electronic devices
111:17 functionality of electronic devices ranging from simple devices like
111:18 ranging from simple devices like computer peripherals to complex
111:20 computer peripherals to complex motherboards
111:25 in the case of motherboards the firmware is typically called the BIOS bios is
111:28 is typically called the BIOS bios is short for basic inputoutput system and
111:31 short for basic inputoutput system and is firmware that is stored on a
111:32 is firmware that is stored on a computer's motherboard it provides the
111:34 computer's motherboard it provides the fundamental instructions and settings
111:36 fundamental instructions and settings necessary for the computer to start up
111:39 necessary for the computer to start up initialize Hardware components and
111:41 initialize Hardware components and establish communication between the
111:42 establish communication between the hardware and the operating system
111:45 hardware and the operating system without it your computer's operating
111:47 without it your computer's operating system would never get off the ground or
111:49 system would never get off the ground or launch while bios was the traditional
111:51 launch while bios was the traditional firmware used and older systems let's
111:53 firmware used and older systems let's bring you up to
111:56 bring you up to date on Modern motherboards UEFI which
111:59 date on Modern motherboards UEFI which is short for unified extensible firmware
112:01 is short for unified extensible firmware interface has become the standard it is
112:04 interface has become the standard it is defined exactly like we defined bios it
112:07 defined exactly like we defined bios it is just newer and has more features UEFI
112:10 is just newer and has more features UEFI offers enhanced features and
112:12 offers enhanced features and capabilities compared to the older bios
112:14 capabilities compared to the older bios including support for larger storage
112:16 including support for larger storage devices faster boot times and options
112:19 devices faster boot times and options for a more secure bootup process
112:21 for a more secure bootup process additionally when making configuration
112:23 additionally when making configuration changes to the firmware you will be
112:25 changes to the firmware you will be provided with a graphical user interface
112:27 provided with a graphical user interface known as a GUI instead of the text based
112:30 known as a GUI instead of the text based interface that was available with
112:33 interface that was available with bios here we have a bios configuration
112:36 bios here we have a bios configuration screen for now just notice the text
112:39 screen for now just notice the text based
112:41 based interface and here is the UEFI interface
112:45 interface and here is the UEFI interface your interface may look a bit different
112:47 your interface may look a bit different I just wanted to give you an idea of
112:49 I just wanted to give you an idea of what to expect when accessing the BIOS
112:51 what to expect when accessing the BIOS or UEFI for configuration
112:55 or UEFI for configuration purposes as for accessing the BIOS or
112:57 purposes as for accessing the BIOS or UEFI on a Computing device you will need
112:59 UEFI on a Computing device you will need to start or restart your computer once
113:02 to start or restart your computer once powered on your computer will only be
113:04 powered on your computer will only be able to access the BIOS or UEFI for a
113:07 able to access the BIOS or UEFI for a brief period of time once the BIOS or
113:10 brief period of time once the BIOS or UEFI initializes and launches your
113:12 UEFI initializes and launches your operating system the window of time will
113:14 operating system the window of time will have closed look for a key prompt during
113:17 have closed look for a key prompt during the boot process as your computer starts
113:19 the boot process as your computer starts up pay attention to the screen for any
113:21 up pay attention to the screen for any messages that indicate which key to
113:23 messages that indicate which key to press to access the BIOS or UEFI
113:26 press to access the BIOS or UEFI settings common Keys include F1 F2 F10
113:30 settings common Keys include F1 F2 F10 delete or Escape Keys press the
113:33 delete or Escape Keys press the indicated key before the operating
113:34 indicated key before the operating system starts loading and you will be
113:36 system starts loading and you will be directed to the BIOS or ufi
113:38 directed to the BIOS or ufi configuration
113:40 configuration interface exam objective 2.3 explain the
113:43 interface exam objective 2.3 explain the purpose of common internal Computing
113:46 purpose of common internal Computing components
113:48 components ram ram or random access memory is a
113:51 ram ram or random access memory is a form of computer memory that stores
113:53 form of computer memory that stores working data or programs currently in
113:55 working data or programs currently in use by a computer RAM is also the type
113:58 use by a computer RAM is also the type of memory used for the system memory of
114:00 of memory used for the system memory of most Computing devices in case you
114:03 most Computing devices in case you forgot by now I introduced you to the
114:05 forgot by now I introduced you to the topic of system memory back in exam
114:07 topic of system memory back in exam objective 1.3 and to avoid confusion
114:10 objective 1.3 and to avoid confusion just think of RAM and system memory as
114:12 just think of RAM and system memory as interchangeable at least for this video
114:15 interchangeable at least for this video anyways once a software program is
114:18 anyways once a software program is started its instructions are loaded into
114:20 started its instructions are loaded into the system memory and remain there until
114:22 the system memory and remain there until no longer needed by the Computing device
114:24 no longer needed by the Computing device or until the Computing device is powered
114:28 or until the Computing device is powered off system memory is different from
114:30 off system memory is different from long-term storage devices such as hard
114:32 long-term storage devices such as hard drives because it provides much faster
114:34 drives because it provides much faster access to data when the processor needs
114:37 access to data when the processor needs to receive or output data it can
114:39 to receive or output data it can interact directly with the system memory
114:41 interact directly with the system memory which allows for faster execution of
114:43 which allows for faster execution of instructions by the
114:45 instructions by the processor the amount of ram in a
114:47 processor the amount of ram in a computer is an important factor in
114:49 computer is an important factor in determining its performance more RAM
114:52 determining its performance more RAM allows the computer to store and access
114:54 allows the computer to store and access larger amounts of data which is
114:56 larger amounts of data which is particularly useful when running memory
114:58 particularly useful when running memory intensive programs or when several
114:59 intensive programs or when several applications are opened
115:01 applications are opened simultaneously on the other hand
115:03 simultaneously on the other hand insufficient Ram can lead to slower
115:05 insufficient Ram can lead to slower performance as the computer may not be
115:07 performance as the computer may not be able to store all the data it needs in
115:09 able to store all the data it needs in system memory all at the same time exam
115:13 system memory all at the same time exam objective 2.3 explain the purpose of
115:15 objective 2.3 explain the purpose of common internal Computing
115:18 common internal Computing components
115:20 components CPU the central processing unit or CPU
115:23 CPU the central processing unit or CPU for short is the primary component of a
115:25 for short is the primary component of a computer responsible for executing
115:27 computer responsible for executing instructions and Performing
115:29 instructions and Performing calculations the CPU acts as the brain
115:32 calculations the CPU acts as the brain of the computer carrying out essential
115:34 of the computer carrying out essential tasks such as arithmetic operations
115:36 tasks such as arithmetic operations logical comparisons and managing data
115:39 logical comparisons and managing data movement between various Hardware
115:41 movement between various Hardware components it interprets and executes
115:43 components it interprets and executes instructions from computer programs
115:45 instructions from computer programs allowing the computer to perform tasks
115:47 allowing the computer to perform tasks and run
115:48 and run applications it is also worth noting
115:51 applications it is also worth noting that the CPU generates more heat than
115:53 that the CPU generates more heat than any other Computing component probably
115:55 any other Computing component probably because it works so hard worse if you
115:58 because it works so hard worse if you work your CPU too hard it may overheat
116:01 work your CPU too hard it may overheat which can lead to unexpected reboots or
116:07 shutdowns next we will discuss the difference between the 32-bit and 64-bit
116:10 difference between the 32-bit and 64-bit CPUs these are two common types of CPUs
116:13 CPUs these are two common types of CPUs that you are likely to find installed in
116:15 that you are likely to find installed in a laptop workstation or a server the
116:19 a laptop workstation or a server the difference between 32-bit and 64-bit
116:21 difference between 32-bit and 64-bit CPUs lies in the way they handle data
116:24 CPUs lies in the way they handle data 32-bit CPUs are appropriately named as
116:27 32-bit CPUs are appropriately named as they support instructions that are
116:29 they support instructions that are 32bits in size and since you are so
116:32 32bits in size and since you are so smart I am sure you have already deduced
116:34 smart I am sure you have already deduced that 64-bit CPUs are designed to handle
116:37 that 64-bit CPUs are designed to handle 64-bit
116:38 64-bit instructions this has a trickle down
116:41 instructions this has a trickle down effect first up is the operating system
116:44 effect first up is the operating system a 32-bit processor is compatible with a
116:47 a 32-bit processor is compatible with a 32-bit operating system while a 64-bit
116:50 32-bit operating system while a 64-bit processor is compatible with both 64-bit
116:53 processor is compatible with both 64-bit and 32-bit operating systems this
116:55 and 32-bit operating systems this trickles down a little further with the
116:57 trickles down a little further with the same Arrangement holding true for
117:00 same Arrangement holding true for applications a 32-bit operating system
117:02 applications a 32-bit operating system is capable of running a 32-bit
117:04 is capable of running a 32-bit application while a 64-bit operating
117:07 application while a 64-bit operating system is capable of running 64-bit
117:09 system is capable of running 64-bit applications and most 32-bit
117:12 applications and most 32-bit applications having fun how about a few
117:15 applications having fun how about a few more interesting facts okay don't beg
117:18 more interesting facts okay don't beg I'll keep going so when working with
117:21 I'll keep going so when working with these two CPU architectures you may see
117:24 these two CPU architectures you may see the terms x86 and
117:26 the terms x86 and x64 though there is some history with
117:28 x64 though there is some history with these terms you should at least know
117:30 these terms you should at least know that x86 is referencing the 32-bit
117:32 that x86 is referencing the 32-bit architecture while the x64 is
117:35 architecture while the x64 is referencing the 64-bit architecture I
117:38 referencing the 64-bit architecture I know x86 is confusing to use as a
117:40 know x86 is confusing to use as a reference to 32-bit architectures and
117:43 reference to 32-bit architectures and would have been a lot easier to remember
117:44 would have been a lot easier to remember if it was X32 but I don't make the
117:47 if it was X32 but I don't make the rules all right one last fact for 32bit
117:51 rules all right one last fact for 32bit and 64 bit CPUs before I move on a 32bit
117:55 and 64 bit CPUs before I move on a 32bit CPU will limit the amount of ram that
117:57 CPU will limit the amount of ram that can be recognized by a Computing system
117:59 can be recognized by a Computing system to 4 gabes 64-bit systems also have a
118:03 to 4 gabes 64-bit systems also have a limit but the number is super large and
118:05 limit but the number is super large and not a real
118:07 not a real concern now I will teach you about one
118:09 concern now I will teach you about one last CPU type the arm processor arm
118:13 last CPU type the arm processor arm stands for advanced risk machine and is
118:15 stands for advanced risk machine and is a family of CPUs based on the risk or
118:17 a family of CPUs based on the risk or reduced instruction set Computing
118:19 reduced instruction set Computing architecture arm processors are smaller
118:21 architecture arm processors are smaller in size generate less heat and consume
118:24 in size generate less heat and consume less power than processors found in
118:26 less power than processors found in laptops workstations and servers making
118:29 laptops workstations and servers making arm processors a great candidate for
118:31 arm processors a great candidate for mobile phones and tablets the downside
118:34 mobile phones and tablets the downside is they are limited in processing
118:36 is they are limited in processing power exam objective 2.3 explain the
118:40 power exam objective 2.3 explain the purpose of common internal Computing
118:43 purpose of common internal Computing components internal
118:45 components internal storage internal storage refers to the
118:48 storage internal storage refers to the storage drives within a Computing device
118:50 storage drives within a Computing device that are designed to store Digital Data
118:52 that are designed to store Digital Data internal storage drives exist to provide
118:54 internal storage drives exist to provide long-term storage to contrast the
118:56 long-term storage to contrast the temporary or short-term storage offered
118:58 temporary or short-term storage offered by Ram internal storage serves as the
119:01 by Ram internal storage serves as the primary storage medium used by the
119:03 primary storage medium used by the Computing device making it the preferred
119:05 Computing device making it the preferred location to store the devic's operating
119:07 location to store the devic's operating system and software
119:13 applications two common types of internal storage drives are the hard
119:14 internal storage drives are the hard disk drive and the solidstate drive
119:17 disk drive and the solidstate drive these Drive types will be covered in
119:19 these Drive types will be covered in more detail with exam objective 2.5
119:22 more detail with exam objective 2.5 along with Optical drives flash drives
119:25 along with Optical drives flash drives network storage and cloud
119:27 network storage and cloud storage exam objective 2.3 explain the
119:31 storage exam objective 2.3 explain the purpose of common internal Computing
119:33 purpose of common internal Computing components
119:35 components GPU a GPU or a graphics processing unit
119:39 GPU a GPU or a graphics processing unit is a specialized processor designed to
119:41 is a specialized processor designed to rapidly process and render Graphics
119:43 rapidly process and render Graphics images and videos a GPU will have the
119:47 images and videos a GPU will have the primary function of producing visual
119:49 primary function of producing visual output to a monitor or other display
119:51 output to a monitor or other display device so obviously they are great for
119:54 device so obviously they are great for gaming
119:55 gaming PCs gpus can be both internal or
119:58 PCs gpus can be both internal or external internal gpus are integrated
120:01 external internal gpus are integrated directly into the computer's motherboard
120:03 directly into the computer's motherboard or as a partitioned portion of a CPU
120:06 or as a partitioned portion of a CPU external gpus are separate Graphics
120:08 external gpus are separate Graphics processing units that can be connected
120:10 processing units that can be connected to a computer system externally they are
120:12 to a computer system externally they are typically housed in an external
120:14 typically housed in an external enclosure and connect to the computer
120:16 enclosure and connect to the computer via high-speed interfaces such as
120:17 via high-speed interfaces such as Thunderbolt or
120:20 Thunderbolt or USBC if a simple GPU is not enough you
120:23 USBC if a simple GPU is not enough you can step up your game with a graphics
120:25 can step up your game with a graphics card now let me warn you the terms GPU
120:29 card now let me warn you the terms GPU and graphics card are often used
120:30 and graphics card are often used interchangeably by those who are not
120:32 interchangeably by those who are not lucky enough to be taking my course but
120:35 lucky enough to be taking my course but I will make sure you know better a GPU
120:37 I will make sure you know better a GPU and a graphics card actually refer to
120:39 and a graphics card actually refer to different aspects of a Computing system
120:42 different aspects of a Computing system to demonstrate let me strip off the
120:44 to demonstrate let me strip off the cooling unit and the cover on the
120:45 cooling unit and the cover on the graphics card behind
120:48 graphics card behind me that's better okay here is the GPU it
120:53 me that's better okay here is the GPU it is just a part of the graphics card and
120:55 is just a part of the graphics card and only handles the processing a graphics
120:58 only handles the processing a graphics card is actually much more a graphics
121:00 card is actually much more a graphics card has its own circuit board dedicated
121:03 card has its own circuit board dedicated memory the GPU of course and interface
121:06 memory the GPU of course and interface ports one last fact just like a CPU a
121:09 ports one last fact just like a CPU a GPU generates a lot of heat too let a
121:12 GPU generates a lot of heat too let a GPU overheat and just like a CPU it can
121:15 GPU overheat and just like a CPU it can lead to unexpected reboots or
121:18 lead to unexpected reboots or shutdowns exam objective 2.3 explain the
121:22 shutdowns exam objective 2.3 explain the purpose of common internal Computing
121:24 purpose of common internal Computing components
121:26 components cooling heat is a natural byproduct of
121:29 cooling heat is a natural byproduct of electronic
121:30 electronic operations as such efficient cooling
121:33 operations as such efficient cooling methods are needed to prevent damage and
121:35 methods are needed to prevent damage and maintain safe operating temperatures
121:37 maintain safe operating temperatures within a Computing device you are likely
121:39 within a Computing device you are likely to find one or more of the following
121:41 to find one or more of the following three cooling methods in
121:44 three cooling methods in use first up we have a heat sink a heat
121:48 use first up we have a heat sink a heat sink is a metal structure that absorbs
121:50 sink is a metal structure that absorbs and disperses heat generated by
121:51 and disperses heat generated by electronic components such as CPUs or
121:55 electronic components such as CPUs or gpus it helps prevent overheating by
121:57 gpus it helps prevent overheating by providing a larger surface area for heat
121:59 providing a larger surface area for heat dissipation into the surrounding air
122:01 dissipation into the surrounding air through the process of convection heat
122:04 through the process of convection heat sinks are a passive cooling device
122:06 sinks are a passive cooling device capable of minimal heat dispersion but
122:08 capable of minimal heat dispersion but they can be combined with cooling fans
122:10 they can be combined with cooling fans in order to increase their
122:15 efficiency often times Computing devices output too much heat for a passive heat
122:17 output too much heat for a passive heat sink to handle so a more common cooling
122:20 sink to handle so a more common cooling method is to utilize fans
122:22 method is to utilize fans fans are considered active Cooling and
122:24 fans are considered active Cooling and improve heat dissipation by increasing
122:26 improve heat dissipation by increasing the air flow across Computing components
122:29 the air flow across Computing components the general logic is more fans will
122:31 the general logic is more fans will equal more cooling but there will be a
122:35 equal more cooling but there will be a limit if fans still come up short and
122:38 limit if fans still come up short and things are getting hotter there is one
122:39 things are getting hotter there is one more option you can use liquid cooling
122:43 more option you can use liquid cooling liquid cooling offers Superior cooling
122:45 liquid cooling offers Superior cooling but comes with a higher price tag this
122:48 but comes with a higher price tag this type of cooling would be best suited for
122:50 type of cooling would be best suited for a high-end gaming PC in a PC liquid
122:53 a high-end gaming PC in a PC liquid cooling involves actively circulating a
122:55 cooling involves actively circulating a liquid typically water or a coolant
122:57 liquid typically water or a coolant through a closed loop system this method
123:00 through a closed loop system this method provides the best cooling because
123:02 provides the best cooling because liquids are more efficient than air
123:03 liquids are more efficient than air convection at dispersing heat in
123:05 convection at dispersing heat in summation heat sinks are good fans are
123:08 summation heat sinks are good fans are better and liquid is best unless cost is
123:10 better and liquid is best unless cost is an
123:11 an issue exam objective 2.3 explain the
123:15 issue exam objective 2.3 explain the purpose of common internal Computing
123:17 purpose of common internal Computing components
123:19 components Nick a Nick or Network interface card is
123:23 Nick a Nick or Network interface card is a computer hardware component that
123:24 a computer hardware component that allows a computer to connect to a
123:26 allows a computer to connect to a network or other Computing device and
123:28 network or other Computing device and acts as a communication link enabling
123:30 acts as a communication link enabling the transfer of data the primary
123:33 the transfer of data the primary function of a Nick is to convert the
123:34 function of a Nick is to convert the Digital Data generated by the computer
123:36 Digital Data generated by the computer into electrical signals that can be
123:38 into electrical signals that can be transmitted as an output also they need
123:41 transmitted as an output also they need to be able to receive data by converting
123:43 to be able to receive data by converting electrical signals back into Digital
123:45 electrical signals back into Digital Data as an
123:48 Data as an input NYX can come in many different
123:50 input NYX can come in many different forms when classifying Nicks the first
123:53 forms when classifying Nicks the first thing we can consider is whether they
123:55 thing we can consider is whether they are wired or Wireless wired Nicks use
123:58 are wired or Wireless wired Nicks use physical cables such as ethernet cables
124:00 physical cables such as ethernet cables to establish a network connection they
124:03 to establish a network connection they generally offer faster and more reliable
124:05 generally offer faster and more reliable data throughput rates Wireless nxs on
124:08 data throughput rates Wireless nxs on the other hand utilize Wireless
124:10 the other hand utilize Wireless Technologies such as Wi-Fi Bluetooth NFC
124:14 Technologies such as Wi-Fi Bluetooth NFC or even cellular to connect to a network
124:16 or even cellular to connect to a network without the need for physical
124:18 without the need for physical cables you can also classify NYX into
124:21 cables you can also classify NYX into two more groups they can be integrated
124:24 two more groups they can be integrated into the motherboard of a computer we
124:26 into the motherboard of a computer we refer to these as onboard Nicks or they
124:28 refer to these as onboard Nicks or they can be added as a separate expansion
124:30 can be added as a separate expansion card or add-on card an integrated Nick
124:33 card or add-on card an integrated Nick is built directly into the motherboard
124:35 is built directly into the motherboard of the computer it is already present
124:38 of the computer it is already present and does not require any additional
124:40 and does not require any additional installation this may seem like a
124:42 installation this may seem like a benefit but it does pose some
124:44 benefit but it does pose some restrictions as we lose the ability to
124:45 restrictions as we lose the ability to upgrade in the future add-on Nix however
124:48 upgrade in the future add-on Nix however can be easily replaced or upgraded if
124:51 can be easily replaced or upgraded if you want to change or upgrade your
124:53 you want to change or upgrade your network connection you can simply remove
124:55 network connection you can simply remove the existing add-on Nick and install a
124:57 the existing add-on Nick and install a new
124:57 new one exam objective 2.4 compare and
125:01 one exam objective 2.4 compare and contrast common internet service
125:04 contrast common internet service types an internet service provider or
125:07 types an internet service provider or ISP is a company or organization that
125:10 ISP is a company or organization that provides individuals businesses and
125:12 provides individuals businesses and other entities with access to the
125:14 other entities with access to the internet isps are responsible for
125:17 internet isps are responsible for connecting customers to the internet
125:19 connecting customers to the internet through various Technologies why
125:21 through various Technologies why Technologies include fiber optics cable
125:24 Technologies include fiber optics cable and DSL Wireless Technologies include
125:27 and DSL Wireless Technologies include satellite and cellular they typically
125:30 satellite and cellular they typically offer a range of subscription plans that
125:32 offer a range of subscription plans that vary in terms of throughput speeds and
125:34 vary in terms of throughput speeds and pricing to meet the needs of different
125:36 pricing to meet the needs of different users another consideration is location
125:39 users another consideration is location not all connection types are available
125:41 not all connection types are available in all areas now that we know what an
125:44 in all areas now that we know what an ISP is let's discuss each of the
125:46 ISP is let's discuss each of the available connection types one at a
125:50 available connection types one at a time fiber optic is a type of wired
125:52 time fiber optic is a type of wired internet connection that utilizes fiber
125:54 internet connection that utilizes fiber optic cables to transmit data it is
125:57 optic cables to transmit data it is considered one of the fastest and most
125:59 considered one of the fastest and most reliable forms of internet connectivity
126:01 reliable forms of internet connectivity available today fiber optic cables are
126:04 available today fiber optic cables are made of thin strands of glass or plastic
126:07 made of thin strands of glass or plastic known as Optical fibers these fibers are
126:10 known as Optical fibers these fibers are designed to transmit data using pulses
126:12 designed to transmit data using pulses of light Fiber Optic internet
126:14 of light Fiber Optic internet connections can be relatively more
126:16 connections can be relatively more expensive compared to some other types
126:18 expensive compared to some other types of internet connections and are commonly
126:20 of internet connections and are commonly deployed by ISP in urban
126:24 deployed by ISP in urban areas cable internet is a type of wired
126:27 areas cable internet is a type of wired internet connection that utilizes the
126:28 internet connection that utilizes the same coaxial cables used for cable
126:31 same coaxial cables used for cable television transmission to deliver
126:32 television transmission to deliver high-speed internet access to homes and
126:35 high-speed internet access to homes and businesses it provides sufficient speeds
126:37 businesses it provides sufficient speeds for most homes and small businesses but
126:39 for most homes and small businesses but falls short of the speeds possible with
126:41 falls short of the speeds possible with fiber optic connections as a plus cable
126:44 fiber optic connections as a plus cable internet is usually cheaper than fiber
126:46 internet is usually cheaper than fiber optic connections and has a larger
126:48 optic connections and has a larger coverage
126:49 coverage area DSL or digital subscriber line is a
126:53 area DSL or digital subscriber line is a type of wired internet connection that
126:55 type of wired internet connection that uses existing copper telephone lines to
126:57 uses existing copper telephone lines to transmit data it is a popular
126:59 transmit data it is a popular alternative to cable and fiber optic
127:01 alternative to cable and fiber optic Connections in areas where these options
127:03 Connections in areas where these options may not be available to establish a DSL
127:07 may not be available to establish a DSL connection a DSL modem is required the
127:10 connection a DSL modem is required the modem connects to the telephone line and
127:12 modem connects to the telephone line and translates the Digital Data from the
127:14 translates the Digital Data from the user's devices into signals that can be
127:16 user's devices into signals that can be transmitted over the copper telephone
127:18 transmitted over the copper telephone lines DSL is relatively slow compared to
127:22 lines DSL is relatively slow compared to fiber optic and cable connections but
127:24 fiber optic and cable connections but DSL tends to be more
127:26 DSL tends to be more cost-efficient and since it uses the
127:28 cost-efficient and since it uses the existing telephone network coverage is
127:30 existing telephone network coverage is pretty
127:31 pretty widespread satellite internet is a type
127:34 widespread satellite internet is a type of wireless internet connection that
127:35 of wireless internet connection that uses communication satellites and
127:37 uses communication satellites and satellite antennas to provide internet
127:39 satellite antennas to provide internet access to users it is a viable option
127:42 access to users it is a viable option for areas where traditional wired
127:44 for areas where traditional wired connections like fiber optic cable or
127:47 connections like fiber optic cable or DSL are not available or practical
127:49 DSL are not available or practical usually due to a lack of existing INF
127:51 usually due to a lack of existing INF structure while satellite may be your
127:54 structure while satellite may be your only option in a remote location it is
127:56 only option in a remote location it is probably going to be expensive and slow
127:59 probably going to be expensive and slow this connection type is expensive
128:01 this connection type is expensive because a satellite internet service
128:02 because a satellite internet service provider operates a network of
128:04 provider operates a network of communication satellites in
128:05 communication satellites in geostationary orbit around the Earth and
128:09 geostationary orbit around the Earth and this connection type is slow because
128:10 this connection type is slow because these satellites are positioned
128:12 these satellites are positioned approximately 35,000 km above the
128:14 approximately 35,000 km above the Earth's surface it takes a fair amount
128:17 Earth's surface it takes a fair amount of time for a radio signal to travel
128:19 of time for a radio signal to travel 35,000 km to the South satellite and
128:22 35,000 km to the South satellite and then back down again and if you have bad
128:24 then back down again and if you have bad weather like a rainstorm interfering
128:26 weather like a rainstorm interfering with your radio signals just forget
128:28 with your radio signals just forget it cellular internet also known as
128:31 it cellular internet also known as mobile internet is a type of wireless
128:33 mobile internet is a type of wireless internet access that utilizes cellular
128:35 internet access that utilizes cellular networks to provide connectivity to
128:37 networks to provide connectivity to devices such as smartphones tablets and
128:40 devices such as smartphones tablets and computers it enables users to access the
128:43 computers it enables users to access the internet while on the go or traveling
128:45 internet while on the go or traveling without relying on fixed wired
128:47 without relying on fixed wired connections each device will have an
128:49 connections each device will have an antenna that allows it to connect to a
128:51 antenna that allows it to connect to a cellular network
128:52 cellular network infrastructure this infrastructure
128:54 infrastructure this infrastructure consists of a system of interconnected
128:56 consists of a system of interconnected base stations or cell towers that are
128:58 base stations or cell towers that are strategically placed to provide coverage
129:00 strategically placed to provide coverage over a specific geographic area also
129:04 over a specific geographic area also when I lost my power the other day I
129:06 when I lost my power the other day I noticed an additional benefit to a
129:07 noticed an additional benefit to a cellular internet connection I could
129:10 cellular internet connection I could still surf the web in the dark as my
129:12 still surf the web in the dark as my phone was battery powered and to be
129:14 phone was battery powered and to be clear I said surf the web in the dark
129:17 clear I said surf the web in the dark not surf the dark web exam objective 2.5
129:21 not surf the dark web exam objective 2.5 compare and contrast storage
129:23 compare and contrast storage types volatile versus non-volatile
129:27 types volatile versus non-volatile storage volatility refers to the degree
129:30 storage volatility refers to the degree to which stored data will remain
129:31 to which stored data will remain accessible over a given period of time
129:34 accessible over a given period of time in general storage volatility can be
129:36 in general storage volatility can be categorized into two main types volatile
129:38 categorized into two main types volatile storage and non-volatile
129:44 storage volatile storage refers to a type of storage that requires a
129:46 type of storage that requires a continuous power supply to retain data
129:49 continuous power supply to retain data random access memory RAM is the most
129:51 random access memory RAM is the most common example of volatile storage when
129:54 common example of volatile storage when the power is cut off or the system is
129:56 the power is cut off or the system is turned off the data stored in volatile
129:58 turned off the data stored in volatile storage is lost this is your temporary
130:01 storage is lost this is your temporary storage
130:03 storage option non-volatile storage on the other
130:06 option non-volatile storage on the other hand refers to a type of storage that
130:08 hand refers to a type of storage that retains data even when power is lost or
130:10 retains data even when power is lost or the system is turned off examples of
130:13 the system is turned off examples of non-volatile storage include hard disk
130:15 non-volatile storage include hard disk drives solid state drives Optical discs
130:18 drives solid state drives Optical discs and flash drives this is your more
130:20 and flash drives this is your more permanent storage
130:22 permanent storage option exam objective 2.5 compare and
130:26 option exam objective 2.5 compare and contrast storage
130:29 contrast storage types in this video I will be covering
130:31 types in this video I will be covering the various storage types used to store
130:33 the various storage types used to store Digital Data there are several types of
130:36 Digital Data there are several types of computer storage each with its own
130:38 computer storage each with its own characteristics including speed capacity
130:40 characteristics including speed capacity volatility and cost to align with the
130:44 volatility and cost to align with the CompTIA ITF plus exam objective 2.5 I
130:47 CompTIA ITF plus exam objective 2.5 I will break these into three specific
130:49 will break these into three specific storage types these C categories will be
130:52 storage types these C categories will be local device storage local network
130:54 local device storage local network storage and cloud storage now let's
130:57 storage and cloud storage now let's learn more about each of these
131:02 categories local device storage encompasses Hardware components used to
131:04 encompasses Hardware components used to store data on a computer device locally
131:06 store data on a computer device locally as opposed to remotely or on another
131:09 as opposed to remotely or on another device the types of local device storage
131:11 device the types of local device storage we will cover for the CompTIA ITF plus
131:14 we will cover for the CompTIA ITF plus exam include Ram hard disk drives solid
131:17 exam include Ram hard disk drives solid state drives Optical drives and flash
131:19 state drives Optical drives and flash drives
131:25 next up we have local network storage local network storage refers to the
131:27 local network storage refers to the various types of storage systems that
131:29 various types of storage systems that are accessible over a local area network
131:31 are accessible over a local area network connection allowing multiple devices to
131:33 connection allowing multiple devices to share and access stored data the types
131:36 share and access stored data the types of local network storage we will cover
131:38 of local network storage we will cover for the CompTIA ITF plus exam include
131:41 for the CompTIA ITF plus exam include file servers and network attached
131:45 file servers and network attached storage the last category of storage
131:47 storage the last category of storage types we will discuss is cloud storage
131:50 types we will discuss is cloud storage cloud storage storage refers to the
131:52 cloud storage storage refers to the practice of storing and managing data on
131:54 practice of storing and managing data on remote servers accessed over the
131:56 remote servers accessed over the Internet it involves using the
131:58 Internet it involves using the infrastructure of a cloud service
131:59 infrastructure of a cloud service provider which maintains large-scale
132:01 provider which maintains large-scale data centers to store and protect the
132:03 data centers to store and protect the data of individuals and
132:05 data of individuals and organizations some of the largest cloud
132:08 organizations some of the largest cloud service providers are Amazon web
132:10 service providers are Amazon web services Microsoft Azure and Google
132:12 services Microsoft Azure and Google Cloud platform in the following videos
132:15 Cloud platform in the following videos we will further discuss each storage
132:17 we will further discuss each storage type with greater detail with the
132:19 type with greater detail with the exception of ram as it was covered in
132:20 exception of ram as it was covered in exam objective
132:22 exam objective 2.3 exam objective 2.5 compare and
132:26 2.3 exam objective 2.5 compare and contrast storage
132:28 contrast storage types hard disk
132:30 types hard disk drive a hard disk drive or HDD is a type
132:34 drive a hard disk drive or HDD is a type of local device storage where Digital
132:36 of local device storage where Digital Data is stored magnetically on a
132:37 Data is stored magnetically on a spinning disc hdds are known for their
132:40 spinning disc hdds are known for their large storage capacities and relatively
132:43 large storage capacities and relatively lower cost compared to other storage
132:45 lower cost compared to other storage Technologies they are widely used in
132:47 Technologies they are widely used in desktop computers laptops and servers
132:51 desktop computers laptops and servers however hdds are mechanical devices and
132:54 however hdds are mechanical devices and are susceptible to wear and tear over
132:56 are susceptible to wear and tear over time they can also be slower in terms of
132:58 time they can also be slower in terms of data access and retrieval compared to
133:01 data access and retrieval compared to solid state
133:03 solid state drives the basic structure of an HDD
133:06 drives the basic structure of an HDD consists of one or more magnetic discs
133:08 consists of one or more magnetic discs or platters that rotate at high speeds
133:11 or platters that rotate at high speeds each platter has a magnetic coating that
133:13 each platter has a magnetic coating that stores the data The Platters are stacked
133:16 stores the data The Platters are stacked vertically on a spindle and the entire
133:18 vertically on a spindle and the entire assembly is enclosed in a protective
133:20 assembly is enclosed in a protective casing to read or write data an HDD uses
133:23 casing to read or write data an HDD uses a read/ WR head that hovers just above
133:26 a read/ WR head that hovers just above the surface of the rotating platters the
133:28 the surface of the rotating platters the read/ right head moves rapidly across
133:31 read/ right head moves rapidly across the platter's surface to access the
133:32 the platter's surface to access the desired data when reading data the head
133:35 desired data when reading data the head detects the magnetic changes on the
133:37 detects the magnetic changes on the platter's surface and converts them into
133:39 platter's surface and converts them into electrical signals that can be processed
133:42 electrical signals that can be processed by the computer when writing data the
133:44 by the computer when writing data the head applies a magnetic field to the
133:46 head applies a magnetic field to the platter to encode the information it
133:49 platter to encode the information it might go without saying but keep these
133:51 might go without saying but keep these devices away from strong magnets as they
133:53 devices away from strong magnets as they could seriously damage an HDD
133:55 could seriously damage an HDD Drive exam objective 2.5 compare and
133:59 Drive exam objective 2.5 compare and contrast storage
134:01 contrast storage types solid state
134:03 types solid state drive a solid state drive or SSD is a
134:07 drive a solid state drive or SSD is a type of local device storage where
134:09 type of local device storage where Digital Data is stored on non-volatile
134:10 Digital Data is stored on non-volatile flash memory chips ssds have many
134:14 flash memory chips ssds have many benefits when compared to
134:16 benefits when compared to hdds ssds are faster that means faster
134:19 hdds ssds are faster that means faster at accessing and storing dat dat
134:21 at accessing and storing dat dat including personal files to software
134:23 including personal files to software applications to operating system boot
134:26 applications to operating system boot files they are also more resistant to
134:28 files they are also more resistant to physical shocks vibrations and extreme
134:31 physical shocks vibrations and extreme temperatures due to their lack of
134:32 temperatures due to their lack of mechanical components additionally with
134:35 mechanical components additionally with no moving Parts ssds can operate
134:38 no moving Parts ssds can operate silently while ssds offer many
134:40 silently while ssds offer many advantages over traditional hdds they
134:43 advantages over traditional hdds they are generally more expensive per unit of
134:45 are generally more expensive per unit of storage however the cost of ssds has
134:48 storage however the cost of ssds has been decreasing over time making them
134:50 been decreasing over time making them more affordable aable and popular for
134:52 more affordable aable and popular for both personal and professional
134:55 both personal and professional use the main component of an SSD is nand
134:59 use the main component of an SSD is nand flash memory which is a type of
135:00 flash memory which is a type of nonvolatile memory that can retain data
135:02 nonvolatile memory that can retain data for long periods without the need for
135:04 for long periods without the need for power access to the nand flash memory is
135:07 power access to the nand flash memory is provided by the SSD controller which
135:10 provided by the SSD controller which acts as the interface between the
135:11 acts as the interface between the computer and the flash memory the
135:14 computer and the flash memory the controller manages data read and write
135:17 controller manages data read and write operations the last piece of the puzzle
135:19 operations the last piece of the puzzle is the cache to enhance performance ssds
135:23 is the cache to enhance performance ssds often incorporate a cache or high-speed
135:25 often incorporate a cache or high-speed buffer that stores frequently accessed
135:27 buffer that stores frequently accessed data for quicker
135:28 data for quicker retrieval course exam objective 2.5
135:33 retrieval course exam objective 2.5 compare and contrast storage
135:35 compare and contrast storage types optical
135:37 types optical drive an optical drive is a type of
135:40 drive an optical drive is a type of local device storage where Digital Data
135:42 local device storage where Digital Data is stored optically on a spinning dis
135:45 is stored optically on a spinning dis Optical drives are classified based on
135:47 Optical drives are classified based on the type of optical diss they can read
135:49 the type of optical diss they can read and write to the three main types of
135:52 and write to the three main types of optical discs are CDs or compact discs
135:56 optical discs are CDs or compact discs DVDs or digital versatile discs and
136:00 DVDs or digital versatile discs and Blu-ray discs as for how an optical
136:03 Blu-ray discs as for how an optical drive works it consists of a tray or
136:05 drive works it consists of a tray or slot where you insert the dis when you
136:07 slot where you insert the dis when you insert a disk the drive uses a laser
136:10 insert a disk the drive uses a laser beam to read the data stored on the
136:11 beam to read the data stored on the disk's surface the laser scans the dis
136:15 disk's surface the laser scans the dis reflecting off its surface and the drive
136:17 reflecting off its surface and the drive interprets the reflected signals as
136:19 interprets the reflected signals as Digital Data such as audio a video or
136:22 Digital Data such as audio a video or computer files similarly when writing
136:25 computer files similarly when writing data to a disk the optical drive uses a
136:27 data to a disk the optical drive uses a laser to etch or burn information onto
136:30 laser to etch or burn information onto the disk's surface this process creates
136:32 the disk's surface this process creates pits and lands on the disk that
136:34 pits and lands on the disk that represent the data being written once
136:37 represent the data being written once the data is written it can be read by
136:39 the data is written it can be read by any compatible optical
136:42 any compatible optical drive another topic worth discussing
136:45 drive another topic worth discussing with regard to Optical discs is their
136:47 with regard to Optical discs is their storage limits according to the CompTIA
136:50 storage limits according to the CompTIA official study guide the maximum storage
136:53 official study guide the maximum storage limit for a CD is 700 mbes that is
136:56 limit for a CD is 700 mbes that is roughly 74 minutes of uncompressed
136:58 roughly 74 minutes of uncompressed stereo digital audio the maximum storage
137:02 stereo digital audio the maximum storage limit for a DVD is approximately 17
137:05 limit for a DVD is approximately 17 GB and the maximum storage limit for a
137:08 GB and the maximum storage limit for a Blu-ray disc is 128
137:11 Blu-ray disc is 128 GB exam objective 2.5 compare and
137:15 GB exam objective 2.5 compare and contrast storage
137:16 contrast storage types flash
137:18 types flash drive a flash drive is a type of
137:21 drive a flash drive is a type of portable storage device where Digital
137:23 portable storage device where Digital Data is stored on non-volatile flash
137:25 Data is stored on non-volatile flash memory chips this definition may look
137:27 memory chips this definition may look similar to the definition of an SSD
137:30 similar to the definition of an SSD drive well it should flash drives and
137:33 drive well it should flash drives and ssds use the same flash memory chips to
137:36 ssds use the same flash memory chips to store data the difference is that flash
137:38 store data the difference is that flash drives are small and compact making them
137:43 drives are small and compact making them portable a flash drive may also be
137:45 portable a flash drive may also be called a thumb drive or a USB flash
137:47 called a thumb drive or a USB flash drive if it has a USB connector just
137:50 drive if it has a USB connector just like like an SSD flash drives use flash
137:53 like like an SSD flash drives use flash memory a type of nonvolatile memory that
137:55 memory a type of nonvolatile memory that retains data even when power is removed
137:58 retains data even when power is removed this allows you to store files on the
138:00 this allows you to store files on the drive and access them later without the
138:02 drive and access them later without the need for a continuous power source flash
138:05 need for a continuous power source flash drives have a connector or interface on
138:07 drives have a connector or interface on one end which plugs into a computer
138:09 one end which plugs into a computer laptop or other compatible device the
138:12 laptop or other compatible device the interface provides both data transfer
138:15 interface provides both data transfer and power to the flash drive eliminating
138:17 and power to the flash drive eliminating the need for additional cables or power
138:19 the need for additional cables or power adapters
138:20 adapters once connected to a computer the flash
138:23 once connected to a computer the flash drive appears as a removable storage
138:25 drive appears as a removable storage device in the operating system from
138:27 device in the operating system from there you can simply drag and drop files
138:29 there you can simply drag and drop files or folders onto the drive to store them
138:32 or folders onto the drive to store them similarly you can copy files from the
138:34 similarly you can copy files from the flash drive to your computer for
138:36 flash drive to your computer for accessing or
138:42 editing yes memory cards can also be considered a form of flash drive it too
138:44 considered a form of flash drive it too uses flash memory technology to store
138:47 uses flash memory technology to store and transfer data however there are some
138:50 and transfer data however there are some differences in in terms of form factor
138:52 differences in in terms of form factor and
138:52 and usage memory cards are typically smaller
138:55 usage memory cards are typically smaller and thinner than traditional USB flash
138:57 and thinner than traditional USB flash drives they are designed to be inserted
139:00 drives they are designed to be inserted into specific memory card slots on
139:02 into specific memory card slots on devices such as cameras smartphones
139:04 devices such as cameras smartphones tablets and other Computing devices
139:08 tablets and other Computing devices common types of memory cards include
139:09 common types of memory cards include secure digital or SD cards mini SD cards
139:13 secure digital or SD cards mini SD cards micro SD cards compact flash cards and
139:16 micro SD cards compact flash cards and XD picture
139:18 XD picture cards exam objective 2.5 five compare
139:21 cards exam objective 2.5 five compare and contrast storage
139:23 and contrast storage types local network
139:26 types local network storage in this video we will cover two
139:28 storage in this video we will cover two options for local network storage
139:30 options for local network storage starting with a file server a file
139:33 starting with a file server a file server is a type of local network
139:35 server is a type of local network storage in which a general computing
139:36 storage in which a general computing device provides centralized storage and
139:39 device provides centralized storage and file sharing capabilities to multiple
139:41 file sharing capabilities to multiple users on a network when a computer is
139:44 users on a network when a computer is part of a network any internal or
139:46 part of a network any internal or external local drives can be shared with
139:48 external local drives can be shared with other computers when a computer shares
139:50 other computers when a computer shares its directly attached storage the
139:52 its directly attached storage the computer is acting as a file server to
139:55 computer is acting as a file server to simplify things a file server is a
139:58 simplify things a file server is a general computer or server that has been
140:00 general computer or server that has been configured with the purpose of sharing
140:02 configured with the purpose of sharing and storing files with other Computing
140:03 and storing files with other Computing devices on a local
140:06 devices on a local network while a server is a general
140:09 network while a server is a general computing device that can be purposed
140:11 computing device that can be purposed for many different functions network
140:13 for many different functions network attached storage devices or Nas devices
140:15 attached storage devices or Nas devices are a dedicated device with a specific
140:18 are a dedicated device with a specific function Nas devices are primarily
140:20 function Nas devices are primarily focused on file storage and sharing
140:23 focused on file storage and sharing while they may offer additional features
140:25 while they may offer additional features such as media streaming their primary
140:27 such as media streaming their primary function is to provide reliable and
140:29 function is to provide reliable and efficient file storage
140:31 efficient file storage capabilities Nas devices are designed to
140:33 capabilities Nas devices are designed to be userfriendly and easy to set up they
140:36 be userfriendly and easy to set up they often come with a web-based interface
140:38 often come with a web-based interface that allows users to configure settings
140:40 that allows users to configure settings manage file shares and set access
140:42 manage file shares and set access permissions without requiring deep
140:44 permissions without requiring deep technical knowledge that is why they are
140:47 technical knowledge that is why they are commonly used in home networks small
140:49 commonly used in home networks small businesses and environments where a
140:51 businesses and environments where a simple file sharing solution is
140:54 simple file sharing solution is preferred exam objective 2.5 compare and
140:58 preferred exam objective 2.5 compare and contrast storage
140:59 contrast storage types cloud
141:02 types cloud storage the last storage category we
141:04 storage the last storage category we will discuss is cloud storage cloud
141:07 will discuss is cloud storage cloud storage refers to the practice of
141:09 storage refers to the practice of storing and managing data on remote
141:11 storing and managing data on remote servers accessed over the Internet it
141:13 servers accessed over the Internet it involves using the infrastructure of a
141:15 involves using the infrastructure of a cloud service
141:18 cloud service provider in an earlier video we
141:20 provider in an earlier video we discussed some of the largest cloud
141:22 discussed some of the largest cloud service providers Amazon web services
141:24 service providers Amazon web services Microsoft Azure and Google Cloud
141:27 Microsoft Azure and Google Cloud platform now let's narrow it down and
141:29 platform now let's narrow it down and talk specifically about cloud storage
141:32 talk specifically about cloud storage Services a cloud storage service
141:34 Services a cloud storage service provides a cloud-based file storage and
141:36 provides a cloud-based file storage and synchronization service developed to
141:38 synchronization service developed to allow users to store access and share
141:41 allow users to store access and share files and folders across various devices
141:43 files and folders across various devices such as computers smartphones and
141:46 such as computers smartphones and tablets take a peek at the icons behind
141:49 tablets take a peek at the icons behind me Rec recognize any these four services
141:53 me Rec recognize any these four services are some of the largest cloud storage
141:54 are some of the largest cloud storage services on the market from left to
141:57 services on the market from left to right we have Microsoft One
141:59 right we have Microsoft One Drive Google
142:01 Drive Google Drive
142:03 Drive Dropbox and
142:06 Dropbox and iCloud exam objective 2.5 compare and
142:09 iCloud exam objective 2.5 compare and contrast storage
142:11 contrast storage types read and
142:13 types read and write it is time to break away from the
142:16 write it is time to break away from the exam objectives for a moment and do a
142:17 exam objectives for a moment and do a bit more bonus teaching in order to
142:19 bit more bonus teaching in order to discuss read and and write data read and
142:22 discuss read and and write data read and write operations are a foundational
142:24 write operations are a foundational topic with various applications
142:26 topic with various applications including software development database
142:28 including software development database management data analysis and file
142:31 management data analysis and file storage and I feel this is the perfect
142:33 storage and I feel this is the perfect time to talk about read and write as we
142:35 time to talk about read and write as we have just finished working with storage
142:38 have just finished working with storage drives okay so what is a
142:40 drives okay so what is a read a read involves retrieving
142:43 read a read involves retrieving information from a storage device and
142:45 information from a storage device and bringing it into the computer's system
142:46 bringing it into the computer's system memory for processing some synonyms we
142:49 memory for processing some synonyms we have used for have been access and
142:52 have used for have been access and retrieve a read would also be considered
142:54 retrieve a read would also be considered a drive output
143:00 operation now that we have defined read right is mostly the opposite a right
143:02 right is mostly the opposite a right involves storing our updating
143:03 involves storing our updating information on a storage device allowing
143:06 information on a storage device allowing you to modify existing data or add new
143:08 you to modify existing data or add new data a right would also be considered a
143:11 data a right would also be considered a drive input
143:16 operation with read and write defined we can now move on to some performance
143:17 can now move on to some performance metrics that help us to evaluate a
143:19 metrics that help us to evaluate a storage Drive
143:21 storage Drive I will first cover transfer rates a
143:24 I will first cover transfer rates a transfer rate also known as data rate is
143:26 transfer rate also known as data rate is very similar to throughput but instead
143:28 very similar to throughput but instead represents the speed at which data can
143:30 represents the speed at which data can be read from or written to a storage
143:32 be read from or written to a storage drive as opposed to the speed at which
143:34 drive as opposed to the speed at which data moves between
143:36 data moves between locations also transfer rates are
143:39 locations also transfer rates are usually measured in bytes per second
143:41 usually measured in bytes per second with the uppercase B bytes as opposed to
143:43 with the uppercase B bytes as opposed to throughput being measured in bits per
143:45 throughput being measured in bits per second with a lowercase b
143:47 second with a lowercase b bits okay to summarize transfer rate
143:51 bits okay to summarize transfer rate read speed is how fast a drive can
143:53 read speed is how fast a drive can retrieve information when
143:55 retrieve information when requested WR speed is how fast a drive
143:58 requested WR speed is how fast a drive can record or store incoming data
144:01 can record or store incoming data looking at the image behind me 3.1
144:03 looking at the image behind me 3.1 megabytes per second read speed means
144:05 megabytes per second read speed means data is currently being retrieved from
144:07 data is currently being retrieved from this drive at a rate of 3.1 megabytes of
144:10 this drive at a rate of 3.1 megabytes of data every second any thoughts on how
144:13 data every second any thoughts on how long it is going to take if the file
144:14 long it is going to take if the file being retrieved is 31 megabytes in
144:18 being retrieved is 31 megabytes in total that's right it will take
144:21 total that's right it will take approximately 10
144:24 approximately 10 seconds in addition to transfer rates we
144:27 seconds in addition to transfer rates we can measure a storage dries Performance
144:28 can measure a storage dries Performance Based on iops iops stands for input
144:32 Based on iops iops stands for input output operations per second and is a
144:34 output operations per second and is a performance metric that measures the
144:35 performance metric that measures the number of read and write operations a
144:38 number of read and write operations a storage device can handle in one second
144:40 storage device can handle in one second calculating iops involves two parts the
144:43 calculating iops involves two parts the average size of each operation and the
144:45 average size of each operation and the storage drives transfer rate the average
144:48 storage drives transfer rate the average operation size refers to the amount of
144:49 operation size refers to the amount of data read from or written to the storage
144:51 data read from or written to the storage device in a single operation and is
144:54 device in a single operation and is typically measured in bytes the transfer
144:57 typically measured in bytes the transfer rate represents the amount of data that
144:58 rate represents the amount of data that can be read from or written to the
145:00 can be read from or written to the storage device per second now to
145:02 storage device per second now to calculate iops take the transfer rate
145:05 calculate iops take the transfer rate and divide it by the average operation
145:07 and divide it by the average operation size while you may not see this
145:09 size while you may not see this information right away in your It
145:10 information right away in your It Journey it will prove useful in time
145:14 Journey it will prove useful in time exam objective 2.6 compare and contrast
145:17 exam objective 2.6 compare and contrast common Computing devices and their
145:18 common Computing devices and their purposes
145:20 purposes there are many different types of
145:22 there are many different types of computing devices in this video I will
145:25 computing devices in this video I will present some information about some of
145:26 present some information about some of the more common Computing devices
145:28 the more common Computing devices starting with mobile phones a mobile
145:31 starting with mobile phones a mobile phone is a portable device designed for
145:33 phone is a portable device designed for wireless communication over a cellular
145:35 wireless communication over a cellular network sounds like such a simple
145:37 network sounds like such a simple definition considering what a mobile
145:39 definition considering what a mobile phone can do it enables users to make
145:42 phone can do it enables users to make and receive phone calls send and receive
145:44 and receive phone calls send and receive text messages access the internet and
145:47 text messages access the internet and use various
145:48 use various applications no wonder people now refer
145:51 applications no wonder people now refer to a mobile phone as a smartphone a
145:53 to a mobile phone as a smartphone a mobile phone works by utilizing a
145:55 mobile phone works by utilizing a combination of hardware and software
145:57 combination of hardware and software components including an internal antenna
145:59 components including an internal antenna to receive and transmit cellular network
146:02 to receive and transmit cellular network signals they also utilize arm processors
146:05 signals they also utilize arm processors due to space
146:11 limitations next we have tablets a tablet can be defined the same as a
146:13 tablet can be defined the same as a mobile phone or smartphone just like a
146:15 mobile phone or smartphone just like a smartphone tablets have internal
146:17 smartphone tablets have internal antennas allowing them to connect to a
146:19 antennas allowing them to connect to a cellular network work they utilize arm
146:21 cellular network work they utilize arm processors and provide similar
146:24 processors and provide similar functionality the main difference is the
146:26 functionality the main difference is the screen size while a smartphone screen
146:29 screen size while a smartphone screen typically measures 4 and 1 half to 5.7
146:31 typically measures 4 and 1 half to 5.7 in a tablet screen will measure 7 to 10
146:34 in a tablet screen will measure 7 to 10 in in
146:37 in in size looks like our devices keep getting
146:39 size looks like our devices keep getting bigger next up on the size scale we have
146:43 bigger next up on the size scale we have laptops a laptop is a Computing device
146:46 laptops a laptop is a Computing device that integrates the display system
146:47 that integrates the display system components and multiple peripheral
146:49 components and multiple peripheral devices within a single portable case
146:52 devices within a single portable case they have an internal battery power
146:54 they have an internal battery power source but can also utilize external
146:56 source but can also utilize external power sources as well some of the
146:59 power sources as well some of the built-in peripherals may include a
147:00 built-in peripherals may include a keyboard touchpad instead of a mouse
147:03 keyboard touchpad instead of a mouse touchscreen webcam and or
147:10 microphone up next is a workstation a workstation is a type of computing
147:12 workstation is a type of computing device that is designed to be used in a
147:14 device that is designed to be used in a fixed location a workstation may be
147:17 fixed location a workstation may be known to you by the name desktop PC or
147:19 known to you by the name desktop PC or just desk desktop mostly because we
147:22 just desk desktop mostly because we place these Computing devices on or
147:24 place these Computing devices on or under a desk unlike a laptop a
147:26 under a desk unlike a laptop a workstation peripheral devices will be
147:28 workstation peripheral devices will be external and attached using a variety of
147:36 interfaces our next device is a server and this is where things get tricky so
147:38 and this is where things get tricky so time to listen closely a server in a
147:40 time to listen closely a server in a logical sense is a Computing device that
147:43 logical sense is a Computing device that provides a service to other Computing
147:45 provides a service to other Computing devices a perfect example of this was
147:48 devices a perfect example of this was the centralized file server discussed an
147:50 the centralized file server discussed an exam objective
147:51 exam objective 2.5 there are also print servers email
147:54 2.5 there are also print servers email servers web servers and so on then there
147:58 servers web servers and so on then there is a server in a physical sense and the
148:00 is a server in a physical sense and the physical definition of a server is what
148:02 physical definition of a server is what we are going to be focused on for
148:05 we are going to be focused on for now okay with that clarification out of
148:07 now okay with that clarification out of the way a server is defined as a
148:09 the way a server is defined as a powerful Computing device designed to
148:11 powerful Computing device designed to support a number of users
148:13 support a number of users simultaneously it will have the same
148:15 simultaneously it will have the same internal components as a workstation but
148:18 internal components as a workstation but the components will be more powerful
148:19 the components will be more powerful more reliable and more expensive another
148:23 more reliable and more expensive another note since a server provides a service
148:25 note since a server provides a service to many other Computing devices
148:27 to many other Computing devices consideration must be taken when
148:29 consideration must be taken when upgrading updating or patching a server
148:32 upgrading updating or patching a server as these actions will have an impact on
148:34 as these actions will have an impact on the server's ability to provide its
148:40 services the last Computing device I will cover is gaming consoles a gaming
148:43 will cover is gaming consoles a gaming console is a specialized Computing
148:45 console is a specialized Computing device designed primarily for playing
148:47 device designed primarily for playing video games most of us are probably
148:50 video games most of us are probably familiar with gaming consoles especially
148:52 familiar with gaming consoles especially the market leaders Sony PlayStation
148:54 the market leaders Sony PlayStation Nintendo switch and Microsoft
148:57 Nintendo switch and Microsoft Xbox these devices are not just
148:59 Xbox these devices are not just specialized Computing devices but also
149:02 specialized Computing devices but also come with specialized operating systems
149:04 come with specialized operating systems which may be referred to as an embedded
149:06 which may be referred to as an embedded operating
149:08 operating system exam objective 2.6 compare and
149:11 system exam objective 2.6 compare and contrast common Computing devices and
149:13 contrast common Computing devices and their
149:14 their purposes
149:16 purposes iot we have covered the major types of
149:19 iot we have covered the major types of computing devices in the previous video
149:22 computing devices in the previous video but what about everything else that is
149:24 but what about everything else that is embedded with processing and networking
149:26 embedded with processing and networking functionality well we have a category
149:28 functionality well we have a category for them too they are classified as iot
149:31 for them too they are classified as iot devices where iot stands for Internet of
149:34 devices where iot stands for Internet of Things these well things are physical
149:38 Things these well things are physical devices objects and sensors that are
149:40 devices objects and sensors that are connected to the internet and can
149:41 connected to the internet and can collect exchange and transmit data these
149:45 collect exchange and transmit data these devices which can range from everyday
149:47 devices which can range from everyday household objects to Industrial
149:49 household objects to Industrial machinery come with sensors embedded
149:51 machinery come with sensors embedded operating systems and network
149:53 operating systems and network connectivity to enable communication and
149:55 connectivity to enable communication and data sharing this Internet of Things
149:58 data sharing this Internet of Things allows these devices to interact with
150:00 allows these devices to interact with each other as well as with humans to
150:02 each other as well as with humans to gather and analyze data automate
150:04 gather and analyze data automate processes and enable remote monitoring
150:06 processes and enable remote monitoring and control iot devices have been
150:09 and control iot devices have been deployed in various ways you can find
150:12 deployed in various ways you can find iot devices for home appliances home
150:14 iot devices for home appliances home automation in modern cars with IP
150:17 automation in modern cars with IP cameras streaming media devices and
150:19 cameras streaming media devices and medical devices to name a
150:23 medical devices to name a few iot devices have transformed the
150:26 few iot devices have transformed the functionality of Home Appliances
150:27 functionality of Home Appliances including refrigerators ovens microwaves
150:31 including refrigerators ovens microwaves washers and dryers making our lives more
150:33 washers and dryers making our lives more convenient and efficient with iot
150:36 convenient and efficient with iot technology smart refrigerators can offer
150:38 technology smart refrigerators can offer features such as tracking food items
150:40 features such as tracking food items their expir dates and even suggest
150:43 their expir dates and even suggest recipes based on the available
150:45 recipes based on the available ingredients ovens and microwaves
150:47 ingredients ovens and microwaves equipped with iot capabilities allow
150:49 equipped with iot capabilities allow remote control control and monitoring
150:50 remote control control and monitoring through smartphone apps enabling users
150:53 through smartphone apps enabling users to preheat adjust cooking settings and
150:55 to preheat adjust cooking settings and receive notifications when meals are
150:57 receive notifications when meals are ready iot enabled washers and dryers
151:00 ready iot enabled washers and dryers offer remote control and scheduling
151:02 offer remote control and scheduling options allowing users to start or pause
151:05 options allowing users to start or pause cycles and receive alerts when clothes
151:07 cycles and receive alerts when clothes are ready for the next
151:09 are ready for the next step in addition to Home Appliances iot
151:13 step in addition to Home Appliances iot devices have pave the way for advanced
151:15 devices have pave the way for advanced home automation iot devices for home
151:18 home automation iot devices for home automation including thermostat and
151:20 automation including thermostat and security systems revolutionize Our
151:22 security systems revolutionize Our Living Spaces smart thermostats offer
151:25 Living Spaces smart thermostats offer remote temperature control and energy
151:27 remote temperature control and energy management optimizing comfort and
151:29 management optimizing comfort and efficiency iot-based security systems
151:32 efficiency iot-based security systems integrate cameras sensors and locks for
151:35 integrate cameras sensors and locks for remote monitoring and real-time alerts
151:37 remote monitoring and real-time alerts these devices enable personalized
151:39 these devices enable personalized schedules for lighting entertainment and
151:42 schedules for lighting entertainment and centralized control through mobile apps
151:44 centralized control through mobile apps enhancing convenience Energy savings and
151:47 enhancing convenience Energy savings and Home Security
151:50 Home Security the use of iot devices in modern cars
151:52 the use of iot devices in modern cars has greatly enhanced the driving
151:54 has greatly enhanced the driving experience and safety features connected
151:57 experience and safety features connected car Technologies allow for real-time
151:59 car Technologies allow for real-time monitoring analysis and communication
152:02 monitoring analysis and communication between vehicles and the surrounding
152:04 between vehicles and the surrounding environment iot enabled features include
152:07 environment iot enabled features include GPS navigation systems with live traffic
152:09 GPS navigation systems with live traffic updates vehicle diagnostics maintenance
152:12 updates vehicle diagnostics maintenance alerts or my personal favorite remote
152:15 alerts or my personal favorite remote lock unlock and start capabilities all
152:18 lock unlock and start capabilities all from an application on my smartphone
152:24 the integration of iot with IP cameras has revolutionized surveillance and
152:26 has revolutionized surveillance and monitoring systems iot enabled IP
152:29 monitoring systems iot enabled IP cameras offer Advanced features and
152:31 cameras offer Advanced features and functionalities for enhanced security
152:33 functionalities for enhanced security and remote monitoring these cameras can
152:36 and remote monitoring these cameras can connect to the internet allowing users
152:38 connect to the internet allowing users to access live video feeds and
152:40 to access live video feeds and recordings from anywhere through mobile
152:41 recordings from anywhere through mobile apps or web
152:47 browsers with the integration of iot Technology streaming media devices such
152:49 Technology streaming media devices such as Smart TVs streaming sticks and set
152:52 as Smart TVs streaming sticks and set toop boxes have become more than just
152:54 toop boxes have become more than just devices for Content consumption they now
152:57 devices for Content consumption they now offer seamless connectivity personalized
152:59 offer seamless connectivity personalized experiences and a wealth of innovative
153:01 experiences and a wealth of innovative features by connecting to the internet
153:04 features by connecting to the internet these devices provide access to a vast
153:06 these devices provide access to a vast array of online streaming platforms
153:08 array of online streaming platforms allowing users to enjoy their favorite
153:10 allowing users to enjoy their favorite movies TV shows and music with
153:14 movies TV shows and music with ease one last use for iot devices
153:17 ease one last use for iot devices includes the healthcare industry iot
153:20 includes the healthcare industry iot enabled medical devices such as wearable
153:22 enabled medical devices such as wearable Health trackers smart implants and
153:24 Health trackers smart implants and remote patient monitoring systems enable
153:27 remote patient monitoring systems enable continuous monitoring of Vital Signs
153:29 continuous monitoring of Vital Signs medication adherence and overall patient
153:32 medication adherence and overall patient well-being these devices can collect
153:34 well-being these devices can collect real-time data and transmit it securely
153:36 real-time data and transmit it securely to healthcare providers facilitating
153:38 to healthcare providers facilitating remote patient monitoring And Timely
153:41 remote patient monitoring And Timely intervention wow now that is a lot to
153:43 intervention wow now that is a lot to take in iot devices are really
153:47 take in iot devices are really everywhere exam objective 2. 7 explain
153:50 everywhere exam objective 2. 7 explain basic networking
153:52 basic networking Concepts basics of network
153:55 Concepts basics of network communication it is now time to welcome
153:58 communication it is now time to welcome you to the world of network
153:59 you to the world of network communication in this video we will
154:02 communication in this video we will embark on a journey to demystify the
154:04 embark on a journey to demystify the basics of computer networking and
154:05 basics of computer networking and explain their significance in modern
154:07 explain their significance in modern Computing so let's Dive In by defining
154:09 Computing so let's Dive In by defining the word network a network is two or
154:12 the word network a network is two or more Computing devices linked together
154:14 more Computing devices linked together by some form of transmission medium that
154:16 by some form of transmission medium that enables them to share information you
154:19 enables them to share information you can also Imagine imagine a network as a
154:20 can also Imagine imagine a network as a digital web or virtual Highway
154:22 digital web or virtual Highway connecting computers smartphones servers
154:25 connecting computers smartphones servers and
154:27 and more so why are networks so important in
154:30 more so why are networks so important in modern Computing well they form the
154:32 modern Computing well they form the backbone of our interconnected World
154:35 backbone of our interconnected World networks enable us to stay connected
154:37 networks enable us to stay connected with friends and family across the globe
154:39 with friends and family across the globe access information on the internet
154:41 access information on the internet stream movies play online games and
154:43 stream movies play online games and collaborate with colleagues remotely
154:46 collaborate with colleagues remotely they facilitate the exchange of data
154:48 they facilitate the exchange of data providing a platform for business
154:49 providing a platform for business businesses education entertainment and
154:52 businesses education entertainment and so much
154:54 so much more now let's talk about protocols in
154:58 more now let's talk about protocols in the world of computer networking a
155:00 the world of computer networking a protocol refers to a set of rules and
155:02 protocol refers to a set of rules and standards that govern the exchange of
155:04 standards that govern the exchange of information between devices or systems
155:07 information between devices or systems it defines how data is transmitted
155:09 it defines how data is transmitted received interpreted and acted upon
155:11 received interpreted and acted upon during communication just as we follow
155:14 during communication just as we follow social norms to interact with others
155:16 social norms to interact with others effectively devices on a network adhere
155:18 effectively devices on a network adhere to specific protocols to ensure seamless
155:21 to specific protocols to ensure seamless communication think of protocols as a
155:23 communication think of protocols as a common language that devices use to
155:25 common language that devices use to understand and interpret each other's
155:27 understand and interpret each other's messages protocols also Define how
155:30 messages protocols also Define how devices identify one another and how
155:32 devices identify one another and how errors are handled they provide a
155:34 errors are handled they provide a structured framework that allows devices
155:36 structured framework that allows devices to communicate in a reliable and
155:38 to communicate in a reliable and standardized manner without protocols
155:41 standardized manner without protocols communication across networks would be
155:43 communication across networks would be chaotic and prone to errors throughout
155:46 chaotic and prone to errors throughout exam objective 2.7 we will cover some of
155:49 exam objective 2.7 we will cover some of the most common networking
155:51 the most common networking protocols exam objective 2.7 explain
155:55 protocols exam objective 2.7 explain basic networking
155:57 basic networking Concepts Lan and
155:59 Concepts Lan and Wan networks of different sizes can be
156:02 Wan networks of different sizes can be categorized in different ways based on
156:04 categorized in different ways based on their coverage and scale in this video
156:06 their coverage and scale in this video we will cover the most common Network
156:08 we will cover the most common Network types starting with Lan Lan is short for
156:11 types starting with Lan Lan is short for local area network and refers to a wired
156:13 local area network and refers to a wired Network that covers a small geographical
156:15 Network that covers a small geographical area typically within a building small
156:18 area typically within a building small office or home
156:21 office or home in a lan devices such as computers
156:23 in a lan devices such as computers laptops printers and servers
156:26 laptops printers and servers interconnect allowing for the sharing of
156:28 interconnect allowing for the sharing of resources data and services within the
156:32 resources data and services within the network in addition to landan networks
156:35 network in addition to landan networks we have W Lan networks W Lan stands for
156:39 we have W Lan networks W Lan stands for wireless local area network a w Lan is
156:42 wireless local area network a w Lan is similar to a lan but the key difference
156:44 similar to a lan but the key difference is the use of Wireless technology for
156:46 is the use of Wireless technology for connectivity instead of relying on
156:48 connectivity instead of relying on physical C
156:50 physical C W lands use wireless signals such as
156:52 W lands use wireless signals such as Wi-Fi to connect devices within a
156:54 Wi-Fi to connect devices within a localized
156:57 localized area a w land may also be connected to a
157:00 area a w land may also be connected to a landan in this way a w lan can extend a
157:03 landan in this way a w lan can extend a land by providing a method for wireless
157:05 land by providing a method for wireless devices to connect to and share
157:07 devices to connect to and share resources with the wired Land
157:11 resources with the wired Land network now we can move on to WS or wide
157:14 network now we can move on to WS or wide area networks WS cover a much larger
157:17 area networks WS cover a much larger area than lands or w l
157:20 area than lands or w l a Wan is a network that spans a large
157:22 a Wan is a network that spans a large geographical area typically connecting
157:25 geographical area typically connecting multiple lands or remote locations WS
157:28 multiple lands or remote locations WS are used to connect networks across
157:30 are used to connect networks across cities countries or even continents they
157:33 cities countries or even continents they enable long-distance Communications and
157:35 enable long-distance Communications and data exchanges between geographically
157:37 data exchanges between geographically dispersed sites the internet itself can
157:40 dispersed sites the internet itself can be considered a massive Wan connecting
157:42 be considered a massive Wan connecting networks
157:47 worldwide and just like Lan has a wireless equivalent so does w the WAN
157:50 wireless equivalent so does w the WAN Wireless equivalent is a wwan WWI stands
157:53 Wireless equivalent is a wwan WWI stands for wireless wide area network it refers
157:57 for wireless wide area network it refers to a wireless network that provides
157:58 to a wireless network that provides coverage over a large geographical area
158:01 coverage over a large geographical area typically larger than what a w land can
158:03 typically larger than what a w land can cover ww's most commonly used cellular
158:06 cover ww's most commonly used cellular networks such as 3G 4G or 5G to provide
158:11 networks such as 3G 4G or 5G to provide Wireless connectivity to devices across
158:13 Wireless connectivity to devices across wide ranging
158:15 wide ranging areas a w wind may also extend a w by
158:19 areas a w wind may also extend a w by providing a method for wireless devices
158:21 providing a method for wireless devices to connect to a WAN network this is
158:23 to connect to a WAN network this is accomplished when a w when cell tower
158:26 accomplished when a w when cell tower has a wired connection to a
158:29 has a wired connection to a w now that we understand what a lan and
158:32 w now that we understand what a lan and when are how do they work together L and
158:34 when are how do they work together L and WS are interconnected and complimentary
158:37 WS are interconnected and complimentary components of an overall Network
158:39 components of an overall Network infrastructure land serve as the
158:41 infrastructure land serve as the foundation for local communication and
158:43 foundation for local communication and resource sharing within a limited area
158:45 resource sharing within a limited area providing fast and efficient
158:46 providing fast and efficient connectivity between devices in close
158:48 connectivity between devices in close proximity
158:50 proximity they enable seamless collaboration file
158:52 they enable seamless collaboration file sharing and access to Shared resources
158:54 sharing and access to Shared resources within a building small office or home
158:57 within a building small office or home while a Wan extends the reach of lands
158:59 while a Wan extends the reach of lands by connecting geographically dispersed
159:02 by connecting geographically dispersed networks together LS and WS create a
159:04 networks together LS and WS create a comprehensive Network architecture that
159:06 comprehensive Network architecture that enables seamless and scalable
159:08 enables seamless and scalable communication across both local and
159:10 communication across both local and Global distances and there you have it
159:14 Global distances and there you have it an introduction to L W Lans ws and W WS
159:18 an introduction to L W Lans ws and W WS the fundamental Network types and
159:20 the fundamental Network types and computer
159:21 computer networking exam objective 2.7 explain
159:25 networking exam objective 2.7 explain basic networking
159:27 basic networking Concepts basics of packet
159:30 Concepts basics of packet transmission Network packets are like
159:32 transmission Network packets are like small envelopes that carry chunks of
159:34 small envelopes that carry chunks of data across a computer network when you
159:36 data across a computer network when you send or receive information over a lan
159:38 send or receive information over a lan or WAN network it's divided into smaller
159:41 or WAN network it's divided into smaller pieces called packets these packets
159:44 pieces called packets these packets contain both the data you're sending and
159:45 contain both the data you're sending and additional information needed to ensure
159:47 additional information needed to ensure proper delivery
159:50 proper delivery this is the same concept as a company
159:52 this is the same concept as a company that wants to send a large shipment of
159:54 that wants to send a large shipment of goods to another location instead of
159:57 goods to another location instead of sending the entire shipment in one
159:59 sending the entire shipment in one massive box they will divide it into
160:00 massive box they will divide it into smaller boxes each containing a portion
160:03 smaller boxes each containing a portion of the goods similarly data is divided
160:06 of the goods similarly data is divided into packets with each packet containing
160:08 into packets with each packet containing a portion of the total information to be
160:10 a portion of the total information to be sent just as shipping smaller boxes is
160:13 sent just as shipping smaller boxes is easier to handle and transport breaking
160:16 easier to handle and transport breaking information into small packets allows
160:18 information into small packets allows for more efficient data trans
160:23 Transmissions now with our theoretical shipment broken down into many smaller
160:25 shipment broken down into many smaller boxes each box will require a label the
160:28 boxes each box will require a label the label should include additional
160:30 label should include additional information to help with successful
160:32 information to help with successful delivery our data packets will do the
160:34 delivery our data packets will do the same in addition to the data being sent
160:37 same in addition to the data being sent each data packet will include
160:39 each data packet will include information such as addressing
160:40 information such as addressing sequencing error checking and much more
160:44 sequencing error checking and much more what can I say computers like to be
160:47 what can I say computers like to be precise exam object Ive 2.7 explain
160:51 precise exam object Ive 2.7 explain basic networking
160:53 basic networking Concepts networking
160:55 Concepts networking devices in networking we have many
160:58 devices in networking we have many network devices that help us to connect
161:00 network devices that help us to connect our different Computing devices together
161:02 our different Computing devices together before learning about the different
161:04 before learning about the different networking devices you will need to
161:05 networking devices you will need to learn a couple definitions to expand
161:07 learn a couple definitions to expand your
161:08 your vocabulary in exam objective 2.6 you
161:12 vocabulary in exam objective 2.6 you learned about all the common Computing
161:13 learned about all the common Computing devices to include mobile phones or
161:16 devices to include mobile phones or smartphones tablets laptops workstations
161:19 smartphones tablets laptops workstations servers and iot devices yes I left out
161:23 servers and iot devices yes I left out gaming consoles as they don't come up
161:24 gaming consoles as they don't come up very often in networking
161:26 very often in networking conversations and allow me to add in
161:28 conversations and allow me to add in printers and voice over IP or digital
161:31 printers and voice over IP or digital phones as they do come up a lot now all
161:33 phones as they do come up a lot now all of these Computing devices have a
161:35 of these Computing devices have a specific classification with regard to
161:38 specific classification with regard to networking they are called end devices a
161:41 networking they are called end devices a definition of end device would then be
161:43 definition of end device would then be any device that directly connects to a
161:45 any device that directly connects to a network and is used by individuals or
161:47 network and is used by individuals or organizations to access or provide
161:49 organizations to access or provide provide information services or
161:55 resources so if a device is not classified as an end device it is
161:57 classified as an end device it is probably a network device a network
162:00 probably a network device a network device is any component that facilitates
162:02 device is any component that facilitates the communication and transfer of data
162:04 the communication and transfer of data within a computer network these devices
162:07 within a computer network these devices play a crucial role in establishing and
162:09 play a crucial role in establishing and maintaining network connectivity
162:11 maintaining network connectivity enabling the transmission of information
162:13 enabling the transmission of information between different end devices networks
162:15 between different end devices networks or systems the network devices we will
162:18 or systems the network devices we will cover for the ITF plus exam are modem
162:21 cover for the ITF plus exam are modem switch access point router and
162:24 switch access point router and firewall exam objective 2.7 explain
162:28 firewall exam objective 2.7 explain basic networking
162:30 basic networking Concepts
162:32 Concepts modem hold on 1 second while I try to
162:44 connect just kidding okay time to get back to
162:45 back to work there are many different types of
162:47 work there are many different types of modems depending on the trans
162:49 modems depending on the trans transmission medium and service
162:50 transmission medium and service connection type in use so I will stick
162:52 connection type in use so I will stick to the general functions of a modem and
162:54 to the general functions of a modem and use telephone lines and the public
162:56 use telephone lines and the public switch telephone Network as the
162:58 switch telephone Network as the transmission medium and service
162:59 transmission medium and service connection type for my example later in
163:01 connection type for my example later in this
163:02 this video okay so what is a modem a modem is
163:06 video okay so what is a modem a modem is a network device that connects a
163:07 a network device that connects a computer or Lan using digital signals to
163:10 computer or Lan using digital signals to an analog based W Network it serves as a
163:13 an analog based W Network it serves as a bridge between the digital signals used
163:15 bridge between the digital signals used by computers and the analog signals used
163:17 by computers and the analog signals used by communication lines such as telephone
163:20 by communication lines such as telephone lines or cable
163:23 lines or cable lines consider a modem to be the Gateway
163:25 lines consider a modem to be the Gateway between your computer and a vast world
163:27 between your computer and a vast world of the Internet it's the first point of
163:30 of the Internet it's the first point of contact that enables your computer to
163:31 contact that enables your computer to access online resources and services
163:34 access online resources and services using the image behind me I will walk
163:37 using the image behind me I will walk you through the process of sending data
163:38 you through the process of sending data from one Computing device to another
163:40 from one Computing device to another Computing device across an internet
163:42 Computing device across an internet service providers Network in this case a
163:45 service providers Network in this case a telephone Network such as dialup or DSL
163:49 telephone Network such as dialup or DSL on the far left we have a workstation
163:51 on the far left we have a workstation that will be sending a data packet the
163:54 that will be sending a data packet the network interface card on the
163:55 network interface card on the workstation will send out a digital
163:57 workstation will send out a digital signal comprised of binary digits here
164:00 signal comprised of binary digits here the digital signal will be received by
164:02 the digital signal will be received by the modem on the left and the modem will
164:03 the modem on the left and the modem will perform a process called signal
164:06 perform a process called signal modulation modulation is the process of
164:08 modulation modulation is the process of taking an incoming signal in this case a
164:10 taking an incoming signal in this case a digital signal and modifying the signal
164:13 digital signal and modifying the signal into another form to be transmitted in
164:15 into another form to be transmitted in this case an analog signal the analog
164:18 this case an analog signal the analog signal will will then travel across an
164:20 signal will will then travel across an internet service provider's network
164:21 internet service provider's network until the destination network is reached
164:24 until the destination network is reached here another modem will perform a
164:26 here another modem will perform a process called Dem
164:27 process called Dem modulation demodulation is the reversal
164:30 modulation demodulation is the reversal of the modulation process here the
164:33 of the modulation process here the incoming signal which is currently an
164:35 incoming signal which is currently an analog signal will be converted back to
164:37 analog signal will be converted back to a digital signal now the network
164:39 a digital signal now the network interface of the workstation on the far
164:41 interface of the workstation on the far right can receive the digital signal as
164:43 right can receive the digital signal as an input and process the newly received
164:46 an input and process the newly received data packet exam objective 2 .7 explain
164:50 data packet exam objective 2 .7 explain basic networking
164:52 basic networking Concepts
164:54 Concepts switch at the heart of any modern local
164:56 switch at the heart of any modern local area network you are likely to find a
164:58 area network you are likely to find a network switch or maybe multiple
165:00 network switch or maybe multiple switches if the network is large and
165:02 switches if the network is large and complex a switch is a network device
165:05 complex a switch is a network device that connects multiple devices within a
165:07 that connects multiple devices within a local area network it acts as a central
165:10 local area network it acts as a central Hub allowing devices like computers
165:12 Hub allowing devices like computers printers servers or other end devices to
165:15 printers servers or other end devices to communicate with each other by
165:16 communicate with each other by forwarding data packets on the same land
165:23 think of a network switch as a traffic controller in a network it receives data
165:26 controller in a network it receives data packets from one device and
165:27 packets from one device and intelligently forwards them to the
165:29 intelligently forwards them to the intended recipient ensuring efficient
165:31 intended recipient ensuring efficient and direct communication between devices
165:33 and direct communication between devices within the network network switches
165:36 within the network network switches commonly use ethernet cables or cat
165:38 commonly use ethernet cables or cat cables to connect end devices to the
165:40 cables to connect end devices to the ports on the network switch and
165:42 ports on the network switch and communicate using the ethernet protocol
165:45 communicate using the ethernet protocol when a device wants to send data to
165:47 when a device wants to send data to another device within the landan network
165:49 another device within the landan network it encapsulates the data into a data
165:51 it encapsulates the data into a data packet this data packet will contain the
165:54 packet this data packet will contain the destination address the sender Source
165:56 destination address the sender Source address and the actual data or payload
165:58 address and the actual data or payload being transmitted this encapsulated data
166:01 being transmitted this encapsulated data packet is then given the name ethernet
166:03 packet is then given the name ethernet frame the switch then receives the data
166:06 frame the switch then receives the data packet and examines the destination
166:08 packet and examines the destination address it then uses this information to
166:11 address it then uses this information to determine the best path or port to
166:13 determine the best path or port to forward the packet to the intended
166:15 forward the packet to the intended device this direct forwarding allows for
166:17 device this direct forwarding allows for fast and efficient commun communication
166:19 fast and efficient commun communication between
166:20 between devices exam objective 2.7 explain basic
166:24 devices exam objective 2.7 explain basic networking
166:26 networking Concepts access
166:28 Concepts access point in a traditional wired Lan devices
166:31 point in a traditional wired Lan devices are physically connected using cables
166:33 are physically connected using cables and network switches but in a wireless
166:35 and network switches but in a wireless LAN we eliminate the need for these
166:37 LAN we eliminate the need for these cables this is where wireless access
166:40 cables this is where wireless access points come into play a wireless access
166:43 points come into play a wireless access point also known as a WAP is a network
166:46 point also known as a WAP is a network device that allows Wireless
166:47 device that allows Wireless communication between devices in a
166:51 communication between devices in a network think of a network access point
166:53 network think of a network access point as a central Hub that enables Wireless
166:56 as a central Hub that enables Wireless connectivity it acts as a bridge between
166:58 connectivity it acts as a bridge between devices and the network creating a
167:00 devices and the network creating a wireless connection for them to
167:02 wireless connection for them to communicate with each other but how does
167:04 communicate with each other but how does a wireless access point work with other
167:06 a wireless access point work with other wired
167:08 wired networks well it's quite simple the
167:11 networks well it's quite simple the wireless access point takes the data
167:13 wireless access point takes the data packets it receives from devices such as
167:15 packets it receives from devices such as smartphones tablets and laptops and
167:18 smartphones tablets and laptops and transmits it wirelessly to the
167:20 transmits it wirelessly to the network similarly it receives data from
167:23 network similarly it receives data from the network and sends it wirelessly to
167:25 the network and sends it wirelessly to the devices connected to it this two-way
167:27 the devices connected to it this two-way communication allows devices to access
167:30 communication allows devices to access the network and share information with
167:32 the network and share information with each other
167:33 each other seamlessly now you might be wondering
167:35 seamlessly now you might be wondering how devices connect to a wireless access
167:37 how devices connect to a wireless access point well it's as easy as connecting to
167:40 point well it's as easy as connecting to a Wi-Fi network when you turn on your
167:42 a Wi-Fi network when you turn on your devic's Wi-Fi it scans for available
167:45 devic's Wi-Fi it scans for available wireless networks and when it detects a
167:47 wireless networks and when it detects a wireless access point it it prompts you
167:49 wireless access point it it prompts you to connect to it once connected you can
167:52 to connect to it once connected you can access the Network's resources and
167:54 access the Network's resources and communicate with other devices in the
167:56 communicate with other devices in the network just like you would in a wired
167:58 network just like you would in a wired Network so if an access point sounds a
168:01 Network so if an access point sounds a lot like a switch you are right an
168:03 lot like a switch you are right an access point is just a wireless version
168:05 access point is just a wireless version of a switch that provides local device
168:08 of a switch that provides local device connectivity exam objective 2.7 explain
168:11 connectivity exam objective 2.7 explain basic networking
168:13 basic networking Concepts
168:15 Concepts router before we delve into the
168:17 router before we delve into the specifics of a network router let's
168:19 specifics of a network router let's review the concept of computer
168:21 review the concept of computer networking computer networks are like
168:23 networking computer networks are like digital highways connecting devices
168:25 digital highways connecting devices together to facilitate communication and
168:28 together to facilitate communication and resource sharing and just as roads have
168:30 resource sharing and just as roads have intersections and signs to guide traffic
168:33 intersections and signs to guide traffic networks have switches and rouers to
168:35 networks have switches and rouers to direct data packets a network router is
168:38 direct data packets a network router is a network device that directs data
168:40 a network device that directs data packets between different computer
168:42 packets between different computer networks yes this is similar to a switch
168:45 networks yes this is similar to a switch with the exception that a switch directs
168:47 with the exception that a switch directs traffic within a land and router
168:49 traffic within a land and router controls data packets entering or
168:50 controls data packets entering or leaving the
168:52 leaving the Lan but how does a network router
168:55 Lan but how does a network router actually work well when a device wants
168:58 actually work well when a device wants to send data to another device in a
169:00 to send data to another device in a different network it compiles a data
169:02 different network it compiles a data packet these data packets will contain a
169:05 packet these data packets will contain a source address and a destination address
169:08 source address and a destination address the data packet will then seek out the
169:10 the data packet will then seek out the router the router examines the packet's
169:12 router the router examines the packet's destination address much like reading a
169:14 destination address much like reading a street sign and determines the most
169:16 street sign and determines the most efficient path for the data to reach its
169:18 efficient path for the data to reach its intended
169:19 intended destination to sum up a router a router
169:22 destination to sum up a router a router is a gateway sitting at the edge of a
169:24 is a gateway sitting at the edge of a network controlling inbound and outbound
169:26 network controlling inbound and outbound connectivity to other networks these
169:29 connectivity to other networks these could be other directly attached lands
169:31 could be other directly attached lands or maybe a Wan connection to the
169:33 or maybe a Wan connection to the internet and these routers make
169:35 internet and these routers make decisions based on addressing
169:36 decisions based on addressing information found within each and every
169:38 information found within each and every data
169:40 data packet exam objective 2.7 explain basic
169:44 packet exam objective 2.7 explain basic networking
169:45 networking Concepts Soho Network
169:49 Concepts Soho Network in this video I have some more bonus
169:51 in this video I have some more bonus material to cover specifically the topic
169:54 material to cover specifically the topic of a Soho Network having just covered
169:57 of a Soho Network having just covered the topics of network switch access
169:59 the topics of network switch access point and router I figured now would be
170:02 point and router I figured now would be a great time to discuss how these
170:04 a great time to discuss how these devices fit into a smaller setting of a
170:06 devices fit into a smaller setting of a home or small business environment the
170:08 home or small business environment the type of networking equipment used in a
170:10 type of networking equipment used in a home or small business environment can
170:12 home or small business environment can be described as Soho where Soho stands
170:15 be described as Soho where Soho stands for small office home office this
170:18 for small office home office this particular type of network will commonly
170:20 particular type of network will commonly utilize a multi-function Network device
170:22 utilize a multi-function Network device referred to as a Soho router but don't
170:25 referred to as a Soho router but don't let the name fool you though similar in
170:27 let the name fool you though similar in some aspects this is not like the
170:29 some aspects this is not like the Enterprise grade router we studied
170:31 Enterprise grade router we studied earlier in this exam objective a Soho
170:34 earlier in this exam objective a Soho router can perform routing functions but
170:36 router can perform routing functions but that is not all it can do so let's break
170:39 that is not all it can do so let's break down the main components that make up a
170:40 down the main components that make up a Soho
170:43 Soho router first up we have the network
170:45 router first up we have the network switch you may recall that a network
170:48 switch you may recall that a network switch is a network device that connects
170:50 switch is a network device that connects multiple devices within a local area
170:52 multiple devices within a local area network and yes the Soho router has a
170:55 network and yes the Soho router has a built-in network switch it may not have
170:58 built-in network switch it may not have as many ports as an Enterprise switch
171:00 as many ports as an Enterprise switch but it will still function the same the
171:02 but it will still function the same the Soho router displayed here can only
171:05 Soho router displayed here can only connect four Computing devices together
171:06 connect four Computing devices together in an Ethernet Lan the switch ports are
171:09 in an Ethernet Lan the switch ports are the yellow RJ45 ports inside box number
171:14 the yellow RJ45 ports inside box number one next we have the access point as a
171:18 one next we have the access point as a refresher the access point is a network
171:20 refresher the access point is a network device that allows Wireless
171:21 device that allows Wireless Communications between devices in a
171:24 Communications between devices in a network and yes the Soho router has a
171:27 network and yes the Soho router has a built-in access point too it may not
171:29 built-in access point too it may not support as many Wireless clients as an
171:31 support as many Wireless clients as an Enterprise access point but it will
171:33 Enterprise access point but it will still function the same the Soho router
171:36 still function the same the Soho router displayed here has an antenna inside box
171:38 displayed here has an antenna inside box number two that can transmit and receive
171:40 number two that can transmit and receive Wi-Fi
171:45 signals lastly let's talk about the router itself the router is the Gateway
171:48 router itself the router is the Gateway between your Soho Network and the
171:50 between your Soho Network and the internet or ISP that is where box number
171:53 internet or ISP that is where box number three comes in this is your Wan
171:56 three comes in this is your Wan connection pretty cool how a Soho router
171:58 connection pretty cool how a Soho router seamlessly integrates all these
172:00 seamlessly integrates all these components into one compact device if
172:03 components into one compact device if you are dealing with a limited number of
172:04 you are dealing with a limited number of computing devices in your network a Soho
172:07 computing devices in your network a Soho router would be the perfect choice to
172:08 router would be the perfect choice to provide network
172:10 provide network connectivity exam objective 2.7 explain
172:14 connectivity exam objective 2.7 explain basic networking
172:16 basic networking Concepts Network firewall
172:19 Concepts Network firewall let's imagine our computer network as a
172:22 let's imagine our computer network as a fortress just like a fortress has
172:24 fortress just like a fortress has protective barriers and guards a
172:26 protective barriers and guards a computer network needs a way to
172:28 computer network needs a way to safeguard against unwanted intrusions
172:30 safeguard against unwanted intrusions and threats this is where Network
172:32 and threats this is where Network firewalls come into play a network
172:35 firewalls come into play a network firewall is a network security device
172:37 firewall is a network security device that acts as a barrier between a
172:39 that acts as a barrier between a computer network and outside Network
172:40 computer network and outside Network traffic it monitors and controls
172:43 traffic it monitors and controls incoming and outgoing Network
172:50 traffic so how does a network firewall work well it examines each data packet
172:53 work well it examines each data packet that tries to pass through it inspecting
172:54 that tries to pass through it inspecting its source address destination address
172:57 its source address destination address and content it Compares this information
173:00 and content it Compares this information against a set of predefined security
173:02 against a set of predefined security rules and
173:03 rules and policies if a data packet matches the
173:05 policies if a data packet matches the allowed criteria it's permitted to pass
173:08 allowed criteria it's permitted to pass through and continue towards its
173:10 through and continue towards its destination however if a data packet
173:12 destination however if a data packet violates any of the security rules the
173:14 violates any of the security rules the firewall blocks it from entering or
173:16 firewall blocks it from entering or leaving the network
173:19 leaving the network predefined security rules and policies
173:22 predefined security rules and policies in the context of network firewalls are
173:24 in the context of network firewalls are often implemented using a mechanism
173:26 often implemented using a mechanism called Access Control lists or ACLS an
173:30 called Access Control lists or ACLS an ACL defines the specific criteria that
173:32 ACL defines the specific criteria that determines whether Network traffic will
173:34 determines whether Network traffic will be allowed or denied by the firewall
173:36 be allowed or denied by the firewall Access Control lists are essentially a
173:38 Access Control lists are essentially a set of rules that dictate what types of
173:40 set of rules that dictate what types of network traffic are permitted and what
173:42 network traffic are permitted and what types should be blocked as a data packet
173:45 types should be blocked as a data packet is received by a network firewall the
173:48 is received by a network firewall the network nwork firewall will compare the
173:49 network nwork firewall will compare the data packet against the security rules
173:51 data packet against the security rules listed in its Access Control list if the
173:54 listed in its Access Control list if the data packet does not match any of the
173:56 data packet does not match any of the allow rules in the access control list
173:58 allow rules in the access control list the data packet will be
174:00 the data packet will be denied then the next packet can be
174:03 denied then the next packet can be processed the network firewall will
174:05 processed the network firewall will again compare the data packet against
174:07 again compare the data packet against the security rules listed in its Access
174:09 the security rules listed in its Access Control list if the data packet matches
174:12 Control list if the data packet matches an allow rule in the access control list
174:14 an allow rule in the access control list the data packet will be permitted and
174:16 the data packet will be permitted and forwarded on
174:19 forwarded on exam objective 2.7 explain basic
174:22 exam objective 2.7 explain basic networking
174:23 networking Concepts Mac
174:26 Concepts Mac address I will begin this video with the
174:28 address I will begin this video with the definition of a MAC address where Mac
174:30 definition of a MAC address where Mac stands for media Access Control simply
174:33 stands for media Access Control simply put a MAC address is a unique Hardware
174:35 put a MAC address is a unique Hardware identification address issued to a
174:37 identification address issued to a networking device at the time of
174:39 networking device at the time of manufacturing it's like a digital
174:41 manufacturing it's like a digital fingerprint for that device within a
174:43 fingerprint for that device within a network every device that can connect to
174:46 network every device that can connect to a network including both end devices and
174:48 a network including both end devices and networking devices has its own Mac
174:50 networking devices has its own Mac address this is also very similar to how
174:53 address this is also very similar to how automobiles have VIN numbers or vehicle
174:55 automobiles have VIN numbers or vehicle identification numbers that are unique
174:57 identification numbers that are unique to every vehicle
174:59 to every vehicle manufactured now you may be wondering
175:02 manufactured now you may be wondering how are Mac addresses
175:03 how are Mac addresses represented well Mac addresses use the
175:06 represented well Mac addresses use the hexadecimal numbering system unlike our
175:09 hexadecimal numbering system unlike our familiar decimal system with numbers
175:11 familiar decimal system with numbers from 0 to 9 hexadecimal uses a base of
175:13 from 0 to 9 hexadecimal uses a base of 16 and includes numbers from 0 to 9 and
175:17 16 and includes numbers from 0 to 9 and letters from A to f
175:18 letters from A to f if you need a refresher on heximal this
175:21 if you need a refresher on heximal this topic was covered in the videos for exam
175:23 topic was covered in the videos for exam objective
175:28 1.1 now let's take a closer look at the structure of a MAC address a MAC address
175:31 structure of a MAC address a MAC address consists of 12 heximal digits which is
175:33 consists of 12 heximal digits which is equivalent to 48 binary bits the first
175:37 equivalent to 48 binary bits the first part of a MAC address is the oui which
175:39 part of a MAC address is the oui which stands for organizationally Unique
175:42 stands for organizationally Unique identifier this section comprises the
175:44 identifier this section comprises the first six hexadecimal digits of the MAC
175:46 first six hexadecimal digits of the MAC address the o UI helps identify the
175:49 address the o UI helps identify the manufacturer or vendor of the network
175:51 manufacturer or vendor of the network interface card the second part of a MAC
175:54 interface card the second part of a MAC address is the Nic or network interface
175:57 address is the Nic or network interface controller it follows the oui and
175:59 controller it follows the oui and consists of the remaining six heximal
176:01 consists of the remaining six heximal digits of the MAC address the Nic part
176:04 digits of the MAC address the Nic part provides a unique identifier for the
176:06 provides a unique identifier for the device itself within the manufacturer's
176:08 device itself within the manufacturer's range of Mac addresses this portion of
176:11 range of Mac addresses this portion of the MAC address distinguishes individual
176:13 the MAC address distinguishes individual devices produced by the same
176:18 manufacturer it's important to note that Mac addresses are globally unique this
176:21 Mac addresses are globally unique this means that no two devices in the world
176:23 means that no two devices in the world should have the same Mac address
176:26 should have the same Mac address manufacturers issue these addresses
176:28 manufacturers issue these addresses during the production process this
176:30 during the production process this ensures that each device has its own
176:32 ensures that each device has its own unique identifier even if they are made
176:34 unique identifier even if they are made by the same company this uniqueness is
176:37 by the same company this uniqueness is crucial for proper communication and
176:39 crucial for proper communication and data transmission within a network could
176:41 data transmission within a network could you imagine if a mailman had to deliver
176:43 you imagine if a mailman had to deliver a letter to a specific address but there
176:46 a letter to a specific address but there were two houses with the exact same
176:47 were two houses with the exact same address
176:49 address which one would get the
176:51 which one would get the letter the same holds true for a data
176:54 letter the same holds true for a data packet if two devices were using the
176:57 packet if two devices were using the same Mac address which network interface
176:59 same Mac address which network interface would receive the data packet from the
177:01 would receive the data packet from the network switch the switch and I surely
177:03 network switch the switch and I surely don't
177:06 don't know now you might be wondering how are
177:08 know now you might be wondering how are Mac addresses used well Mac addresses
177:12 Mac addresses used well Mac addresses play a vital role in the communication
177:14 play a vital role in the communication between devices on a local area network
177:16 between devices on a local area network or Lan when you send data from your
177:18 or Lan when you send data from your device to another device within the same
177:20 device to another device within the same local area network the MAC address is
177:23 local area network the MAC address is used to identify the intended recipient
177:25 used to identify the intended recipient it helps ensure that your message
177:27 it helps ensure that your message reaches the correct
177:29 reaches the correct destination how about seeing this in
177:31 destination how about seeing this in action first we need a data packet to be
177:34 action first we need a data packet to be sent luckily the workstation in the top
177:37 sent luckily the workstation in the top left of our diagram has a data packet to
177:40 left of our diagram has a data packet to sent to another device in our local area
177:42 sent to another device in our local area network now the workstation needs to
177:45 network now the workstation needs to encapsulate the data to be sent into an
177:47 encapsulate the data to be sent into an Ethernet frame the ethernet frame will
177:49 Ethernet frame the ethernet frame will include the destination Mac address or
177:51 include the destination Mac address or the MAC address of the device the
177:53 the MAC address of the device the workstation will be sending the data
177:55 workstation will be sending the data packet to the ethernet frame will also
177:57 packet to the ethernet frame will also include the workstation own Mac address
178:00 include the workstation own Mac address known as the source Mac address and
178:02 known as the source Mac address and finally the data or payload that will be
178:03 finally the data or payload that will be sent with this packet next the data
178:06 sent with this packet next the data packet will then be sent out of the
178:08 packet will then be sent out of the workstation network interface card to
178:10 workstation network interface card to the network switch the switch will
178:12 the network switch the switch will determine which network path is to be
178:14 determine which network path is to be used to reach the device matching our
178:15 used to reach the device matching our destination Mac address in the ethernet
178:17 destination Mac address in the ethernet frame
178:19 frame and if everything goes right our data
178:21 and if everything goes right our data packet will finally be delivered all
178:23 packet will finally be delivered all thanks to the help of Mac
178:25 thanks to the help of Mac addresses CompTIA ITF plus complete
178:28 addresses CompTIA ITF plus complete training course exam objective 2.7
178:32 training course exam objective 2.7 explain basic networking
178:34 explain basic networking Concepts IP
178:36 Concepts IP address by the end of this video you
178:39 address by the end of this video you will have a basic understanding of what
178:40 will have a basic understanding of what an IP address is and how it functions in
178:42 an IP address is and how it functions in the world of networking so let's get to
178:45 the world of networking so let's get to it first up is to Define what an IP
178:47 it first up is to Define what an IP address is is IP stands for Internet
178:50 address is is IP stands for Internet Protocol and an IP address is a unique
178:52 Protocol and an IP address is a unique numerical identifier assigned to every
178:54 numerical identifier assigned to every device connected to a network within
178:56 device connected to a network within this definition the keyword is assigned
178:59 this definition the keyword is assigned an IP address differs from a MAC address
179:01 an IP address differs from a MAC address in this regard where a MAC address is
179:03 in this regard where a MAC address is hardcoded into a network interface card
179:05 hardcoded into a network interface card an IP address is logically assigned can
179:07 an IP address is logically assigned can be changed and even reassigned as
179:11 be changed and even reassigned as needed currently there are two versions
179:14 needed currently there are two versions of IP addresses in use ipv4 and I pv6
179:19 of IP addresses in use ipv4 and I pv6 ipv4 which stands for Internet Protocol
179:21 ipv4 which stands for Internet Protocol version 4 is the older and more widely
179:24 version 4 is the older and more widely adopted version an ipv4 address
179:26 adopted version an ipv4 address identifies a device in an Internet
179:28 identifies a device in an Internet Protocol version 4 or ipv4 network it is
179:31 Protocol version 4 or ipv4 network it is worth noting that ipv4 addresses use a
179:34 worth noting that ipv4 addresses use a specific type of notation called decimal
179:36 specific type of notation called decimal notation decimal notation is a way of
179:39 notation decimal notation is a way of displaying a big number in manageable
179:40 displaying a big number in manageable chunks in the case of an ipv4 address
179:43 chunks in the case of an ipv4 address each address is 32 binary digits long
179:46 each address is 32 binary digits long this is a bit difficult to understand so
179:48 this is a bit difficult to understand so let's group this 32 binary digit address
179:51 let's group this 32 binary digit address into different containers that are
179:52 into different containers that are separated by dots this will create four
179:55 separated by dots this will create four sets of eight binary digits also known
179:57 sets of eight binary digits also known as octets next we will convert each
179:59 as octets next we will convert each octet from binary to their decimal value
180:02 octet from binary to their decimal value equivalents resulting in a do decimal
180:04 equivalents resulting in a do decimal notation that is much easier to read
180:06 notation that is much easier to read with this do decimal notation each octet
180:08 with this do decimal notation each octet can range from 0 to 255 providing us
180:11 can range from 0 to 255 providing us with over 4.2 billion numerical
180:18 combinations IPv6 addresses are considerably longer than an ipv4 address
180:21 considerably longer than an ipv4 address at 128 binary digits long IPv6 addresses
180:25 at 128 binary digits long IPv6 addresses also use a different addressing scheme
180:27 also use a different addressing scheme IPv6 addresses include eight groups of
180:30 IPv6 addresses include eight groups of four heximal digits separated by colons
180:33 four heximal digits separated by colons each group of four hexadecimal digits
180:35 each group of four hexadecimal digits can also be called a hex
180:38 can also be called a hex tet next let's explore how IP addresses
180:41 tet next let's explore how IP addresses are assigned to devices there are two
180:44 are assigned to devices there are two main methods static and dynamic a static
180:47 main methods static and dynamic a static IP address is manually assigned to a
180:49 IP address is manually assigned to a device and remains constant over time
180:51 device and remains constant over time this is often used for servers printers
180:54 this is often used for servers printers or other devices that need a persistent
180:56 or other devices that need a persistent unchanging address in order to be
180:58 unchanging address in order to be consistently located by other
181:00 consistently located by other devices on the other hand Dynamic IP
181:03 devices on the other hand Dynamic IP addresses are automatically assigned by
181:05 addresses are automatically assigned by a service called DHCP which stands for
181:08 a service called DHCP which stands for dynamic host configuration protocol with
181:10 dynamic host configuration protocol with Dynamic addressing using DHCP a device
181:13 Dynamic addressing using DHCP a device receives an IP address from a DHCP
181:16 receives an IP address from a DHCP server when it connects to the network
181:18 server when it connects to the network this Dynamic addressing using DHCP
181:20 this Dynamic addressing using DHCP allows for efficient assignment and use
181:22 allows for efficient assignment and use of IP addresses additionally Dynamic IP
181:25 of IP addresses additionally Dynamic IP addressing using DHCP simplifies the
181:27 addressing using DHCP simplifies the process of getting connected to a
181:29 process of getting connected to a network for non-technical users instead
181:31 network for non-technical users instead of manually configuring IP addresses
181:34 of manually configuring IP addresses DHCP automatically assigns an IP address
181:36 DHCP automatically assigns an IP address to a device when it connects to the
181:38 to a device when it connects to the network this eliminates the need for
181:40 network this eliminates the need for users to have prior knowledge of
181:41 users to have prior knowledge of networking or IP addressing making it
181:44 networking or IP addressing making it more userfriendly and convenient
181:46 more userfriendly and convenient non-technical users can simp simply
181:48 non-technical users can simp simply connect their devices to the network and
181:50 connect their devices to the network and DHCP takes care of the
181:52 DHCP takes care of the rest now let's talk about private and
181:55 rest now let's talk about private and public ipv4 addresses private ipv4
181:58 public ipv4 addresses private ipv4 addresses are used within local networks
182:00 addresses are used within local networks such as your home or office they are not
182:02 such as your home or office they are not rootable on the internet and are meant
182:04 rootable on the internet and are meant for internal Communications such as
182:06 for internal Communications such as between a workstation and a printer or
182:08 between a workstation and a printer or for an internal corporate web server
182:09 for an internal corporate web server known as an internet these addresses
182:12 known as an internet these addresses fall within specific reserved ranges
182:14 fall within specific reserved ranges these private IP address ranges are
182:16 these private IP address ranges are displayed just above me any ipv4
182:19 displayed just above me any ipv4 addresses falling Within These ranges
182:21 addresses falling Within These ranges will be considered a private ipv4
182:23 will be considered a private ipv4 address and will be restricted to use
182:24 address and will be restricted to use within a landan or private Network it
182:27 within a landan or private Network it will be a good idea to remember these
182:28 will be a good idea to remember these ranges as they will show up again and
182:30 ranges as they will show up again and again throughout your It
182:33 again throughout your It Journey public ipv4 addresses behave a
182:36 Journey public ipv4 addresses behave a bit differently they are assigned to
182:38 bit differently they are assigned to devices that connect directly to the
182:40 devices that connect directly to the internet these addresses are unique
182:42 internet these addresses are unique globally and allow devices to
182:44 globally and allow devices to communicate with each other across the
182:46 communicate with each other across the internet internet service provid
182:47 internet internet service provid providers isps assign public IP
182:50 providers isps assign public IP addresses to devices connected to their
182:52 addresses to devices connected to their Network now this is a video that might
182:54 Network now this is a video that might be worth watching a couple times we
182:56 be worth watching a couple times we covered the definition of an IP address
182:58 covered the definition of an IP address the different IP protocols version 4 and
183:01 the different IP protocols version 4 and version six static and dynamic IP
183:03 version six static and dynamic IP address assignment and the difference
183:05 address assignment and the difference between private and public IP addresses
183:07 between private and public IP addresses great job oh and one last piece of
183:10 great job oh and one last piece of knowledge don't get an IP address and a
183:12 knowledge don't get an IP address and a MAC address confused an IP address is a
183:15 MAC address confused an IP address is a unique identifier for a device's network
183:17 unique identifier for a device's network location while a MAC address is a unique
183:19 location while a MAC address is a unique Hardware identifier belonging to a
183:21 Hardware identifier belonging to a network interface card while an IP
183:23 network interface card while an IP address facilitates communication
183:25 address facilitates communication between networks a MAC address will
183:27 between networks a MAC address will enable communication within a local area
183:29 enable communication within a local area network exam objective 2.7 explain basic
183:33 network exam objective 2.7 explain basic networking
183:35 networking Concepts
183:37 Concepts DNS DNS stands for domain name system
183:40 DNS DNS stands for domain name system and it's like a phone book for the
183:42 and it's like a phone book for the internet DNS is a system used in
183:44 internet DNS is a system used in computer networking to translate human
183:46 computer networking to translate human readable website names into their
183:48 readable website names into their corresponding numerical IP addresses
183:51 corresponding numerical IP addresses essentially DNS enables us to access
183:54 essentially DNS enables us to access websites using memorable names instead
183:56 websites using memorable names instead of complex numerical IP
184:02 addresses so how does DNS translate a website name to its IP address it starts
184:05 website name to its IP address it starts when you type a website name known as a
184:07 when you type a website name known as a URL or uniform resource locator into
184:09 URL or uniform resource locator into your browser the URL has multiple Parts
184:14 your browser the URL has multiple Parts using the graphic behind me and starting
184:16 using the graphic behind me and starting at the left there is the protocol call
184:18 at the left there is the protocol call the subdomain the domain name and the
184:20 the subdomain the domain name and the top level domain and the file path for
184:23 top level domain and the file path for example in the URL https
184:27 example in the URL https colon
184:30 colon www.example.com forino forward slab us
184:34 www.example.com forino forward slab us to
184:34 to HTML the protocol is https which is a
184:38 HTML the protocol is https which is a protocol for secure web traffic the
184:41 protocol for secure web traffic the subdomain is www which stands for
184:44 subdomain is www which stands for worldwide web the domain is example
184:48 worldwide web the domain is example the top level domain is do and the file
184:52 the top level domain is do and the file path is infoabout us to
184:55 path is infoabout us to HTML when you hit enter your browser
184:57 HTML when you hit enter your browser sends a request to a DNS resolver which
185:00 sends a request to a DNS resolver which is a server that handles DNS queries or
185:02 is a server that handles DNS queries or requests for information the resolver
185:05 requests for information the resolver then begins the process of looking up
185:07 then begins the process of looking up the IP address associated with the
185:08 the IP address associated with the domain name you
185:10 domain name you entered when you hit enter your browser
185:13 entered when you hit enter your browser sends a request to a DNS recursive
185:15 sends a request to a DNS recursive server which begins the process of
185:17 server which begins the process of looking up the IP address associated
185:19 looking up the IP address associated with the domain name you entered the
185:21 with the domain name you entered the first stop is a root server a root name
185:24 first stop is a root server a root name server provides a referral to the
185:26 server provides a referral to the appropriate top level domain server for
185:28 appropriate top level domain server for our scenario theom TLD server the DNS
185:33 our scenario theom TLD server the DNS recursive server then reaches out to the
185:35 recursive server then reaches out to the TLD server which then directs the DNS
185:37 TLD server which then directs the DNS recursive server to the domain name
185:39 recursive server to the domain name server responsible for the specific
185:41 server responsible for the specific domain the domain name server will then
185:44 domain the domain name server will then return the IP address associated with
185:46 return the IP address associated with the domain to the DNS DS recursive
185:48 the domain to the DNS DS recursive server the DNS recursive server will
185:51 server the DNS recursive server will complete the lookup process by providing
185:53 complete the lookup process by providing the requested IP address back to your
185:56 the requested IP address back to your browser now that we know how the DNS
185:58 browser now that we know how the DNS lookup process works let's take another
186:01 lookup process works let's take another look at the URL and see how much you
186:03 look at the URL and see how much you learned which part of the URL correlated
186:06 learned which part of the URL correlated to the location where the IP address was
186:08 to the location where the IP address was actually
186:10 actually stored that is right the domain example
186:14 stored that is right the domain example was the portion of the URL that led us
186:16 was the portion of the URL that led us to the domain name name server where the
186:18 to the domain name name server where the IP address information or record was
186:21 IP address information or record was stored in addition to translating
186:23 stored in addition to translating website names to IP addresses DNS also
186:26 website names to IP addresses DNS also plays a role in translating device names
186:28 plays a role in translating device names within a local area network in a home or
186:31 within a local area network in a home or office network devices such as
186:33 office network devices such as workstations laptops printers and other
186:36 workstations laptops printers and other network enabled devices are often
186:38 network enabled devices are often assigned human readable names for easy
186:39 assigned human readable names for easy identification and
186:41 identification and communication for example a printer
186:43 communication for example a printer might be named office printer or a
186:45 might be named office printer or a laptop might be named John's lap top
186:48 laptop might be named John's lap top when devices on the local network need
186:50 when devices on the local network need to communicate with each other they can
186:52 to communicate with each other they can use these friendly names instead of IP
186:54 use these friendly names instead of IP addresses the local DNS server often
186:57 addresses the local DNS server often provided by the router or a network
186:59 provided by the router or a network server maintains a database of these
187:01 server maintains a database of these device names and their corresponding IP
187:03 device names and their corresponding IP addresses this allows devices to
187:06 addresses this allows devices to communicate efficiently within the local
187:08 communicate efficiently within the local area network making it simpler for users
187:10 area network making it simpler for users to access and share resources without
187:12 to access and share resources without needing to remember complex IP addresses
187:15 needing to remember complex IP addresses thank goodness we have DNS to make our
187:17 thank goodness we have DNS to make our Our Lives easier I would hate to have a
187:20 Our Lives easier I would hate to have a bunch of sticky notes all over my desk
187:22 bunch of sticky notes all over my desk just to be able to visit my favorite
187:24 just to be able to visit my favorite websites exam objective 2.7 explain
187:28 websites exam objective 2.7 explain basic networking
187:29 basic networking Concepts HTTP and
187:33 Concepts HTTP and https up to now we have discussed
187:36 https up to now we have discussed networking protocols that support the
187:38 networking protocols that support the addressing and forwarding of data
187:39 addressing and forwarding of data packets to their intended
187:41 packets to their intended destinations with that behind us we will
187:44 destinations with that behind us we will move forward with application protocols
187:47 move forward with application protocols application protocols deal with the data
187:49 application protocols deal with the data or payloads themselves and I am going to
187:52 or payloads themselves and I am going to start with a protocol most of us are
187:53 start with a protocol most of us are already familiar with
188:01 HTTP HTTP stands for hypertext transfer protocol and is the foundation of data
188:03 protocol and is the foundation of data communication on the worldwide web HTTP
188:07 communication on the worldwide web HTTP enables web browsers and servers to
188:09 enables web browsers and servers to exchange information allowing you to
188:11 exchange information allowing you to access and view web pages and other
188:13 access and view web pages and other resources on the internet in simpler
188:15 resources on the internet in simpler terms think of it as a of rules that
188:18 terms think of it as a of rules that allow web browsers and web servers to
188:20 allow web browsers and web servers to understand and exchange information with
188:22 understand and exchange information with each
188:23 each other for a moment imagine you're using
188:26 other for a moment imagine you're using a web browser like Chrome or Firefox to
188:29 a web browser like Chrome or Firefox to access a website when you type the
188:31 access a website when you type the website's address into the URL bar and
188:33 website's address into the URL bar and hit enter your browser sends an HTTP
188:36 hit enter your browser sends an HTTP request to the web server hosting that
188:38 request to the web server hosting that site asking for the web Page's content
188:41 site asking for the web Page's content the server then processes the request
188:43 the server then processes the request and sends back an HTTP response
188:45 and sends back an HTTP response containing the requested web pages data
188:48 containing the requested web pages data this entire process happens seamlessly
188:50 this entire process happens seamlessly in the background enabling you to see
188:51 in the background enabling you to see the web page on your screen this all
188:54 the web page on your screen this all happens because of the HTTP
188:57 happens because of the HTTP protocol now you should know that HTTP
189:00 protocol now you should know that HTTP is not a secure protocol and if you need
189:03 is not a secure protocol and if you need to access your bank account information
189:05 to access your bank account information or any other sensitive information you
189:07 or any other sensitive information you will not want to use
189:08 will not want to use HTTP so what should you use the answer
189:12 HTTP so what should you use the answer is
189:13 is https https stands for hypertext
189:16 https https stands for hypertext transfer protocol secure and is a secure
189:19 transfer protocol secure and is a secure version of the standard HTTP protocol
189:21 version of the standard HTTP protocol used for data communication on the
189:23 used for data communication on the worldwide web https incorporates an
189:26 worldwide web https incorporates an additional layer of security using
189:28 additional layer of security using encryption to protect the data being
189:29 encryption to protect the data being transmitted between a user's web browser
189:32 transmitted between a user's web browser and a web
189:33 and a web server exam objective 2.7 explain basic
189:37 server exam objective 2.7 explain basic networking
189:38 networking Concepts POP 3 IMAP and
189:42 Concepts POP 3 IMAP and SMTP in this video I will be discussing
189:45 SMTP in this video I will be discussing three essential email protocols POP 3
189:48 three essential email protocols POP 3 IMAP and
189:49 IMAP and SMTP if these acronyms sound like a
189:52 SMTP if these acronyms sound like a foreign language to you don't worry I
189:54 foreign language to you don't worry I will break them down in simple terms by
189:56 will break them down in simple terms by the end of this video you'll understand
189:58 the end of this video you'll understand how these protocols work together to
190:00 how these protocols work together to manage your emails effectively let's get
190:05 manage your emails effectively let's get started in the world of computer
190:07 started in the world of computer networking email Protocols are like sets
190:09 networking email Protocols are like sets of rules that govern how emails are sent
190:11 of rules that govern how emails are sent received and managed between email
190:13 received and managed between email clients like your email app and email
190:16 clients like your email app and email servers where your email are stored so
190:18 servers where your email are stored so let's imagine your email client is like
190:20 let's imagine your email client is like your mailbox and the email server is the
190:22 your mailbox and the email server is the central post office the protocols we'll
190:25 central post office the protocols we'll discuss help manage the flow of emails
190:27 discuss help manage the flow of emails between these two points ensuring a
190:29 between these two points ensuring a smooth email
190:31 smooth email experience our first email protocol is
190:33 experience our first email protocol is pop 3 which stands for post office
190:36 pop 3 which stands for post office protocol version 3 POP 3 is like the
190:39 protocol version 3 POP 3 is like the traditional way of receiving mail when
190:41 traditional way of receiving mail when you use pop 3 your email client connects
190:44 you use pop 3 your email client connects to the email server and downloads new
190:46 to the email server and downloads new messages
190:48 messages the pop 3 protocol then removes the
190:50 the pop 3 protocol then removes the messages from the server it's like
190:52 messages from the server it's like fetching your mail from the mailbox and
190:54 fetching your mail from the mailbox and taking it inside your home once
190:56 taking it inside your home once downloaded the emails reside on your
190:58 downloaded the emails reside on your device and they're no longer stored on
191:00 device and they're no longer stored on the server while POP 3 is useful for
191:03 the server while POP 3 is useful for offline access to your emails one
191:05 offline access to your emails one limitation is that your emails are tied
191:07 limitation is that your emails are tied to a single device if you access your
191:09 to a single device if you access your emails from another device you won't see
191:11 emails from another device you won't see the same
191:13 the same messages now let's talk about IMAP IMAP
191:16 messages now let's talk about IMAP IMAP stands trans for internet message access
191:19 stands trans for internet message access protocol IMAP is a modern synchronized
191:21 protocol IMAP is a modern synchronized way of handling emails when you use IMAP
191:25 way of handling emails when you use IMAP your email client remains connected to
191:27 your email client remains connected to the email server instead of downloading
191:29 the email server instead of downloading and removing the emails IMAP keeps your
191:31 and removing the emails IMAP keeps your email stored on the server while syncing
191:33 email stored on the server while syncing them with your email
191:35 them with your email client or
191:37 client or clients if you haven't deduced this
191:39 clients if you haven't deduced this already the main advantage of IMAP is
191:41 already the main advantage of IMAP is that you can access your emails from
191:42 that you can access your emails from multiple devices like your workstation
191:45 multiple devices like your workstation laptop or smartphone and they'll always
191:47 laptop or smartphone and they'll always be in sync any changes you make on one
191:50 be in sync any changes you make on one device like reading replying or deleting
191:53 device like reading replying or deleting emails are reflected on all your
191:55 emails are reflected on all your devices now you know two different
191:57 devices now you know two different protocols for receiving emails do we
192:00 protocols for receiving emails do we have a protocol to send emails to we
192:03 have a protocol to send emails to we sure
192:04 sure do last but not least let's discuss SMTP
192:08 do last but not least let's discuss SMTP which stands for simple mail transfer
192:10 which stands for simple mail transfer protocol SMTP is the protocol that
192:13 protocol SMTP is the protocol that handles the sending of emails when you
192:16 handles the sending of emails when you compose an email and click send your
192:18 compose an email and click send your email client uses SMTP to transfer that
192:21 email client uses SMTP to transfer that email to the email server for delivery
192:24 email to the email server for delivery SMTP also ensures that your email is
192:26 SMTP also ensures that your email is sent to the recipient's email server
192:28 sent to the recipient's email server which then stores it until the recipient
192:30 which then stores it until the recipient checks their
192:31 checks their inbox and there you have it pop 3 IMAP
192:34 inbox and there you have it pop 3 IMAP and SMTP the protocol Trio that manages
192:37 and SMTP the protocol Trio that manages all your email
192:39 all your email Communications exam objective 2.7
192:43 Communications exam objective 2.7 explain basic networking
192:45 explain basic networking Concepts FTP ftps and
192:49 Concepts FTP ftps and SFTP I hope you don't mind but I have a
192:52 SFTP I hope you don't mind but I have a few bonus protocols for you in this
192:54 few bonus protocols for you in this video they are FTP ftps and
192:58 video they are FTP ftps and SFTP these Protocols are considered file
193:01 SFTP these Protocols are considered file transfer protocols and these Protocols
193:03 transfer protocols and these Protocols are essential for sharing documents
193:04 are essential for sharing documents images videos and other files between
193:07 images videos and other files between users and
193:09 users and servers to kick things off I will start
193:12 servers to kick things off I will start with the FTP protocol FTP stands for
193:15 with the FTP protocol FTP stands for file transfer protocol FTP is a standard
193:18 file transfer protocol FTP is a standard Network protocol used to transfer files
193:21 Network protocol used to transfer files from one computer to another over a
193:22 from one computer to another over a network such as the internet FTP allows
193:26 network such as the internet FTP allows users to upload and download files
193:28 users to upload and download files between their local computer and a
193:29 between their local computer and a remote server FTP is widely used but it
193:33 remote server FTP is widely used but it lacks security measures so luckily we
193:36 lacks security measures so luckily we have some secure file transfer protocols
193:39 have some secure file transfer protocols too these secure file transfer options
193:41 too these secure file transfer options are ftps which stands for file transfer
193:45 are ftps which stands for file transfer protocol secure
193:47 protocol secure and SFTP which stands for SSH file
193:51 and SFTP which stands for SSH file transfer protocol each of these
193:54 transfer protocol each of these protocols provides data encryption
193:55 protocols provides data encryption during transmission ensuring your data
193:58 during transmission ensuring your data remains private so if you need to send
194:00 remains private so if you need to send files from one device to another look to
194:02 files from one device to another look to any of the FTP protocol variants but if
194:05 any of the FTP protocol variants but if you want to move sensitive data
194:07 you want to move sensitive data electronically from one location to
194:09 electronically from one location to another make sure that protocol acronym
194:11 another make sure that protocol acronym has an s in it to ensure
194:13 has an s in it to ensure security exam objective 2.8 given a
194:16 security exam objective 2.8 given a scenario install configure and secure a
194:19 scenario install configure and secure a basic wireless
194:20 basic wireless network wireless networks 802.11 a b g n
194:25 network wireless networks 802.11 a b g n and
194:26 and AC to talk about wireless networks we
194:29 AC to talk about wireless networks we need to first talk about Wi-Fi Wi-Fi
194:32 need to first talk about Wi-Fi Wi-Fi short for wireless fidelity is a
194:34 short for wireless fidelity is a technology that allows Computing devices
194:36 technology that allows Computing devices to connect to and communicate with other
194:39 to connect to and communicate with other Computing devices wirelessly it enables
194:42 Computing devices wirelessly it enables the transmission of data over short
194:44 the transmission of data over short distances using radio waves typically
194:46 distances using radio waves typically within a home home small office or
194:48 within a home home small office or public Space by connecting to a wireless
194:51 public Space by connecting to a wireless access
194:52 access point now that we have a definition for
194:54 point now that we have a definition for Wi-Fi we can move on to wireless
194:56 Wi-Fi we can move on to wireless standards there have been multiple
194:58 standards there have been multiple standards since Wi-Fi came onto the
195:00 standards since Wi-Fi came onto the scene in 1997 with each standard being
195:03 scene in 1997 with each standard being developed by the i e so I guess the next
195:06 developed by the i e so I guess the next thing to do is to explain what i e is
195:09 thing to do is to explain what i e is itle e is the Institute of electrical
195:11 itle e is the Institute of electrical and electronics Engineers they're a
195:14 and electronics Engineers they're a professional association known for
195:16 professional association known for developing technical standards across
195:18 developing technical standards across various Industries including networking
195:20 various Industries including networking and
195:22 and Telecommunications now we know Who
195:24 Telecommunications now we know Who develops the standards for Wi-Fi I guess
195:27 develops the standards for Wi-Fi I guess we are getting warmer but we don't have
195:29 we are getting warmer but we don't have the complete picture yet out of all the
195:32 the complete picture yet out of all the standards compiled by the i e the
195:34 standards compiled by the i e the numerically labeled 802 set of standards
195:36 numerically labeled 802 set of standards are the standards that pertain to local
195:38 are the standards that pertain to local area networks or land
195:40 area networks or land Communications from here we need to
195:42 Communications from here we need to break open and look at a small subset of
195:44 break open and look at a small subset of the 802 standards this set of standards
195:47 the 802 standards this set of standards that we will be focusing on for now is
195:49 that we will be focusing on for now is labeled
195:50 labeled 802.11 802.11 is all about Wi-Fi how it
195:55 802.11 802.11 is all about Wi-Fi how it works and what makes it tick or more
195:58 works and what makes it tick or more technically speaking 802 to1 is an
196:00 technically speaking 802 to1 is an evolving family of specifications for
196:02 evolving family of specifications for wireless local area networks or W lands
196:06 wireless local area networks or W lands and for your CompTIA certification exam
196:08 and for your CompTIA certification exam we will focus on the following 802.11
196:12 we will focus on the following 802.11 specifications 802.11a
196:30 802.11n and 802.11 AC in the next few videos I will discuss
196:33 AC in the next few videos I will discuss different aspects of these 802.11
196:36 different aspects of these 802.11 standards including the information in
196:37 standards including the information in the table you see here eventually I am
196:40 the table you see here eventually I am hopeful you will not only commit the
196:42 hopeful you will not only commit the information in this table to memory but
196:44 information in this table to memory but will also understand all of its
196:46 will also understand all of its components
196:47 components exam objective 2.8 given a scenario
196:50 exam objective 2.8 given a scenario install configure and secure a basic
196:53 install configure and secure a basic wireless
196:54 wireless network older versus newer
196:57 network older versus newer standards the first Wi-Fi standard came
197:00 standards the first Wi-Fi standard came about in 1997 with the introduction of
197:02 about in 1997 with the introduction of the it 802.11 standard with Wi-Fi we
197:06 the it 802.11 standard with Wi-Fi we could now connect to the internet and
197:08 could now connect to the internet and communicate with each other without the
197:09 communicate with each other without the need for physical cables and over the
197:12 need for physical cables and over the past few decades this has completely
197:14 past few decades this has completely transformed the way we live and work
197:17 transformed the way we live and work so let's briefly Journey Through the
197:19 so let's briefly Journey Through the evolution of Wi-Fi as we explore the
197:21 evolution of Wi-Fi as we explore the timeline of 802.11 standards that have
197:24 timeline of 802.11 standards that have shaped the wireless connectivity we know
197:26 shaped the wireless connectivity we know today after the most basic 802.11
197:29 today after the most basic 802.11 standard was released in 1997 demand
197:32 standard was released in 1997 demand skyrocketed and newer more robust Wi-Fi
197:34 skyrocketed and newer more robust Wi-Fi standards were
197:37 standards were needed so naturally we got an upgrade in
197:40 needed so naturally we got an upgrade in 1999 the 802.11 a standard was released
197:45 1999 the 802.11 a standard was released this wi-fi standard though not the first
197:48 this wi-fi standard though not the first was responsible for solidifying Wi-Fi as
197:50 was responsible for solidifying Wi-Fi as the predominant communication standard
197:52 the predominant communication standard for short-range wireless computer
197:55 for short-range wireless computer networking not even a year later in the
197:57 networking not even a year later in the fall of 1999 we were given
198:04 802.11b it then took four more years before 802.11g was
198:07 before 802.11g was released
198:09 released 802.11n came next with a 2009 release
198:13 802.11n came next with a 2009 release date n 802.11 AC is the last standard we
198:17 date n 802.11 AC is the last standard we will cover with the CompTIA ITF plus
198:19 will cover with the CompTIA ITF plus exam and this standard was released in
198:23 exam and this standard was released in 2013 now there are newer standards
198:25 2013 now there are newer standards currently out like the 802 to 11ax
198:28 currently out like the 802 to 11ax standard which is also referred to as
198:30 standard which is also referred to as Wi-Fi 6 but they are not part of our
198:32 Wi-Fi 6 but they are not part of our exam topics for this
198:34 exam topics for this exam and there you have it the evolution
198:36 exam and there you have it the evolution of the 802.11 standards from oldest to
198:41 of the 802.11 standards from oldest to newest exam objective 2.8 given a
198:44 newest exam objective 2.8 given a scenario install configure and secure a
198:47 scenario install configure and secure a basic wireless
198:48 basic wireless network speed
198:51 network speed limitations Wi-Fi Communications while
198:54 limitations Wi-Fi Communications while providing convenient and wireless
198:55 providing convenient and wireless connectivity do have inherent speed
198:58 connectivity do have inherent speed limitations these limitations are mainly
199:00 limitations these limitations are mainly influenced by factors such as the Wi-Fi
199:02 influenced by factors such as the Wi-Fi standard being used the frequency Bandit
199:05 standard being used the frequency Bandit operates on the number of devices
199:07 operates on the number of devices connected to the network and the
199:08 connected to the network and the distance between the devices and the
199:10 distance between the devices and the wiress access
199:12 wiress access point each Wi-Fi standard from 802.11a
199:16 point each Wi-Fi standard from 802.11a to 802 2.11 AC offers varying
199:18 to 802 2.11 AC offers varying theoretical maximum speeds so let's take
199:21 theoretical maximum speeds so let's take a look at those threshold throughput
199:23 a look at those threshold throughput speeds
199:24 speeds now we begin with
199:27 now we begin with 802.11a this standard clocked in with a
199:30 802.11a this standard clocked in with a maximum speed limitation of 54 megabits
199:32 maximum speed limitation of 54 megabits per
199:34 per second 802.11b was a bit slower offering
199:38 second 802.11b was a bit slower offering speeds up to 11 megabits per
199:41 speeds up to 11 megabits per second 802 to 11g sped things back up
199:44 second 802 to 11g sped things back up again to 54 megabits per second
199:47 again to 54 megabits per second matching the speed of
199:52 802.11a now things really started to heat up with the release of
199:55 heat up with the release of 802.11n with
199:56 802.11n with 802.11n maximum theoretical throughput
199:59 802.11n maximum theoretical throughput speeds jump to 600 megabits per
200:02 speeds jump to 600 megabits per second and then 802 to 11 AC just came
200:05 second and then 802 to 11 AC just came in and blew the rest of the standards
200:07 in and blew the rest of the standards out of the water with a theoretical
200:09 out of the water with a theoretical maximum speed of 1.7 gbits per
200:12 maximum speed of 1.7 gbits per second now there are newer standards
200:14 second now there are newer standards currently out like the 802 .1 ax
200:17 currently out like the 802 .1 ax standard which offers throughput speeds
200:19 standard which offers throughput speeds well above those offered by the 802.11
200:22 well above those offered by the 802.11 AC standard but they are not part of our
200:24 AC standard but they are not part of our exam topics for this
200:26 exam topics for this exam now you should have a firm grasp of
200:28 exam now you should have a firm grasp of the speed limitations of each Wi-Fi
200:32 the speed limitations of each Wi-Fi standard exam objective 2.8 given a
200:35 standard exam objective 2.8 given a scenario install configure and secure a
200:37 scenario install configure and secure a basic wireless
200:39 basic wireless network wireless frequency
200:42 network wireless frequency bands imagine Wi-Fi signals as invisible
200:45 bands imagine Wi-Fi signals as invisible waves carrying data through the air
200:48 waves carrying data through the air these waves have different frequencies
200:50 these waves have different frequencies which determine how they behave and what
200:52 which determine how they behave and what tasks they excel at a signal frequency
200:55 tasks they excel at a signal frequency is like how fast a wave moves up and
200:57 is like how fast a wave moves up and down think of a bouncing ball and you
201:00 down think of a bouncing ball and you counting how many times it bounces up
201:02 counting how many times it bounces up and down in 1 second signal frequency is
201:05 and down in 1 second signal frequency is similar it measures how many times a
201:07 similar it measures how many times a wave goes up and down in 1 second if it
201:10 wave goes up and down in 1 second if it moves up and down quickly it has a high
201:13 moves up and down quickly it has a high frequency but if it moves up and down
201:15 frequency but if it moves up and down slowly it has a low
201:17 slowly it has a low frequency signal frequencies are usually
201:20 frequency signal frequencies are usually measured in hertz which represents the
201:22 measured in hertz which represents the number of cycles per second the
201:24 number of cycles per second the electromagnetic spectrum chart behind me
201:27 electromagnetic spectrum chart behind me shows the entire range of
201:28 shows the entire range of electromagnetic
201:29 electromagnetic frequencies this is just to give you an
201:31 frequencies this is just to give you an idea of the vast nature of Wireless
201:33 idea of the vast nature of Wireless signal frequencies but we are going to
201:36 signal frequencies but we are going to hone in on the two main ranges or
201:38 hone in on the two main ranges or frequency bands used by Wi-Fi these
201:40 frequency bands used by Wi-Fi these frequency bands are the 2.4 GHz band and
201:43 frequency bands are the 2.4 GHz band and the 5 GHz
201:45 the 5 GHz band the first frequency band we will
201:48 band the first frequency band we will discuss is the 2.4 GHz band it's like a
201:51 discuss is the 2.4 GHz band it's like a slow but steady marathon runner the 2.4
201:55 slow but steady marathon runner the 2.4 GHz band offers better range meaning it
201:57 GHz band offers better range meaning it can travel further this characteristic
202:00 can travel further this characteristic makes it ideal for providing Wi-Fi
202:02 makes it ideal for providing Wi-Fi coverage in larger
202:03 coverage in larger spaces however since it's quite popular
202:06 spaces however since it's quite popular the 2.4 GHz band can get crowded leading
202:09 the 2.4 GHz band can get crowded leading to potential interference from other
202:11 to potential interference from other devices that also use this
202:13 devices that also use this frequency now let's meet our Speedy
202:15 frequency now let's meet our Speedy Sprinter the 5 GHz band it may not
202:19 Sprinter the 5 GHz band it may not travel as far as the 2.4 GHz band but it
202:22 travel as far as the 2.4 GHz band but it offers faster and more reliable
202:24 offers faster and more reliable connections over shorter distances due
202:26 connections over shorter distances due to its higher frequency the 5 GHz band
202:29 to its higher frequency the 5 GHz band can handle more data making it ideal for
202:31 can handle more data making it ideal for bandwidth intensive tasks like HD video
202:34 bandwidth intensive tasks like HD video streaming online gaming and file
202:37 streaming online gaming and file transfers additionally since the 5 GHz
202:40 transfers additionally since the 5 GHz band is less crowded it experiences less
202:42 band is less crowded it experiences less interference providing a smoother and
202:44 interference providing a smoother and more consistent Wi-Fi experience
202:48 more consistent Wi-Fi experience now let's take one last look at our 802
202:50 now let's take one last look at our 802 to 11 standards and see which standards
202:52 to 11 standards and see which standards support which frequency
202:54 support which frequency bands we will once again start with
202:58 bands we will once again start with 802.11a this standard utilized the 5 GHz
203:03 802.11a this standard utilized the 5 GHz band next 802 to 11b was a bit slower
203:06 band next 802 to 11b was a bit slower because all other factors the same it
203:08 because all other factors the same it used the 2.4 GHz frequency
203:12 used the 2.4 GHz frequency band 802 to 11g uses the 2.4 GHz B and
203:17 band 802 to 11g uses the 2.4 GHz B and but was able to match the speeds of the
203:18 but was able to match the speeds of the 802 to 11a standard by incorporating a
203:21 802 to 11a standard by incorporating a new signal modulation
203:23 new signal modulation technique with the release of 802 to 11n
203:27 technique with the release of 802 to 11n we were given the option to use either
203:28 we were given the option to use either the 2.4 or 5 GHz bands this was a big
203:32 the 2.4 or 5 GHz bands this was a big deal when it was released as there was
203:34 deal when it was released as there was now a standard to support Computing
203:36 now a standard to support Computing devices on both the 2.4 GHz and 5 GHz
203:41 devices on both the 2.4 GHz and 5 GHz spectrums and last 802.11 AC uses the 5
203:45 spectrums and last 802.11 AC uses the 5 GHz band
203:51 one final note there are many 802.11 AC routers on the market that are labeled
203:53 routers on the market that are labeled dualband routers these dualband routers
203:56 dualband routers these dualband routers support both 2.4 GHz and 5 GHz
204:00 support both 2.4 GHz and 5 GHz Transmissions they do this by creating
204:02 Transmissions they do this by creating two separate Wi-Fi networks one network
204:05 two separate Wi-Fi networks one network will use the 5 GHz 802.11 AC standard
204:09 will use the 5 GHz 802.11 AC standard and the other will use an alternate
204:10 and the other will use an alternate 802.11 standard that supports the 2.4
204:13 802.11 standard that supports the 2.4 GHz
204:14 GHz band now you know about about the two
204:16 band now you know about about the two main Wi-Fi frequency bands the steady
204:20 main Wi-Fi frequency bands the steady 2.4 GHz band a bit slower but has better
204:23 2.4 GHz band a bit slower but has better range and the Speedy 5 GHz band a bit
204:26 range and the Speedy 5 GHz band a bit faster but with less
204:28 faster but with less range understanding each band's
204:30 range understanding each band's strengths and weaknesses will help you
204:32 strengths and weaknesses will help you make the most of your wireless network
204:34 make the most of your wireless network setup exam objective 2.8 given a
204:38 setup exam objective 2.8 given a scenario install configure and secure a
204:40 scenario install configure and secure a basic wireless
204:42 basic wireless network interference and attenuation
204:46 network interference and attenuation we will start this video off with the
204:48 we will start this video off with the topic of interference and save
204:49 topic of interference and save attenuation for the end with that said
204:52 attenuation for the end with that said there are two types of interference that
204:54 there are two types of interference that we will cover the first of which is
204:56 we will cover the first of which is electromagnetic interference
204:59 electromagnetic interference electromagnetic interference or Emi is a
205:02 electromagnetic interference or Emi is a disturbance or noise caused by
205:04 disturbance or noise caused by electromagnetic signals that interfere
205:06 electromagnetic signals that interfere with the proper functioning of
205:07 with the proper functioning of electronic
205:12 devices electromagnetic interference happens when electromagnetic waves from
205:15 happens when electromagnetic waves from one electronic device interferes with
205:17 one electronic device interferes with the signals or operations of another
205:19 the signals or operations of another nearby electronic device these waves can
205:22 nearby electronic device these waves can be produced by various sources such as
205:24 be produced by various sources such as Wi-Fi signals cell phones power lines
205:27 Wi-Fi signals cell phones power lines and even microwave
205:30 and even microwave ovens so how does this topic fit in with
205:33 ovens so how does this topic fit in with our current exam objective covering
205:35 our current exam objective covering wireless networks because when
205:37 wireless networks because when electromagnetic interference becomes too
205:39 electromagnetic interference becomes too great it can lead to A disruption in
205:41 great it can lead to A disruption in Wireless Communications and cause weaker
205:44 Wireless Communications and cause weaker than expected broadcast signals so what
205:46 than expected broadcast signals so what should you do if you have a problem
205:49 should you do if you have a problem ensure that Emi sources are either
205:51 ensure that Emi sources are either removed or at least kept to a minimum if
205:53 removed or at least kept to a minimum if you want reliable Wireless
205:59 Communications next up we have another related topic signal to noise Ratio or
206:02 related topic signal to noise Ratio or SNR for short signal to noise ratio is a
206:05 SNR for short signal to noise ratio is a measure used to describe the quality of
206:07 measure used to describe the quality of a signal by comparing a desired signal
206:10 a signal by comparing a desired signal against any background noise or
206:11 against any background noise or interference that is
206:13 interference that is present imagine you're having a
206:15 present imagine you're having a conversation with someone in a noisy
206:17 conversation with someone in a noisy room the desired signal is your voice
206:20 room the desired signal is your voice and the noise is the background chatter
206:22 and the noise is the background chatter and other sounds in the room the clarity
206:24 and other sounds in the room the clarity of your conversation depends on how
206:26 of your conversation depends on how loudly you speak compared to the noise
206:28 loudly you speak compared to the noise level if your voice is much louder than
206:30 level if your voice is much louder than the noise the other person can hear you
206:32 the noise the other person can hear you clearly and the conversation is
206:34 clearly and the conversation is successful this is a high signal to
206:36 successful this is a high signal to noise ratio speak to softly and your
206:39 noise ratio speak to softly and your voice will not be distinguishable from
206:41 voice will not be distinguishable from the crowd this is a low signal to noise
206:44 the crowd this is a low signal to noise ratio in the context of Technology a
206:47 ratio in the context of Technology a signal to noise ratio Works similarly it
206:50 signal to noise ratio Works similarly it compares the strength of the desired
206:52 compares the strength of the desired signal like a Wi-Fi signal to the
206:54 signal like a Wi-Fi signal to the background noise such as electromagnetic
206:57 background noise such as electromagnetic interference a high signal to noise
206:59 interference a high signal to noise ratio means the desired signal is strong
207:01 ratio means the desired signal is strong compared to the noise resulting in clear
207:03 compared to the noise resulting in clear and reliable communication or data
207:06 and reliable communication or data transmission on the other hand a low
207:08 transmission on the other hand a low signal to noise ratio means the signal
207:10 signal to noise ratio means the signal is weaker making it more challenging to
207:13 is weaker making it more challenging to distinguish the signal from the noise
207:14 distinguish the signal from the noise leading to slow or un aable
207:20 Communications now that you understand the impact of Emi and the importance of
207:22 the impact of Emi and the importance of maintaining a high signal to noise ratio
207:25 maintaining a high signal to noise ratio let's now explore the second type of
207:26 let's now explore the second type of interference physical
207:28 interference physical obstructions yes a physical obstruction
207:31 obstructions yes a physical obstruction can also introduce signal
207:33 can also introduce signal interference for instance any solid
207:36 interference for instance any solid structure such as a brick wall can cause
207:38 structure such as a brick wall can cause interference and weaken a wireless
207:40 interference and weaken a wireless communication signal that has to pass
207:42 communication signal that has to pass through it and just like Emi this form
207:45 through it and just like Emi this form of physical interference can also lead
207:47 of physical interference can also lead to slow or unstable
207:49 to slow or unstable Communications the frequency of a
207:51 Communications the frequency of a wireless signal will also have an effect
207:53 wireless signal will also have an effect on how much interference is experienced
207:55 on how much interference is experienced as a result of a physical obstruction to
207:59 as a result of a physical obstruction to keep this brief and on topic the 2.4 GHz
208:02 keep this brief and on topic the 2.4 GHz band will experience less physical
208:04 band will experience less physical interference than the 5 GHz band in most
208:08 interference than the 5 GHz band in most cases you're almost there we just need
208:11 cases you're almost there we just need to cover one more property that can
208:13 to cover one more property that can result in a weakened communication
208:15 result in a weakened communication signal and that is
208:17 signal and that is attenuation attenuation is the loss of
208:20 attenuation attenuation is the loss of signal strength as the transmission
208:21 signal strength as the transmission distance increases or alternatively you
208:24 distance increases or alternatively you can say a signal decreases in strength
208:26 can say a signal decreases in strength the further it travels from its
208:28 the further it travels from its origination point or
208:30 origination point or source to grasp this concept imagine the
208:33 source to grasp this concept imagine the light coming from a flashlight getting
208:34 light coming from a flashlight getting dimmer As you move further away from its
208:36 dimmer As you move further away from its source similarly as a signal travels
208:39 source similarly as a signal travels over distance it becomes weaker the
208:42 over distance it becomes weaker the farther the signal travels the more it
208:44 farther the signal travels the more it attenuates okay great job with this
208:47 attenuates okay great job with this video you should Now understand how Emi
208:50 video you should Now understand how Emi physical interference and Signal
208:52 physical interference and Signal attenuation can collectively weaken a
208:54 attenuation can collectively weaken a communication signal and lower the
208:56 communication signal and lower the signal to noise ratio if not try
208:59 signal to noise ratio if not try watching this video
209:01 watching this video again exam objective 2.8 given a
209:04 again exam objective 2.8 given a scenario install configure and secure a
209:07 scenario install configure and secure a basic wireless
209:08 basic wireless network wireless network best
209:12 network wireless network best practices whether you are setting up and
209:14 practices whether you are setting up and configuring an access point a wireless
209:16 configuring an access point a wireless router or a Soho router there are common
209:19 router or a Soho router there are common tasks that should be performed to
209:20 tasks that should be performed to maintain the security of your wireless
209:22 maintain the security of your wireless network and this list can be extensive
209:26 network and this list can be extensive but comptus exam objective 2.8 has us
209:29 but comptus exam objective 2.8 has us focusing on two particular configuration
209:31 focusing on two particular configuration best
209:32 best practices they are changing the SS ID
209:36 practices they are changing the SS ID and changing the devic's default
209:38 and changing the devic's default administrative
209:40 administrative password I will assume for a moment that
209:42 password I will assume for a moment that you are unfamiliar with the term SSID
209:44 you are unfamiliar with the term SSID and will therefore explain what it is
209:46 and will therefore explain what it is this the term SSID stands for service
209:49 this the term SSID stands for service set identifier the SSID is a unique
209:52 set identifier the SSID is a unique alphan numeric identifier given to a
209:54 alphan numeric identifier given to a wireless local area network the SSID
209:57 wireless local area network the SSID serves as the name or label for the
209:59 serves as the name or label for the network allowing devices like computers
210:02 network allowing devices like computers smartphones and other Wi-Fi enabled
210:04 smartphones and other Wi-Fi enabled devices to recognize and connect to
210:06 devices to recognize and connect to it the SSID is essential because it
210:10 it the SSID is essential because it helps devices identify and connect to
210:12 helps devices identify and connect to the correct wireless network when you
210:14 the correct wireless network when you want to join a Wi-Fi network you select
210:16 want to join a Wi-Fi network you select its SS ID from a list like the one
210:18 its SS ID from a list like the one behind me look
210:21 behind me look familiar now that you know what an SS ID
210:24 familiar now that you know what an SS ID is why should you change it when setting
210:25 is why should you change it when setting up and configuring a new wireless
210:27 up and configuring a new wireless network device changing the SSID when
210:30 network device changing the SSID when first configuring a wireless device is a
210:33 first configuring a wireless device is a security best practice that is designed
210:35 security best practice that is designed to enhance the overall security of your
210:37 to enhance the overall security of your network most routers come with default
210:40 network most routers come with default SS IDs set by the
210:42 SS IDs set by the manufacturer these default names are
210:44 manufacturer these default names are often wellknown and can be easily
210:46 often wellknown and can be easily identified malicious actors or the bad
210:48 identified malicious actors or the bad guys might use this information to
210:50 guys might use this information to specifically Target networks with
210:52 specifically Target networks with default settings for potential
210:54 default settings for potential attacks in addition to changing the
210:56 attacks in addition to changing the default SS ID you should also change the
210:59 default SS ID you should also change the default administrative password on the
211:01 default administrative password on the wireless network device this password
211:03 wireless network device this password serves as the devic's login credentials
211:06 serves as the devic's login credentials and is used to access and configure the
211:08 and is used to access and configure the devices settings and features again just
211:11 devices settings and features again just like the default SSID default admin
211:13 like the default SSID default admin passwords are often wellknown and can
211:15 passwords are often wellknown and can beas easily exploited by malicious
211:17 beas easily exploited by malicious actors or the bad guys if not changed
211:19 actors or the bad guys if not changed right away so to recap when configuring
211:23 right away so to recap when configuring a new wireless network device it is best
211:25 a new wireless network device it is best practiced to change the default SS ID
211:27 practiced to change the default SS ID and the default admin password as soon
211:29 and the default admin password as soon as
211:30 as possible exam objective 2.8 given a
211:33 possible exam objective 2.8 given a scenario install configure and secure a
211:36 scenario install configure and secure a basic wireless
211:38 basic wireless network encrypted versus
211:41 network encrypted versus unencrypted when configuring a wireless
211:43 unencrypted when configuring a wireless network device you will be presented
211:45 network device you will be presented with a very important security option do
211:48 with a very important security option do you want to encrypt your wireless
211:49 you want to encrypt your wireless network now before you jump right in and
211:52 network now before you jump right in and say of course I want to encrypt I will
211:55 say of course I want to encrypt I will cover a few cases where you might want
211:56 cover a few cases where you might want to leave your wireless network
212:02 unencrypted leaving your wireless network unencrypted or having what is
212:04 network unencrypted or having what is called open authentication allows
212:06 called open authentication allows unrestricted access to the network
212:08 unrestricted access to the network without requiring a password or
212:09 without requiring a password or authentication credentials this can be
212:12 authentication credentials this can be useful in public spaces or guest
212:14 useful in public spaces or guest environments to offer convenient and
212:16 environments to offer convenient and seamless internet access to a wide range
212:17 seamless internet access to a wide range of users a perfect example would be a
212:20 of users a perfect example would be a popular coffee shop in the heart of the
212:22 popular coffee shop in the heart of the city with an open authentication
212:24 city with an open authentication wireless network in place customers can
212:27 wireless network in place customers can easily connect to the internet without
212:29 easily connect to the internet without the need for a password or any
212:30 the need for a password or any authentication process this makes it
212:33 authentication process this makes it hassle-free for patrons to use their
212:35 hassle-free for patrons to use their laptops smartphones or
212:37 laptops smartphones or tablets in doing so users do need to be
212:40 tablets in doing so users do need to be aware that they are responsible for
212:42 aware that they are responsible for their own data security while using the
212:44 their own data security while using the open network using an unencrypted
212:46 open network using an unencrypted wireless network is risky due to lack of
212:48 wireless network is risky due to lack of password security protocols without
212:51 password security protocols without encryption information on the network
212:53 encryption information on the network can be seen by others so try not to log
212:56 can be seen by others so try not to log into your bank account while connected
212:57 into your bank account while connected to one of these
213:00 to one of these networks paired with open authentication
213:02 networks paired with open authentication you will often come across captive
213:04 you will often come across captive portals and keeping in step with our
213:06 portals and keeping in step with our coffee shop scenario on the right we
213:08 coffee shop scenario on the right we have a captive portal from my local
213:11 have a captive portal from my local Starbucks captive portals are commonly
213:13 Starbucks captive portals are commonly used with open authentication networks
213:15 used with open authentication networks to Prov provide an additional layer of
213:16 to Prov provide an additional layer of control when sharing a wireless network
213:19 control when sharing a wireless network with strangers even though we may not be
213:21 with strangers even though we may not be requiring a password to authenticate we
213:24 requiring a password to authenticate we may still want a user to at least agree
213:26 may still want a user to at least agree to some terms and conditions of use some
213:29 to some terms and conditions of use some additional reasons for a captive portal
213:31 additional reasons for a captive portal may include informing a user of data
213:33 may include informing a user of data collection or to provide management of a
213:35 collection or to provide management of a user's session captive portals are
213:38 user's session captive portals are typically displayed as web pages that
213:40 typically displayed as web pages that appear automatically when a user
213:41 appear automatically when a user connects to an open network or attempts
213:43 connects to an open network or attempts to access the internet for the first
213:45 to access the internet for the first time after connecting these web pages
213:48 time after connecting these web pages are designed to capture the users's
213:49 are designed to capture the users's attention and require them to take
213:51 attention and require them to take specific actions before gaining full
213:54 specific actions before gaining full access to the
213:56 access to the network now that we have covered the
213:58 network now that we have covered the unencrypted option let's switch over to
214:01 unencrypted option let's switch over to encrypted networks we will be covering
214:03 encrypted networks we will be covering four key encryption standards WEP WPA
214:07 four key encryption standards WEP WPA WPA 2 and WPA 3 and if you looked at the
214:11 WPA 2 and WPA 3 and if you looked at the CompTIA ITF plus exam objectives you
214:14 CompTIA ITF plus exam objectives you might have noticed I have added WPA 3 to
214:17 might have noticed I have added WPA 3 to the list this may not be a part of the
214:19 the list this may not be a part of the current ITF plus exam as it is a newer
214:22 current ITF plus exam as it is a newer standard but it has found its way into
214:24 standard but it has found its way into the exams of many other it
214:25 the exams of many other it certifications so I figured why not
214:28 certifications so I figured why not cover it in this video now as I briefly
214:31 cover it in this video now as I briefly work my way through these four wireless
214:33 work my way through these four wireless encryption standards use the table
214:35 encryption standards use the table behind me to keep yourself organized I
214:37 behind me to keep yourself organized I will start at the top and work my way
214:40 will start at the top and work my way down first up we have WEP or wired
214:43 down first up we have WEP or wired equivalent privacy this this is the
214:46 equivalent privacy this this is the oldest and weakest of the encryption
214:48 oldest and weakest of the encryption standards WEP used an rc4 encryption
214:51 standards WEP used an rc4 encryption mechanism which had some serious
214:53 mechanism which had some serious security flaws and could be easily
214:55 security flaws and could be easily cracked by determined hackers so it's
214:58 cracked by determined hackers so it's best to avoid using WEP and opt for a
215:01 best to avoid using WEP and opt for a more secure option next we have WPA or
215:05 more secure option next we have WPA or Wi-Fi protected access WPA was an
215:08 Wi-Fi protected access WPA was an improvement over W and offered better
215:11 improvement over W and offered better security it used a more robust
215:13 security it used a more robust encryption mechanism known as tkip
215:16 encryption mechanism known as tkip this made it a bit harder for attackers
215:18 this made it a bit harder for attackers to break into your
215:19 to break into your network however like we WPA is also
215:23 network however like we WPA is also considered outdated and not the best
215:25 considered outdated and not the best choice for modern Wi-Fi security moving
215:28 choice for modern Wi-Fi security moving on to WPA 2 or Wi-Fi protected access 2
215:32 on to WPA 2 or Wi-Fi protected access 2 this is a more Modern Standard for
215:34 this is a more Modern Standard for securing Wi-Fi networks and has been
215:36 securing Wi-Fi networks and has been widely used for years WPA 2 uses a
215:40 widely used for years WPA 2 uses a stronger encryption mechanism known as a
215:43 stronger encryption mechanism known as a ases is highly secure and much more
215:45 ases is highly secure and much more difficult for attackers to crack if you
215:48 difficult for attackers to crack if you have a relatively new router it will
215:50 have a relatively new router it will likely support WPA 2 and this is the
215:52 likely support WPA 2 and this is the best and most secure standard of those
215:54 best and most secure standard of those listed in the CompTIA ITF plus exam
215:57 listed in the CompTIA ITF plus exam objectives and now for the bonus
215:59 objectives and now for the bonus encryption standard
216:01 encryption standard wpa3 WPA 3 is the latest and most
216:05 wpa3 WPA 3 is the latest and most advanced wireless encryption standard
216:07 advanced wireless encryption standard wpa3 Builds on the strengths of WPA 2
216:10 wpa3 Builds on the strengths of WPA 2 and adds even more security features
216:13 and adds even more security features such as the SAE encryption mechanism
216:16 such as the SAE encryption mechanism wpa3 is currently the gold standard for
216:18 wpa3 is currently the gold standard for Wi-Fi security and if your wireless
216:20 Wi-Fi security and if your wireless network device supports it it is the
216:22 network device supports it it is the best choice for keeping your network
216:24 best choice for keeping your network safe one last note about these
216:27 safe one last note about these encryption standards just because your
216:29 encryption standards just because your wireless network device supports a
216:31 wireless network device supports a specific encryption standard does not
216:33 specific encryption standard does not mean the wireless clients do it is very
216:36 mean the wireless clients do it is very common that an older Wireless client
216:38 common that an older Wireless client such as a laptop smartphone or even a
216:40 such as a laptop smartphone or even a wireless iot device like an oven
216:43 wireless iot device like an oven refrigerator or light switch may not
216:45 refrigerator or light switch may not support some of the newer encryption
216:47 support some of the newer encryption standards if this happens the client may
216:50 standards if this happens the client may not be able to connect to the network
216:52 not be able to connect to the network just some food for thought exam
216:54 just some food for thought exam objective 3.1 explain the purpose of
216:57 objective 3.1 explain the purpose of operating
216:59 operating systems for the CompTIA ITF plus exam
217:02 systems for the CompTIA ITF plus exam objective 3.1 we will be taking an
217:05 objective 3.1 we will be taking an in-depth look at operating systems this
217:07 in-depth look at operating systems this first video will just be an overview of
217:09 first video will just be an overview of the videos to follow so let's kick this
217:12 the videos to follow so let's kick this off with a definition of an operating
217:14 off with a definition of an operating system an operating system or Os for
217:17 system an operating system or Os for short is the fundamental software
217:19 short is the fundamental software program that serves as the backbone of a
217:21 program that serves as the backbone of a computer or any other Computing device
217:24 computer or any other Computing device it has the primary job of being the
217:26 it has the primary job of being the intermediary between the hardware
217:27 intermediary between the hardware components of the computer and the
217:29 components of the computer and the applications or software running on it
217:32 applications or software running on it more simply put an operating system is
217:35 more simply put an operating system is like the boss of a computer coordinating
217:37 like the boss of a computer coordinating all its tasks and making sure everything
217:39 all its tasks and making sure everything runs smoothly or it is like a conductor
217:42 runs smoothly or it is like a conductor who leads an orchestra ensuring all the
217:44 who leads an orchestra ensuring all the musicians play to together in harmony to
217:46 musicians play to together in harmony to create beautiful
217:48 create beautiful music well we got the primary function
217:50 music well we got the primary function of being the intermediary between the
217:52 of being the intermediary between the hardware components and the applications
217:54 hardware components and the applications out of the way so what else does the OS
217:57 out of the way so what else does the OS do quite a bit I have put together a
218:00 do quite a bit I have put together a list for now but each of these items
218:02 list for now but each of these items will get their own video so no specifics
218:04 will get their own video so no specifics yet to run through the rest of the list
218:07 yet to run through the rest of the list we have Disk
218:10 we have Disk Management Process Management and
218:13 Management Process Management and scheduling application management
218:16 scheduling application management memory
218:17 memory management device
218:19 management device management and lastly an OS provides
218:22 management and lastly an OS provides access control
218:23 access control functions as we learn about each of
218:25 functions as we learn about each of these OS functions in the following
218:27 these OS functions in the following videos the images and demonstrations I
218:30 videos the images and demonstrations I will be using will be based on the
218:31 will be using will be based on the Windows 10 operating system this is
218:34 Windows 10 operating system this is because CompTIA exam content and
218:36 because CompTIA exam content and questions will lean more toward Windows
218:37 questions will lean more toward Windows than Mac OS or Linux well with the
218:41 than Mac OS or Linux well with the exception of the Linux plus exam of
218:43 exception of the Linux plus exam of course see you in the next
218:46 course see you in the next video exam objective 3.1 explain the
218:50 video exam objective 3.1 explain the purpose of operating
218:52 purpose of operating systems Disk
218:54 systems Disk Management in the context of an
218:56 Management in the context of an operating system Disk Management refers
218:58 operating system Disk Management refers to the way the operating system
219:00 to the way the operating system organizes and provides structure for
219:02 organizes and provides structure for file and data management imagine your
219:05 file and data management imagine your computer's storage as a big cabinet with
219:07 computer's storage as a big cabinet with drawers Disk Management is like
219:09 drawers Disk Management is like arranging files neatly into different
219:11 arranging files neatly into different drawers labeling them for easy retrieval
219:13 drawers labeling them for easy retrieval and ensuring there's enough space for
219:15 and ensuring there's enough space for new files without causing
219:18 new files without causing clutter or you can think of your
219:20 clutter or you can think of your computer's storage as a massive
219:22 computer's storage as a massive bookshelf and the operating system is
219:24 bookshelf and the operating system is the librarian that organizes all the
219:26 the librarian that organizes all the books on each separate shelf similarly
219:29 books on each separate shelf similarly by using Disk Management tools we can
219:31 by using Disk Management tools we can also create separate logical
219:33 also create separate logical compartments on our storage devices
219:35 compartments on our storage devices called
219:36 called partitions a partition is a separate and
219:39 partitions a partition is a separate and distinct section or compartment of a
219:41 distinct section or compartment of a storage device it acts as a virtual
219:43 storage device it acts as a virtual division allowing you to organize and
219:45 division allowing you to organize and manage data separately from other
219:52 partitions in Windows for example we can access the Disk Management utility and
219:55 access the Disk Management utility and create a new Partition for any portion
219:56 create a new Partition for any portion of a drive that is unallocated or is not
219:59 of a drive that is unallocated or is not currently in use the thick red line
220:01 currently in use the thick red line represents where I have added a
220:05 represents where I have added a partition in addition to creating a
220:07 partition in addition to creating a partition we can shrink a partition or
220:09 partition we can shrink a partition or decrease the allocated
220:12 decrease the allocated space we can also extend a partition or
220:15 space we can also extend a partition or increase the allocated
220:18 increase the allocated space and finally we can delete a
220:21 space and finally we can delete a partition Al together when deleting a
220:23 partition Al together when deleting a partition however Please be aware that
220:26 partition however Please be aware that any data inside of it will be
220:32 lost now let's talk about hidden partitions these are partitions that are
220:35 partitions these are partitions that are not readily visible to the user hidden
220:37 not readily visible to the user hidden partitions are often used for system
220:39 partitions are often used for system recovery or specific system functions
220:42 recovery or specific system functions they are typically hidden from the user
220:44 they are typically hidden from the user to prevent accid Dental tampering or
220:46 to prevent accid Dental tampering or deletion but they will still be visible
220:48 deletion but they will still be visible with Disk Management tools let me create
220:51 with Disk Management tools let me create a hypothetical scenario for you to help
220:53 a hypothetical scenario for you to help you understand if you were to purchase a
220:56 you understand if you were to purchase a 1 tbte hard drive but after installation
220:58 1 tbte hard drive but after installation you notice it only offered 900 GB of
221:01 you notice it only offered 900 GB of storage space the first thing you might
221:03 storage space the first thing you might want to do is use the operating systems
221:05 want to do is use the operating systems dis management tool to see if the drive
221:07 dis management tool to see if the drive has any hidden partitions as a hidden
221:09 has any hidden partitions as a hidden partition might be responsible for the
221:11 partition might be responsible for the missing 100 GB of storage space and that
221:14 missing 100 GB of storage space and that wraps up the basics of Disk Management
221:17 wraps up the basics of Disk Management on to the next video and the next OS
221:21 on to the next video and the next OS function exam objective 3.1 explain the
221:24 function exam objective 3.1 explain the purpose of operating
221:26 purpose of operating systems Process
221:28 systems Process Management in the context of a computer
221:31 Management in the context of a computer program a process refers to an instance
221:33 program a process refers to an instance of an executing program or application
221:36 of an executing program or application it represents the Computing resources
221:38 it represents the Computing resources such as memory CPU files Etc allocated
221:42 such as memory CPU files Etc allocated to that specific program while it's
221:43 to that specific program while it's running each process operates
221:46 running each process operates independently and follows its sequence
221:48 independently and follows its sequence of instructions enabling the computer to
221:50 of instructions enabling the computer to execute multiple programs simultaneously
221:53 execute multiple programs simultaneously a capability known as
221:54 a capability known as multitasking the operating system
221:56 multitasking the operating system manages these processes ensuring that
221:59 manages these processes ensuring that they don't interfere with each other and
222:00 they don't interfere with each other and that the system resources are allocated
222:02 that the system resources are allocated efficiently to provide smooth and
222:04 efficiently to provide smooth and responsive Computing experiences to the
222:08 responsive Computing experiences to the user while the operating system handles
222:11 user while the operating system handles processes rather seamlessly we do have
222:13 processes rather seamlessly we do have tools that can help us when processes
222:15 tools that can help us when processes don't behave the way we expect or would
222:17 don't behave the way we expect or would like in Windows we have the task manager
222:21 like in Windows we have the task manager task manager is a system utility that
222:23 task manager is a system utility that provides real-time monitoring and
222:25 provides real-time monitoring and control over processes and system
222:27 control over processes and system performance on a Windows computer it
222:30 performance on a Windows computer it offers several features that allow users
222:32 offers several features that allow users to manage tasks effectively in viewing
222:35 to manage tasks effectively in viewing tasks the task manager displays a list
222:38 tasks the task manager displays a list of running processes applications and
222:40 of running processes applications and services along with their current
222:42 services along with their current resource
222:43 resource utilizations this information
222:45 utilizations this information information helps users identify which
222:47 information helps users identify which programs are consuming the most
222:48 programs are consuming the most resources and potentially causing
222:50 resources and potentially causing performance
222:52 performance issues the task manager also allows
222:55 issues the task manager also allows users to close non-responding
222:56 users to close non-responding applications by selecting the
222:58 applications by selecting the application and clicking end task this
223:01 application and clicking end task this sends a close request to the program
223:03 sends a close request to the program terminating the application freeing up
223:05 terminating the application freeing up system resources and resolving any
223:08 system resources and resolving any potential
223:10 potential unresponsiveness exam objective 3.1
223:13 unresponsiveness exam objective 3.1 explain the purpose of operating system
223:16 explain the purpose of operating system application
223:18 application Management in the context of it an
223:21 Management in the context of it an application refers to a software program
223:23 application refers to a software program or set of programs designed to perform
223:25 or set of programs designed to perform specific tasks or functions to meet the
223:27 specific tasks or functions to meet the user's needs applications can include
223:30 user's needs applications can include everything from simple utilities like
223:32 everything from simple utilities like text editors and web browsers to complex
223:35 text editors and web browsers to complex software like office suites photo
223:37 software like office suites photo editors and video games and just so you
223:40 editors and video games and just so you don't confuse the definitions of an
223:42 don't confuse the definitions of an application and a process an application
223:45 application and a process an application represents the software itself and its
223:47 represents the software itself and its intended purpose a process refers to the
223:49 intended purpose a process refers to the running instance of that application on
223:51 running instance of that application on a computer when you start an application
223:54 a computer when you start an application it becomes a process and it runs
223:56 it becomes a process and it runs independently with its allocated system
223:58 independently with its allocated system resources memory CPU Etc one application
224:02 resources memory CPU Etc one application can have multiple processes if you run
224:04 can have multiple processes if you run it multiple times each process operating
224:07 it multiple times each process operating separately the operating system manages
224:10 separately the operating system manages these processes to ensure efficient use
224:11 these processes to ensure efficient use of resources and to prevent interference
224:14 of resources and to prevent interference between them in summary an application
224:17 between them in summary an application is the software while a process is the
224:19 is the software while a process is the running instance of that software on the
224:23 running instance of that software on the computer now that we have defined what
224:25 computer now that we have defined what an application is managing these
224:27 an application is managing these applications is another function of the
224:28 applications is another function of the operating system within windows we have
224:31 operating system within windows we have the programs and features applet to
224:33 the programs and features applet to assist users in performing the basic
224:35 assist users in performing the basic functions of application
224:38 functions of application management once an application is
224:40 management once an application is installed the programs and features
224:42 installed the programs and features applet will allow you to view manage or
224:44 applet will allow you to view manage or un install
224:47 un install applications exam objective 3.1 explain
224:50 applications exam objective 3.1 explain the purpose of operating
224:52 the purpose of operating systems memory
224:55 systems memory management the next operating system
224:57 management the next operating system function we will discuss is memory
224:59 function we will discuss is memory management from a user standpoint there
225:02 management from a user standpoint there is very little we need to do as the OS
225:04 is very little we need to do as the OS pretty much takes care of this for us
225:05 pretty much takes care of this for us behind the scenes with memory management
225:08 behind the scenes with memory management there are two primary components memory
225:11 there are two primary components memory allocation and
225:12 allocation and deallocation memory allocation involves
225:15 deallocation memory allocation involves allocating memory space to various
225:16 allocating memory space to various processes or programs that are running
225:18 processes or programs that are running on the computer when a program is
225:20 on the computer when a program is launched the operating system allocates
225:23 launched the operating system allocates a portion of the available memory to it
225:25 a portion of the available memory to it this allocated memory is used to store
225:27 this allocated memory is used to store the program's code data and variables
225:29 the program's code data and variables during its
225:31 during its execution memory deallocation occurs
225:33 execution memory deallocation occurs once a program completes its execution
225:35 once a program completes its execution or is terminated memory deallocation
225:38 or is terminated memory deallocation also known as memory release involves
225:41 also known as memory release involves freeing up the memory space previously
225:43 freeing up the memory space previously allocated to the program so that it can
225:44 allocated to the program so that it can be reused by other processes proper
225:47 be reused by other processes proper deallocation ensures that memory is
225:49 deallocation ensures that memory is efficiently
225:54 utilized one more item about memory management you should know is the
225:56 management you should know is the concept of virtual memory virtual memory
225:59 concept of virtual memory virtual memory also known as a page file is a memory
226:02 also known as a page file is a memory management technique used by operating
226:03 management technique used by operating systems to extend the available memory
226:06 systems to extend the available memory beyond the physical RAM Random Access
226:08 beyond the physical RAM Random Access Memory installed on a computer it allows
226:11 Memory installed on a computer it allows the system to use a portion of the
226:12 the system to use a portion of the computer's storage typically a hard
226:14 computer's storage typically a hard drive as an extension of ram virtual
226:17 drive as an extension of ram virtual memory is needed because some programs
226:19 memory is needed because some programs and tasks may require more memory than
226:21 and tasks may require more memory than the physical RAM available and without
226:23 the physical RAM available and without virtual memory the system may become
226:26 virtual memory the system may become Limited in its ability to run multiple
226:28 Limited in its ability to run multiple programs simultaneously or handle large
226:34 processes now let's take a look at virtual memory in action and discuss
226:36 virtual memory in action and discuss each of its parts first up virtual
226:39 each of its parts first up virtual memory or page file the page file is a
226:42 memory or page file the page file is a designated area on the hard disk that
226:44 designated area on the hard disk that acts as a repository when the physical
226:46 acts as a repository when the physical RAM becomes fully occupied when a
226:49 RAM becomes fully occupied when a program requires more memory than the
226:50 program requires more memory than the available Ram the operating system
226:53 available Ram the operating system temporarily stores the less frequently
226:54 temporarily stores the less frequently used or inactive pages of that program
226:57 used or inactive pages of that program in the page file this frees up space in
226:59 in the page file this frees up space in the physical RAM to accommodate the more
227:01 the physical RAM to accommodate the more actively used pages of other
227:03 actively used pages of other programs next we have page swapping as
227:07 programs next we have page swapping as the user switches between different
227:09 the user switches between different programs the operating system uses a
227:11 programs the operating system uses a technique called page swapping it moves
227:14 technique called page swapping it moves pages and in and out of the physical RAM
227:16 pages and in and out of the physical RAM and the page file as needed when a
227:18 and the page file as needed when a program that has Pages stored in the
227:20 program that has Pages stored in the page file becomes active again its pages
227:23 page file becomes active again its pages are moved back to the RAM for faster
227:25 are moved back to the RAM for faster access while virtual memory enables the
227:28 access while virtual memory enables the system to handle larger processes and
227:30 system to handle larger processes and multitasking effectively using the page
227:32 multitasking effectively using the page file on the hard drive is slower than
227:34 file on the hard drive is slower than accessing data directly from the ram
227:37 accessing data directly from the ram this is because Drive access times are
227:39 this is because Drive access times are significantly slower compared to Ram
227:41 significantly slower compared to Ram access times excessive Reliance on
227:44 access times excessive Reliance on virtual memory due to insufficient
227:45 virtual memory due to insufficient physical RAM can lead to Performance
227:47 physical RAM can lead to Performance slowdowns where the system spends more
227:49 slowdowns where the system spends more time swapping pages in and out of the
227:51 time swapping pages in and out of the page file than executing actual tasks
227:54 page file than executing actual tasks and that wraps up this video on memory
227:56 and that wraps up this video on memory management exam objective 3.1 explain
227:59 management exam objective 3.1 explain the purpose of operating
228:01 the purpose of operating systems device
228:04 systems device management device management is the
228:06 management device management is the process of controlling and coordinating
228:08 process of controlling and coordinating the various Hardware devices connected
228:10 the various Hardware devices connected to a computer system it is a vital
228:12 to a computer system it is a vital function of the operating system that
228:14 function of the operating system that enables it to recognize configure
228:16 enables it to recognize configure Monitor and interact with Hardware
228:19 Monitor and interact with Hardware components such as printers graphics
228:21 components such as printers graphics cards network adapters and storage
228:28 devices Device Manager in Windows is a built-in utility that allows users to
228:30 built-in utility that allows users to manage Hardware devices connected to
228:32 manage Hardware devices connected to their computer it provides an intuitive
228:34 their computer it provides an intuitive graphical interface to perform various
228:36 graphical interface to perform various device related tasks to include viewing
228:40 device related tasks to include viewing device
228:41 device information updating device
228:43 information updating device drivers enabling and disabling
228:46 drivers enabling and disabling devices troubleshooting device issues
228:50 devices troubleshooting device issues and facilitating device removal to
228:53 and facilitating device removal to provide an example if you were having
228:55 provide an example if you were having trouble with a printer's driver this
228:57 trouble with a printer's driver this would fall under the device management
228:58 would fall under the device management function of the operating system and the
229:01 function of the operating system and the device manager tool in Windows would be
229:03 device manager tool in Windows would be a great place to start your
229:04 a great place to start your troubleshooting
229:06 troubleshooting efforts exam objective 3.1 explain the
229:09 efforts exam objective 3.1 explain the purpose of operating
229:11 purpose of operating systems Access Control
229:14 systems Access Control Access Control in the context of an
229:17 Access Control in the context of an operating system refers to the process
229:19 operating system refers to the process of managing and regulating the
229:20 of managing and regulating the permissions and privileges granted to
229:22 permissions and privileges granted to users or processes attempting to
229:24 users or processes attempting to interact with system resources it
229:27 interact with system resources it ensures that only authorized entities
229:29 ensures that only authorized entities can access specific resources preventing
229:32 can access specific resources preventing unauthorized access and maintaining the
229:34 unauthorized access and maintaining the security and integrity of the
229:36 security and integrity of the system in an operating system access
229:39 system in an operating system access controls extend their authority over
229:41 controls extend their authority over various aspects including file
229:43 various aspects including file permissions a installations and
229:46 permissions a installations and administrative tasks file permissions
229:49 administrative tasks file permissions dictate who can read write or execute
229:51 dictate who can read write or execute files and directories ensuring that
229:54 files and directories ensuring that sensitive data remains secure and only
229:56 sensitive data remains secure and only authorized users can access it
229:58 authorized users can access it application installations are controlled
230:00 application installations are controlled to prevent unauthorized software from
230:02 to prevent unauthorized software from being installed reducing the risk of
230:04 being installed reducing the risk of malicious or unapproved programs
230:06 malicious or unapproved programs compromising system stability or
230:08 compromising system stability or security administrative tasks such as
230:11 security administrative tasks such as user account management system
230:13 user account management system configurations and software updates are
230:16 configurations and software updates are restricted to authorized Personnel to
230:18 restricted to authorized Personnel to maintain the overall integrity and
230:20 maintain the overall integrity and stability of the operating system this
230:22 stability of the operating system this concludes my breakdown of the different
230:24 concludes my breakdown of the different purposes or functions of the operating
230:26 purposes or functions of the operating system there were seven functions in
230:29 system there were seven functions in total how many can you recall exam
230:32 total how many can you recall exam objective 3.1 explain the purpose of
230:35 objective 3.1 explain the purpose of operating
230:36 operating systems types of operating
230:39 systems types of operating systems we just learned in the last few
230:42 systems we just learned in the last few videos what an operating system is and
230:44 videos what an operating system is and what an operating in system does but
230:46 what an operating in system does but does every Computing device use the same
230:48 does every Computing device use the same OS absolutely not there are many and
230:52 OS absolutely not there are many and each is designed for a specific use case
230:55 each is designed for a specific use case now I have laid out a few icons behind
230:57 now I have laid out a few icons behind me how many do you
231:00 me how many do you recognize most of us are familiar with
231:02 recognize most of us are familiar with apple represented by the Apple icon and
231:04 apple represented by the Apple icon and no doubt you have spotted the Microsoft
231:06 no doubt you have spotted the Microsoft Windows icon behind me too the Penguin
231:09 Windows icon behind me too the Penguin on the left whose name is tux is the
231:11 on the left whose name is tux is the universal symbol for the Linux OS and on
231:14 universal symbol for the Linux OS and on the right we have the icons for Google's
231:15 the right we have the icons for Google's Chrome OS and
231:17 Chrome OS and Android next I will present some use
231:19 Android next I will present some use cases and list appropriate operating
231:21 cases and list appropriate operating systems for each I will start with
231:24 systems for each I will start with workstation os's a workstation OS is
231:27 workstation os's a workstation OS is designed to provide a userfriendly and
231:29 designed to provide a userfriendly and feature-rich environment for individual
231:31 feature-rich environment for individual users often emphasizing multimedia
231:34 users often emphasizing multimedia capabilities productivity tools and
231:36 capabilities productivity tools and personal customization options so which
231:39 personal customization options so which operating systems apply to this scenario
231:42 operating systems apply to this scenario first we have Linux Linux has many
231:45 first we have Linux Linux has many different distributions some of which
231:47 different distributions some of which are great for
231:48 are great for workstations next we have apple apple
231:51 workstations next we have apple apple also offers an OS for
231:53 also offers an OS for workstations their workstation OS is Mac
231:56 workstations their workstation OS is Mac OS Microsoft offers Windows 10 and
231:59 OS Microsoft offers Windows 10 and windows 11 and a little less known but
232:02 windows 11 and a little less known but also considered a workstation OS is
232:04 also considered a workstation OS is Google's Chrome
232:06 Google's Chrome OS servers have operating systems that
232:08 OS servers have operating systems that are very similar to a workstation OS but
232:11 are very similar to a workstation OS but they are likely to be optimized for
232:13 they are likely to be optimized for robustness security an stability to
232:15 robustness security an stability to efficiently manage and serve resources
232:17 efficiently manage and serve resources and services to multiple clients in
232:19 and services to multiple clients in networked environments this is an area
232:22 networked environments this is an area where Linux excels many of the Linux
232:25 where Linux excels many of the Linux distributions have been purpose-built
232:27 distributions have been purpose-built for Server environments Windows also has
232:30 for Server environments Windows also has server specific operating systems the
232:33 server specific operating systems the most recent versions are Windows Server
232:35 most recent versions are Windows Server 2019 and
232:37 2019 and 2022 additionally we have Unix Unix is
232:41 2022 additionally we have Unix Unix is very similar to Linux as they share a
232:43 very similar to Linux as they share a lot of history but are different enough
232:44 lot of history but are different enough to be mentioned
232:46 to be mentioned separately moving on we have mobile
232:48 separately moving on we have mobile device os's mobile device operating
232:51 device os's mobile device operating systems are fairly different than
232:53 systems are fairly different than workstations and servers as these os's
232:56 workstations and servers as these os's must be tailored for the constraints of
232:57 must be tailored for the constraints of smartphones and tablets prioritizing
233:00 smartphones and tablets prioritizing items such as touchbased interfaces
233:02 items such as touchbased interfaces virtual keyboards power efficiency and
233:05 virtual keyboards power efficiency and arm processor
233:06 arm processor compatibility currently the mobile
233:08 compatibility currently the mobile device Market is dominated by two main
233:11 device Market is dominated by two main OS options they are Apple iOS and andro
233:15 OS options they are Apple iOS and andro Android embedded operating systems are
233:18 Android embedded operating systems are specialized os's designed to run on
233:20 specialized os's designed to run on resource constrainted devices with
233:21 resource constrainted devices with specific functions providing real-time
233:24 specific functions providing real-time capabilities minimal resource
233:26 capabilities minimal resource requirements and efficient power
233:27 requirements and efficient power management making them suitable for a
233:29 management making them suitable for a wide range of embedded systems like iot
233:32 wide range of embedded systems like iot devices and gaming consoles they often
233:35 devices and gaming consoles they often provide High reliability for static
233:36 provide High reliability for static environments where regular updates are
233:38 environments where regular updates are not
233:39 not required I do have one more OS type to
233:42 required I do have one more OS type to cover it is a type 1 Hy hypervisor but I
233:45 cover it is a type 1 Hy hypervisor but I will save that for my next video exam
233:48 will save that for my next video exam objective 3.1 explain the purpose of
233:51 objective 3.1 explain the purpose of operating
233:52 operating systems
233:54 systems hypervisor I know that I am expected to
233:57 hypervisor I know that I am expected to teach about hypervisors in this video
233:59 teach about hypervisors in this video but I can serve you better by teaching
234:01 but I can serve you better by teaching about the broader topic of
234:03 about the broader topic of virtualization for most it is assumed
234:05 virtualization for most it is assumed that a single Computing device can only
234:07 that a single Computing device can only run a single operating system at a time
234:10 run a single operating system at a time and for a long time that was true but
234:12 and for a long time that was true but with modern Computing a new feature
234:14 with modern Computing a new feature called virtualization has unlocked the
234:16 called virtualization has unlocked the ability for a single Computing device to
234:19 ability for a single Computing device to divide and share its resources in order
234:21 divide and share its resources in order to simultaneously run multiple operating
234:25 to simultaneously run multiple operating systems with virtualization there are
234:28 systems with virtualization there are two common methods of deployment the
234:31 two common methods of deployment the first virtualization setup starts with
234:33 first virtualization setup starts with the Computing device without an
234:34 the Computing device without an operating system installed this will be
234:37 operating system installed this will be represented by the empty green box
234:39 represented by the empty green box behind me within this Computing device
234:42 behind me within this Computing device we will have Hardware this will include
234:45 we will have Hardware this will include items like the CPU RAM and storage
234:48 items like the CPU RAM and storage drives and inside of a virtualized
234:50 drives and inside of a virtualized environment this Computing device is
234:52 environment this Computing device is often called The Host
234:54 often called The Host device next we will need a hypervisor a
234:58 device next we will need a hypervisor a hypervisor manages the virtualization
235:00 hypervisor manages the virtualization environment and facilitates interactions
235:02 environment and facilitates interactions with the host devices Hardware with
235:05 with the host devices Hardware with hypervisors there are two types with
235:08 hypervisors there are two types with this virtualization setup we will be
235:10 this virtualization setup we will be using a type 1 hypervisor a type 1
235:12 using a type 1 hypervisor a type 1 hypervisor also referred to as a bare
235:15 hypervisor also referred to as a bare metal hypervisor is a purpose-built
235:17 metal hypervisor is a purpose-built operating system that is installed
235:19 operating system that is installed directly on the host device as the host
235:20 directly on the host device as the host devic's OS and this will be the
235:22 devic's OS and this will be the hypervisor managing our virtualization
235:25 hypervisor managing our virtualization environment and facilitating
235:26 environment and facilitating interactions with the host devices
235:29 interactions with the host devices Hardware with the hypervisor in place we
235:31 Hardware with the hypervisor in place we can now complete our virtualization
235:33 can now complete our virtualization setup with the installation of virtual
235:35 setup with the installation of virtual machines or VMS for short virtual
235:38 machines or VMS for short virtual machines are simulated computer systems
235:40 machines are simulated computer systems created by the hypervisor that allows
235:43 created by the hypervisor that allows you to run multiple indep dependent
235:44 you to run multiple indep dependent operating systems and applications on a
235:46 operating systems and applications on a single physical computer
235:48 single physical computer simultaneously each virtual machine acts
235:51 simultaneously each virtual machine acts as a self-contained isolated environment
235:53 as a self-contained isolated environment complete with its own virtual hardware
235:55 complete with its own virtual hardware and resources allowing it to run like a
235:57 and resources allowing it to run like a separate Computing device from within
235:59 separate Computing device from within the host
236:01 the host device now for our next virtualization
236:04 device now for our next virtualization setup again I will start with the
236:06 setup again I will start with the Computing device or host device and I
236:09 Computing device or host device and I will use the same empty green box behind
236:11 will use the same empty green box behind me in order to represent it this
236:13 me in order to represent it this Computing device device will still have
236:15 Computing device device will still have Hardware to include items like the CPU
236:17 Hardware to include items like the CPU RAM and storage drives and we will still
236:20 RAM and storage drives and we will still refer to this Computing device as the
236:22 refer to this Computing device as the host device now here is where we will
236:25 host device now here is where we will differ from the first setup instead of
236:28 differ from the first setup instead of installing a type 1 hypervisor or bare
236:30 installing a type 1 hypervisor or bare metal hypervisor as the host devices OS
236:33 metal hypervisor as the host devices OS we will install an OS like Linux Windows
236:36 we will install an OS like Linux Windows or Mac OS so effectively we have an
236:39 or Mac OS so effectively we have an extra virtualization layer in our setup
236:42 extra virtualization layer in our setup next we will still need a hypervisor to
236:45 next we will still need a hypervisor to manage our virtualization environment
236:46 manage our virtualization environment and facilitate interactions with the
236:48 and facilitate interactions with the host devices hardware and network so
236:52 host devices hardware and network so instead of a type 1 hypervisor we are
236:54 instead of a type 1 hypervisor we are going to install a type 2 hypervisor a
236:57 going to install a type 2 hypervisor a type 2 hypervisor runs as a software
236:59 type 2 hypervisor runs as a software application installed on the host
237:01 application installed on the host operating system just like any other
237:02 operating system just like any other software application in this scenario
237:05 software application in this scenario the host operating system will retain
237:07 the host operating system will retain Direct Control of the host devices
237:09 Direct Control of the host devices hardware and the hypervisor must request
237:11 hardware and the hypervisor must request use of it through the host OS other wise
237:14 use of it through the host OS other wise it will still behave the same as a type
237:16 it will still behave the same as a type 1
237:17 1 hypervisor with our type 2 hypervisor in
237:19 hypervisor with our type 2 hypervisor in place we can now complete our
237:21 place we can now complete our virtualization setup with the
237:22 virtualization setup with the installation of virtual
237:28 machines and in case you are wondering what this might look like in use here is
237:30 what this might look like in use here is a screenshot of a host device with
237:32 a screenshot of a host device with Windows 10 installed on it as the host
237:34 Windows 10 installed on it as the host OS a type 2 hypervisor was then
237:37 OS a type 2 hypervisor was then installed on the Windows 10 host OS as a
237:40 installed on the Windows 10 host OS as a software application this type 2
237:42 software application this type 2 hypervisor was then used to start start
237:44 hypervisor was then used to start start up a virtual machine that utilizes a
237:46 up a virtual machine that utilizes a Linux operating system which can now be
237:49 Linux operating system which can now be operated from within the window here the
237:51 operated from within the window here the Linux device will behave the same as if
237:53 Linux device will behave the same as if it was installed on its own separate
237:55 it was installed on its own separate Computing device thanks to the power of
238:03 virtualization by using a hypervisor to create virtual machines we have an
238:05 create virtual machines we have an operating system designed to manage
238:07 operating system designed to manage other operating systems so where else
238:10 other operating systems so where else might this technology be used well a
238:13 might this technology be used well a very very common scenario is in a data
238:15 very very common scenario is in a data center here a hypervisor can be used to
238:18 center here a hypervisor can be used to create and manage multiple virtual
238:20 create and manage multiple virtual machines on a powerful server enabling
238:22 machines on a powerful server enabling efficient resource utilization and
238:24 efficient resource utilization and consolidation of various workloads such
238:27 consolidation of various workloads such as web servers databases and application
238:30 as web servers databases and application servers on the same Hardware this also
238:33 servers on the same Hardware this also reduces the space requirement or
238:34 reduces the space requirement or physical footprint needed to store
238:36 physical footprint needed to store computer
238:38 computer hardware exam objective 3.2 compare and
238:41 hardware exam objective 3.2 compare and contrast components of an operating
238:43 contrast components of an operating system
238:45 system file systems and
238:47 file systems and features in this video we will cover
238:49 features in this video we will cover what a file system is and some of the
238:51 what a file system is and some of the more common features offered by varying
238:53 more common features offered by varying file systems so let's start with a basic
238:57 file systems so let's start with a basic definition a file system in the context
238:59 definition a file system in the context of computing is a method of organizing
239:01 of computing is a method of organizing and storing data on a computer or
239:03 and storing data on a computer or storage device it provides a structured
239:06 storage device it provides a structured way to manage and access data
239:08 way to manage and access data efficiently for an analogy think of a
239:11 efficiently for an analogy think of a file system as a digital filing cabinet
239:14 file system as a digital filing cabinet just like you use a physical filing
239:15 just like you use a physical filing cabinet to organize and store your
239:17 cabinet to organize and store your documents a file system does the same
239:20 documents a file system does the same for your digital files on a computer it
239:22 for your digital files on a computer it ensures that your files are neatly
239:24 ensures that your files are neatly arranged and easily accessible making it
239:26 arranged and easily accessible making it simpler for you to find and use the
239:28 simpler for you to find and use the information you need now let's explore
239:31 information you need now let's explore some key features offered by various
239:33 some key features offered by various file
239:38 systems the first feature I will cover is file compression file compression is
239:41 is file compression file compression is the process of reducing the size of a
239:43 the process of reducing the size of a file to save storage space and enable
239:45 file to save storage space and enable faster data transfers sounds like a
239:48 faster data transfers sounds like a great solution if you are running out of
239:50 great solution if you are running out of storage space on your workstation or
239:52 storage space on your workstation or server now different types of data May
239:54 server now different types of data May compress better with different
239:56 compress better with different compression formats here are some
239:58 compression formats here are some commonly used compression formats and
240:00 commonly used compression formats and their associations with operating
240:02 their associations with operating systems and data types zip is a widely
240:05 systems and data types zip is a widely used compression format supported by
240:07 used compression format supported by Linux Mac OS and windows it is effective
240:11 Linux Mac OS and windows it is effective for compressing various types of files
240:13 for compressing various types of files including documents images and
240:15 including documents images and multimedia
240:16 multimedia files Gip is a popular compression
240:19 files Gip is a popular compression format used mainly by Linux and Macos it
240:22 format used mainly by Linux and Macos it is designed to provide efficient and
240:24 is designed to provide efficient and fast compression and is commonly used
240:26 fast compression and is commonly used for compressing text files log files and
240:29 for compressing text files log files and web
240:30 web content rarer is a compression format
240:33 content rarer is a compression format associated with WinRAR primarily used on
240:36 associated with WinRAR primarily used on Windows it is known for providing higher
240:38 Windows it is known for providing higher compression ratios and is suitable for
240:40 compression ratios and is suitable for compressing large files and archives
240:44 compressing large files and archives tar short for tape archive is a
240:46 tar short for tape archive is a compression format commonly used on
240:47 compression format commonly used on Linux and Mac
240:49 Linux and Mac OS an ISO is a standard file format used
240:52 OS an ISO is a standard file format used for creating images of optical diss like
240:55 for creating images of optical diss like CDs and DVDs it is compatible with
240:58 CDs and DVDs it is compatible with various operating systems and commonly
241:00 various operating systems and commonly used to distribute software and
241:02 used to distribute software and operating system installation
241:05 operating system installation files our next file system feature is
241:08 files our next file system feature is file encryption file encryption is the
241:11 file encryption file encryption is the process of converting the contents of a
241:13 process of converting the contents of a file into to a secure and unreadable
241:15 file into to a secure and unreadable format using encryption
241:17 format using encryption algorithms this transformation ensures
241:19 algorithms this transformation ensures that only authorized users can access
241:22 that only authorized users can access the original content file encryption is
241:24 the original content file encryption is an essential security measure to protect
241:26 an essential security measure to protect sensitive information from unauthorized
241:28 sensitive information from unauthorized access and ensure data confidentiality
241:31 access and ensure data confidentiality just imagine if you lost your smartphone
241:33 just imagine if you lost your smartphone or your laptop with the right encryption
241:36 or your laptop with the right encryption in place no one would be able to view or
241:38 in place no one would be able to view or read your
241:40 read your data now let's talk about file
241:42 data now let's talk about file permissions
241:44 permissions file permissions are access rights that
241:46 file permissions are access rights that determine what actions users can perform
241:48 determine what actions users can perform within a file system these permissions
241:51 within a file system these permissions are set by the files owner or system
241:53 are set by the files owner or system administrator to control who can read
241:55 administrator to control who can read write execute or have full control over
241:58 write execute or have full control over the file this enhances data security and
242:01 the file this enhances data security and prevents accidental data loss the read
242:04 prevents accidental data loss the read permission allows users to view the
242:06 permission allows users to view the contents of a file the right permission
242:08 contents of a file the right permission allows users to modify the contents of a
242:11 allows users to modify the contents of a file in addition to allowing users to
242:13 file in addition to allowing users to add delete or rename files and the
242:16 add delete or rename files and the execute permission allows users to run a
242:18 execute permission allows users to run a file if it is an executable program or
242:21 file if it is an executable program or script last full control is exactly what
242:24 script last full control is exactly what it sounds like this permission provides
242:27 it sounds like this permission provides a user full control over the
242:30 a user full control over the file our next feature is journaling
242:34 file our next feature is journaling journaling is a feature that records
242:36 journaling is a feature that records changes made to the file system in a log
242:38 changes made to the file system in a log acting like a transaction history it
242:40 acting like a transaction history it helps ensure data Integrity during
242:42 helps ensure data Integrity during unexpected events like like power
242:44 unexpected events like like power outages or system crashes without losing
242:46 outages or system crashes without losing data or corrupting
242:49 data or corrupting files we are nearing the end of this
242:52 files we are nearing the end of this video and you are doing great just two
242:54 video and you are doing great just two more features to cover next up
242:57 more features to cover next up limitations or more specifically file
243:00 limitations or more specifically file system
243:01 system limitations depending on the file system
243:03 limitations depending on the file system you are working with there may be
243:05 you are working with there may be maximum capacity limits for a hard drive
243:07 maximum capacity limits for a hard drive partition or a maximum size limit for an
243:10 partition or a maximum size limit for an individual
243:12 individual file and last file systems will each
243:15 file and last file systems will each have naming rules these rules will
243:18 have naming rules these rules will dictate which characters are allowed or
243:19 dictate which characters are allowed or disallowed in a file name such as the
243:21 disallowed in a file name such as the forward SL character and how many
243:23 forward SL character and how many characters each file name can contain
243:26 characters each file name can contain having a file adhere to a set of naming
243:28 having a file adhere to a set of naming rules ensures that all files are easily
243:31 rules ensures that all files are easily identifiable and accessible within the
243:33 identifiable and accessible within the file
243:34 file system now that you know some common
243:36 system now that you know some common file system features are you ready to
243:38 file system features are you ready to learn which file systems incorporate
243:40 learn which file systems incorporate these features great see you in the next
243:43 these features great see you in the next video
243:44 video video exam objective 3.2 compare and
243:47 video exam objective 3.2 compare and contrast components of an operating
243:50 contrast components of an operating system
243:52 system NTFS NTFS stands for new technology file
243:56 NTFS NTFS stands for new technology file system and is a proprietary file system
243:58 system and is a proprietary file system developed by Microsoft and is the
244:00 developed by Microsoft and is the default file system used in modern
244:02 default file system used in modern Windows operating systems including
244:04 Windows operating systems including Windows 10 Windows 11 and Windows Server
244:08 Windows 10 Windows 11 and Windows Server now that we have a definition for NTFS
244:11 now that we have a definition for NTFS let's quickly see which file system
244:12 let's quickly see which file system features it supports
244:18 our first feature is file compression and NTFS does support file compression
244:21 and NTFS does support file compression through its built-in feature called NTFS
244:23 through its built-in feature called NTFS compression when enabled this feature
244:26 compression when enabled this feature allows files and folders on an NTFS
244:28 allows files and folders on an NTFS formatted drive to be automatically
244:30 formatted drive to be automatically compressed to occupy less disk space
244:32 compressed to occupy less disk space reducing storage usage without
244:34 reducing storage usage without compromising data
244:39 accessibility next we have file encryption and again NTFS does support
244:42 encryption and again NTFS does support file encryption through the encrypting
244:43 file encryption through the encrypting file system or EFS feature EFS allows
244:47 file system or EFS feature EFS allows users to encrypt individual files or
244:49 users to encrypt individual files or folders on an NTFS formatted Drive
244:52 folders on an NTFS formatted Drive providing robust security by ensuring
244:54 providing robust security by ensuring that only authorized users with the
244:55 that only authorized users with the correct encryption keys can access and
244:58 correct encryption keys can access and decrypt the encrypted
245:01 decrypt the encrypted data NTFS also supports file permissions
245:05 data NTFS also supports file permissions allowing users to control access to
245:07 allowing users to control access to files and folders on an NTFS formatted
245:10 files and folders on an NTFS formatted drive through NTFS permissions
245:12 drive through NTFS permissions administrators can assign different
245:14 administrators can assign different levels of access rights to users and
245:16 levels of access rights to users and groups such as read write execute and
245:19 groups such as read write execute and modify to ensure data security and
245:21 modify to ensure data security and restrict unauthorized access to
245:23 restrict unauthorized access to sensitive
245:28 information and continuing with yet another check mark NTFS also supports
245:31 another check mark NTFS also supports journaling which is a feature that
245:32 journaling which is a feature that enhances data integrity and recovery
245:34 enhances data integrity and recovery after system failures or unexpected
245:37 after system failures or unexpected shutdowns the NTFS Journal keeps a
245:40 shutdowns the NTFS Journal keeps a record of changes before they are
245:41 record of changes before they are committed to the file system helping to
245:43 committed to the file system helping to prevent vent data
245:46 prevent vent data corruption while NTFS is a powerful file
245:49 corruption while NTFS is a powerful file system it still has some limits it can
245:52 system it still has some limits it can only handle hard drive partitions up to
245:54 only handle hard drive partitions up to 16 exabytes in size and limits file
245:56 16 exabytes in size and limits file sizes at 16 exabytes as well while these
245:59 sizes at 16 exabytes as well while these limits are quite large and usually not a
246:01 limits are quite large and usually not a problem for regular computer use they're
246:03 problem for regular computer use they're important to know for specific cases
246:05 important to know for specific cases where extremely large data storage is
246:12 involved and finally NTFS follows specific naming rules tools for files
246:14 specific naming rules tools for files and folders it restricts the use of
246:17 and folders it restricts the use of certain characters like the double
246:18 certain characters like the double quotation mark asterisk forward slash
246:21 quotation mark asterisk forward slash colon less than and greater than angle
246:23 colon less than and greater than angle brackets question mark backslash and
246:26 brackets question mark backslash and vertical bar or pipe Additionally the
246:29 vertical bar or pipe Additionally the maximum length for a file name is 255
246:33 maximum length for a file name is 255 characters exam objective 3.2 compare
246:36 characters exam objective 3.2 compare and contrast components of an operating
246:39 and contrast components of an operating system fat
246:42 system fat 32 fat 32 stands for file allocation
246:45 32 fat 32 stands for file allocation table 32 it is a file system used to
246:48 table 32 it is a file system used to manage data on storage devices such as
246:51 manage data on storage devices such as hard drives USB flash drives and memory
246:54 hard drives USB flash drives and memory cards fat 32 is an older file system
246:57 cards fat 32 is an older file system that has been widely supported across
246:59 that has been widely supported across different operating systems including
247:01 different operating systems including Windows Mac OS and
247:03 Windows Mac OS and Linux now that we have a definition for
247:06 Linux now that we have a definition for fat 32 let's quickly see which file
247:08 fat 32 let's quickly see which file system features it supports spoiler
247:11 system features it supports spoiler alert not many
247:18 our first feature is file compression an fat 32 does not support file compression
247:20 fat 32 does not support file compression as it lacks the built-in features to
247:22 as it lacks the built-in features to compress individual files or
247:29 folders next we have file encryption and again fat 32 does not support file
247:31 again fat 32 does not support file encryption
247:33 encryption either fat 32 also does not support file
247:36 either fat 32 also does not support file permissions as it lacks the ability to
247:38 permissions as it lacks the ability to assign different access rights to
247:40 assign different access rights to individual files or folders for
247:42 individual files or folders for different users or
247:45 different users or groups and journaling is a big no
247:49 groups and journaling is a big no too while fat 32 is widely compatible
247:53 too while fat 32 is widely compatible and accessible across different
247:54 and accessible across different platforms you can already see it is very
247:57 platforms you can already see it is very limited these limitations continue with
247:59 limited these limitations continue with its partition size
248:01 its partition size restrictions fat 32 imposes a maximum
248:04 restrictions fat 32 imposes a maximum partition size of 2 terabytes making it
248:07 partition size of 2 terabytes making it unsuitable for modern large capacity
248:08 unsuitable for modern large capacity hard drives that often exceed this limit
248:11 hard drives that often exceed this limit another significant constraint of fat 32
248:14 another significant constraint of fat 32 is its file size limit individual files
248:17 is its file size limit individual files stored on a fat 32 formatted Drive
248:19 stored on a fat 32 formatted Drive cannot exceed 4 GB in size this
248:22 cannot exceed 4 GB in size this limitation can be problematic when
248:24 limitation can be problematic when dealing with large video files high
248:26 dealing with large video files high resolution images or other large data
248:28 resolution images or other large data files that surpass the 4 GB threshold
248:31 files that surpass the 4 GB threshold try to create a file over 4 GB in size
248:34 try to create a file over 4 GB in size and you are likely to see an error
248:38 and you are likely to see an error message and finally fat 32 follows some
248:41 message and finally fat 32 follows some very specific naming rules for files and
248:43 very specific naming rules for files and folders it restricts the use of certain
248:46 folders it restricts the use of certain characters like the double quotation
248:48 characters like the double quotation mark asterisk forward slash colon less
248:51 mark asterisk forward slash colon less than and greater than angle brackets
248:53 than and greater than angle brackets question mark backslash and vertical bar
248:56 question mark backslash and vertical bar or pipe just like NTFS but also
248:58 or pipe just like NTFS but also restricts the plus symbol commas periods
249:01 restricts the plus symbol commas periods semicolons the equal sign and square
249:03 semicolons the equal sign and square brackets as
249:05 brackets as well exam objective 3.2 compare and
249:09 well exam objective 3.2 compare and contrast components of an operating
249:11 contrast components of an operating system HFS
249:14 system HFS plus HFS plus stands for hierarchical
249:17 plus HFS plus stands for hierarchical file system plus it is a file system
249:20 file system plus it is a file system developed by Apple and used as the
249:22 developed by Apple and used as the primary file system for Macintosh
249:24 primary file system for Macintosh computers HFS plus organizes files and
249:28 computers HFS plus organizes files and directories in a hierarchical structure
249:30 directories in a hierarchical structure enabling users to manage and access
249:32 enabling users to manage and access their data efficiently HFS plus was
249:35 their data efficiently HFS plus was preceded by HFS and has since been
249:37 preceded by HFS and has since been superseded by apfs Apple file system as
249:40 superseded by apfs Apple file system as the default file system on Mac OS
249:43 the default file system on Mac OS now that we have a definition for hfs+
249:46 now that we have a definition for hfs+ let's quickly see which file system
249:48 let's quickly see which file system features it supports I will also slip in
249:51 features it supports I will also slip in a few details about HFS and apfs as we
249:54 a few details about HFS and apfs as we go
249:56 go to our first feature is file compression
250:00 to our first feature is file compression HFS plus an extension of the original
250:02 HFS plus an extension of the original HFS introduced file compression
250:05 HFS introduced file compression capabilities that were not available in
250:07 capabilities that were not available in the original HFS with HFS plus users
250:10 the original HFS with HFS plus users have the option to compress individual
250:12 have the option to compress individual files or direct directories reducing
250:14 files or direct directories reducing their size on disk and saving storage
250:16 their size on disk and saving storage space this enhancement addresses a
250:19 space this enhancement addresses a limitation of the original HFS which
250:21 limitation of the original HFS which lacked built-in support for file
250:23 lacked built-in support for file compression making HFS plus a more
250:25 compression making HFS plus a more versatile file system for Mac
250:29 versatile file system for Mac users next we have file encryption HFS
250:33 users next we have file encryption HFS plus does not natively support file
250:35 plus does not natively support file encryption leaving it without the
250:36 encryption leaving it without the built-in capability to encrypt
250:38 built-in capability to encrypt individual files or directories in
250:41 individual files or directories in contrast apfs the accessor to HFS Plus
250:44 contrast apfs the accessor to HFS Plus in Mac OS introduced file level
250:46 in Mac OS introduced file level encryption allowing users to encrypt
250:48 encryption allowing users to encrypt specific files and directories for
250:50 specific files and directories for enhanced data security and privacy on
250:52 enhanced data security and privacy on compatible Mac OS
250:55 compatible Mac OS devices as for our next feature file
250:58 devices as for our next feature file permissions HFS plus does support this
251:01 permissions HFS plus does support this feature enabling users to assign
251:03 feature enabling users to assign different access rights to files and
251:04 different access rights to files and directories for different users or
251:06 directories for different users or groups on Mac OS devices it allows
251:09 groups on Mac OS devices it allows administrators to control and manage
251:11 administrators to control and manage access to data providing a LEL of
251:13 access to data providing a LEL of security and control over file access
251:16 security and control over file access apfs continued with this feature as
251:20 apfs continued with this feature as well and gaining one more check mark
251:23 well and gaining one more check mark hfs+ does support
251:29 journaling now for file system limitations HFS plus supports partitions
251:32 limitations HFS plus supports partitions up to 8 exabytes and it also supports
251:34 up to 8 exabytes and it also supports file sizes up to 8 exabytes as well you
251:37 file sizes up to 8 exabytes as well you are not likely to hit these limits with
251:39 are not likely to hit these limits with your everyday use cases though
251:43 your everyday use cases though and finally hfs+ has pretty loose naming
251:46 and finally hfs+ has pretty loose naming rules for files and folders it restricts
251:49 rules for files and folders it restricts the use of only two characters when
251:51 the use of only two characters when naming a file or a folder the two
251:53 naming a file or a folder the two characters are the forward slash and the
251:56 characters are the forward slash and the colon exam objective 3.2 compare and
252:00 colon exam objective 3.2 compare and contrast components of an operating
252:02 contrast components of an operating system
252:05 system ext4 ext4 stands for fourth extended
252:08 ext4 ext4 stands for fourth extended file system it is the primary file
252:11 file system it is the primary file system used in Linux based operating
252:13 system used in Linux based operating systems ext4 is designed to provide
252:17 systems ext4 is designed to provide improved performance scalability and
252:19 improved performance scalability and reliability compared to its predecessor
252:23 reliability compared to its predecessor ext3 now that we know ext4 is linux's
252:26 ext3 now that we know ext4 is linux's primary file system let's quickly see
252:28 primary file system let's quickly see which file system features it
252:34 supports our first feature is file compression ext4 does not natively
252:37 compression ext4 does not natively support file compression as a built-in
252:40 support file compression as a built-in feature however it is possible to use
252:42 feature however it is possible to use external tools or compression utilities
252:45 external tools or compression utilities within the Linux environment to compress
252:47 within the Linux environment to compress individual files or directories stored
252:49 individual files or directories stored on an ext4 file system allowing users to
252:52 on an ext4 file system allowing users to save storage space and manage data
252:59 efficiently next we have file encryption and yes ext4 does support file
253:02 and yes ext4 does support file encryption there is even a tool called
253:05 encryption there is even a tool called FS Crypt that is used for managing the
253:07 FS Crypt that is used for managing the native file encryption of the ext4 file
253:11 native file encryption of the ext4 file system as for our next feature file
253:14 system as for our next feature file permissions ext4 does support file
253:17 permissions ext4 does support file permissions allowing users to control
253:19 permissions allowing users to control access to files and directories in a
253:21 access to files and directories in a linux-based environment ext4 employs
253:25 linux-based environment ext4 employs standardized permissions where users can
253:27 standardized permissions where users can set read write and execute permissions
253:29 set read write and execute permissions for the owner group and other users
253:32 for the owner group and other users ensuring data security and access
253:34 ensuring data security and access control on files and
253:40 directories ext4 also supports journaling which is a crucial feature
253:42 journaling which is a crucial feature that enhan data integrity and Recovery
253:45 that enhan data integrity and Recovery in case of system crashes or unexpected
253:51 shutdowns now for file system limitations ext4 supports partitions up
253:54 limitations ext4 supports partitions up to 1 exabyte and files sizes up to 16
253:58 to 1 exabyte and files sizes up to 16 terabytes you are not likely to hit
254:00 terabytes you are not likely to hit these limits unless you are working with
254:02 these limits unless you are working with some very large data
254:05 some very large data sets and finally ext4 has some of the
254:09 sets and finally ext4 has some of the most lenient naming rules for files and
254:11 most lenient naming rules for files and folders it restricts the use of only one
254:14 folders it restricts the use of only one character when naming a file or a folder
254:17 character when naming a file or a folder and that character is the forward
254:19 and that character is the forward slash exam objective 3.2 compare and
254:23 slash exam objective 3.2 compare and contrast components of an operating
254:25 contrast components of an operating system folders and
254:28 system folders and directories in the world of Information
254:31 directories in the world of Information Technology understanding file structure
254:33 Technology understanding file structure is essential for organizing and managing
254:35 is essential for organizing and managing data efficiently think of it as the
254:38 data efficiently think of it as the blueprint that guides how information is
254:39 blueprint that guides how information is stored and accessed on our computers
254:42 stored and accessed on our computers imagine having a huge pile of papers
254:44 imagine having a huge pile of papers without any order it would be impossible
254:46 without any order it would be impossible to find what you need quickly similarly
254:49 to find what you need quickly similarly without a file structure our computers
254:51 without a file structure our computers would become chaotic making it
254:53 would become chaotic making it challenging to locate and manage data
254:55 challenging to locate and manage data effectively to provide some sense of
254:57 effectively to provide some sense of order our computers organized data into
255:00 order our computers organized data into files and folders so let's define files
255:03 files and folders so let's define files and folders and see how they work to
255:05 and folders and see how they work to bring order to our
255:07 bring order to our data a file in the context of
255:10 data a file in the context of Information Technology is a digital
255:12 Information Technology is a digital container that holds data such as
255:14 container that holds data such as documents images videos or any other
255:16 documents images videos or any other type of information it could be your
255:19 type of information it could be your essay for school a picture from your
255:21 essay for school a picture from your last vacation or even a program that
255:23 last vacation or even a program that runs your favorite game imagine files as
255:26 runs your favorite game imagine files as individual pieces of a jigsaw puzzle
255:28 individual pieces of a jigsaw puzzle when they are organized and put together
255:30 when they are organized and put together correctly they create a complete picture
255:32 correctly they create a complete picture enabling your computer to perform its
255:34 enabling your computer to perform its various tasks without files there would
255:37 various tasks without files there would be no data to work with and your
255:39 be no data to work with and your computer would be nothing more than a
255:40 computer would be nothing more than a lifeless box
255:44 lifeless box now let's talk about folders also known
255:46 now let's talk about folders also known as directories a folder is like a
255:49 as directories a folder is like a virtual container that helps you
255:50 virtual container that helps you organize your files in a logical manner
255:53 organize your files in a logical manner think of folders as your file cabinet
255:55 think of folders as your file cabinet with each drawer containing related
255:58 with each drawer containing related documents you can have separate folders
256:00 documents you can have separate folders for work-related files personal
256:02 for work-related files personal documents pictures or any other category
256:05 documents pictures or any other category that makes sense to you organizing files
256:07 that makes sense to you organizing files into folders not only keeps your data
256:09 into folders not only keeps your data tidy but also makes it easier to find
256:12 tidy but also makes it easier to find and access specific specific information
256:13 and access specific specific information when needed moreover folders can be
256:16 when needed moreover folders can be nested inside other folders creating a
256:19 nested inside other folders creating a hierarchical structure just like
256:20 hierarchical structure just like subfolders within a larger main folder
256:23 subfolders within a larger main folder to summarize keep your computer neat and
256:26 to summarize keep your computer neat and tidy organize your files into meaningful
256:28 tidy organize your files into meaningful folders and your computer will be a
256:30 folders and your computer will be a whole lot
256:31 whole lot happier exam objective 3.2 compare and
256:34 happier exam objective 3.2 compare and contrast components of an operating
256:37 contrast components of an operating system file types and
256:40 system file types and extensions when dealing with files it it
256:42 extensions when dealing with files it it is important to know that Files come in
256:44 is important to know that Files come in different types such as documents images
256:47 different types such as documents images videos and more each file type is
256:50 videos and more each file type is identified by a unique extension which
256:52 identified by a unique extension which is a few characters at the end of the
256:53 is a few characters at the end of the file name understanding file types and
256:56 file name understanding file types and extensions is crucial because they tell
256:58 extensions is crucial because they tell your computer how to interpret and
257:00 your computer how to interpret and handle the data within the file so let's
257:02 handle the data within the file so let's dive in and unravel the secrets behind
257:04 dive in and unravel the secrets behind file
257:09 extensions file extensions are little tags that convey specific information
257:11 tags that convey specific information about a file for instance a document
257:14 about a file for instance a document might have the doc extension while an
257:16 might have the doc extension while an image could have a JPEG or PNG extension
257:19 image could have a JPEG or PNG extension when you doubleclick on a file your
257:21 when you doubleclick on a file your computer uses the extension to determine
257:24 computer uses the extension to determine which program should be used to open and
257:25 which program should be used to open and read the files contents it's like
257:28 read the files contents it's like telling your computer hey this file is a
257:30 telling your computer hey this file is a document so use the wordprocessing
257:32 document so use the wordprocessing software to open it extensions make file
257:35 software to open it extensions make file handling easier for both users and
257:37 handling easier for both users and computers ensuring that the correct
257:40 computers ensuring that the correct software is used to access each file's
257:42 software is used to access each file's data
257:47 now let's talk about a scenario that is specific to Linux and Unix operating
257:49 specific to Linux and Unix operating systems in Linux and Unix based systems
257:52 systems in Linux and Unix based systems extensions are not required I repeat in
257:56 extensions are not required I repeat in Linux and Unix based systems extensions
257:58 Linux and Unix based systems extensions are not required instead these operating
258:01 are not required instead these operating systems rely on file permissions and the
258:04 systems rely on file permissions and the content within the file to determine how
258:06 content within the file to determine how to handle it however there's a neat
258:08 to handle it however there's a neat trick called a shebang that allows
258:10 trick called a shebang that allows scripts to specify which program should
258:12 scripts to specify which program should be used to open and read the files
258:14 be used to open and read the files contents directly in the file for
258:17 contents directly in the file for example if the first line in a script
258:19 example if the first line in a script starts with a hashtag followed
258:20 starts with a hashtag followed immediately with an exclamation point
258:22 immediately with an exclamation point this is a shebang the shebang will then
258:25 this is a shebang the shebang will then be followed with the file path leading
258:27 be followed with the file path leading to the program that should be used to
258:28 to the program that should be used to open and read the files
258:30 open and read the files contents in my example forward SL bin SL
258:35 contents in my example forward SL bin SL bash will call a program known in Linux
258:37 bash will call a program known in Linux as The Bash shell to execute the script
258:40 as The Bash shell to execute the script using this shebang provides flexibility
258:42 using this shebang provides flexibility and allows developers to create powerful
258:44 and allows developers to create powerful and portable scripts without relying on
258:46 and portable scripts without relying on file
258:48 file extensions
258:49 extensions congratulations you now have a solid
258:51 congratulations you now have a solid grasp of file types extensions and how
258:54 grasp of file types extensions and how they function in the IT
258:56 they function in the IT world exam objective 3.2 compare and
258:59 world exam objective 3.2 compare and contrast components of an operating
259:02 contrast components of an operating system
259:04 system Services a service is a software program
259:07 Services a service is a software program or function that runs in the background
259:08 or function that runs in the background of a computer or device providing
259:11 of a computer or device providing specific tasks function fun alties or
259:13 specific tasks function fun alties or capabilities to support the operating
259:15 capabilities to support the operating system or
259:16 system or applications you can think of services
259:19 applications you can think of services as dedicated helpers that work behind
259:20 as dedicated helpers that work behind the scenes to manage and coordinate
259:22 the scenes to manage and coordinate various tasks on our devices they
259:25 various tasks on our devices they provide fundamental functionalities that
259:27 provide fundamental functionalities that allow us to interact with our computers
259:28 allow us to interact with our computers and perform everyday activities
259:30 and perform everyday activities effortlessly from managing Hardware
259:32 effortlessly from managing Hardware resources like memory and processing
259:34 resources like memory and processing power to handling software applications
259:37 power to handling software applications and user interfaces OS services are the
259:39 and user interfaces OS services are the unsung heroes that make our digital
259:41 unsung heroes that make our digital experiences possible
259:43 experiences possible another essential feature of services is
259:45 another essential feature of services is that they can be configured to start
259:47 that they can be configured to start automatically when the computer is
259:48 automatically when the computer is booted up this in turn allows certain
259:51 booted up this in turn allows certain applications to run without requiring
259:53 applications to run without requiring manual intervention from the user each
259:55 manual intervention from the user each time the computer
260:01 starts as a user OS services are indispensable because they simplify our
260:03 indispensable because they simplify our Computing experiences and shield us from
260:05 Computing experiences and shield us from the complexities of hardware and
260:07 the complexities of hardware and software
260:08 software interactions they ensure that our
260:10 interactions they ensure that our devices run smoothly and provide a use
260:12 devices run smoothly and provide a use friendly environment where we can work
260:14 friendly environment where we can work play and communicate effortlessly
260:17 play and communicate effortlessly imagine trying to print a document
260:19 imagine trying to print a document without the device management and Print
260:21 without the device management and Print Spooler services or accessing your
260:23 Spooler services or accessing your photos without the file management
260:25 photos without the file management service now that would be a challenging
260:27 service now that would be a challenging and frustrating experience thanks to
260:30 and frustrating experience thanks to these OS Services we can focus on what
260:33 these OS Services we can focus on what we want to achieve without worrying
260:34 we want to achieve without worrying about the technical intricacies
260:36 about the technical intricacies happening beneath the
260:37 happening beneath the surface exam objective 3.2 compare and
260:41 surface exam objective 3.2 compare and contrast components of an operating
260:43 contrast components of an operating system
260:45 system processes I know that I covered this
260:48 processes I know that I covered this topic in exam objective 3.1 but a
260:50 topic in exam objective 3.1 but a refresher sure wouldn't hurt so here it
260:53 refresher sure wouldn't hurt so here it is again in the context of a computer
260:55 is again in the context of a computer program a process refers to an instance
260:57 program a process refers to an instance of an executing program or application
261:00 of an executing program or application it represents the Computing resources
261:03 it represents the Computing resources such as memory CPU files Etc allocated
261:06 such as memory CPU files Etc allocated to that specific program while it's
261:08 to that specific program while it's running each process operates
261:10 running each process operates independently and follows its Secret of
261:12 independently and follows its Secret of instructions enabling the computer to
261:15 instructions enabling the computer to execute multiple programs simultaneously
261:17 execute multiple programs simultaneously a capability known as multitasking the
261:20 a capability known as multitasking the operating system manages these processes
261:23 operating system manages these processes ensuring that they don't interfere with
261:24 ensuring that they don't interfere with each other and that the system resources
261:26 each other and that the system resources are allocated efficiently to provide
261:28 are allocated efficiently to provide smooth and responsive Computing
261:30 smooth and responsive Computing experiences to the
261:33 experiences to the user and once again just so you don't
261:36 user and once again just so you don't confuse the definitions of an
261:37 confuse the definitions of an application and a process an application
261:40 application and a process an application represents the software itself and its
261:42 represents the software itself and its intended purpose a process refers to the
261:44 intended purpose a process refers to the running instance of that application on
261:46 running instance of that application on a computer an application and a process
261:49 a computer an application and a process are not the same when you start an
261:51 are not the same when you start an application it becomes a process and it
261:54 application it becomes a process and it runs independently with its allocated
261:56 runs independently with its allocated system resources memory CPU Etc one
262:00 system resources memory CPU Etc one application can have multiple processes
262:02 application can have multiple processes if you run it multiple times each
262:04 if you run it multiple times each process operating separately the
262:07 process operating separately the operating system manages these processes
262:09 operating system manages these processes to ensure efficient use of resources and
262:11 to ensure efficient use of resources and to prevent interference between them in
262:14 to prevent interference between them in summary an application is the software
262:16 summary an application is the software while a process is the running instance
262:18 while a process is the running instance of that software on the
262:20 of that software on the computer exam objective 3.2 compare and
262:23 computer exam objective 3.2 compare and contrast components of an operating
262:26 contrast components of an operating system
262:28 system drivers a device driver is a software
262:31 drivers a device driver is a software program that facilitates communication
262:33 program that facilitates communication between a Computing devices operating
262:35 between a Computing devices operating system and a specific Hardware device
262:38 system and a specific Hardware device the device driver acts as a translator
262:40 the device driver acts as a translator allowing the operating system to
262:42 allowing the operating system to directly communicate with understand and
262:44 directly communicate with understand and utilize the features and functions of
262:46 utilize the features and functions of the attached Hardware
262:49 the attached Hardware device with a driver in place the next
262:52 device with a driver in place the next step is to keep your driver up to date
262:55 step is to keep your driver up to date updating drivers is crucial to ensure
262:57 updating drivers is crucial to ensure Optimal Performance security and
262:59 Optimal Performance security and compatibility with evolving hardware and
263:01 compatibility with evolving hardware and software as technology advances
263:04 software as technology advances manufacturers release driver updates
263:06 manufacturers release driver updates that address potential bugs improve
263:08 that address potential bugs improve device functionality and enhance overall
263:11 device functionality and enhance overall system stability these updates can
263:13 system stability these updates can unlock new features boost performance
263:16 unlock new features boost performance and resolve vulnerabilities that could
263:17 and resolve vulnerabilities that could be exploited by malicious actors by
263:20 be exploited by malicious actors by regularly updating drivers users can
263:23 regularly updating drivers users can harness the full potential of their
263:24 harness the full potential of their Hardware experience fewer compatibility
263:27 Hardware experience fewer compatibility issues and Safeguard their systems
263:29 issues and Safeguard their systems against potential security threats it
263:31 against potential security threats it also ensures that the hardware can
263:33 also ensures that the hardware can seamlessly integrate with the latest
263:35 seamlessly integrate with the latest operating systems and applications
263:37 operating systems and applications providing a smoother and more enjoyable
263:39 providing a smoother and more enjoyable Computing
263:41 Computing experience but performing these updates
263:43 experience but performing these updates does not always go to plan in the event
263:46 does not always go to plan in the event that something goes wrong after updating
263:47 that something goes wrong after updating a driver the option to perform a roll
263:50 a driver the option to perform a roll back is a valuable safety
263:52 back is a valuable safety mechanism sometimes an updated driver
263:54 mechanism sometimes an updated driver may inadvertently introduce problems or
263:56 may inadvertently introduce problems or conflicts with specific Hardware
263:58 conflicts with specific Hardware configurations or software setups if
264:01 configurations or software setups if these issues cause performance
264:02 these issues cause performance degradation or malfunctions users can
264:05 degradation or malfunctions users can revert to the previous driver version
264:06 revert to the previous driver version through a roll back process by doing so
264:10 through a roll back process by doing so the system can return to a stable state
264:12 the system can return to a stable state where the Hardware was functioning
264:13 where the Hardware was functioning correctly before the update this ability
264:16 correctly before the update this ability to roll back a driver provides an
264:17 to roll back a driver provides an important undue function giving users
264:20 important undue function giving users confidence to experiment with new
264:21 confidence to experiment with new updates while maintaining a safety net
264:23 updates while maintaining a safety net to recover quickly in case of any
264:25 to recover quickly in case of any adverse
264:26 adverse effects exam objective 3.2 compare and
264:30 effects exam objective 3.2 compare and contrast components of an operating
264:32 contrast components of an operating system
264:34 system utilities operating system utilities are
264:37 utilities operating system utilities are a set of essential tools and programs
264:39 a set of essential tools and programs built into an operating system to help
264:41 built into an operating system to help users manage maintain and optimize their
264:44 users manage maintain and optimize their computers these utilities perform
264:46 computers these utilities perform various tasks such as file management
264:49 various tasks such as file management system maintenance security and
264:52 system maintenance security and more operating system utilities are like
264:54 more operating system utilities are like a toolbox for your computer just like a
264:57 a toolbox for your computer just like a toolbox contains a range of tools that
264:59 toolbox contains a range of tools that help you fix build and organize things
265:02 help you fix build and organize things operating system utilities provide the
265:04 operating system utilities provide the necessary tools to manage and maintain
265:06 necessary tools to manage and maintain your computer
265:09 your computer efficiently one of my favorite operating
265:11 efficiently one of my favorite operating system utilities these is Task scheduler
265:14 system utilities these is Task scheduler task scheduler is a built-in utility in
265:16 task scheduler is a built-in utility in Windows that allows users to automate
265:18 Windows that allows users to automate and schedule tasks to run at specified
265:20 and schedule tasks to run at specified times or in response to certain events
265:23 times or in response to certain events it provides a way to execute programs
265:26 it provides a way to execute programs scripts or commands automatically
265:28 scripts or commands automatically without user
265:29 without user intervention task Schuler enables users
265:32 intervention task Schuler enables users to set up tasks to run at specific
265:34 to set up tasks to run at specific intervals or on specific dates and times
265:37 intervals or on specific dates and times this automation is useful for repetitive
265:39 this automation is useful for repetitive tasks such as system maintenance backups
265:42 tasks such as system maintenance backups and software
265:43 and software updates tasks can also be triggered
265:46 updates tasks can also be triggered based on specific events such as when
265:48 based on specific events such as when the computer starts up when a user logs
265:50 the computer starts up when a user logs in or when a certain event occurs in the
265:53 in or when a certain event occurs in the system but the real beauty lies in the
265:55 system but the real beauty lies in the fact that tasks created in task
265:57 fact that tasks created in task scheduler are centrally managed by the
265:59 scheduler are centrally managed by the Windows operating system users can
266:02 Windows operating system users can review the history of task executions
266:04 review the history of task executions monitor task status and make adjustments
266:06 monitor task status and make adjustments to task settings as needed if you think
266:09 to task settings as needed if you think the task scheduler utility is cool just
266:11 the task scheduler utility is cool just wait
266:12 wait the CompTIA A+ Core 2 exam is chalk full
266:15 the CompTIA A+ Core 2 exam is chalk full of Windows utilities to learn about exam
266:19 of Windows utilities to learn about exam objective 3.2 compare and contrast
266:21 objective 3.2 compare and contrast components of an operating
266:23 components of an operating system
266:26 system interfaces in this video we will explore
266:28 interfaces in this video we will explore the two primary interfaces used to
266:30 the two primary interfaces used to interact with computers the command line
266:32 interact with computers the command line interface or CLI and the graphical user
266:35 interface or CLI and the graphical user interface or guy let's begin with the
266:38 interface or guy let's begin with the command line interface the command line
266:41 command line interface the command line interface or or CLI is a text-based
266:43 interface or or CLI is a text-based interface used to interact with a
266:45 interface used to interact with a computer or operating system you can
266:48 computer or operating system you can imagine it as a direct text based way to
266:50 imagine it as a direct text based way to communicate with your computer just like
266:53 communicate with your computer just like having a conversation with someone using
266:55 having a conversation with someone using written
266:57 written language by typing commands into the CLI
267:00 language by typing commands into the CLI users can execute various tasks such as
267:03 users can execute various tasks such as navigating the file system launching
267:05 navigating the file system launching applications managing files and
267:08 applications managing files and configuring system settings by entering
267:10 configuring system settings by entering specific commands and receiving text
267:12 specific commands and receiving text based responses CLI provides a powerful
267:15 based responses CLI provides a powerful and efficient way to control a computer
267:18 and efficient way to control a computer especially for advanced users and system
267:21 especially for advanced users and system administrators now our second interface
267:24 administrators now our second interface type is a graphical user interface a
267:27 type is a graphical user interface a graphical user interface or GUI is a
267:29 graphical user interface or GUI is a visual interface that allows users to
267:31 visual interface that allows users to interact with a computer or software
267:33 interact with a computer or software application through graphical elements
267:36 application through graphical elements such as icons buttons and
267:39 such as icons buttons and windows in a GUI users can perform Tas
267:42 windows in a GUI users can perform Tas tasks by clicking on these graphical
267:43 tasks by clicking on these graphical elements using a mouse or touchpad
267:46 elements using a mouse or touchpad making it more intuitive and user
267:47 making it more intuitive and user friendly especially for those who are
267:49 friendly especially for those who are not familiar with text based commands in
267:51 not familiar with text based commands in the command line interface CLI guis are
267:55 the command line interface CLI guis are commonly used in modern operating
267:56 commonly used in modern operating systems and applications to provide a
267:58 systems and applications to provide a visually appealing and interactive way
268:00 visually appealing and interactive way for users to navigate manage files and
268:03 for users to navigate manage files and perform various tasks with
268:05 perform various tasks with ease one last note in some situations
268:09 ease one last note in some situations the guy might not be accessible may not
268:11 the guy might not be accessible may not have the the necessary tools you need or
268:13 have the the necessary tools you need or may not be available at all but the CLI
268:16 may not be available at all but the CLI will always be there to help control
268:17 will always be there to help control your computer
268:19 your computer efficiently exam objective 3.3 explain
268:22 efficiently exam objective 3.3 explain the purpose and proper use of
268:24 the purpose and proper use of software productivity
268:27 software productivity software productivity software refers to
268:30 software productivity software refers to software applications that assist users
268:32 software applications that assist users in performing various work-related
268:34 in performing various work-related activities and tasks it empowers users
268:37 activities and tasks it empowers users to create manage and manipulate digital
268:39 to create manage and manipulate digital content saving time and effort while
268:41 content saving time and effort while impr proving
268:43 impr proving productivity some types of productivity
268:45 productivity some types of productivity software include Word Processing
268:48 software include Word Processing software spreadsheet software
268:52 software spreadsheet software presentation
268:53 presentation software web
268:55 software web browsers and visual diagramming
268:58 browsers and visual diagramming software now let's examine each one of
269:00 software now let's examine each one of these software types one at a
269:04 these software types one at a time first we will look into word
269:06 time first we will look into word processing software which allows you to
269:08 processing software which allows you to create edit format and print text
269:10 create edit format and print text documents it's like a digital typewriter
269:13 documents it's like a digital typewriter with a whole lot of powerful
269:15 with a whole lot of powerful features three popular examples of
269:18 features three popular examples of wordprocessing software would include
269:20 wordprocessing software would include Microsoft Word Libra office and Google
269:29 docs next we will examine spreadsheet software which allows users to organize
269:32 software which allows users to organize manipulate and analyze numerical data in
269:34 manipulate and analyze numerical data in a tabular format it consists of rows and
269:38 a tabular format it consists of rows and columns where data can be entered
269:40 columns where data can be entered calculated and displayed in an order
269:42 calculated and displayed in an order organized manner spreadsheet software is
269:44 organized manner spreadsheet software is commonly used for tasks such as
269:46 commonly used for tasks such as performing calculations and compiling
269:49 performing calculations and compiling data three popular examples of
269:51 data three popular examples of spreadsheet software would include
269:54 spreadsheet software would include Microsoft Excel Libra Cal and Google
270:03 Sheets now we have presentation software which allows users to combine text
270:05 which allows users to combine text images videos and other multimedia
270:08 images videos and other multimedia elements to create visual slideshows or
270:10 elements to create visual slideshows or presentations
270:12 presentations these slideshows or presentations are
270:14 these slideshows or presentations are commonly used for educational
270:15 commonly used for educational informative or persuasive purposes in
270:18 informative or persuasive purposes in business academic or personal settings
270:21 business academic or personal settings presentation software provides tools to
270:24 presentation software provides tools to design and organize slides add
270:26 design and organize slides add animations or Transitions and share
270:28 animations or Transitions and share engaging and dynamic presentations to an
270:31 engaging and dynamic presentations to an audience three popular examples of
270:34 audience three popular examples of presentation software would include
270:36 presentation software would include Microsoft PowerPoint Libra impress and
270:41 Microsoft PowerPoint Libra impress and Google Slides
270:47 moving on we have web browsers a web browser allows users to access and view
270:50 browser allows users to access and view content on the worldwide web it serves
270:52 content on the worldwide web it serves as a gateway to the internet enabling
270:54 as a gateway to the internet enabling users to navigate websites search for
270:57 users to navigate websites search for information and interact with various
270:59 information and interact with various online resources and cloud-based
271:02 online resources and cloud-based applications three popular examples of a
271:04 applications three popular examples of a web browser would include Milla
271:08 web browser would include Milla Firefox Google Chrome and Microsoft
271:13 Firefox Google Chrome and Microsoft Edge and the last productivity software
271:16 Edge and the last productivity software type we will cover is visual diagramming
271:18 type we will cover is visual diagramming software visual diagramming software
271:21 software visual diagramming software allows users to create visual
271:23 allows users to create visual representations of information Concepts
271:25 representations of information Concepts processes or
271:27 processes or relationships and this is accomplished
271:29 relationships and this is accomplished using images diagrams flowcharts text
271:33 using images diagrams flowcharts text numbers and other graphical elements it
271:36 numbers and other graphical elements it provides a user-friendly interface with
271:38 provides a user-friendly interface with various tools and shapes that users can
271:40 various tools and shapes that users can use to design and connect elements to
271:42 use to design and connect elements to illustrate complex ideas visually visual
271:46 illustrate complex ideas visually visual diagramming software is commonly used
271:48 diagramming software is commonly used for planning brainstorming problem
271:50 for planning brainstorming problem solving and communicating ideas in a
271:52 solving and communicating ideas in a clear and structured manner three
271:55 clear and structured manner three popular examples of visual diagramming
271:57 popular examples of visual diagramming software would include Microsoft Vio
272:01 software would include Microsoft Vio draw IO and Lucid
272:04 draw IO and Lucid chart exam objective 3.3 explain the
272:08 chart exam objective 3.3 explain the purpose and proper use of
272:10 purpose and proper use of software collaboration ation
272:13 software collaboration ation software collaboration software is a
272:15 software collaboration software is a category of software applications
272:17 category of software applications designed to enhance communication among
272:19 designed to enhance communication among individuals working on shared files or
272:22 individuals working on shared files or projects regardless of their physical
272:24 projects regardless of their physical locations it enables users to
272:26 locations it enables users to collaborate in real- time share
272:28 collaborate in real- time share resources and streamline
272:30 resources and streamline workflows some types of collaboration
272:33 workflows some types of collaboration software include email
272:36 software include email clients conferencing software instant
272:39 clients conferencing software instant messaging software on online
272:42 messaging software on online workspaces and document sharing software
272:46 workspaces and document sharing software now let's examine each one of these
272:48 now let's examine each one of these collaboration software types one at a
272:52 collaboration software types one at a time first we will look into email
272:54 time first we will look into email clients which allows users to access
272:57 clients which allows users to access send receive and manage email messages
272:59 send receive and manage email messages from their email accounts additionally
273:02 from their email accounts additionally it may feature built-in calendar
273:04 it may feature built-in calendar functions that enable users to create
273:06 functions that enable users to create manage and schedule events appointments
273:09 manage and schedule events appointments and
273:09 and meetings three popular examples of email
273:12 meetings three popular examples of email client software would include Microsoft
273:16 client software would include Microsoft Outlook Google Gmail and Apple
273:21 Outlook Google Gmail and Apple Mail next we will examine conferencing
273:24 Mail next we will examine conferencing software which enables real-time
273:25 software which enables real-time communication between multiple
273:27 communication between multiple participants through video and audio
273:29 participants through video and audio calls it allows users to conduct virtual
273:32 calls it allows users to conduct virtual meetings video conferences webinars and
273:35 meetings video conferences webinars and screen sharing sessions fostering
273:37 screen sharing sessions fostering effective communication and teamwork
273:39 effective communication and teamwork among remote individuals or teams
273:42 among remote individuals or teams conferencing software plays a crucial
273:44 conferencing software plays a crucial role in modern work environments
273:45 role in modern work environments facilitating seamless interactions idea
273:48 facilitating seamless interactions idea sharing and decision- making without the
273:50 sharing and decision- making without the need for everyone to be physically
273:51 need for everyone to be physically present in the same
273:53 present in the same location three popular examples of
273:56 location three popular examples of conferencing software would include Zoom
274:00 conferencing software would include Zoom Google meet and
274:03 Google meet and Skype now we have instant messaging
274:06 Skype now we have instant messaging software which enables real-time
274:07 software which enables real-time text-based communication between
274:09 text-based communication between individuals or groups it allows users to
274:12 individuals or groups it allows users to send and receive text-based messages and
274:15 send and receive text-based messages and file attachments instantly fostering
274:17 file attachments instantly fostering quick and efficient communication among
274:19 quick and efficient communication among users regardless of their geographical
274:22 users regardless of their geographical locations three popular examples of
274:24 locations three popular examples of presentation software would include
274:28 presentation software would include slack WhatsApp and
274:33 slack WhatsApp and Discord moving on we have online
274:36 Discord moving on we have online workspaces online workspace software
274:38 workspaces online workspace software provides a virtual environment where
274:40 provides a virtual environment where team members can collabor on projects
274:42 team members can collabor on projects and organize resources online workspaces
274:45 and organize resources online workspaces are designed to enhance remote
274:47 are designed to enhance remote collaboration making it easier for team
274:49 collaboration making it easier for team members to access and work on shared
274:51 members to access and work on shared materials from anywhere a popular
274:54 materials from anywhere a popular example of online workspace software
274:56 example of online workspace software would be Microsoft
274:59 would be Microsoft SharePoint and the last collaboration
275:02 SharePoint and the last collaboration software type we will cover is document
275:04 software type we will cover is document sharing software document sharing
275:07 sharing software document sharing software allows users to share access
275:09 software allows users to share access and collaborate on digital documents
275:11 and collaborate on digital documents with others over the Internet it enables
275:14 with others over the Internet it enables individuals to upload store and
275:16 individuals to upload store and distribute various types of files such
275:18 distribute various types of files such as text documents spreadsheets
275:21 as text documents spreadsheets presentations and multimedia files
275:24 presentations and multimedia files document sharing software promotes
275:26 document sharing software promotes efficient collaboration by providing
275:28 efficient collaboration by providing secure and easy access to Shared
275:29 secure and easy access to Shared documents allowing multiple users to
275:32 documents allowing multiple users to view edit and comment on the same files
275:35 view edit and comment on the same files simultaneously three popular examples of
275:38 simultaneously three popular examples of document sharing software would include
275:41 document sharing software would include Microsoft one drive Google Drive and
275:46 Microsoft one drive Google Drive and Dropbox before closing out this video it
275:48 Dropbox before closing out this video it is important to note that not all
275:50 is important to note that not all collaboration software will fit into a
275:52 collaboration software will fit into a single category Let me Give an example
275:55 single category Let me Give an example to explain what I mean Zoom May function
275:57 to explain what I mean Zoom May function primarily as conferencing software but
276:00 primarily as conferencing software but also has built an instant messaging
276:01 also has built an instant messaging capabilities to improve the user's
276:04 capabilities to improve the user's experience another example is how online
276:07 experience another example is how online workspace software will typically offer
276:09 workspace software will typically offer a range of features designed to enhance
276:10 a range of features designed to enhance collaboration including document sharing
276:14 collaboration including document sharing just keep this in mind come exam
276:16 just keep this in mind come exam time exam objective 3.3 explain the
276:20 time exam objective 3.3 explain the purpose and proper use of
276:22 purpose and proper use of software business
276:25 software business software business software refers to
276:27 software business software refers to software applications that are
276:29 software applications that are specifically designed to assist with
276:31 specifically designed to assist with various business processes and tasks
276:34 various business processes and tasks business software helps organizations
276:36 business software helps organizations streamline operations improve efficiency
276:38 streamline operations improve efficiency and make informed Decisions by managing
276:41 and make informed Decisions by managing and process processing data
276:42 and process processing data effectively some types of business
276:44 effectively some types of business software include database software
276:49 software include database software project management software business
276:51 project management software business specific
276:53 specific applications and accounting
276:55 applications and accounting software now let's examine each one of
276:58 software now let's examine each one of these business software types one at a
277:01 these business software types one at a time first we will look into database
277:04 time first we will look into database software which allows users to store
277:06 software which allows users to store organize manage and retrieve structured
277:09 organize manage and retrieve structured data efficiently it provides provides a
277:11 data efficiently it provides provides a structured framework for collecting and
277:13 structured framework for collecting and storing information making it easily
277:15 storing information making it easily accessible and searchable database
277:18 accessible and searchable database software is commonly used in businesses
277:20 software is commonly used in businesses and various Industries to store large
277:22 and various Industries to store large volumes of data such as customer records
277:25 volumes of data such as customer records sales records and inventory records
277:28 sales records and inventory records additionally database software is
277:30 additionally database software is designed to allow these records to be
277:32 designed to allow these records to be edited by multiple people at the same
277:34 edited by multiple people at the same time three popular examples of database
277:37 time three popular examples of database software would include my SQL micro roft
277:42 software would include my SQL micro roft SQL and Maria
277:45 SQL and Maria DB next we will examine project
277:48 DB next we will examine project management software which enables teams
277:50 management software which enables teams to plan execute track and collaborate on
277:54 to plan execute track and collaborate on projects it provides a centralized
277:56 projects it provides a centralized platform for managing tasks timelines
277:59 platform for managing tasks timelines resources and communication related to a
278:02 resources and communication related to a project project management software is
278:04 project project management software is designed to increase efficiency
278:06 designed to increase efficiency productivity and organization by
278:08 productivity and organization by facilitating effective coordination and
278:10 facilitating effective coordination and monitoring of project progress from
278:12 monitoring of project progress from start to
278:13 start to completion three popular examples of
278:16 completion three popular examples of project management software would
278:18 project management software would include Microsoft Project as and
278:25 include Microsoft Project as and Trello now let's talk about business
278:27 Trello now let's talk about business specific
278:28 specific applications these are specialized
278:30 applications these are specialized software applications tailored to meet
278:32 software applications tailored to meet the unique needs and requirements of
278:34 the unique needs and requirements of specific businesses or Industries unlike
278:37 specific businesses or Industries unlike generic software business specific
278:39 generic software business specific applications are designed to address
278:41 applications are designed to address industry specific challenges and
278:43 industry specific challenges and processes providing targeted Solutions
278:45 processes providing targeted Solutions and
278:46 and functionalities these applications aim
278:48 functionalities these applications aim to enhance efficiency productivity and
278:51 to enhance efficiency productivity and decision-making within a particular
278:53 decision-making within a particular business domain by focusing on the
278:54 business domain by focusing on the specific tasks and workflows relevant to
278:57 specific tasks and workflows relevant to that
278:59 that industry and the last business software
279:01 industry and the last business software type we will cover is accounting
279:03 type we will cover is accounting software accounting software enables
279:06 software accounting software enables businesses and individuals to manage
279:08 businesses and individuals to manage their financial transactions record
279:10 their financial transactions record income and expenses generate invoices
279:12 income and expenses generate invoices track expenses and create a general
279:15 track expenses and create a general ledger it automates various accounting
279:17 ledger it automates various accounting processes such as bookkeeping payroll
279:20 processes such as bookkeeping payroll and tax calculations making it easier to
279:23 and tax calculations making it easier to track and analyze financial data
279:25 track and analyze financial data accounting software helps businesses
279:27 accounting software helps businesses maintain accurate Financial records
279:29 maintain accurate Financial records streamline Financial operations and
279:31 streamline Financial operations and ensure compliance with financial
279:33 ensure compliance with financial regulations and Reporting
279:35 regulations and Reporting requirements three popular examples of
279:38 requirements three popular examples of accounting software would include
279:40 accounting software would include QuickBooks
279:42 QuickBooks sage and
279:44 sage and wave with the topic of business software
279:47 wave with the topic of business software behind us we have successfully covered
279:49 behind us we have successfully covered exam objective
279:51 exam objective 3.3 hopefully you now have a good idea
279:53 3.3 hopefully you now have a good idea of all the available types of software
279:55 of all the available types of software out there and how they can be used great
279:58 out there and how they can be used great job exam objective 3.4 explain methods
280:02 job exam objective 3.4 explain methods of application architecture and delivery
280:05 of application architecture and delivery models application
280:08 models application architectures in the world of it
280:10 architectures in the world of it application architect ures are like the
280:12 application architect ures are like the blueprints that Architects use to design
280:14 blueprints that Architects use to design buildings just as Architects plan the
280:16 buildings just as Architects plan the structure of a building to ensure
280:18 structure of a building to ensure functionality it professionals design
280:20 functionality it professionals design application architectures to create
280:22 application architectures to create efficient and Reliable Software
280:24 efficient and Reliable Software systems in this video we will cover
280:27 systems in this video we will cover three basic software layers that serve
280:29 three basic software layers that serve as the foundation for most application
280:32 as the foundation for most application architectures these layers are the
280:35 architectures these layers are the presentation layer the application layer
280:39 presentation layer the application layer and the data layer
280:41 and the data layer the presentation layer also known as the
280:44 the presentation layer also known as the front-end or user interface is the part
280:46 front-end or user interface is the part of an application that interacts
280:48 of an application that interacts directly with users its primary purpose
280:51 directly with users its primary purpose is to present information and provide a
280:53 is to present information and provide a userfriendly
280:54 userfriendly interface this layer handles the visual
280:56 interface this layer handles the visual elements such as Graphics menus buttons
281:00 elements such as Graphics menus buttons and forms that users see on their
281:02 and forms that users see on their screens it also facilitates user input
281:05 screens it also facilitates user input capturing data and transmitting it to
281:07 capturing data and transmitting it to the application layer for processing in
281:10 the application layer for processing in essence the presentation layer acts as
281:12 essence the presentation layer acts as the bridge between the user and the
281:15 the bridge between the user and the application next there is the
281:17 application next there is the application layer the application layer
281:20 application layer the application layer also referred to as the middleware or
281:22 also referred to as the middleware or business logic layer is the core
281:24 business logic layer is the core functional component of an application
281:27 functional component of an application it processes and manages user requests
281:29 it processes and manages user requests received from the presentation layer and
281:31 received from the presentation layer and performs the necessary computations and
281:33 performs the necessary computations and data manipulations to fulfill those
281:36 data manipulations to fulfill those requests this layer contains the
281:38 requests this layer contains the business logic algorithms and rules that
281:40 business logic algorithms and rules that Define how the application functions and
281:43 Define how the application functions and processes data it acts as an
281:45 processes data it acts as an intermediary between the presentation
281:47 intermediary between the presentation layer and our next layer the data layer
281:50 layer and our next layer the data layer as for that data layer we usually refer
281:52 as for that data layer we usually refer to it as the backend or data access
281:54 to it as the backend or data access layer and it is responsible for storing
281:56 layer and it is responsible for storing retrieving and managing the
281:58 retrieving and managing the application's data it deals with
282:00 application's data it deals with databases or other data storage
282:02 databases or other data storage mechanisms where information is
282:04 mechanisms where information is persistently stored when the application
282:06 persistently stored when the application requires data the data layer retrieves
282:09 requires data the data layer retrieves and sends it to the application layer
282:10 and sends it to the application layer for processing similarly when data needs
282:13 for processing similarly when data needs to be saved or updated the data layer
282:16 to be saved or updated the data layer handles the storage process in the next
282:19 handles the storage process in the next video we will see how these application
282:21 video we will see how these application architecture layers are deployed within
282:23 architecture layers are deployed within varying architecture models exam
282:26 varying architecture models exam objective 3.4 explain methods of
282:28 objective 3.4 explain methods of application architecture and delivery
282:31 application architecture and delivery models architecture
282:33 models architecture models to keep in line with comptus ITF
282:37 models to keep in line with comptus ITF plus exam objective 3.4 this video will
282:40 plus exam objective 3.4 this video will cover the one tier two-tier three tier
282:42 cover the one tier two-tier three tier and ntier application architecture
282:45 and ntier application architecture models now let's start with the simplest
282:47 models now let's start with the simplest model the one-tier architecture and see
282:50 model the one-tier architecture and see how the application architecture layers
282:52 how the application architecture layers we learned about in the previous video
282:53 we learned about in the previous video are
282:55 are organized in a one-tier architecture
282:57 organized in a one-tier architecture also known as a monolithic architecture
283:00 also known as a monolithic architecture all the components of an application
283:02 all the components of an application reside on a single machine or system
283:04 reside on a single machine or system there is no separation of the
283:06 there is no separation of the presentation layer application layer and
283:08 presentation layer application layer and data layer instead they are all all
283:11 data layer instead they are all all tightly integrated into one unit to
283:13 tightly integrated into one unit to better understand the one tier
283:15 better understand the one tier architecture let's imagine a computer
283:17 architecture let's imagine a computer game that runs entirely on your personal
283:19 game that runs entirely on your personal computer or
283:20 computer or workstation in this scenario your
283:23 workstation in this scenario your computer becomes the complete
283:24 computer becomes the complete application ecosystem the games Graphics
283:27 application ecosystem the games Graphics sounds user interface logic and data
283:30 sounds user interface logic and data storage are all bundled together and
283:32 storage are all bundled together and operate within your computer's
283:34 operate within your computer's resources while this approach is
283:36 resources while this approach is suitable for simple and Standalone games
283:39 suitable for simple and Standalone games it may encounter challenges when dealing
283:41 it may encounter challenges when dealing with more complex and larger scale
283:43 with more complex and larger scale applications for more extensive
283:45 applications for more extensive applications modern software design
283:47 applications modern software design emphasizes breaking down the different
283:49 emphasizes breaking down the different layers into separate modules allowing
283:51 layers into separate modules allowing for better scalability maintainability
283:53 for better scalability maintainability and flexibility to achieve these
283:56 and flexibility to achieve these benefits multi-tiered architecture
283:58 benefits multi-tiered architecture models should be
284:01 models should be used so let's try breaking down our
284:03 used so let's try breaking down our one-tier architecture into a two-tier
284:06 one-tier architecture into a two-tier architecture here the components of an
284:08 architecture here the components of an application will be divided into two
284:10 application will be divided into two main parts
284:12 main parts the client and the server in this
284:14 the client and the server in this two-tier architecture model the
284:16 two-tier architecture model the presentation layer will be handled by
284:18 presentation layer will be handled by the client side of the application as
284:21 the client side of the application as for the application layer and the data
284:23 for the application layer and the data layer they will be handled by the server
284:25 layer they will be handled by the server side of the
284:26 side of the application and what do you know I have
284:28 application and what do you know I have another analogy for you for this
284:30 another analogy for you for this two-tier architecture scenario picture a
284:33 two-tier architecture scenario picture a fast food restaurant with a cashier at
284:35 fast food restaurant with a cashier at the counter and a kitchen in the back
284:37 the counter and a kitchen in the back the cashier takes your order and
284:39 the cashier takes your order and communicates directly with the kitchen
284:41 communicates directly with the kitchen to prepare your food this parallels our
284:43 to prepare your food this parallels our two-tier architecture the client
284:45 two-tier architecture the client handling the presentation layer is our
284:47 handling the presentation layer is our cashier and the server handling our
284:49 cashier and the server handling our application layer and data layer is our
284:52 application layer and data layer is our kitchen while this model is an
284:54 kitchen while this model is an improvement over the one tier
284:55 improvement over the one tier architecture it can still become
284:57 architecture it can still become challenging to maintain as the
284:58 challenging to maintain as the application
285:01 application grows so let's keep going and break down
285:03 grows so let's keep going and break down our two-tier architecture into a three-
285:05 our two-tier architecture into a three- tier architecture in a three-tier
285:08 tier architecture in a three-tier architecture all three application
285:10 architecture all three application architecture lay ERS are broken into
285:12 architecture lay ERS are broken into separate
285:13 separate components again we will have a client
285:16 components again we will have a client and a server but the data layer will now
285:18 and a server but the data layer will now be handled by a distinct database
285:20 be handled by a distinct database component in this three- tier
285:22 component in this three- tier architecture model the presentation
285:24 architecture model the presentation layer will be handled by the client the
285:26 layer will be handled by the client the application layer will be handled by the
285:28 application layer will be handled by the application server and the data layer
285:30 application server and the data layer will be handled by a separate database
285:32 will be handled by a separate database server this model allows for better
285:35 server this model allows for better scalability as each layer can be managed
285:37 scalability as each layer can be managed separately making it easier to add or
285:39 separately making it easier to add or modify components with without affecting
285:41 modify components with without affecting the
285:43 the others lastly we have the antier
285:46 others lastly we have the antier architecture in the antier architecture
285:49 architecture in the antier architecture the N is meant to represent any number
285:50 the N is meant to represent any number of tiers imagine a large corporation
285:53 of tiers imagine a large corporation with several departments each department
285:56 with several departments each department has its specific tasks and they
285:58 has its specific tasks and they collaborate when needed in an end tier
286:01 collaborate when needed in an end tier architecture we have multiple layers
286:03 architecture we have multiple layers each with a specific role and
286:05 each with a specific role and responsibility these tiers can range
286:07 responsibility these tiers can range from three to many depending on the
286:09 from three to many depending on the complexity of the application
286:12 complexity of the application this model provides the highest level of
286:14 this model provides the highest level of flexibility making it ideal for complex
286:17 flexibility making it ideal for complex applications so to summarize application
286:20 applications so to summarize application architecture models are like building
286:22 architecture models are like building your application with Lego blocks you
286:24 your application with Lego blocks you can start simple with a one tier add
286:26 can start simple with a one tier add more features with two tiers get even
286:28 more features with two tiers get even fancier with three tiers or go full on
286:30 fancier with three tiers or go full on architect mode within
286:32 architect mode within tiers exam objective 3.4 explain methods
286:36 tiers exam objective 3.4 explain methods of application architecture and delivery
286:39 of application architecture and delivery models application delivery
286:42 models application delivery methods application delivery methods
286:44 methods application delivery methods Define how software applications are
286:46 Define how software applications are accessed and made available to users in
286:49 accessed and made available to users in this video I will cover three popular
286:51 this video I will cover three popular methods of accessing and using software
286:58 applications our first application delivery method will be locally
287:00 delivery method will be locally installed this is a perfect method to
287:02 installed this is a perfect method to use with Standalone or one tier
287:04 use with Standalone or one tier applications for this type of
287:06 applications for this type of application delivery method the
287:08 application delivery method the application files and data are stored
287:10 application files and data are stored directly on your local computers hard
287:11 directly on your local computers hard drive when you use the application it
287:14 drive when you use the application it fetches and processes the data from your
287:16 fetches and processes the data from your device there is no specific Network
287:19 device there is no specific Network requirement for running locally
287:20 requirement for running locally installed
287:21 installed applications once the application is
287:24 applications once the application is installed you can also use it offline
287:26 installed you can also use it offline without a need for an internet
287:29 without a need for an internet connection our next method is local
287:31 connection our next method is local network hosted
287:33 network hosted applications with this delivery method
287:35 applications with this delivery method the application and any Associated data
287:38 the application and any Associated data files will be stored on a server or
287:39 files will be stored on a server or multiple servers within a local area
287:41 multiple servers within a local area network or Lan the application server
287:44 network or Lan the application server can then be accessed by clients on the
287:46 can then be accessed by clients on the same Lan this type of delivery method
287:49 same Lan this type of delivery method does require a local area network to
287:51 does require a local area network to function but does not require an
287:53 function but does not require an internet
287:55 internet connection our last application delivery
287:57 connection our last application delivery method will be cloud-hosted
287:59 method will be cloud-hosted applications this method is becoming
288:02 applications this method is becoming increasingly popular as it allows access
288:04 increasingly popular as it allows access to applications and data over the
288:06 to applications and data over the internet from anywhere with this method
288:08 internet from anywhere with this method the application files and data will be
288:11 the application files and data will be stored on a off premises remote server
288:14 stored on a off premises remote server accessible across an internet connection
288:16 accessible across an internet connection or as we have come to refer to it in the
288:18 or as we have come to refer to it in the cloud while it does sound great to be
288:20 cloud while it does sound great to be able to access an application from
288:22 able to access an application from anywhere being dependent on an internet
288:24 anywhere being dependent on an internet connection does have its
288:25 connection does have its downsides no internet no app so which
288:29 downsides no internet no app so which application delivery method do you
288:31 application delivery method do you prefer and why feel free to share your
288:34 prefer and why feel free to share your thoughts in the
288:35 thoughts in the comments exam objective 3.4 explain
288:38 comments exam objective 3.4 explain methods of application architecture and
288:40 methods of application architecture and delivery
288:41 delivery models internet intranet and
288:45 models internet intranet and Extranet now that we have finished up
288:47 Extranet now that we have finished up our study of application architectures
288:49 our study of application architectures and delivery models it is a perfect time
288:52 and delivery models it is a perfect time for a bit of bonus teaching in this
288:54 for a bit of bonus teaching in this video I will be adding three new terms
288:56 video I will be adding three new terms to your it vocabulary starting with
288:59 to your it vocabulary starting with internet okay so you may know this one
289:01 internet okay so you may know this one but let me Define It Anyways the
289:04 but let me Define It Anyways the internet is a Global Network of
289:05 internet is a Global Network of interconnected computers and devices
289:07 interconnected computers and devices that allows people to communicate share
289:09 that allows people to communicate share information and and access a wide range
289:11 information and and access a wide range of online resources such as websites and
289:14 of online resources such as websites and services it enables data to be
289:16 services it enables data to be transmitted across the world
289:18 transmitted across the world facilitating seamless communication and
289:20 facilitating seamless communication and access to
289:21 access to information this is super cool but what
289:24 information this is super cool but what if we don't want to share with the whole
289:26 if we don't want to share with the whole world do we have any other options of
289:29 world do we have any other options of course we
289:30 course we do and that option is called an internet
289:34 do and that option is called an internet an internet is a private Network that
289:36 an internet is a private Network that exists within an organization such as a
289:38 exists within an organization such as a company or institution it allows
289:41 company or institution it allows authorized members of an organization to
289:43 authorized members of an organization to communicate collaborate and share
289:45 communicate collaborate and share information securely no matter where
289:47 information securely no matter where they are located unlike the public
289:49 they are located unlike the public internet internets are restricted to
289:51 internet internets are restricted to only those within the organization and
289:53 only those within the organization and are used for internal purposes great we
289:56 are used for internal purposes great we have a fully public option an internet
289:58 have a fully public option an internet and a private option an internet for
290:00 and a private option an internet for sharing websites and other resources but
290:03 sharing websites and other resources but do we have something in between yes we
290:06 do we have something in between yes we have a little something for
290:08 have a little something for everyone and that will bring us to our
290:10 everyone and that will bring us to our last term for this video externet an
290:13 last term for this video externet an externet is an extension of an Internet
290:15 externet is an extension of an Internet that allows specific external parties
290:17 that allows specific external parties such as partners suppliers or customers
290:20 such as partners suppliers or customers to access certain parts of the
290:21 to access certain parts of the organization's internal Network it
290:24 organization's internal Network it provides a secure and controlled way for
290:26 provides a secure and controlled way for external entities to collaborate and
290:28 external entities to collaborate and share information with the organization
290:30 share information with the organization while keeping sensitive data separate
290:31 while keeping sensitive data separate from the public
290:33 from the public internet I hope this bonus video helps
290:35 internet I hope this bonus video helps you to never get these three terms
290:37 you to never get these three terms confused as I am sure you will see these
290:39 confused as I am sure you will see these terms used in a certification exam or
290:41 terms used in a certification exam or two or maybe
290:43 two or maybe more exam objective 3.5 given a scenario
290:47 more exam objective 3.5 given a scenario configure and use web
290:49 configure and use web browsers web browser
290:51 browsers web browser caching we have now reached exam
290:54 caching we have now reached exam objective 3.5 which will be all about
290:56 objective 3.5 which will be all about configuring and using web browsers first
290:59 configuring and using web browsers first up for this objective we have caching
291:02 up for this objective we have caching caching is a technique used in
291:04 caching is a technique used in information technology to store copies
291:06 information technology to store copies of frequently accessed data or resources
291:09 of frequently accessed data or resources temporarily by doing so it allows for
291:12 temporarily by doing so it allows for faster access to the data reducing the
291:14 faster access to the data reducing the need to fetch it from the original
291:15 need to fetch it from the original Source every time it is requested
291:18 Source every time it is requested caching is widely used in various
291:19 caching is widely used in various systems including web browsers to
291:22 systems including web browsers to improve performance and
291:27 efficiency caching is like having a handy storage area on your browser it
291:30 handy storage area on your browser it saves copies of web pages images and
291:32 saves copies of web pages images and other resources you've visited recently
291:34 other resources you've visited recently so that if you revisit those sites your
291:36 so that if you revisit those sites your browser doesn't need to fetch everything
291:38 browser doesn't need to fetch everything from the internet again instead it
291:40 from the internet again instead it retrieves the stored resources from its
291:42 retrieves the stored resources from its cache making the process much faster and
291:45 cache making the process much faster and more efficient when you access a website
291:47 more efficient when you access a website for the first time your browser
291:49 for the first time your browser downloads all the necessary files from
291:51 downloads all the necessary files from the internet and stores them in its
291:53 the internet and stores them in its cache the next time you visit the same
291:55 cache the next time you visit the same website your browser checks its cach
291:58 website your browser checks its cach first if it finds the required files
292:00 first if it finds the required files there it loads them directly from the
292:02 there it loads them directly from the cach reducing loading times and saving
292:05 cach reducing loading times and saving bandwidth caching significantly improves
292:07 bandwidth caching significantly improves your web browsing experience especially
292:09 your web browsing experience especially when you revisit frequently access sites
292:11 when you revisit frequently access sites or navigate back and forth between
292:13 or navigate back and forth between different pages of the same
292:15 different pages of the same website while caching provides numerous
292:18 website while caching provides numerous benefits it's essential to understand
292:20 benefits it's essential to understand why cash clearing is necessary from time
292:22 why cash clearing is necessary from time to time first cached resources may
292:25 to time first cached resources may become outdated websites are continually
292:28 become outdated websites are continually updating content and if your browser
292:30 updating content and if your browser continues to use outdated resources from
292:32 continues to use outdated resources from the cache you might not see the latest
292:34 the cache you might not see the latest changes on the website second caching
292:37 changes on the website second caching can sometimes lead to privacy and
292:39 can sometimes lead to privacy and security concerns
292:41 security concerns cache data can include sensitive
292:43 cache data can include sensitive information such as login credentials or
292:45 information such as login credentials or personal details if someone gains access
292:48 personal details if someone gains access to your computer or device they could
292:50 to your computer or device they could potentially access this cache data third
292:53 potentially access this cache data third cash accumulation over time can consume
292:55 cash accumulation over time can consume significant storage space on your device
292:58 significant storage space on your device potentially slowing down your computer
292:59 potentially slowing down your computer or smartphone clearing your cache is a
293:02 or smartphone clearing your cache is a simple process that varies slightly
293:04 simple process that varies slightly depending on the web browser you use
293:07 depending on the web browser you use generally you can find the cache
293:08 generally you can find the cache clearing option in your browser settings
293:10 clearing option in your browser settings or preferences menu it is a good
293:13 or preferences menu it is a good practice to clear your cach regularly
293:15 practice to clear your cach regularly especially if you notice any of the
293:16 especially if you notice any of the problems we discussed earlier doing so
293:19 problems we discussed earlier doing so will ensure you have the most up-to-date
293:21 will ensure you have the most up-to-date content and a smoother browsing
293:23 content and a smoother browsing experience exam objective 3.5 given a
293:26 experience exam objective 3.5 given a scenario configure and use web
293:29 scenario configure and use web browsers website
293:32 browsers website scripting in this video you will be
293:34 scripting in this video you will be exposed to the magic behind scripting
293:36 exposed to the magic behind scripting for websites but before we delve into
293:38 for websites but before we delve into the technicalities let's start with with
293:40 the technicalities let's start with with a simple definition to help you
293:42 a simple definition to help you understand what scripting is all about
293:44 understand what scripting is all about scripting refers to the use of
293:46 scripting refers to the use of programming code to instruct a website
293:48 programming code to instruct a website on how to behave and interact with users
293:51 on how to behave and interact with users it enables websites to perform various
293:53 it enables websites to perform various tasks respond to user inputs and create
293:55 tasks respond to user inputs and create Dynamic and interactive elements
293:57 Dynamic and interactive elements enhancing the overall user experience
294:00 enhancing the overall user experience with the right script you can make
294:02 with the right script you can make websites come
294:04 websites come alive let's take a look at some examples
294:07 alive let's take a look at some examples of what website scripting can do a
294:10 of what website scripting can do a script can create an image Carousel that
294:12 script can create an image Carousel that Cycles through pictures adding a dynamic
294:14 Cycles through pictures adding a dynamic touch to the website a script can also
294:17 touch to the website a script can also ensure that users provide valid
294:19 ensure that users provide valid information in forms before submitting
294:21 information in forms before submitting them reducing errors and improving data
294:23 them reducing errors and improving data quality or scripting can enable websites
294:26 quality or scripting can enable websites to display customized banner ads the
294:29 to display customized banner ads the possibilities with website scripting are
294:33 possibilities with website scripting are infinite with web scripting there are
294:36 infinite with web scripting there are two primary types client side and server
294:38 two primary types client side and server side
294:40 side client side scripting occurs directly
294:42 client side scripting occurs directly within the user's web browser it allows
294:45 within the user's web browser it allows for interactive elements like the image
294:47 for interactive elements like the image carousels and form validations we
294:49 carousels and form validations we discussed earlier without relying on
294:51 discussed earlier without relying on constant communication with the
294:53 constant communication with the server on the other hand serers side
294:56 server on the other hand serers side scripting takes place on the web server
294:58 scripting takes place on the web server itself it handles tasks that require
295:01 itself it handles tasks that require data processing like database operations
295:03 data processing like database operations or user authentications and then sends
295:05 or user authentications and then sends the results to the user's
295:08 the results to the user's browser while script scripting does
295:10 browser while script scripting does improve the user's experience there are
295:12 improve the user's experience there are some security concerns especially with
295:14 some security concerns especially with client side scripting this is due to its
295:17 client side scripting this is due to its potential for abuse by malicious actors
295:19 potential for abuse by malicious actors since client side scripts are executed
295:21 since client side scripts are executed within the user's web browser one option
295:24 within the user's web browser one option to safeguard your computer is to
295:26 to safeguard your computer is to deactivate client side scripting
295:27 deactivate client side scripting altogether by adjusting your browser
295:30 altogether by adjusting your browser settings while this may enhance security
295:32 settings while this may enhance security by preventing potentially malicious
295:34 by preventing potentially malicious scripts from running deactivating it may
295:36 scripts from running deactivating it may result in a degraded user experience
295:38 result in a degraded user experience rendering certain features
295:39 rendering certain features non-functional or limiting the usability
295:41 non-functional or limiting the usability of the website another option is to use
295:44 of the website another option is to use a script blocker a script blocker also
295:47 a script blocker a script blocker also known as a script blocking extension or
295:49 known as a script blocking extension or add-on is a browser tool designed to
295:51 add-on is a browser tool designed to control the execution of client side
295:53 control the execution of client side scripts on websites it allows users to
295:56 scripts on websites it allows users to selectively enable or disable the
295:57 selectively enable or disable the running of individual scripts by
296:00 running of individual scripts by choosing a script blocker over client
296:02 choosing a script blocker over client side scripting deactivation you will
296:04 side scripting deactivation you will maintain more granular control over
296:05 maintain more granular control over script
296:07 script execution exam objective 3 5 given a
296:11 execution exam objective 3 5 given a scenario configure and use web
296:14 scenario configure and use web browsers browser
296:16 browsers browser extensions browser extensions also known
296:19 extensions browser extensions also known as add-ons or plugins are small software
296:22 as add-ons or plugins are small software programs that integrate with your web
296:24 programs that integrate with your web browser they are designed to extend the
296:26 browser they are designed to extend the functionality of the browser and provide
296:28 functionality of the browser and provide extra features for tasks like ad and
296:30 extra features for tasks like ad and script blocking language translation
296:32 script blocking language translation password management and much
296:36 password management and much more in order to add browser extensions
296:39 more in order to add browser extensions to tailor your browsing experience
296:40 to tailor your browsing experience experience you will need to open your
296:41 experience you will need to open your web browser and navigate to the
296:43 web browser and navigate to the browser's extension store or
296:45 browser's extension store or Marketplace from here you can search for
296:48 Marketplace from here you can search for the desired extension using the search
296:50 the desired extension using the search bar once you find the extension you want
296:53 bar once you find the extension you want click add and the extension will
296:54 click add and the extension will download and install automatically
296:57 download and install automatically should you wish to remove an extension
296:59 should you wish to remove an extension the process is just as
297:01 the process is just as simple now that you know how to add and
297:03 simple now that you know how to add and remove extensions let's explore how to
297:05 remove extensions let's explore how to enable and disable them based on your
297:07 enable and disable them based on your preferences just because you have an
297:09 preferences just because you have an extension installed does not mean you
297:11 extension installed does not mean you have to have it enabled all the time you
297:14 have to have it enabled all the time you can choose when and where to use the
297:16 can choose when and where to use the extension to enable and disable the
297:19 extension to enable and disable the extension open your browser and navigate
297:21 extension open your browser and navigate to the extension settings here you can
297:24 to the extension settings here you can toggle the extension between enabled and
297:26 toggle the extension between enabled and disabled when enabled the extension will
297:29 disabled when enabled the extension will run and function as intended when
297:31 run and function as intended when disabled the extension will be
297:33 disabled the extension will be deactivated and its functionality will
297:35 deactivated and its functionality will be suspended until you reenable it again
297:38 be suspended until you reenable it again also don't assume the extension is is
297:40 also don't assume the extension is is enabled just because you installed it
297:43 enabled just because you installed it sometimes the default state for a newly
297:44 sometimes the default state for a newly installed extension will be the disable
297:47 installed extension will be the disable State and not the enabled
297:50 State and not the enabled state exam objective 3.5 given a
297:53 state exam objective 3.5 given a scenario configure and use web
297:56 scenario configure and use web browsers private
297:58 browsers private browsing private browsing also known as
298:01 browsing private browsing also known as incognito mode or private mode is a
298:03 incognito mode or private mode is a feature found in most web browsers that
298:05 feature found in most web browsers that allows users to browse the internet
298:07 allows users to browse the internet without leaving any traces of their
298:08 without leaving any traces of their online activity on the device they are
298:10 online activity on the device they are using it is designed to provide a higher
298:13 using it is designed to provide a higher level of privacy and prevent the browser
298:15 level of privacy and prevent the browser from storing data related to the user's
298:17 from storing data related to the user's browsing
298:19 browsing session when you use private browsing
298:22 session when you use private browsing the browser does not store any records
298:23 the browser does not store any records of the websites you visit the searches
298:25 of the websites you visit the searches you make or the pages you view this
298:28 you make or the pages you view this means that after closing the private
298:30 means that after closing the private browsing window there will be no history
298:32 browsing window there will be no history of your online activities on that
298:34 of your online activities on that session additionally in private browsing
298:36 session additionally in private browsing mode cookies and temporary data are not
298:39 mode cookies and temporary data are not saved preventing websites from
298:41 saved preventing websites from remembering your preferences or tracking
298:42 remembering your preferences or tracking your online
298:43 your online activities and if that wasn't already
298:46 activities and if that wasn't already enough anonymity private browsing also
298:48 enough anonymity private browsing also disables autofill and saved passwords so
298:50 disables autofill and saved passwords so your login credentials and personal
298:52 your login credentials and personal information won't be automatically
298:53 information won't be automatically filled in on websites either in short if
298:56 filled in on websites either in short if you use private browsing it is as if you
298:58 you use private browsing it is as if you had cleared all your browsing data
299:00 had cleared all your browsing data before closing the
299:02 before closing the session exam objective 3.5 given a
299:05 session exam objective 3.5 given a scenario configure and use web
299:08 scenario configure and use web browsers proxy settings
299:11 browsers proxy settings in this video let's start with the
299:13 in this video let's start with the basics what is a proxy server a proxy
299:17 basics what is a proxy server a proxy server is an intermediary server that
299:19 server is an intermediary server that acts as a bridge between a user's device
299:21 acts as a bridge between a user's device and the internet or you could think of
299:23 and the internet or you could think of it as a middleman or a mediator between
299:25 it as a middleman or a mediator between you and the internet imagine you want to
299:28 you and the internet imagine you want to access a website instead of connecting
299:30 access a website instead of connecting directly to that website your request
299:32 directly to that website your request goes through the proxy server first This
299:35 goes through the proxy server first This Server then forwards your request to the
299:37 Server then forwards your request to the website on your behalf and Returns the
299:38 website on your behalf and Returns the website's response back back to you it's
299:41 website's response back back to you it's like having someone fetch information
299:43 like having someone fetch information for you this also provides the proxy
299:45 for you this also provides the proxy server with supervisory control over the
299:48 server with supervisory control over the connection now let's take a closer look
299:50 connection now let's take a closer look at a proxy server in
299:52 at a proxy server in Action a standard connection provides
299:55 Action a standard connection provides direct access between the local network
299:57 direct access between the local network and resources across the internet so
300:00 and resources across the internet so where does a proxy server fit in a proxy
300:03 where does a proxy server fit in a proxy server interrupts the standard
300:05 server interrupts the standard Connection in order to establish a
300:07 Connection in order to establish a monitored connection that is why we can
300:09 monitored connection that is why we can refer to to it as a
300:11 refer to to it as a middleman the proxy server can then
300:13 middleman the proxy server can then intercept Network traffic allowing only
300:15 intercept Network traffic allowing only approved traffic to pass through
300:17 approved traffic to pass through security rules that permit traffic can
300:19 security rules that permit traffic can be applied to requests leaving the
300:21 be applied to requests leaving the network or to responses entering the
300:23 network or to responses entering the network conversely the proxy server will
300:26 network conversely the proxy server will deny Network traffic that does not meet
300:28 deny Network traffic that does not meet any security rule
300:30 any security rule requirements so what are some issues
300:32 requirements so what are some issues that might accompany this type of setup
300:35 that might accompany this type of setup well for starters if the proxy server is
300:37 well for starters if the proxy server is misconfigured or down you might not be
300:39 misconfigured or down you might not be able to access access the internet at
300:40 able to access access the internet at all it's essential to check the settings
300:43 all it's essential to check the settings and make sure everything is set up
300:45 and make sure everything is set up correctly another problem that can arise
300:47 correctly another problem that can arise is a slow internet
300:49 is a slow internet connection sometimes if the proxy server
300:51 connection sometimes if the proxy server is overloaded or not optimized for your
300:53 is overloaded or not optimized for your needs it could result in slower loading
300:55 needs it could result in slower loading times for websites other issues might be
300:58 times for websites other issues might be the ability to receive some types of
301:00 the ability to receive some types of traffic like email but not HTTP traffic
301:03 traffic like email but not HTTP traffic or having the ability to access the
301:05 or having the ability to access the company's internet but not external
301:07 company's internet but not external websites these may be intentional
301:09 websites these may be intentional restrictions imposed by an organization
301:11 restrictions imposed by an organization or just a misconfiguration of the proxy
301:14 or just a misconfiguration of the proxy settings so if you are having any of
301:16 settings so if you are having any of these issues press two for technical
301:18 these issues press two for technical support otherwise stay on the line for
301:21 support otherwise stay on the line for my next
301:28 video exam objective 3.5 given a scenario configure and use web
301:31 scenario configure and use web browsers website security
301:34 browsers website security certificates to begin this video let's
301:36 certificates to begin this video let's discuss what a website security
301:38 discuss what a website security certificate is you can think of a
301:40 certificate is you can think of a certificate as a digital ID card for a
301:43 certificate as a digital ID card for a website just like you need
301:44 website just like you need identification to verify who you are
301:46 identification to verify who you are websites need certificates to prove
301:48 websites need certificates to prove their authenticity and ensure secure
301:51 their authenticity and ensure secure communication imagine you're about to
301:53 communication imagine you're about to enter a secure website your web browser
301:55 enter a secure website your web browser checks this certificate to confirm the
301:57 checks this certificate to confirm the site's identity like a virtual handshake
301:59 site's identity like a virtual handshake before it establishes a secure
302:01 before it establishes a secure connection these certificates are
302:03 connection these certificates are crucial in safeguarding sensitive data
302:05 crucial in safeguarding sensitive data such as personal information or credit
302:07 such as personal information or credit card details from falling into the wrong
302:09 card details from falling into the wrong hands
302:11 hands so how are certificates acquired great
302:14 so how are certificates acquired great question certificates are issued and
302:16 question certificates are issued and managed by trusted thirdparty entities
302:18 managed by trusted thirdparty entities known as certificate authorities or Casa
302:22 known as certificate authorities or Casa these Casa act as digital notaries
302:24 these Casa act as digital notaries verifying the identity and authenticity
302:26 verifying the identity and authenticity of the websites when a website owner
302:29 of the websites when a website owner wants a certificate they go through a
302:31 wants a certificate they go through a validation process with the ca the ca
302:34 validation process with the ca the ca will verify the website owners's
302:35 will verify the website owners's identity and domain ownership to ensure
302:37 identity and domain ownership to ensure they are legitimate once the validation
302:40 they are legitimate once the validation is successful the ca issues a digital
302:42 is successful the ca issues a digital certificate containing the website's
302:44 certificate containing the website's public encryption key and other
302:46 public encryption key and other essential information let's now look at
302:48 essential information let's now look at the process step by step just keep in
302:51 the process step by step just keep in mind I will be presenting you with a
302:52 mind I will be presenting you with a simplified version of this process that
302:54 simplified version of this process that is appropriate for the ITF plus
302:56 is appropriate for the ITF plus certification
302:58 certification exam okay step one the ca issues a
303:01 exam okay step one the ca issues a certificate to the
303:03 certificate to the server next a client will request
303:05 server next a client will request identification from a
303:07 identification from a server the server will then send it
303:09 server the server will then send it certificate and a public encryption key
303:13 certificate and a public encryption key the client will then verify the
303:14 the client will then verify the authenticity of the certificate with the
303:16 authenticity of the certificate with the ca if all goes well a secure connection
303:19 ca if all goes well a secure connection will be formed between the client and
303:21 will be formed between the client and the
303:22 the server so that was a little bit of a
303:24 server so that was a little bit of a behind-the-scene view of certificates I
303:26 behind-the-scene view of certificates I will no move to a user's Viewpoint when
303:29 will no move to a user's Viewpoint when you access a website using https in the
303:31 you access a website using https in the URL your web browser recognizes this and
303:34 URL your web browser recognizes this and checks for a valid certificate if the
303:36 checks for a valid certificate if the certificate is valid and trusted your
303:39 certificate is valid and trusted your browser EST establishes a secure
303:40 browser EST establishes a secure encrypted connection with the website
303:42 encrypted connection with the website server the lock icon you see in the
303:44 server the lock icon you see in the browser's address bar indicates a secure
303:47 browser's address bar indicates a secure connection it means your data such as
303:49 connection it means your data such as login credentials or credit card
303:51 login credentials or credit card information is encrypted while being
303:53 information is encrypted while being transmitted making it extremely
303:55 transmitted making it extremely difficult for hackers to intercept or
303:58 difficult for hackers to intercept or decipher but be careful not all
304:01 decipher but be careful not all certificates are trustworthy let's talk
304:03 certificates are trustworthy let's talk about valid and invalid
304:05 about valid and invalid certificates a valid certificate is one
304:08 certificates a valid certificate is one that has been issued by a reputable CA
304:10 that has been issued by a reputable CA and is within its expiration date on the
304:13 and is within its expiration date on the other hand an invalid certificate raises
304:15 other hand an invalid certificate raises a red flag this could happen if the
304:17 a red flag this could happen if the certificate has expired the website's
304:20 certificate has expired the website's domain name doesn't match the
304:21 domain name doesn't match the certificate or the certificate was
304:23 certificate or the certificate was issued by an untrusted or unauthorized
304:25 issued by an untrusted or unauthorized CA when you encounter an invalid
304:27 CA when you encounter an invalid certificate your web browser will
304:29 certificate your web browser will display a warning message to protect you
304:31 display a warning message to protect you from potential security risks in such
304:34 from potential security risks in such cases it's best to avoid proceeding to
304:36 cases it's best to avoid proceeding to the website exam objective 3.5 given a
304:40 the website exam objective 3.5 given a scenario configure and use web
304:43 scenario configure and use web browsers browser
304:45 browsers browser compatibility browser compatibility
304:48 compatibility browser compatibility refers to how well a website or web
304:50 refers to how well a website or web application functions across different
304:51 application functions across different web browsers with numerous browsers
304:54 web browsers with numerous browsers available like Safari Firefox Chrome
304:57 available like Safari Firefox Chrome Edge and Opera ensuring your digital
304:59 Edge and Opera ensuring your digital Creations work seamlessly on all of them
305:01 Creations work seamlessly on all of them is essential poor browser compatibility
305:04 is essential poor browser compatibility can lead to frustrating user experiences
305:06 can lead to frustrating user experiences broken functionality and even security
305:09 broken functionality and even security vulnerab
305:14 abilities various factors can impact browser compatibility but one major
305:17 browser compatibility but one major factor is the HTML CSS and JavaScript
305:20 factor is the HTML CSS and JavaScript code used by websites browsers tend to
305:23 code used by websites browsers tend to interpret these languages differently
305:25 interpret these languages differently which can cause some website pages to
305:27 which can cause some website pages to have visual or functional
305:29 have visual or functional discrepancies behind me I have a Graphic
305:31 discrepancies behind me I have a Graphic of the same web page being rendered by
305:33 of the same web page being rendered by two different web browsers Firefox and
305:36 two different web browsers Firefox and Safari Can you spot any differences
305:45 and lastly when it comes to web applications compatibility issues can
305:47 applications compatibility issues can arise from older applications not being
305:49 arise from older applications not being able to function on newer browsers or
305:51 able to function on newer browsers or the opposite newer applications not
305:53 the opposite newer applications not functioning on an older
305:55 functioning on an older browser exam objective 3.6 compare and
305:58 browser exam objective 3.6 compare and contrast General application Concepts
306:00 contrast General application Concepts and
306:01 and uses single platform versus
306:04 uses single platform versus crossplatform
306:05 crossplatform in this video we will compare single and
306:08 in this video we will compare single and crossplatform applic apps a single
306:11 crossplatform applic apps a single platform application is designed to work
306:13 platform application is designed to work exclusively with one type of computer or
306:15 exclusively with one type of computer or operating system for example an single
306:18 operating system for example an single platform application developed for
306:20 platform application developed for Windows might not work on a Mac and vice
306:23 Windows might not work on a Mac and vice versa this can create compatibility
306:25 versa this can create compatibility issues limiting the application's
306:27 issues limiting the application's usability to a specific group of users
306:30 usability to a specific group of users but single platform applications do have
306:32 but single platform applications do have some benefits having a targeted approach
306:35 some benefits having a targeted approach does allow developers to fully leverage
306:37 does allow developers to fully leverage the features functionalities and Design
306:40 the features functionalities and Design Elements of that particular platform as
306:43 Elements of that particular platform as a result users of single platform
306:45 a result users of single platform applications often experience a highly
306:47 applications often experience a highly optimized and tailored user
306:52 experience now let's explore cross-platform
306:54 cross-platform applications these applications are
306:56 applications these applications are designed to work on different types of
306:58 designed to work on different types of computers and operating systems like
307:00 computers and operating systems like Windows Mac and even mobile devices like
307:03 Windows Mac and even mobile devices like smartphones and tablets crossplatform
307:05 smartphones and tablets crossplatform applications have been designed to be
307:07 applications have been designed to be versatile making them accessible to a
307:09 versatile making them accessible to a wider audience they break down language
307:12 wider audience they break down language barriers between different computer
307:14 barriers between different computer systems ensuring that the same
307:15 systems ensuring that the same application can run seamlessly on
307:17 application can run seamlessly on various devices while cross-platform
307:20 various devices while cross-platform applications offer a consistent user
307:22 applications offer a consistent user experience across varying devices and
307:24 experience across varying devices and operating systems developers will often
307:27 operating systems developers will often have to sacrifice certain features and
307:28 have to sacrifice certain features and functionalities to achieve this
307:31 functionalities to achieve this goal exam objective 3.6 compare and
307:35 goal exam objective 3.6 compare and contrast General application Concepts
307:37 contrast General application Concepts and
307:38 and uses open Source versus
307:41 uses open Source versus proprietary for this video we will
307:43 proprietary for this video we will imagine software as a recipe in open
307:46 imagine software as a recipe in open source the recipe or the source code is
307:49 source the recipe or the source code is like a publicly posted recipe anyone can
307:52 like a publicly posted recipe anyone can access it modify it and even share their
307:54 access it modify it and even share their changes with others it's like a
307:57 changes with others it's like a collaborative cooking project where
307:59 collaborative cooking project where everyone can add their own ingredients
308:00 everyone can add their own ingredients and improve the recipe the beauty of
308:03 and improve the recipe the beauty of Open Source software is that it
308:05 Open Source software is that it encourages collaboration Innovation and
308:08 encourages collaboration Innovation and transparency since anyone can contribute
308:10 transparency since anyone can contribute issues can be fixed faster and updates
308:12 issues can be fixed faster and updates can come out more frequently to give an
308:15 can come out more frequently to give an example many Linux distributions are
308:17 example many Linux distributions are open
308:19 open source as for proprietary software
308:22 source as for proprietary software picture this as a secret recipe that
308:24 picture this as a secret recipe that only a specific Chef knows the source
308:27 only a specific Chef knows the source code is kept hidden and you usually have
308:29 code is kept hidden and you usually have to pay to use the software it's like
308:31 to pay to use the software it's like ordering a dish at a restaurant you
308:33 ordering a dish at a restaurant you don't know exactly what goes into it but
308:35 don't know exactly what goes into it but it is expected that it will taste good
308:38 it is expected that it will taste good similarly proprietary applications often
308:40 similarly proprietary applications often come with dedicated support a polished
308:42 come with dedicated support a polished user experience and a clear chain of
308:45 user experience and a clear chain of responsibility the company behind the
308:47 responsibility the company behind the software takes care of updates and
308:49 software takes care of updates and maintenance to ensure it operates as
308:51 maintenance to ensure it operates as intended as for a couple proprietary
308:53 intended as for a couple proprietary software examples we have the Windows
308:56 software examples we have the Windows and Mac OS operating
308:58 and Mac OS operating systems exam objective 3.6 compare and
309:02 systems exam objective 3.6 compare and contrast General application Concepts
309:04 contrast General application Concepts and
309:05 and uses subscription versus one-time
309:08 uses subscription versus one-time purchase
309:10 purchase over the last few years there's been a
309:12 over the last few years there's been a fundamental shift in the way software
309:13 fundamental shift in the way software companies do business specifically the
309:16 companies do business specifically the shift from onetime purchases to
309:18 shift from onetime purchases to subscription based
309:20 subscription based service previously with onetime
309:22 service previously with onetime purchases you bought a software product
309:24 purchases you bought a software product paid a one-time fee up front and it was
309:26 paid a one-time fee up front and it was yours to keep in use forever for example
309:30 yours to keep in use forever for example Microsoft Office used to be available as
309:32 Microsoft Office used to be available as a one-time purchase you'd buy a version
309:35 a one-time purchase you'd buy a version like office 2019 and it would be
309:37 like office 2019 and it would be installed on your computer you could use
309:39 installed on your computer you could use it as long as you wanted without any
309:41 it as long as you wanted without any further
309:42 further payments now let's talk about
309:45 payments now let's talk about subscriptions instead of buying the
309:46 subscriptions instead of buying the software outright as a one-time purchase
309:49 software outright as a one-time purchase you pay a recurring subscription fee at
309:50 you pay a recurring subscription fee at regular intervals like monthly or
309:52 regular intervals like monthly or annually to continue using the software
309:55 annually to continue using the software in keeping with our Microsoft Office
309:57 in keeping with our Microsoft Office example the subscription alternative is
309:59 example the subscription alternative is called Office
310:01 called Office 365 while a one-time software purchase
310:03 365 while a one-time software purchase benefits from no ongoing payments
310:05 benefits from no ongoing payments subscription-based software offers
310:07 subscription-based software offers continual access to the latest features
310:10 continual access to the latest features updates and support and the flexibility
310:12 updates and support and the flexibility to cancel or change software as
310:15 to cancel or change software as needed exam objective 3.6 compare and
310:18 needed exam objective 3.6 compare and contrast General application Concepts
310:20 contrast General application Concepts and
310:22 and uses software
310:24 uses software licensing before we dive into the
310:26 licensing before we dive into the different types of software licensing
310:28 different types of software licensing let's understand what software licensing
310:30 let's understand what software licensing actually is think of software licensing
310:33 actually is think of software licensing as a set of rules and permissions that
310:35 as a set of rules and permissions that govern how you can use a piece of
310:37 govern how you can use a piece of software it's like a digital contract
310:39 software it's like a digital contract between you and the software
310:45 creator okay now let's talk about the first type of software licensing we are
310:47 first type of software licensing we are expected to understand for the CompTIA
310:49 expected to understand for the CompTIA ITF plus certification exam the
310:51 ITF plus certification exam the single-use license imagine you're buying
310:54 single-use license imagine you're buying a ticket to a movie that ticket grants
310:57 a ticket to a movie that ticket grants you onetime access to watch the film
311:00 you onetime access to watch the film similarly a single- software license
311:02 similarly a single- software license allows you to install and use the
311:04 allows you to install and use the software on one device for example if
311:07 software on one device for example if you purchase a single-use license for a
311:09 you purchase a single-use license for a photo editing software you can install
311:11 photo editing software you can install and use it on one
311:13 and use it on one computer next up we have the group use
311:15 computer next up we have the group use or site license imagine you're
311:18 or site license imagine you're organizing a group event and you
311:20 organizing a group event and you purchase a group ticket that allows
311:21 purchase a group ticket that allows multiple people to attend similarly a
311:24 multiple people to attend similarly a group use or site license permits you to
311:26 group use or site license permits you to install and use the software on multiple
311:28 install and use the software on multiple devices within a defined group or
311:31 devices within a defined group or location for instance a school might buy
311:33 location for instance a school might buy a site license for educational software
311:36 a site license for educational software this would allow all the computers in
311:38 this would allow all the computers in the school's computer lab to have the
311:40 the school's computer lab to have the software installed it's like buying a
311:42 software installed it's like buying a bunch of group tickets for everyone
311:44 bunch of group tickets for everyone attending your event this is a great
311:46 attending your event this is a great licensing solution when the number of
311:48 licensing solution when the number of users is expected to fluctuate
311:51 users is expected to fluctuate regularly and lastly let's discuss the
311:53 regularly and lastly let's discuss the concurrent license type imagine you're a
311:56 concurrent license type imagine you're a restaurant owner and you have a limited
311:58 restaurant owner and you have a limited number of seats available only a certain
312:01 number of seats available only a certain number of people can be seated at the
312:02 number of people can be seated at the same time a concurrent license operates
312:05 same time a concurrent license operates similarly it limits the number of users
312:07 similarly it limits the number of users who can access the software
312:10 who can access the software simultaneously for example a company
312:12 simultaneously for example a company might purchase a concurrent license for
312:14 might purchase a concurrent license for project management software or
312:15 project management software or accounting software this means that only
312:18 accounting software this means that only a specific number of employees can use
312:20 a specific number of employees can use the software at the same time this is
312:23 the software at the same time this is just like having a fixed number of seats
312:25 just like having a fixed number of seats at your
312:26 at your restaurant exam objective 3.6 compare
312:29 restaurant exam objective 3.6 compare and contrast General application
312:31 and contrast General application Concepts and
312:33 Concepts and uses software
312:35 uses software installation the process of installing
312:38 installation the process of installing software can be broken down into some
312:39 software can be broken down into some common steps the first of which is to
312:41 common steps the first of which is to read the installation
312:43 read the installation instructions this will cover important
312:45 instructions this will cover important topics like is the software compatible
312:47 topics like is the software compatible with your operating system or does your
312:49 with your operating system or does your current Hardware support the program and
312:51 current Hardware support the program and meet the minimum RAM processor or hard
312:53 meet the minimum RAM processor or hard drive
312:55 drive requirements after reading the
312:56 requirements after reading the installation instructions and verifying
312:58 installation instructions and verifying your system can operate the software the
313:00 your system can operate the software the next step is to download the software
313:02 next step is to download the software from the installation media software
313:05 from the installation media software installation media refers to the
313:06 installation media refers to the physical or digital means by which
313:08 physical or digital means by which software is delivered and installed onto
313:10 software is delivered and installed onto a computer or device installation media
313:13 a computer or device installation media transitions software from a collection
313:15 transitions software from a collection of digital instructions into a
313:17 of digital instructions into a functional application installation
313:19 functional application installation media can come in various forms such as
313:22 media can come in various forms such as CDs DVDs USB drives or downloadable
313:25 CDs DVDs USB drives or downloadable files from the internet but once it has
313:28 files from the internet but once it has completed its task the result will be an
313:30 completed its task the result will be an operational program that can be used by
313:32 operational program that can be used by the Computing
313:37 device next depending on the software product you are likely to need need a
313:39 product you are likely to need need a product key these product keys are like
313:41 product key these product keys are like digital passports that Grant access to
313:44 digital passports that Grant access to specific software
313:45 specific software applications much like a unique
313:47 applications much like a unique fingerprint each product key is distinct
313:49 fingerprint each product key is distinct and serves as a verification mechanism
313:51 and serves as a verification mechanism to ensure that users have acquired
313:53 to ensure that users have acquired legitimate and authorized copies of the
313:55 legitimate and authorized copies of the software acting as both a security
313:57 software acting as both a security measure and a licensing control a
313:59 measure and a licensing control a product key is typically a combination
314:01 product key is typically a combination of letters numbers or characters
314:04 of letters numbers or characters separated by hyphens that users enter
314:06 separated by hyphens that users enter during the software installation process
314:09 during the software installation process this key unlocks the software enabling
314:11 this key unlocks the software enabling its full
314:15 functionality another part of the software installation process involves
314:17 software installation process involves agreeing with the Ula a Ula or end user
314:20 agreeing with the Ula a Ula or end user license agreement is a legally binding
314:22 license agreement is a legally binding contract between the software creator or
314:25 contract between the software creator or publisher and the end user of a software
314:27 publisher and the end user of a software application operating as a virtual rule
314:29 application operating as a virtual rule book The Ula outlines the terms and
314:32 book The Ula outlines the terms and conditions that govern the usage of the
314:33 conditions that govern the usage of the software comparable to a set of
314:35 software comparable to a set of guidelines for navigating a digital
314:37 guidelines for navigating a digital landscape the Ula specifi I important
314:39 landscape the Ula specifi I important aspects such as permitted usage
314:41 aspects such as permitted usage restrictions intellectual property
314:43 restrictions intellectual property rights liability limitations and any
314:46 rights liability limitations and any obligations or responsibilities of both
314:48 obligations or responsibilities of both parties involved by agreeing to the Ula
314:51 parties involved by agreeing to the Ula users acknowledge and accept the rules
314:53 users acknowledge and accept the rules under which they can utilize the
314:55 under which they can utilize the software the last part of the software
314:57 software the last part of the software installation process I will explain is
314:59 installation process I will explain is the difference between the default and
315:01 the difference between the default and the advanced installation option
315:04 the advanced installation option starting with the default installation
315:05 starting with the default installation option this option is designed to offer
315:07 option this option is designed to offer an Express and hassle approach to
315:09 an Express and hassle approach to installing software comparable to
315:12 installing software comparable to following a well-marked path a default
315:14 following a well-marked path a default installation takes care of the essential
315:16 installation takes care of the essential steps making it ideal for users seeking
315:18 steps making it ideal for users seeking a quick and straightforward
315:20 a quick and straightforward setup however for those who wish to take
315:22 setup however for those who wish to take their software experience a step further
315:24 their software experience a step further and customize it to their specific needs
315:26 and customize it to their specific needs Advanced options come into play these
315:29 Advanced options come into play these custom options provide users with the
315:31 custom options provide users with the ability to fine-tune various aspects of
315:33 ability to fine-tune various aspects of the installation process this includes
315:36 the installation process this includes selecting specific components or
315:37 selecting specific components or features to install choosing where
315:39 features to install choosing where installation files will be placed
315:41 installation files will be placed adjusting performance settings and even
315:43 adjusting performance settings and even modifying the user interface be sure to
315:46 modifying the user interface be sure to pay attention to each of these software
315:47 pay attention to each of these software installation steps next time you install
315:49 installation steps next time you install a program maybe even take a peek at the
315:52 a program maybe even take a peek at the advanced installation options what could
315:55 advanced installation options what could go wrong exam objective 4.1 compare and
315:59 go wrong exam objective 4.1 compare and contrast programming language
316:01 contrast programming language categories programming
316:04 categories programming levels with this video we will be
316:06 levels with this video we will be starting our study of domain 4.0 of the
316:08 starting our study of domain 4.0 of the the CompTIA ITF plus certification exam
316:11 the CompTIA ITF plus certification exam which is all about software development
316:13 which is all about software development Concepts or computer programming we will
316:16 Concepts or computer programming we will start from the very Basics and work our
316:18 start from the very Basics and work our way up so don't worry if you're
316:19 way up so don't worry if you're completely new to information technology
316:21 completely new to information technology or programming let's get
316:24 or programming let's get started at the most fundamental level
316:27 started at the most fundamental level computers receive transmit process and
316:30 computers receive transmit process and store information in binary form
316:33 store information in binary form computers work in this manner because
316:34 computers work in this manner because they utilize billions of tiny electronic
316:36 they utilize billions of tiny electronic switches called transistors
316:39 switches called transistors these transistors can be either an off
316:41 these transistors can be either an off or on state the digits zero and one used
316:44 or on state the digits zero and one used in binary reflect the off and on states
316:46 in binary reflect the off and on states of a transistor where zero is off and
316:49 of a transistor where zero is off and one is on if this sounds familiar that
316:52 one is on if this sounds familiar that is because we covered this in exam
316:53 is because we covered this in exam objective
316:55 objective 1.1 moving up a level we have machine
316:58 1.1 moving up a level we have machine language or machine code machine code
317:01 language or machine code machine code consists of hexadecimal representations
317:03 consists of hexadecimal representations of binary instructions that are used by
317:05 of binary instructions that are used by the computer's processor to directly
317:07 the computer's processor to directly control the computer's Hardware this is
317:09 control the computer's Hardware this is like the computer's native language but
317:11 like the computer's native language but it's not something humans find easy to
317:13 it's not something humans find easy to work with and is not quite
317:15 work with and is not quite readable moving up yet another level we
317:18 readable moving up yet another level we have Assembly Language this language
317:20 have Assembly Language this language represents machine code instructions
317:22 represents machine code instructions using pneumonics that are easier for
317:24 using pneumonics that are easier for humans to understand it is the closest
317:27 humans to understand it is the closest language we have to machine code and is
317:29 language we have to machine code and is great for Designing and programming
317:30 great for Designing and programming low-level device drivers but it is still
317:33 low-level device drivers but it is still not quite user
317:34 not quite user friendly finally as computers evolved so
317:38 friendly finally as computers evolved so did programming Lang languages highle
317:40 did programming Lang languages highle languages like python Java C++ C and
317:44 languages like python Java C++ C and many others were created these languages
317:47 many others were created these languages are much more human friendly in highle
317:50 are much more human friendly in highle languages you write code using words and
317:52 languages you write code using words and syntax that closely resembles everyday
317:55 syntax that closely resembles everyday human language in the next few videos I
317:58 human language in the next few videos I will be focusing on the high level
317:59 will be focusing on the high level languages but at a minimum don't forget
318:02 languages but at a minimum don't forget the basics about each level we just
318:04 the basics about each level we just discussed exam objective 4.1 compare and
318:07 discussed exam objective 4.1 compare and contrast programming language
318:10 contrast programming language categories compiled
318:12 categories compiled languages this video will focus on a
318:15 languages this video will focus on a subset of highlevel programming
318:16 subset of highlevel programming languages called compiled languages but
318:19 languages called compiled languages but to begin understanding what a compiled
318:21 to begin understanding what a compiled language is you first need a definition
318:23 language is you first need a definition for a compiler a compiler is a
318:26 for a compiler a compiler is a translator for computer programs it
318:29 translator for computer programs it takes the human written instructions you
318:30 takes the human written instructions you give in a highlevel programming language
318:32 give in a highlevel programming language and turns them into machine code it is
318:34 and turns them into machine code it is important to note that a compiler
318:36 important to note that a compiler translates the entire program into
318:38 translates the entire program into machine code prior to running or
318:40 machine code prior to running or executing the
318:41 executing the program just as we use different
318:43 program just as we use different languages to communicate with each other
318:45 languages to communicate with each other computers require specific languages to
318:48 computers require specific languages to understand the instructions we give them
318:50 understand the instructions we give them a compiler takes the human readable
318:52 a compiler takes the human readable source code you write in a compiled
318:53 source code you write in a compiled programming language and translates it
318:55 programming language and translates it into machine code the low-level
318:57 into machine code the low-level instructions that the computer's
318:58 instructions that the computer's processor can execute once the entire
319:02 processor can execute once the entire program has been translated by the
319:03 program has been translated by the compiler the program is ready to run now
319:07 compiler the program is ready to run now here's an important aspect of compiled
319:09 here's an important aspect of compiled languages they are single platform what
319:12 languages they are single platform what does that mean well a compiled program
319:14 does that mean well a compiled program is tailored to run on a specific type of
319:16 is tailored to run on a specific type of computer or platform this means that if
319:19 computer or platform this means that if you've written a program using a
319:21 you've written a program using a compiled language it will work best on
319:23 compiled language it will work best on the platform it was compiled for if you
319:25 the platform it was compiled for if you want the program to run on a different
319:27 want the program to run on a different platform you'll need to recompile it for
319:29 platform you'll need to recompile it for that specific platform as an upside
319:32 that specific platform as an upside since the program has already been
319:34 since the program has already been translated to machine code when you do
319:36 translated to machine code when you do run the program it will execute or run
319:38 run the program it will execute or run faster
319:43 to wrap things up let's take a quick look at some popular compiled
319:44 look at some popular compiled programming languages we have go
319:50 programming languages we have go C++ Java
319:53 C++ Java C and cobal just to name a few exam
319:57 C and cobal just to name a few exam objective 4.1 compare and contrast
320:00 objective 4.1 compare and contrast programming language
320:01 programming language categories interpreted
320:04 categories interpreted languages this video will focus on
320:06 languages this video will focus on another subset of highlevel program
320:08 another subset of highlevel program languages called interpreted languages
320:11 languages called interpreted languages but to begin understanding what an
320:13 but to begin understanding what an interpreted language is you first need a
320:15 interpreted language is you first need a definition for an interpreter an
320:17 definition for an interpreter an interpreter is a real-time translator
320:19 interpreter is a real-time translator for computer programs it takes the human
320:22 for computer programs it takes the human written instructions you give in a
320:23 written instructions you give in a highlevel programming language and turns
320:25 highlevel programming language and turns them into machine code this is very
320:28 them into machine code this is very similar to the compiler we discussed in
320:29 similar to the compiler we discussed in the previous video with one clear
320:32 the previous video with one clear difference The Interpreter translates
320:34 difference The Interpreter translates and executes the program line by line in
320:36 and executes the program line by line in real time
320:38 real time just as you might use a translator to
320:40 just as you might use a translator to understand a language you're not
320:41 understand a language you're not familiar with computers use interpreters
320:44 familiar with computers use interpreters to understand and execute the
320:45 to understand and execute the instructions you give it in a
320:46 instructions you give it in a programming language unlike compilers
320:49 programming language unlike compilers which translate the entire program up
320:51 which translate the entire program up front interpreters work line by line
320:53 front interpreters work line by line converting your human readable code into
320:55 converting your human readable code into machine instructions as it goes now
320:58 machine instructions as it goes now here's an important aspect of
321:00 here's an important aspect of interpreted languages they are
321:01 interpreted languages they are crossplatform but what does that mean
321:05 crossplatform but what does that mean well an interpreted program is more
321:07 well an interpreted program is more flexible in terms of platform
321:09 flexible in terms of platform this means that the same program can run
321:11 this means that the same program can run on different types of computers without
321:13 on different types of computers without needing to be Rewritten or recompiled
321:16 needing to be Rewritten or recompiled interpreters adapt the code on the fly
321:17 interpreters adapt the code on the fly to match the computer's specific
321:19 to match the computer's specific architecture making it easier to create
321:21 architecture making it easier to create software that works on various platforms
321:24 software that works on various platforms as a downside since the program has to
321:26 as a downside since the program has to be translated to machine code line by
321:28 be translated to machine code line by line at runtime it will execute or run a
321:30 line at runtime it will execute or run a bit
321:32 bit slower to wrap things up let's take a
321:35 slower to wrap things up let's take a quick look at some popular interpreted
321:37 quick look at some popular interpreted programming languages
321:39 programming languages we have
321:41 we have PHP Pearl python Ruby and JavaScript
321:48 PHP Pearl python Ruby and JavaScript which should never be confused with Java
321:50 which should never be confused with Java exam objective 4.1 compare and contrast
321:54 exam objective 4.1 compare and contrast programming language
321:55 programming language categories scripting
321:58 categories scripting languages this video will focus on
322:00 languages this video will focus on scripting languages which is a subset of
322:03 scripting languages which is a subset of interpreted languages but before I talk
322:05 interpreted languages but before I talk about scripting languages let's talk
322:07 about scripting languages let's talk about scripted langu languages these are
322:10 about scripted langu languages these are programming languages that are used to
322:11 programming languages that are used to create applications software or
322:14 create applications software or functionalities that can stand alone
322:16 functionalities that can stand alone they're like the main actors on a stage
322:19 they're like the main actors on a stage they are ready to perform without
322:20 they are ready to perform without needing a director or another program to
322:23 needing a director or another program to guide
322:24 guide them now on to scripting languages you
322:27 them now on to scripting languages you can think of these as the supporting
322:29 can think of these as the supporting actors they are used to create scripts
322:32 actors they are used to create scripts which are sequences of instructions that
322:34 which are sequences of instructions that merely guide other software programs
322:37 merely guide other software programs it's like giving cues to the main actors
322:39 it's like giving cues to the main actors on how to perform specific
322:41 on how to perform specific actions great now you know the subtle
322:44 actions great now you know the subtle difference between scripted languages
322:46 difference between scripted languages and scripting languages with that out of
322:48 and scripting languages with that out of the way let's look a bit closer at
322:50 the way let's look a bit closer at scripting languages scripting languages
322:53 scripting languages scripting languages Focus mostly on creating scripts that
322:55 Focus mostly on creating scripts that automate tasks or control other software
322:58 automate tasks or control other software these scripts often work behind the
323:00 these scripts often work behind the scenes and are comprised of a series of
323:02 scenes and are comprised of a series of commandline instructions or commands
323:04 commandline instructions or commands grouped together these instructions are
323:06 grouped together these instructions are written in a specific order to automate
323:08 written in a specific order to automate tasks or perform actions on a computer
323:10 tasks or perform actions on a computer or system think of it as a quick and
323:13 or system think of it as a quick and efficient way to make the computer carry
323:15 efficient way to make the computer carry out multiple tasks without manually
323:17 out multiple tasks without manually typing each and every command some
323:20 typing each and every command some examples of scripting languages include
323:22 examples of scripting languages include bash which is common in Linux
323:24 bash which is common in Linux distributions and Powershell which is
323:26 distributions and Powershell which is specific to Windows while scripted
323:29 specific to Windows while scripted languages offer better performance and
323:31 languages offer better performance and optimization for Standalone applications
323:33 optimization for Standalone applications scripting languages excel in Automation
323:35 scripting languages excel in Automation and quick task completion scripting Lang
323:38 and quick task completion scripting Lang languages are easy to learn and highly
323:40 languages are easy to learn and highly versatile at performing ad hoc or as
323:42 versatile at performing ad hoc or as needed tasks
323:43 needed tasks quickly exam objective 4.1 compare and
323:47 quickly exam objective 4.1 compare and contrast programming language
323:49 contrast programming language categories markup
323:52 categories markup languages now it is time to cover markup
323:55 languages now it is time to cover markup languages in this lesson we'll decode
323:57 languages in this lesson we'll decode the mystery behind what makes websites
323:59 the mystery behind what makes websites and digital content look and feel the
324:01 and digital content look and feel the way they do let's start with the basics
324:04 way they do let's start with the basics imagine you're reading a book the words
324:07 imagine you're reading a book the words on the pages are written in a language
324:09 on the pages are written in a language we understand right well web pages and
324:12 we understand right well web pages and digital content also have their own
324:14 digital content also have their own special language that computers and
324:16 special language that computers and browsers used to understand how to
324:17 browsers used to understand how to display things this language is known as
324:20 display things this language is known as a markup language just like you wouldn't
324:23 a markup language just like you wouldn't read a book without paragraphs headings
324:25 read a book without paragraphs headings or punctuation digital content wouldn't
324:28 or punctuation digital content wouldn't make sense without its own set of
324:29 make sense without its own set of instructions markup languages provide
324:32 instructions markup languages provide these instructions to Computing devices
324:34 these instructions to Computing devices so they know how to arrange and present
324:36 so they know how to arrange and present the content you see on your screen
324:39 the content you see on your screen one of the most common and foundational
324:40 one of the most common and foundational markup languages is HTML which stands
324:43 markup languages is HTML which stands for hypertext markup language HTML uses
324:47 for hypertext markup language HTML uses a series of tags think of them as
324:49 a series of tags think of them as digital labels to Define elements on a
324:51 digital labels to Define elements on a web page like headings paragraphs images
324:54 web page like headings paragraphs images and
324:55 and links so think of HTML like the
324:58 links so think of HTML like the blueprint for a web page it tells the
325:00 blueprint for a web page it tells the browser where to place each piece of
325:02 browser where to place each piece of content how to format text and how to
325:04 content how to format text and how to embed images or videos this structure
325:07 embed images or videos this structure and formatting ensure that the web page
325:09 and formatting ensure that the web page looks consistent and readable on
325:11 looks consistent and readable on different devices and screen
325:13 different devices and screen sizes and HTML is just the beginning
325:17 sizes and HTML is just the beginning there are other markup languages too
325:19 there are other markup languages too like XML extensible markup language
325:22 like XML extensible markup language which is used or storing and
325:23 which is used or storing and transporting data and SVG scalable
325:26 transporting data and SVG scalable vector graphics which is great for
325:27 vector graphics which is great for creating scalable graphics and
325:30 creating scalable graphics and illustrations so whether you're building
325:32 illustrations so whether you're building a personal blog a company website or
325:34 a personal blog a company website or even a complex web application
325:36 even a complex web application understanding how markup languages work
325:38 understanding how markup languages work will give you the power to shape and
325:39 will give you the power to shape and share your digital ideas with the
325:42 share your digital ideas with the world exam objective 4.1 compare and
325:46 world exam objective 4.1 compare and contrast programming language
325:48 contrast programming language categories query
325:51 categories query languages ready to learn about query
325:53 languages ready to learn about query languages all right let's go a query
325:57 languages all right let's go a query language is a specialized computer
325:59 language is a specialized computer programming language used to communicate
326:00 programming language used to communicate with and manipulate
326:02 with and manipulate databases it provides a way for users
326:04 databases it provides a way for users and applications to interact with
326:06 and applications to interact with databases by sending requests for
326:08 databases by sending requests for specific data or actions to be performed
326:11 specific data or actions to be performed query languages are essential for
326:13 query languages are essential for extracting meaningful insights from
326:15 extracting meaningful insights from large volumes of data stored in
326:17 large volumes of data stored in databases they allow users to formulate
326:20 databases they allow users to formulate complex queries to filter sort Aggregate
326:23 complex queries to filter sort Aggregate and transform data based on specific
326:25 and transform data based on specific criteria query languages are
326:27 criteria query languages are particularly valuable for data analysis
326:30 particularly valuable for data analysis reporting and decision-making
326:33 reporting and decision-making processes one well-known example of a
326:35 processes one well-known example of a query language is SQL or structured
326:37 query language is SQL or structured query language anguage SQL is widely
326:40 query language anguage SQL is widely used for relational databases and is
326:42 used for relational databases and is used to manage and manipulate data in a
326:44 used to manage and manipulate data in a tabular format where tabular is just a
326:46 tabular format where tabular is just a fancy word for table SQL queries can
326:49 fancy word for table SQL queries can retrieve specific records perform
326:52 retrieve specific records perform calculations join data from multiple
326:54 calculations join data from multiple tables and much more if this topic
326:57 tables and much more if this topic excites you I will cover it in much more
326:59 excites you I will cover it in much more detail when we get to domain five of the
327:01 detail when we get to domain five of the CompTIA ITF plus exam objectives exam
327:04 CompTIA ITF plus exam objectives exam objective 4.2 given a scenario use
327:07 objective 4.2 given a scenario use programming organizational techniques
327:09 programming organizational techniques and interpret
327:10 and interpret logic flowchart
327:13 logic flowchart Concepts a program is no more than a
327:15 Concepts a program is no more than a sequence of step-by-step instructions
327:18 sequence of step-by-step instructions also known as an algorithm for very
327:21 also known as an algorithm for very simple programs keeping track of these
327:23 simple programs keeping track of these steps during the design process can be
327:25 steps during the design process can be easy but what happens when a program
327:27 easy but what happens when a program gets significantly more complex do you
327:30 gets significantly more complex do you think it would help to have a visual
327:31 think it would help to have a visual representation of the program luckily we
327:34 representation of the program luckily we have such a tool imagine you're
327:37 have such a tool imagine you're embarking on an adventure Quest through
327:38 embarking on an adventure Quest through a maze as you navigate you encounter
327:42 a maze as you navigate you encounter Pathways decisions and obstacles in the
327:45 Pathways decisions and obstacles in the realm of computers we use programming
327:47 realm of computers we use programming flowcharts as our guide helping us
327:49 flowcharts as our guide helping us visualize and map out the logical
327:51 visualize and map out the logical Journey our programs will
327:53 Journey our programs will take think of a programming flowchart as
327:55 take think of a programming flowchart as your trusty map it's a visual
327:57 your trusty map it's a visual representation of the steps and
327:59 representation of the steps and decisions your program will make just as
328:02 decisions your program will make just as a real map helps you find your way a
328:04 a real map helps you find your way a flowchart guides your program's actions
328:06 flowchart guides your program's actions ensuring it follows the correct sequence
328:09 ensuring it follows the correct sequence within a flowchart you will find a
328:11 within a flowchart you will find a variety of different shapes and arrows
328:13 variety of different shapes and arrows with each element having their own
328:14 with each element having their own meaning for example a rectangle might
328:17 meaning for example a rectangle might represent a process or task while a
328:19 represent a process or task while a diamond shape signifies a decision point
328:21 diamond shape signifies a decision point where your program must choose between
328:23 where your program must choose between different paths the beauty of flowcharts
328:26 different paths the beauty of flowcharts is their
328:27 is their universality they transcend programming
328:29 universality they transcend programming languages making them a powerful tool
328:31 languages making them a powerful tool for both beginners and seasoned
328:33 for both beginners and seasoned programmers programming flowcharts are
328:35 programmers programming flowcharts are your compass in the realm of coding when
328:38 your compass in the realm of coding when whether you're building games apps or
328:40 whether you're building games apps or solving real world problems they Guide
328:42 solving real world problems they Guide You Through The Logical twists and turns
328:44 You Through The Logical twists and turns ensuring your programs run smoothly and
328:46 ensuring your programs run smoothly and efficiently exam objective 4.2 given a
328:49 efficiently exam objective 4.2 given a scenario use programming organizational
328:51 scenario use programming organizational techniques and interpret
328:53 techniques and interpret logic pseudo code
328:56 logic pseudo code Concepts in this video we will be
328:58 Concepts in this video we will be covering the topic of pseudo code pseudo
329:01 covering the topic of pseudo code pseudo code is a simplified and human readable
329:03 code is a simplified and human readable representation of a computer program's
329:05 representation of a computer program's logic and algorithm expressed in natural
329:07 logic and algorithm expressed in natural language or basic codel like syntax
329:10 language or basic codel like syntax using pseudo code helps programmers
329:12 using pseudo code helps programmers outline and plan the steps a program
329:14 outline and plan the steps a program should take without focusing on specific
329:16 should take without focusing on specific programming language
329:19 programming language details here is an example of some
329:21 details here is an example of some pseudo code and I have placed it side by
329:24 pseudo code and I have placed it side by side with its equivalent python code the
329:27 side with its equivalent python code the pseudo code on the left is just a plain
329:29 pseudo code on the left is just a plain language description of the steps in an
329:31 language description of the steps in an algorithm it uses structural conventions
329:33 algorithm it uses structural conventions of a normal programming language but is
329:36 of a normal programming language but is intended for human reading rather than
329:37 intended for human reading rather than machine reading with pseudo code being
329:40 machine reading with pseudo code being precise is not as important as getting
329:42 precise is not as important as getting your code organized this is very similar
329:45 your code organized this is very similar to the pre-writing phase of the writing
329:47 to the pre-writing phase of the writing process the pseudo code is just your
329:49 process the pseudo code is just your rough draft of the program logic after
329:52 rough draft of the program logic after completing your pseudo code you should
329:54 completing your pseudo code you should be ready to clean it up and write the
329:55 be ready to clean it up and write the actual code in accordance with the
329:57 actual code in accordance with the specific syntax and format of your
329:59 specific syntax and format of your desired programming language or in the
330:02 desired programming language or in the case of my example here
330:04 case of my example here python exam objective 4.3 explain the
330:08 python exam objective 4.3 explain the purpose and use of programming
330:10 purpose and use of programming Concepts let's get
330:12 Concepts let's get coding over the course of the next few
330:15 coding over the course of the next few videos I'll be diving into a range of
330:17 videos I'll be diving into a range of fundamental programming Concepts that
330:19 fundamental programming Concepts that have Universal relevance across
330:20 have Universal relevance across different languages each of the topics
330:23 different languages each of the topics outlined in comptus ITF plus exam
330:25 outlined in comptus ITF plus exam objectives was selected in order to
330:27 objectives was selected in order to provide you with a solid foundation upon
330:29 provide you with a solid foundation upon which to construct your understanding of
330:31 which to construct your understanding of coding these programming Concepts
330:34 coding these programming Concepts include
330:36 include identifiers containers
330:39 identifiers containers logic
330:40 logic components
330:41 components functions and
330:47 objects as I explain each programming Concept in detail I plan to harness the
330:49 Concept in detail I plan to harness the power of flowcharts they will help as a
330:52 power of flowcharts they will help as a dynamic tool to demystify intricate
330:54 dynamic tool to demystify intricate coding Concepts these flowcharts will
330:57 coding Concepts these flowcharts will serve as your compass guiding you
330:59 serve as your compass guiding you through the intricate Pathways of logic
331:00 through the intricate Pathways of logic and decision-making within programming
331:03 and decision-making within programming by employing these illustrative diagrams
331:05 by employing these illustrative diagrams my hope is to convert complex ideas into
331:07 my hope is to convert complex ideas into intuitive visual narratives making even
331:10 intuitive visual narratives making even the most intricate coding Concepts feel
331:11 the most intricate coding Concepts feel like a walk in the
331:13 like a walk in the park also where appropriate I will
331:16 park also where appropriate I will incorporate pseudo code and python code
331:18 incorporate pseudo code and python code to further assist with topic
331:20 to further assist with topic comprehension now that you know what to
331:22 comprehension now that you know what to expect join me as we take a step-by-step
331:25 expect join me as we take a step-by-step exploration through these essential
331:26 exploration through these essential programming
331:27 programming Concepts exam objective 4.3 explain the
331:31 Concepts exam objective 4.3 explain the purpose and use of programming
331:34 purpose and use of programming Concepts
331:36 Concepts identifiers in this video we will learn
331:38 identifiers in this video we will learn about two specific types of program
331:40 about two specific types of program identifiers a variable and a constant
331:44 identifiers a variable and a constant but first off let's talk about
331:45 but first off let's talk about identifiers as a whole you can think of
331:48 identifiers as a whole you can think of an identifier as a symbolic name that
331:50 an identifier as a symbolic name that points to a specific location in the
331:52 points to a specific location in the computer's memory just like your name
331:54 computer's memory just like your name helps people identify you identifiers
331:57 helps people identify you identifiers help the computer keep track of
331:58 help the computer keep track of different pieces of information referred
332:00 different pieces of information referred to as values looking at the graphic
332:03 to as values looking at the graphic behind me you can imagine the computer's
332:05 behind me you can imagine the computer's memory or Ram as a bunch of boxes
332:08 memory or Ram as a bunch of boxes each box holds some data it could be a
332:10 each box holds some data it could be a number a word or anything else
332:13 number a word or anything else identifiers are like labels on these
332:15 identifiers are like labels on these boxes they tell the computer which box
332:18 boxes they tell the computer which box to look in when it needs that particular
332:20 to look in when it needs that particular piece of
332:24 information great now we can break this topic down a bit more and focus on a
332:26 topic down a bit more and focus on a specific type of identifier called a
332:28 specific type of identifier called a variable in keeping with our box analogy
332:31 variable in keeping with our box analogy a variable is like an open box that can
332:34 a variable is like an open box that can hold different things at different times
332:36 hold different things at different times for example you might might have a
332:38 for example you might might have a variable called num 2 that holds an
332:39 variable called num 2 that holds an integer value you can put different
332:42 integer value you can put different values into this box and the computer
332:44 values into this box and the computer will remember them maybe you start with
332:46 will remember them maybe you start with the value
332:49 the value 20 but then change it to 47 the variable
332:53 20 but then change it to 47 the variable num two can be reassigned to the new
332:55 num two can be reassigned to the new value just like that and though the
332:57 value just like that and though the value has changed the identifier
332:59 value has changed the identifier symbolic name and the location where it
333:00 symbolic name and the location where it is stored in memory will
333:03 is stored in memory will not our next type of identifier is
333:06 not our next type of identifier is called a constant this will behave very
333:09 called a constant this will behave very similar to a variable at first with a
333:11 similar to a variable at first with a constant our box will start open but
333:14 constant our box will start open but once we assign a value to a constant the
333:16 once we assign a value to a constant the Box will be closed for the remainder of
333:18 Box will be closed for the remainder of the program's runtime in short a
333:21 the program's runtime in short a constant holds a single value that
333:22 constant holds a single value that doesn't change imagine you have a box
333:25 doesn't change imagine you have a box labeled Pi you then assign the value
333:28 labeled Pi you then assign the value 3.14 to the constant
333:31 3.14 to the constant PI from that moment forward our box will
333:34 PI from that moment forward our box will be sealed and you will be unable to
333:36 be sealed and you will be unable to change this value
333:39 change this value now that we know what a variable and a
333:41 now that we know what a variable and a constant are there is one last thing I
333:43 constant are there is one last thing I want to cover before we jump into our
333:44 want to cover before we jump into our first coding example once again look at
333:47 first coding example once again look at this flowchart where does our program
333:52 this flowchart where does our program start I hope you shout it out at the top
333:55 start I hope you shout it out at the top and if you did you are right coding
333:58 and if you did you are right coding works the same way reading code line by
334:01 works the same way reading code line by line from top to bottom is fundamental
334:03 line from top to bottom is fundamental to programming when looking at a program
334:06 to programming when looking at a program you will need to get comfortable
334:07 you will need to get comfortable sequentially following the execution
334:09 sequentially following the execution path of the program from the first line
334:11 path of the program from the first line at the top to the last line at the
334:13 at the top to the last line at the bottom doing so enables you to track
334:15 bottom doing so enables you to track variable changes understand the flow of
334:18 variable changes understand the flow of logic and observe control structures
334:21 logic and observe control structures just as you read a book or follow a set
334:22 just as you read a book or follow a set of instruction step by step reading code
334:25 of instruction step by step reading code linearly allows you to progressively
334:26 linearly allows you to progressively build a comprehensive understanding of
334:28 build a comprehensive understanding of how the program
334:30 how the program operates now we can work with some very
334:32 operates now we can work with some very simple code five lines of code to be
334:36 simple code five lines of code to be exact I have even numbered the lines of
334:38 exact I have even numbered the lines of code to help keep things organized so
334:41 code to help keep things organized so where should I start at the top with
334:44 where should I start at the top with line one of
334:45 line one of course here we see xal 5 this is called
334:50 course here we see xal 5 this is called an assignment statement as it assigns a
334:52 an assignment statement as it assigns a variable with a value in this case the
334:54 variable with a value in this case the integer five you can read this quite
334:56 integer five you can read this quite literally as X is assigned with the
334:58 literally as X is assigned with the value five for this assignment statement
335:01 value five for this assignment statement the identifier is X this is the symbolic
335:04 the identifier is X this is the symbolic name that will be used by the computer
335:06 name that will be used by the computer to reference the values location in
335:08 to reference the values location in memory the equal sign here is referred
335:11 memory the equal sign here is referred to as an assignment operator as it
335:13 to as an assignment operator as it performs the function of assigning a
335:14 performs the function of assigning a value and five is the value being stored
335:17 value and five is the value being stored the order is also very important the
335:20 the order is also very important the identifier will always be on the left
335:22 identifier will always be on the left and the value on the right of the
335:24 and the value on the right of the assignment operator if you look at the
335:26 assignment operator if you look at the top right of the screen I have
335:27 top right of the screen I have intentionally positioned a box that will
335:29 intentionally positioned a box that will help us keep track of our variable
335:31 help us keep track of our variable values as we progress through the lines
335:33 values as we progress through the lines of
335:34 of code okay on to line two here the value
335:38 code okay on to line two here the value of x is replaced with the integer 6
335:41 of x is replaced with the integer 6 because it is a variable we can reach in
335:43 because it is a variable we can reach in and remove the five and replace it with
335:45 and remove the five and replace it with the
335:46 the six now on line three we see something a
335:50 six now on line three we see something a bit different here the current value of
335:52 bit different here the current value of x is 6 but we are going to replace it
335:54 x is 6 but we are going to replace it with its current value plus two causing
335:56 with its current value plus two causing our new value to be
335:58 our new value to be 8 on line four we will be declaring a
336:01 8 on line four we will be declaring a new variable y this y variable will be
336:04 new variable y this y variable will be assigned the current value of x which
336:06 assigned the current value of x which happens to be 8
336:08 happens to be 8 and for our last line of code we will
336:10 and for our last line of code we will declare yet another variable Z and
336:13 declare yet another variable Z and assign it the value of x + y since the
336:15 assign it the value of x + y since the value of x is currently 8 and the value
336:17 value of x is currently 8 and the value of y is currently 8 Z will become
336:20 of y is currently 8 Z will become 16 this should give you some insight
336:22 16 this should give you some insight into how variables work as for constants
336:26 into how variables work as for constants the process is the same with the
336:27 the process is the same with the exception that you cannot change the
336:29 exception that you cannot change the value after the initial
336:31 value after the initial assignment so where do you use these
336:33 assignment so where do you use these variables and
336:34 variables and constants well just about anytime a prr
336:37 constants well just about anytime a prr needs to store a value in a place that
336:39 needs to store a value in a place that can be accessed quickly and where you
336:41 can be accessed quickly and where you need the value to remain in memory only
336:43 need the value to remain in memory only while the program is running and there
336:45 while the program is running and there you have it the basics of variables and
336:47 you have it the basics of variables and constants with regards to computer
336:51 constants with regards to computer programming exam objective 4.3 explain
336:54 programming exam objective 4.3 explain the purpose and use of programming
336:57 the purpose and use of programming Concepts
336:59 Concepts containers in this video we will build
337:02 containers in this video we will build upon the concept of identifiers and
337:04 upon the concept of identifiers and learn about
337:05 learn about containers containers are just a special
337:07 containers containers are just a special type of identifier and will therefore
337:09 type of identifier and will therefore have many of the same properties as a
337:11 have many of the same properties as a variable or a constant containers will
337:14 variable or a constant containers will still have a symbolic name that points
337:15 still have a symbolic name that points to a specific location in the computer's
337:18 to a specific location in the computer's memory and these symbolic names will
337:20 memory and these symbolic names will still help the computer keep track of
337:22 still help the computer keep track of different pieces of information referred
337:24 different pieces of information referred to as values so how are these containers
337:27 to as values so how are these containers different from a standard
337:28 different from a standard identifier well they are capable of
337:31 identifier well they are capable of holding more than one data element at a
337:33 holding more than one data element at a time while a standard variable or a
337:35 time while a standard variable or a constant Can Only Hold one data element
337:37 constant Can Only Hold one data element El at a time a container can hold one
337:40 El at a time a container can hold one two three or more data elements
337:46 simultaneously great now we can break this topic down a bit more and focus on
337:48 this topic down a bit more and focus on two specific container types the array
337:51 two specific container types the array and the vector but before I do a quick
337:54 and the vector but before I do a quick disclaimer for this topic I will be
337:56 disclaimer for this topic I will be following the terminology and
337:58 following the terminology and definitions provided in comptus official
338:00 definitions provided in comptus official study guide outside of this course you
338:03 study guide outside of this course you will find some ambiguity with regards to
338:05 will find some ambiguity with regards to this topic as each programming language
338:07 this topic as each programming language is likely to use slightly different
338:08 is likely to use slightly different terminology and definitions for arrays
338:11 terminology and definitions for arrays and
338:16 vectors okay so how does compa Define an array an array is a special type of
338:18 array an array is a special type of identifier that can reference multiple
338:21 identifier that can reference multiple values these values can be arranged in a
338:24 values these values can be arranged in a single or multi-dimensional manner which
338:26 single or multi-dimensional manner which you can visualize like a table with
338:27 you can visualize like a table with multiple columns and rows additionally
338:30 multiple columns and rows additionally an array will be of a fixed size meaning
338:33 an array will be of a fixed size meaning you cannot resize it after it is
338:35 you cannot resize it after it is declared now how does comp Define a
338:38 declared now how does comp Define a vector a vector is another special type
338:40 vector a vector is another special type of identifier that can reference
338:42 of identifier that can reference multiple values these values can also be
338:45 multiple values these values can also be arranged in a single or
338:47 arranged in a single or multi-dimensional manner but a vector
338:49 multi-dimensional manner but a vector differs from an array in one major way a
338:52 differs from an array in one major way a vector has the ability to grow or Shrink
338:54 vector has the ability to grow or Shrink in
338:56 in size now let's work with some very
338:58 size now let's work with some very simple code starting with the review of
339:00 simple code starting with the review of a standard
339:02 a standard variable in line one we declare a
339:04 variable in line one we declare a variable X by using the code xal 5 if
339:08 variable X by using the code xal 5 if you recall from the previous video on
339:10 you recall from the previous video on identifiers this is called an assignment
339:12 identifiers this is called an assignment statement as it assigns an identifier
339:14 statement as it assigns an identifier with a value for this assignment
339:16 with a value for this assignment statement the identifier is X this is
339:20 statement the identifier is X this is the symbolic name that will be used by
339:21 the symbolic name that will be used by the computer to reference the value
339:23 the computer to reference the value stored location in memory the equal sign
339:26 stored location in memory the equal sign here is referred to as an assignment
339:28 here is referred to as an assignment operator as it performs the function of
339:30 operator as it performs the function of assigning a value and five is the value
339:32 assigning a value and five is the value being
339:33 being stored now in line two we have a
339:36 stored now in line two we have a container
339:37 container here the identifier is numb list this is
339:40 here the identifier is numb list this is still considered an assignment statement
339:42 still considered an assignment statement as it assigns a container with a set of
339:44 as it assigns a container with a set of values in this case the integers 5 6 and
339:48 values in this case the integers 5 6 and 8 and for one more example we have a
339:51 8 and for one more example we have a container that is given the identifier
339:53 container that is given the identifier animals this container is assigned
339:56 animals this container is assigned multiple string values specifically cat
339:59 multiple string values specifically cat and
340:00 and dog so where do you use arrays and
340:02 dog so where do you use arrays and vectors outside of my example code well
340:06 vectors outside of my example code well just about anytime a program needs to
340:07 just about anytime a program needs to store a set of values this could include
340:10 store a set of values this could include storing a list of items like the months
340:12 storing a list of items like the months of the year or collection of data like a
340:14 of the year or collection of data like a list of strings containing customer
340:17 list of strings containing customer names and there you have it the basics
340:19 names and there you have it the basics of containers with regards to computer
340:22 of containers with regards to computer programming exam objective 4.2 given a
340:25 programming exam objective 4.2 given a scenario use programming organizational
340:27 scenario use programming organizational techniques and interpret
340:29 techniques and interpret logic
340:31 logic branching up till now we have only
340:34 branching up till now we have only looked at code running line by line from
340:36 looked at code running line by line from top to bottom
340:37 top to bottom this is like driving down a straight
340:39 this is like driving down a straight road with no exits twists or turns this
340:43 road with no exits twists or turns this works for the most basic of programs but
340:45 works for the most basic of programs but this will not allow our programs to make
340:47 this will not allow our programs to make decisions so how can we add decisions
340:50 decisions so how can we add decisions and variants into our programs well we
340:53 and variants into our programs well we have a control structure for that
340:55 have a control structure for that referred to as
340:57 referred to as branching a branching statement provides
340:59 branching a branching statement provides a program with a decision while driving
341:02 a program with a decision while driving from one city to another we could take a
341:04 from one city to another we could take a straight route down the highway but in
341:06 straight route down the highway but in reality we could very likely choose from
341:08 reality we could very likely choose from many different paths that all lead to
341:09 many different paths that all lead to the same destination this is the exact
341:12 the same destination this is the exact idea to keep in mind as we explain this
341:14 idea to keep in mind as we explain this topic of branching
341:20 statements using the power of flowcharts I will illustrate a branching statement
341:23 I will illustrate a branching statement as usual we will start at the top of our
341:25 as usual we will start at the top of our code next in the code we encounter a
341:28 code next in the code we encounter a branching statement here we are
341:30 branching statement here we are presented with a decision in the program
341:32 presented with a decision in the program as denoted by the diamond shaped symbol
341:34 as denoted by the diamond shaped symbol this flowchart displays a decision
341:36 this flowchart displays a decision having two Poss possible options option
341:39 having two Poss possible options option one would result in output one while
341:42 one would result in output one while option two would result in output two
341:45 option two would result in output two and regardless of which decision is made
341:47 and regardless of which decision is made both branches will eventually merge back
341:49 both branches will eventually merge back together and continue with any remaining
341:51 together and continue with any remaining code statements or in our case reach the
341:53 code statements or in our case reach the end of the
341:54 end of the program now I am going to zoom in on the
341:57 program now I am going to zoom in on the decision portion of this branching
341:58 decision portion of this branching statement when we reach a branching
342:00 statement when we reach a branching statement our program will of course
342:02 statement our program will of course have a decision to make but how does a
342:05 have a decision to make but how does a computer program make a decision
342:08 computer program make a decision well that is the next piece in this
342:09 well that is the next piece in this puzzle a branching statement will use a
342:12 puzzle a branching statement will use a condition statement to Aid in the
342:13 condition statement to Aid in the decision-making process a condition
342:16 decision-making process a condition statement will present a true or false
342:18 statement will present a true or false scenario for our example I am using the
342:21 scenario for our example I am using the condition statement if num is greater
342:23 condition statement if num is greater than two with this statement we will be
342:25 than two with this statement we will be looking at the numb variable and
342:27 looking at the numb variable and checking whether it is greater than
342:29 checking whether it is greater than two now should the variable num have a
342:32 two now should the variable num have a current value of 10 the conditional
342:34 current value of 10 the conditional statement would evaluate to true as 10
342:36 statement would evaluate to true as 10 is greater than two this would result in
342:39 is greater than two this would result in our code displaying output
342:41 our code displaying output one but if the current value of num was
342:43 one but if the current value of num was one the conditional statement would
342:45 one the conditional statement would evaluate to false as one is not greater
342:47 evaluate to false as one is not greater than two this would result in our code
342:50 than two this would result in our code displaying output
342:52 displaying output two hopefully you now understand the
342:54 two hopefully you now understand the concept of branching statements and the
342:56 concept of branching statements and the conditional statements that drive them
342:58 conditional statements that drive them now it is time for some more
343:00 now it is time for some more terminology next we will take these
343:02 terminology next we will take these Concepts and apply them to coding
343:04 Concepts and apply them to coding directly in most programming languages a
343:07 directly in most programming languages a decision with two branches is often
343:09 decision with two branches is often called an if else statement with this
343:11 called an if else statement with this code Arrangement if the conditional
343:13 code Arrangement if the conditional statement evaluates to true then the
343:15 statement evaluates to true then the first branch which would be the if
343:17 first branch which would be the if Branch will execute otherwise if the
343:20 Branch will execute otherwise if the conditional statement evaluates to false
343:22 conditional statement evaluates to false the second branch which would be the
343:23 the second branch which would be the else Branch will execute or to put it
343:26 else Branch will execute or to put it another way the else Branch acts as a
343:28 another way the else Branch acts as a catch all for any scenario where the if
343:30 catch all for any scenario where the if statement is not found to be
343:32 statement is not found to be true to wrap up this video let's take a
343:35 true to wrap up this video let's take a look at an if else branch using some
343:37 look at an if else branch using some pseudo code and walk you through the
343:38 pseudo code and walk you through the code line by line for our example we
343:41 code line by line for our example we will have some fun and pretend we are
343:43 will have some fun and pretend we are working with some military security
343:44 working with some military security clearance levels first up let's take an
343:47 clearance levels first up let's take an input for the user variable our input
343:50 input for the user variable our input will be General in receiving this input
343:53 will be General in receiving this input our user variable becomes equal to
343:55 our user variable becomes equal to General and is stored in
343:57 General and is stored in memory next we see online two if and
344:00 memory next we see online two if and online for else these are our two
344:03 online for else these are our two possible
344:05 possible branches you will start with the if
344:07 branches you will start with the if statement and see whether or not the
344:08 statement and see whether or not the condition evaluates to True since user
344:11 condition evaluates to True since user does indeed equal General our condition
344:13 does indeed equal General our condition is true and we will execute the indented
344:15 is true and we will execute the indented line of
344:16 line of code this line of code declares a
344:19 code this line of code declares a variable with the identifier of
344:20 variable with the identifier of clearance and assigns it the value of
344:22 clearance and assigns it the value of top
344:24 top secret now this next piece is very
344:26 secret now this next piece is very important because our if Branch was
344:29 important because our if Branch was selected we will now skip over lines
344:30 selected we will now skip over lines four and five which includes the else
344:32 four and five which includes the else branch and the code indented underneath
344:34 branch and the code indented underneath it just as you can only take one path on
344:37 it just as you can only take one path on the highway each time you go from one
344:39 the highway each time you go from one place to another you only execute One
344:42 place to another you only execute One path in a branching statement each time
344:43 path in a branching statement each time it is encountered in the
344:45 it is encountered in the code once we have concluded with the
344:47 code once we have concluded with the branching statement we pick up on the
344:49 branching statement we pick up on the very next line of code and continue on
344:52 very next line of code and continue on as for this last line of code the
344:54 as for this last line of code the program is directed to print or output
344:56 program is directed to print or output the value currently stored within the
344:58 the value currently stored within the variable clearance which happens to be
345:00 variable clearance which happens to be top secret great job for making it this
345:03 top secret great job for making it this far in the next video we will build upon
345:06 far in the next video we will build upon this concept and see how we can add
345:07 this concept and see how we can add additional
345:09 additional branches exam objective 4.2 given a
345:12 branches exam objective 4.2 given a scenario use programming organizational
345:14 scenario use programming organizational techniques and interpret
345:16 techniques and interpret logic branching
345:18 logic branching continued in the previous video on
345:21 continued in the previous video on branching we covered if else statements
345:24 branching we covered if else statements this was a perfect coding technique to
345:26 this was a perfect coding technique to use when presented with a choice that
345:28 use when presented with a choice that has only two possible outcomes but what
345:31 has only two possible outcomes but what if we have three or more possible
345:33 if we have three or more possible outcomes time to bring in the El's if
345:35 outcomes time to bring in the El's if Branch the elf if branch is a branch
345:38 Branch the elf if branch is a branch statement that will contain an
345:39 statement that will contain an additional condition statement it
345:41 additional condition statement it behaves exactly as the original if
345:43 behaves exactly as the original if Branch with one exception the if Branch
345:46 Branch with one exception the if Branch condition is checked prior to any else
345:48 condition is checked prior to any else if
345:50 if condition using flowcharts I will
345:52 condition using flowcharts I will illustrate this new
345:54 illustrate this new concept as usual we will start at the
345:56 concept as usual we will start at the top of our code next in the code we
345:59 top of our code next in the code we encounter a branching statement our
346:02 encounter a branching statement our first conditional statement will be our
346:03 first conditional statement will be our if statement the if statement will
346:06 if statement the if statement will present a condition that needs to be
346:08 present a condition that needs to be checked when the if statement's
346:10 checked when the if statement's condition evaluates to true the code
346:12 condition evaluates to true the code will display output one but when the if
346:15 will display output one but when the if statement's condition evaluates to false
346:17 statement's condition evaluates to false the code moves on to the next Branch for
346:20 the code moves on to the next Branch for this scenario that would be the El's if
346:22 this scenario that would be the El's if statement and just as it sounds else if
346:25 statement and just as it sounds else if is much like a backup plan for when plan
346:27 is much like a backup plan for when plan a fails here your code will repeat the
346:30 a fails here your code will repeat the condition check process but this time
346:31 condition check process but this time the check will be performed using the
346:33 the check will be performed using the else if conditional statement when the
346:36 else if conditional statement when the else if statement condition evaluates to
346:38 else if statement condition evaluates to true the code will display output
346:40 true the code will display output to now should the if statement and the
346:43 to now should the if statement and the else if statements all evaluate to false
346:46 else if statements all evaluate to false the code moves on to the else Branch
346:48 the code moves on to the else Branch this is our catch all Branch as there is
346:50 this is our catch all Branch as there is no conditional statement that has to be
346:52 no conditional statement that has to be satisfied for this scenario the else
346:55 satisfied for this scenario the else Branch leads to Output three being
346:57 Branch leads to Output three being displayed and once again regardless of
346:59 displayed and once again regardless of which decision is made all branches will
347:01 which decision is made all branches will eventually merge back together and
347:03 eventually merge back together and continue with any remaining code
347:05 continue with any remaining code statements or in our case reach the end
347:07 statements or in our case reach the end of the
347:09 of the program to wrap up this video let's take
347:11 program to wrap up this video let's take a look at another branching statement
347:14 a look at another branching statement again I will utilize some pseudo code
347:16 again I will utilize some pseudo code and walk you through the code line by
347:18 and walk you through the code line by line for this example we will be going
347:20 line for this example we will be going to the circus and we will need to
347:22 to the circus and we will need to determine our ticket price based on Age
347:25 determine our ticket price based on Age first up let's take an input for the age
347:27 first up let's take an input for the age variable our pretend person will be 20
347:30 variable our pretend person will be 20 years old in receiving this input our
347:33 years old in receiving this input our age variable becomes equal to 20 and is
347:35 age variable becomes equal to 20 and is stored in memory
347:37 stored in memory next we need to evaluate whether or not
347:39 next we need to evaluate whether or not the conditional statement for the if
347:41 the conditional statement for the if branch is true or false in this case our
347:44 branch is true or false in this case our current age of 20 is not less than four
347:46 current age of 20 is not less than four so the statement is
347:48 so the statement is false this causes us to skip line three
347:51 false this causes us to skip line three and pushes us down to the else if Branch
347:54 and pushes us down to the else if Branch now we need to evaluate whether or not
347:56 now we need to evaluate whether or not the conditional statement for the else
347:58 the conditional statement for the else if branch is true or false in this case
348:01 if branch is true or false in this case our current age of 20 is not less than
348:03 our current age of 20 is not less than 18 so the statement is
348:05 18 so the statement is false this this leads us to skip line
348:08 false this this leads us to skip line five and go straight to the Els Branch
348:09 five and go straight to the Els Branch our catchall here there is no
348:12 our catchall here there is no conditional
348:13 conditional statement with no check to perform we
348:16 statement with no check to perform we jump right into this branch and execute
348:18 jump right into this branch and execute the indented statement on line 7 this is
348:20 the indented statement on line 7 this is an assignment statement that declares
348:22 an assignment statement that declares the variable price and assigns at the
348:24 the variable price and assigns at the value
348:25 value shown once we have concluded with the
348:28 shown once we have concluded with the branching statement we pick up on the
348:29 branching statement we pick up on the very next line of code and continue on
348:32 very next line of code and continue on as for this last line of code the
348:34 as for this last line of code the program is directed to print or output
348:36 program is directed to print or output the value currently stored within the
348:38 the value currently stored within the variable price this can be seen on the
348:41 variable price this can be seen on the right hand side under
348:42 right hand side under output wow you are crushing this topic
348:46 output wow you are crushing this topic in the next video we will take
348:47 in the next video we will take everything we have learned about coding
348:49 everything we have learned about coding thus far and try to solve a few practice
348:51 thus far and try to solve a few practice questions exam objective 4.2 given a
348:55 questions exam objective 4.2 given a scenario use programming organizational
348:57 scenario use programming organizational techniques and interpret
348:59 techniques and interpret logic branching
349:01 logic branching practice time to practice your new
349:04 practice time to practice your new coding skills with some practice
349:05 coding skills with some practice questions these questions are specially
349:08 questions these questions are specially designed to prepare you for the CompTIA
349:10 designed to prepare you for the CompTIA ITF plus exam each question will contain
349:13 ITF plus exam each question will contain pseudo code represented in different
349:15 pseudo code represented in different ways remember there are no hard rules on
349:18 ways remember there are no hard rules on how to write pseudo code and CompTIA
349:20 how to write pseudo code and CompTIA likes to be a bit tricky ready here is
349:23 likes to be a bit tricky ready here is question one examine the following
349:25 question one examine the following pseudo code if the variable num is set
349:29 pseudo code if the variable num is set to four what will be the output if you
349:32 to four what will be the output if you want to try and solve this question on
349:33 want to try and solve this question on your own pause this video now
349:36 your own pause this video now otherwise I will go through the code
349:38 otherwise I will go through the code line by line in line one we have an if
349:41 line by line in line one we have an if statement so we know this is the first
349:43 statement so we know this is the first part of a larger branching statement
349:45 part of a larger branching statement your first task is to evaluate if num is
349:48 your first task is to evaluate if num is greater than seven which is a false
349:50 greater than seven which is a false statement as num is equal to 4 and four
349:53 statement as num is equal to 4 and four is not greater than seven so we head on
349:56 is not greater than seven so we head on down to the next Branch statement on
349:57 down to the next Branch statement on line three here we evaluate if num is
350:00 line three here we evaluate if num is less than 11 this is true as num is
350:03 less than 11 this is true as num is equal to 4 and 4 is less than 11 so this
350:07 equal to 4 and 4 is less than 11 so this is the branch we will execute the only
350:09 is the branch we will execute the only statement in this branch is to print
350:11 statement in this branch is to print which means to Output the string B so
350:15 which means to Output the string B so the answer to this question is B now
350:18 the answer to this question is B now many of you may be looking at line five
350:21 many of you may be looking at line five the condition num equals 4 is pretty
350:23 the condition num equals 4 is pretty tempting am I right but don't fall for
350:26 tempting am I right but don't fall for this remember that we start with the
350:29 this remember that we start with the first branch and work our way down the
350:30 first branch and work our way down the code sequentially until we find a branch
350:32 code sequentially until we find a branch that evaluates to True once we do that
350:35 that evaluates to True once we do that is the path we take
350:37 is the path we take you can only choose one
350:39 you can only choose one path in this question the computer never
350:42 path in this question the computer never even considers the third branch
350:43 even considers the third branch containing the num equals four
350:45 containing the num equals four conditional statement as it had already
350:47 conditional statement as it had already selected the previous
350:55 Branch here is question two examine the following pseudo code what will be the
350:57 following pseudo code what will be the output of this code if you want to try
351:00 output of this code if you want to try and solve this question on your own
351:02 and solve this question on your own pause this video now otherwise I will go
351:05 pause this video now otherwise I will go through the Cod line by line first off
351:08 through the Cod line by line first off remember this is pseudo code here we
351:11 remember this is pseudo code here we just need to follow the logic and
351:12 just need to follow the logic and consider the pseudo code as a truncated
351:14 consider the pseudo code as a truncated form of spoken language okay for this
351:17 form of spoken language okay for this question the case on line two and end
351:20 question the case on line two and end case on line 8 is pseudo code
351:21 case on line 8 is pseudo code representing the beginning and end of
351:23 representing the beginning and end of this branching statement and lines 3
351:26 this branching statement and lines 3 through 7 are our different branches
351:28 through 7 are our different branches knowing this probably makes this
351:30 knowing this probably makes this question seem a lot easier doesn't it
351:33 question seem a lot easier doesn't it now in line one we have an assignment
351:35 now in line one we have an assignment statement this statement declares a
351:37 statement this statement declares a variable with the identifier score and
351:39 variable with the identifier score and assigns it the value of
351:42 assigns it the value of 70. line two case opens our list of
351:45 70. line two case opens our list of possible branches from here we go Branch
351:48 possible branches from here we go Branch by Branch or line by line until we find
351:50 by Branch or line by line until we find a conditional statement that evaluates
351:52 a conditional statement that evaluates to true the branch on line three
351:54 to true the branch on line three evaluates to false as our score of 70.00
351:58 evaluates to false as our score of 70.00 is not greater than 90 the branch on
352:01 is not greater than 90 the branch on line 4 also evaluates to false as our
352:03 line 4 also evaluates to false as our score of 70.00 is not greater than 80
352:07 score of 70.00 is not greater than 80 the branch on line five is where most
352:09 the branch on line five is where most would make a mistake in coding we have
352:11 would make a mistake in coding we have to be precise this Branch evaluates to
352:14 to be precise this Branch evaluates to false as the score variable may be equal
352:17 false as the score variable may be equal to 70 but it is not greater than 70 in
352:21 to 70 but it is not greater than 70 in computer programming that is a huge
352:23 computer programming that is a huge difference now the branch online 6
352:26 difference now the branch online 6 evaluates to true as our score of 70.00
352:30 evaluates to true as our score of 70.00 is greater than 60 so we read on and are
352:33 is greater than 60 so we read on and are instructed to declare and set a variable
352:35 instructed to declare and set a variable identified as grade to the string value
352:37 identified as grade to the string value of D now that we have chosen a branch we
352:40 of D now that we have chosen a branch we move on to the next line of code
352:41 move on to the next line of code following the branch statement this is
352:44 following the branch statement this is line nine here the code outputs the
352:47 line nine here the code outputs the value of the grade variable which is
352:49 value of the grade variable which is currently d d is our final
352:58 answer here is question three examine the following pseudo code if today is
353:01 the following pseudo code if today is Sunday what will be the program's output
353:04 Sunday what will be the program's output if you want to try and solve this
353:05 if you want to try and solve this question on your pause this video
353:08 question on your pause this video now otherwise I will go through the code
353:11 now otherwise I will go through the code line by line okay so this piece of code
353:14 line by line okay so this piece of code is designed to Output a business's
353:16 is designed to Output a business's operating hours based on the day of the
353:18 operating hours based on the day of the week it does include some containers but
353:21 week it does include some containers but I am confident you can handle this as it
353:23 I am confident you can handle this as it is not that much different from the
353:24 is not that much different from the previous two
353:26 previous two questions in line one we have an
353:28 questions in line one we have an assignment statement this statement
353:30 assignment statement this statement declares a variable with the identifier
353:32 declares a variable with the identifier today and assigns it the string value of
353:35 today and assigns it the string value of Sunday next we have our containers line
353:38 Sunday next we have our containers line two shows a container with the
353:40 two shows a container with the identifier week day one and stores the
353:41 identifier week day one and stores the string values Monday Wednesday and
353:44 string values Monday Wednesday and Friday these values can be used as a set
353:47 Friday these values can be used as a set or referenced
353:48 or referenced individually line three shows another
353:50 individually line three shows another container with the identifier weak day
353:52 container with the identifier weak day two and stores the string values Tuesday
353:55 two and stores the string values Tuesday and Thursday and line 4 shows yet
353:58 and Thursday and line 4 shows yet another container with the identifier
353:59 another container with the identifier weekend and stores the string values
354:01 weekend and stores the string values Saturday and Sunday in line five we see
354:05 Saturday and Sunday in line five we see this question is once again testing us
354:07 this question is once again testing us on the concept of branching and this
354:09 on the concept of branching and this line is our if Branch our conditional
354:11 line is our if Branch our conditional statement is asking us to check if the
354:13 statement is asking us to check if the value of today is equal to Friday and
354:16 value of today is equal to Friday and here I have an opportunity to teach you
354:18 here I have an opportunity to teach you something new we know in coding that an
354:20 something new we know in coding that an equal sign is used as an assignment
354:22 equal sign is used as an assignment operator for many languages the single
354:25 operator for many languages the single equal sign has the job of assigning a
354:27 equal sign has the job of assigning a value to an
354:28 value to an identifier well to prevent confusion in
354:31 identifier well to prevent confusion in a computer program most languages use a
354:33 a computer program most languages use a double equal sign as a comparison
354:35 double equal sign as a comparison operator to see if two values are
354:37 operator to see if two values are equivalent in value now being that this
354:40 equivalent in value now being that this is just pseudo code exact syntax is not
354:42 is just pseudo code exact syntax is not necessary so be prepared to see some
354:44 necessary so be prepared to see some variance as you attempt these types of
354:47 variance as you attempt these types of questions okay back to the question at
354:49 questions okay back to the question at hand the variable today which is
354:52 hand the variable today which is currently set to Sunday is not equal to
354:54 currently set to Sunday is not equal to Friday so this statement evaluates to
354:57 Friday so this statement evaluates to false this causes us to skip line six
355:00 false this causes us to skip line six and move on to the else if branch on
355:01 and move on to the else if branch on line 7 here our conditional statement is
355:04 line 7 here our conditional statement is checking if the value of today which
355:06 checking if the value of today which which is currently set to Sunday exists
355:08 which is currently set to Sunday exists in the container weekend well weekend
355:11 in the container weekend well weekend contains the values Saturday and Sunday
355:14 contains the values Saturday and Sunday so yes Sunday is in the container
355:16 so yes Sunday is in the container weekend and our statement will evaluate
355:18 weekend and our statement will evaluate to true now we will execute this branch
355:22 to true now we will execute this branch which includes the indented statement on
355:23 which includes the indented statement on line 8 line 8 calls for the program to
355:26 line 8 line 8 calls for the program to Output the hours of 10 to 4: and that is
355:28 Output the hours of 10 to 4: and that is our answer if you found these example
355:31 our answer if you found these example questions helpful please share your
355:33 questions helpful please share your thoughts in the comments also I look
355:36 thoughts in the comments also I look forward to seeing you in the next video
355:38 forward to seeing you in the next video where we will begin our study of
355:40 where we will begin our study of Loops exam objective 4.2 given a
355:43 Loops exam objective 4.2 given a scenario use programming organizational
355:45 scenario use programming organizational techniques and interpret
355:47 techniques and interpret logic
355:49 logic looping up till now we have looked at
355:52 looping up till now we have looked at code running line by line from top to
355:55 code running line by line from top to bottom then we moved on to branching
355:57 bottom then we moved on to branching which provided our programs with the
355:59 which provided our programs with the power of
356:01 power of choice but now we are going to add one
356:03 choice but now we are going to add one more logical component to our coding
356:05 more logical component to our coding repertoire
356:07 repertoire looping programming Loops are structures
356:09 looping programming Loops are structures and coding that enable the repetition of
356:11 and coding that enable the repetition of a specific set of instructions until a
356:13 a specific set of instructions until a certain condition is no longer met they
356:16 certain condition is no longer met they allow for automating repetitive tasks
356:18 allow for automating repetitive tasks making your code more efficient and
356:22 making your code more efficient and concise using the power of flowcharts
356:24 concise using the power of flowcharts once again I will illustrate the concept
356:26 once again I will illustrate the concept of a programming loop as usual we will
356:29 of a programming loop as usual we will start at the top of our code next in the
356:32 start at the top of our code next in the code we encounter a loop statement here
356:35 code we encounter a loop statement here we are presented with a decision in the
356:36 we are presented with a decision in the program as denoted by the diamond shaped
356:38 program as denoted by the diamond shaped symbol this flowchart displays a
356:41 symbol this flowchart displays a decision of whether to enter the loop or
356:43 decision of whether to enter the loop or continue on with the remainder of the
356:44 continue on with the remainder of the code if we enter the loop we will
356:47 code if we enter the loop we will execute the code included inside the
356:49 execute the code included inside the loop in this case we have a process to
356:51 loop in this case we have a process to be
356:53 be performed and then an output of some
356:57 performed and then an output of some sort after the code inside the loop is
357:00 sort after the code inside the loop is executed we return back to the decision
357:02 executed we return back to the decision Point here we are once again presented
357:04 Point here we are once again presented with the option to enter the loop Loop
357:06 with the option to enter the loop Loop or continue on with the remainder of the
357:08 or continue on with the remainder of the code this looping process can be
357:10 code this looping process can be repeated as many times as necessary by
357:13 repeated as many times as necessary by the program once the program has
357:15 the program once the program has finished with the loop it will continue
357:17 finished with the loop it will continue on with any remaining code statements or
357:19 on with any remaining code statements or in our case reach the end of the program
357:22 in our case reach the end of the program now that we have discussed the basic
357:24 now that we have discussed the basic concept of looping in the next few
357:25 concept of looping in the next few videos we will progress deeper into this
357:27 videos we will progress deeper into this topic by exploring two common Loop types
357:30 topic by exploring two common Loop types the while loop and the for Loop the
357:33 the while loop and the for Loop the while loop and the for Loop the while
357:36 while loop and the for Loop the while Loop and the four Loop uh-oh looks like
357:39 Loop and the four Loop uh-oh looks like I got caught in a loop
357:46 myself exam objective 4.2 given a scenario use programming organizational
357:49 scenario use programming organizational techniques and interpret
357:50 techniques and interpret logic while
357:53 logic while Loops for this video we will discuss
357:56 Loops for this video we will discuss while Loops a while loop is a
357:58 while Loops a while loop is a programming construct that repeatedly
358:00 programming construct that repeatedly executes a block of code as long as a
358:02 executes a block of code as long as a specified condition remains true the
358:04 specified condition remains true the loop continues to run until the
358:06 loop continues to run until the condition evaluates to false at which
358:08 condition evaluates to false at which point the program moves on to the next
358:10 point the program moves on to the next section of code outside the loop a while
358:12 section of code outside the loop a while loop is best used in situations where
358:15 loop is best used in situations where you don't know beforehand how many times
358:16 you don't know beforehand how many times the code needs to be executed and you
358:18 the code needs to be executed and you want the loop to continue until a
358:20 want the loop to continue until a certain condition is no longer met we
358:22 certain condition is no longer met we will now take a closer look at the
358:24 will now take a closer look at the decision portion of this while loop a
358:27 decision portion of this while loop a while loop starts with a condition check
358:29 while loop starts with a condition check before entering the loop the condition
358:31 before entering the loop the condition specified in the while statement is
358:33 specified in the while statement is evaluated if the condition is true the
358:36 evaluated if the condition is true the code inside the loop is executed if the
358:39 code inside the loop is executed if the condition is false from the start the
358:41 condition is false from the start the loop will not be executed at all for our
358:43 loop will not be executed at all for our example we will be checking if the
358:45 example we will be checking if the variable num is a positive integer or
358:48 variable num is a positive integer or greater than zero to start things off
358:50 greater than zero to start things off our variable num is equal to four so the
358:53 our variable num is equal to four so the condition check is num greater than zero
358:55 condition check is num greater than zero will evaluate to true this will cause us
358:58 will evaluate to true this will cause us to execute the code within the while
359:00 to execute the code within the while loop next we will receive an integer
359:02 loop next we will receive an integer from a user that will be assigned to the
359:04 from a user that will be assigned to the num variable and replace our current
359:06 num variable and replace our current value here we will assume the value two
359:08 value here we will assume the value two was provided as an input here our
359:11 was provided as an input here our program will perform some type of
359:13 program will perform some type of process and then we will return back to
359:14 process and then we will return back to the condition check of the while loop at
359:17 the condition check of the while loop at this point we have completed the while
359:19 this point we have completed the while loop once now it is time to re-evaluate
359:22 loop once now it is time to re-evaluate and see if the condition statement of
359:24 and see if the condition statement of the while loop is still true here we can
359:26 the while loop is still true here we can see that the variable num which is now
359:28 see that the variable num which is now equal to two is indeed still greater
359:30 equal to two is indeed still greater than zero so we will execute the code
359:32 than zero so we will execute the code within the while loop a second time so
359:35 within the while loop a second time so again we will receive an integer from a
359:37 again we will receive an integer from a user that will be assigned to the num
359:39 user that will be assigned to the num variable and replace our current value
359:42 variable and replace our current value this time we will assume the value minus
359:43 this time we will assume the value minus one was provided as an input here our
359:46 one was provided as an input here our program will perform some type of
359:48 program will perform some type of process and then we will return back to
359:51 process and then we will return back to the condition check of the while loop at
359:53 the condition check of the while loop at this point we have completed the while
359:55 this point we have completed the while loop twice now it is time to once again
359:58 loop twice now it is time to once again re-evaluate and see if the condition
360:00 re-evaluate and see if the condition statement of the while loop is still
360:01 statement of the while loop is still true here we can see that the variable
360:04 true here we can see that the variable num which is now equal to minus 1 is no
360:06 num which is now equal to minus 1 is no longer greater than zero so we will not
360:08 longer greater than zero so we will not execute the code within the while loop
360:10 execute the code within the while loop anymore since the condition check has
360:13 anymore since the condition check has now evaluated to false we will continue
360:16 now evaluated to false we will continue with any remaining code statements or in
360:18 with any remaining code statements or in our case reach the end of the
360:21 our case reach the end of the program now that we got the flow of
360:23 program now that we got the flow of things let's take a look at a while loop
360:25 things let's take a look at a while loop using some pseudo code and walk through
360:27 using some pseudo code and walk through the code line by line for our pseudo
360:30 the code line by line for our pseudo code example we will keep things very
360:32 code example we will keep things very simple first up we will declare a
360:34 simple first up we will declare a variable with the ident Iden ifier X and
360:36 variable with the ident Iden ifier X and initialize it with the value of zero on
360:39 initialize it with the value of zero on line two we see a condition statement
360:41 line two we see a condition statement for a while loop our condition statement
360:44 for a while loop our condition statement calls for our program to check if x is
360:46 calls for our program to check if x is less than two since the value of the
360:49 less than two since the value of the variable X which is currently zero is
360:52 variable X which is currently zero is less than two we will execute the code
360:54 less than two we will execute the code statements within the loop the word
360:56 statements within the loop the word begin on line three is only used here to
360:58 begin on line three is only used here to Mark the beginning of the looped code
361:00 Mark the beginning of the looped code statements so let's continue on on line
361:04 statements so let's continue on on line four we will reassign the variable x
361:07 four we will reassign the variable x with the current value of x + 1 this is
361:10 with the current value of x + 1 this is a very important part of the while loop
361:12 a very important part of the while loop since the condition check of the while
361:14 since the condition check of the while loop is based on the value of x if our
361:17 loop is based on the value of x if our Loop does not provide a way for X to be
361:19 Loop does not provide a way for X to be modified in some way that will
361:20 modified in some way that will eventually cause the condition to
361:21 eventually cause the condition to evaluate to false we could find our code
361:24 evaluate to false we could find our code stuck in an endless cycle or what is
361:25 stuck in an endless cycle or what is referred to as an infinite loop on line
361:29 referred to as an infinite loop on line five our program prints out the value of
361:31 five our program prints out the value of variable X which is now one on line six
361:34 variable X which is now one on line six we have the word n to Mark the end of
361:36 we have the word n to Mark the end of the looped code
361:37 the looped code statements now we head back up to line
361:40 statements now we head back up to line two and start the while loop all over
361:42 two and start the while loop all over again this time we perform a
361:44 again this time we perform a reevaluation and check if x is still
361:46 reevaluation and check if x is still less than two since the value of the
361:49 less than two since the value of the variable X which is currently 1 is less
361:51 variable X which is currently 1 is less than 2 we will execute the code
361:53 than 2 we will execute the code statements within the loop again next we
361:56 statements within the loop again next we see the word begin this opens our looped
361:59 see the word begin this opens our looped code we reassign x with the current
362:01 code we reassign x with the current value of x + 1 making two the new value
362:05 value of x + 1 making two the new value we print out the value of x which is
362:07 we print out the value of x which is currently two and append it to the
362:09 currently two and append it to the previous output of one next we see the
362:12 previous output of one next we see the word end this closes our looped code and
362:15 word end this closes our looped code and finally we pop back up to the top of the
362:17 finally we pop back up to the top of the loop to perform our condition check a
362:19 loop to perform our condition check a third time this time we see that X is
362:22 third time this time we see that X is equal to two but no longer less than two
362:24 equal to two but no longer less than two so our condition evaluates to false this
362:27 so our condition evaluates to false this causes our program to move to the next
362:29 causes our program to move to the next line after the while loop in this
362:31 line after the while loop in this example since there is no more code our
362:34 example since there is no more code our program is done
362:36 program is done great job in the next video we will try
362:39 great job in the next video we will try to solve a few practice questions using
362:41 to solve a few practice questions using what we have learned about while
362:43 what we have learned about while Loops exam objective 4.2 given a
362:46 Loops exam objective 4.2 given a scenario use programming organizational
362:48 scenario use programming organizational techniques and interpret
362:50 techniques and interpret logic while loop
362:53 logic while loop practice time to practice your new
362:55 practice time to practice your new coding skills with some practice
362:57 coding skills with some practice questions these questions are specially
362:59 questions these questions are specially designed to prepare you for the CompTIA
363:01 designed to prepare you for the CompTIA ITF plus exam each question will contain
363:04 ITF plus exam each question will contain pseudo code repres presented in
363:06 pseudo code repres presented in different ways remember there are no
363:08 different ways remember there are no hard rules on how to write pseudo code
363:10 hard rules on how to write pseudo code and CompTIA likes to be a bit tricky
363:13 and CompTIA likes to be a bit tricky ready here is question one examine the
363:16 ready here is question one examine the following pseudo code what will be the
363:19 following pseudo code what will be the output if you want to try and solve this
363:22 output if you want to try and solve this question on your own pause this video
363:24 question on your own pause this video now otherwise I will go through the code
363:27 now otherwise I will go through the code line by line in line one we declare a
363:30 line by line in line one we declare a variable at num in line two we set the
363:33 variable at num in line two we set the variable at num to the value of H
363:36 variable at num to the value of H on line three we see a condition
363:38 on line three we see a condition statement for a while loop our condition
363:41 statement for a while loop our condition statement calls for our program to check
363:43 statement calls for our program to check if at num is less than 10 since the
363:45 if at num is less than 10 since the value of the variable at num which is
363:47 value of the variable at num which is currently 8 is less than 10 we will
363:49 currently 8 is less than 10 we will execute the code statements within the
363:51 execute the code statements within the loop the word begin on line four is only
363:55 loop the word begin on line four is only used here to Mark the beginning of the
363:56 used here to Mark the beginning of the looped code statements so let's continue
363:59 looped code statements so let's continue on on line five we will reassign the
364:02 on on line five we will reassign the variable at num with the current value
364:04 variable at num with the current value of at num plus one resulting in a value
364:06 of at num plus one resulting in a value of nine remember this is a very
364:09 of nine remember this is a very important part of the while loop since
364:12 important part of the while loop since the condition check of the while loop is
364:13 the condition check of the while loop is based on the value of it num if our Loop
364:16 based on the value of it num if our Loop does not provide a way for it num to be
364:18 does not provide a way for it num to be modified in some way that will
364:19 modified in some way that will eventually cause the condition to
364:21 eventually cause the condition to evaluate to false we could find our code
364:23 evaluate to false we could find our code stuck in an infinite loop on line six we
364:26 stuck in an infinite loop on line six we have the word n to Mark the end of the
364:28 have the word n to Mark the end of the looped code
364:29 looped code statements now we head back up to line
364:31 statements now we head back up to line three and start the while loop all over
364:33 three and start the while loop all over again this time we perform a
364:35 again this time we perform a reevaluation and check if at num is
364:37 reevaluation and check if at num is still less than 10 since the value of
364:40 still less than 10 since the value of the variable at num which is currently 9
364:42 the variable at num which is currently 9 is less than 10 we will execute the code
364:45 is less than 10 we will execute the code statements within the loop again next we
364:48 statements within the loop again next we see the word begin this opens our looped
364:50 see the word begin this opens our looped code then line five will increment our
364:53 code then line five will increment our variable at num by one again setting its
364:55 variable at num by one again setting its value to 10 this is followed by the word
364:58 value to 10 this is followed by the word end which closes our looped code and
365:01 end which closes our looped code and finally we pop back up to the top of the
365:03 finally we pop back up to the top of the loop to perform our condition check a
365:04 loop to perform our condition check a third time
365:06 third time this time we see that our variable at
365:07 this time we see that our variable at num is equal to 10 but no longer less
365:10 num is equal to 10 but no longer less than 10 so our condition evaluates to
365:12 than 10 so our condition evaluates to false this causes our program to move to
365:15 false this causes our program to move to the next line of code after the while
365:17 the next line of code after the while loop which happens to be line seven on
365:20 loop which happens to be line seven on line seven our program prints out the
365:22 line seven our program prints out the current value of at num which is now 10
365:25 current value of at num which is now 10 so our answer to this question is
365:33 10 here is question two examine the following pseudo code what will be the
365:36 following pseudo code what will be the output if you want to try and solve this
365:39 output if you want to try and solve this question on your own pause this video
365:41 question on your own pause this video now otherwise I will go through the code
365:44 now otherwise I will go through the code line by line in line one we declare a
365:47 line by line in line one we declare a variable my num and assign it the value
365:49 variable my num and assign it the value of one on line two we see a condition
365:52 of one on line two we see a condition statement for a while loop our condition
365:55 statement for a while loop our condition statement calls for our program to check
365:57 statement calls for our program to check if my num is less than two since the
366:00 if my num is less than two since the value of the variable my num which is
366:02 value of the variable my num which is currently one is less than two we will
366:04 currently one is less than two we will execute the code statement within the
366:06 execute the code statement within the loop the word begin on line three is
366:09 loop the word begin on line three is only used here to Mark the beginning of
366:10 only used here to Mark the beginning of the looped code statements so let's
366:13 the looped code statements so let's continue on on line four we will print
366:16 continue on on line four we will print out the value of my num plus 4 this will
366:19 out the value of my num plus 4 this will cause the program to Output the value of
366:21 cause the program to Output the value of five on line five we have the word n to
366:24 five on line five we have the word n to Mark the end of the looped code
366:26 Mark the end of the looped code statements now we head back up to line
366:29 statements now we head back up to line two and start the while loop all over
366:31 two and start the while loop all over again this time we perform a
366:33 again this time we perform a re-evaluation and check if my num is
366:35 re-evaluation and check if my num is still less than two since the value of
366:37 still less than two since the value of the variable my num which has never
366:39 the variable my num which has never changed is less than two we will execute
366:42 changed is less than two we will execute the code statements within the loop
366:43 the code statements within the loop again but let me pause here for a
366:46 again but let me pause here for a moment see anything wrong with this
366:49 moment see anything wrong with this scenario if you notice that we have an
366:52 scenario if you notice that we have an infinite Loop you are absolutely right
366:54 infinite Loop you are absolutely right in this Loop there is only one statement
366:57 in this Loop there is only one statement and that statement has the program
366:58 and that statement has the program output the value of my num + 4 this is
367:01 output the value of my num + 4 this is not a reassignment statement so my num
367:04 not a reassignment statement so my num will forever remain at one and our while
367:06 will forever remain at one and our while loop condition statement will forever
367:07 loop condition statement will forever evaluate to true now when running a
367:10 evaluate to true now when running a program that encounters an infinite Loop
367:12 program that encounters an infinite Loop you are likely to see nothing printed as
367:14 you are likely to see nothing printed as our program will fail so just disregard
367:17 our program will fail so just disregard the output of five we had a moment ago
367:19 the output of five we had a moment ago as the correct answer to this question
367:21 as the correct answer to this question would be
367:28 nothing here is question three examine the following pseudo code what will be
367:30 the following pseudo code what will be the output if you want to try and solve
367:33 the output if you want to try and solve this question on your own pause this
367:35 this question on your own pause this video
367:36 video now otherwise I will go through the code
367:38 now otherwise I will go through the code line by line in line one we declare a
367:42 line by line in line one we declare a variable counter and assigned the value
367:44 variable counter and assigned the value of one on line two we see a condition
367:47 of one on line two we see a condition statement for a while loop our condition
367:50 statement for a while loop our condition statement calls for our program to check
367:52 statement calls for our program to check if the variable counter is greater than
367:54 if the variable counter is greater than four since the value of the variable
367:56 four since the value of the variable counter which is currently one is not
367:58 counter which is currently one is not greater than four we will not execute
368:00 greater than four we will not execute the code statements within the loop this
368:03 the code statements within the loop this causes our program to move to the next
368:05 causes our program to move to the next line of code after the while loop which
368:07 line of code after the while loop which happens to be line six on line six our
368:11 happens to be line six on line six our program prints out the current value of
368:13 program prints out the current value of counter which is one so our answer to
368:16 counter which is one so our answer to this question is one now that was an
368:18 this question is one now that was an easy one but in all honesty I hope you
368:21 easy one but in all honesty I hope you find all while Loops easy now that you
368:23 find all while Loops easy now that you have had a little
368:24 have had a little practice exam objective 4.2 given a
368:28 practice exam objective 4.2 given a scenario use programming organizational
368:30 scenario use programming organizational techniques and interpret
368:32 techniques and interpret Logic for loops
368:35 Logic for loops for this video we will discuss for Loops
368:38 for this video we will discuss for Loops a for Loop is a programming construct
368:40 a for Loop is a programming construct that is very similar to a while loop but
368:42 that is very similar to a while loop but they differ slightly in their structure
368:44 they differ slightly in their structure and application both Loops repeat a
368:47 and application both Loops repeat a block of code allowing for efficient
368:49 block of code allowing for efficient automation of repetitive tasks the key
368:52 automation of repetitive tasks the key difference lies in their decision
368:54 difference lies in their decision mechanisms a for loop as pictured on the
368:56 mechanisms a for loop as pictured on the left typically specifies the number of
368:59 left typically specifies the number of iterations prior to execution making it
369:01 iterations prior to execution making it ideal for situations where the number of
369:03 ideal for situations where the number of iterations is known in advance on the
369:06 iterations is known in advance on the other hand a while loop as pictured on
369:08 other hand a while loop as pictured on the right relies on a condition to
369:10 the right relies on a condition to control its execution making it more
369:12 control its execution making it more suitable for scenarios where the number
369:14 suitable for scenarios where the number of iterations is
369:17 of iterations is uncertain now that we got the flow of
369:19 uncertain now that we got the flow of things let's take a look at a for Loop
369:21 things let's take a look at a for Loop using some pseudo code and walk through
369:22 using some pseudo code and walk through the code line by line our example will
369:25 the code line by line our example will demonstrate a four Loop which specifies
369:27 demonstrate a four Loop which specifies a counter variable I along with its
369:30 a counter variable I along with its start and end values by specifying the
369:33 start and end values by specifying the start and end values for I we are
369:35 start and end values for I we are designating in advance how many times we
369:37 designating in advance how many times we want to iterate through this for Loop
369:38 want to iterate through this for Loop using integer values this example will
369:41 using integer values this example will also include the keyword next a next
369:44 also include the keyword next a next statement is used in certain languages
369:46 statement is used in certain languages to increase the counter variable by the
369:48 to increase the counter variable by the value of one each time the loop
369:50 value of one each time the loop completes an
369:51 completes an iteration ready to walk through this
369:53 iteration ready to walk through this example line by line all right let's go
369:57 example line by line all right let's go first up we will declare a variable with
369:59 first up we will declare a variable with the identifier Y and initialize it with
370:01 the identifier Y and initialize it with the value of four on line two we see a
370:04 the value of four on line two we see a four Loop Loop statement the for Loop
370:07 four Loop Loop statement the for Loop statement starts with the word for this
370:09 statement starts with the word for this is followed by the Declaration of a
370:11 is followed by the Declaration of a counter variable for this example our
370:14 counter variable for this example our counter variable will be I this variable
370:17 counter variable will be I this variable is appropriately named as it will help
370:19 is appropriately named as it will help us keep count of which iteration of the
370:20 us keep count of which iteration of the loop we are on next we have our start
370:23 loop we are on next we have our start and end values with this statement we
370:25 and end values with this statement we know that we will continue this for loop
370:27 know that we will continue this for loop from the time our counter variable I
370:28 from the time our counter variable I starts at zero and continue until our
370:30 starts at zero and continue until our counter variable I reaches two being
370:33 counter variable I reaches two being that this is our first iteration our I
370:35 that this is our first iteration our I variable will be set to the value of
370:36 variable will be set to the value of zero for now the indented code statement
370:39 zero for now the indented code statement on line three is part of our looped code
370:42 on line three is part of our looped code it will reassign the variable y with the
370:44 it will reassign the variable y with the current value of y + 1 y will now be set
370:48 current value of y + 1 y will now be set to the value of five on line four we see
370:51 to the value of five on line four we see the word next this next statement will
370:54 the word next this next statement will increase the counter variable by the
370:56 increase the counter variable by the value of one and mark the end of our
370:57 value of one and mark the end of our Loop's first
370:59 Loop's first iteration now we head back up to line
371:01 iteration now we head back up to line two and start the for Loop all over
371:03 two and start the for Loop all over again since the value of the variable I
371:06 again since the value of the variable I which is currently one is still in the
371:08 which is currently one is still in the range of 0 to 2 we will iterate through
371:10 range of 0 to 2 we will iterate through the four loop again on line three we
371:12 the four loop again on line three we will reassign y with the current value
371:14 will reassign y with the current value of y + 1 making six the new value on
371:18 of y + 1 making six the new value on line four we see the word next this next
371:21 line four we see the word next this next statement will increase the counter
371:23 statement will increase the counter variable by the value of one and mark
371:25 variable by the value of one and mark the end of our Loop's second
371:27 the end of our Loop's second iteration next we pop back up to the top
371:29 iteration next we pop back up to the top of the for loop again since the value of
371:32 of the for loop again since the value of the variable I which is currently two is
371:34 the variable I which is currently two is still in the range of 0 to 2 we will
371:36 still in the range of 0 to 2 we will iterate through the four loop again on
371:39 iterate through the four loop again on line three we will reassign y with the
371:41 line three we will reassign y with the current value of y + 1 making seven the
371:43 current value of y + 1 making seven the new value on line four we see the word
371:47 new value on line four we see the word next this next statement will increase
371:49 next this next statement will increase the counter variable by the value of one
371:51 the counter variable by the value of one and mark the end of our Loop's third
371:53 and mark the end of our Loop's third iteration now this time when we pop back
371:56 iteration now this time when we pop back up to the top of the for Loop since the
371:58 up to the top of the for Loop since the value of the variable I which is
372:00 value of the variable I which is currently three is no longer in the
372:01 currently three is no longer in the range of 0 to two we will not iterate
372:03 range of 0 to two we will not iterate through the four loop again
372:05 through the four loop again instead we will continue on in the code
372:07 instead we will continue on in the code with the next line following the F Loop
372:09 with the next line following the F Loop which is line five on line five we will
372:12 which is line five on line five we will reassign y with the current value of y +
372:15 reassign y with the current value of y + 5 making 12 the new value we also no
372:18 5 making 12 the new value we also no longer retain the counter variable I in
372:20 longer retain the counter variable I in memory as we have finished with our for
372:22 memory as we have finished with our for Loop next on line six we see the word
372:26 Loop next on line six we see the word echo echo is a word used by some
372:28 echo echo is a word used by some programs to perform an output in this
372:31 programs to perform an output in this case our program is called to Output the
372:33 case our program is called to Output the value of y which is currently 12 and
372:36 value of y which is currently 12 and with no more lines of code our program
372:38 with no more lines of code our program ends now if you ever feel like you're
372:41 ends now if you ever feel like you're stuck in an infinite Loop of confusion
372:43 stuck in an infinite Loop of confusion just press pause grab a snack and debug
372:45 just press pause grab a snack and debug your frustrations before diving back
372:47 your frustrations before diving back into our video
372:49 into our video series exam objective 4.3 explain the
372:52 series exam objective 4.3 explain the purpose and use of programming
372:55 purpose and use of programming Concepts
372:57 Concepts functions let's start with the basics
373:00 functions let's start with the basics what exactly is a programming function
373:03 what exactly is a programming function in simple terms a function is is a
373:05 in simple terms a function is is a reusable block of code that performs a
373:07 reusable block of code that performs a specific task or set of steps this
373:10 specific task or set of steps this enables programs to be divided into
373:12 enables programs to be divided into reusable
373:13 reusable components think of it as a set of
373:15 components think of it as a set of instructions that we can call upon
373:17 instructions that we can call upon whenever we need to perform that task
373:19 whenever we need to perform that task without having to write the same code
373:20 without having to write the same code over and over
373:22 over and over again now let's explore the input and
373:25 again now let's explore the input and output aspect of a function think about
373:28 output aspect of a function think about a vending machine you put coins in that
373:30 a vending machine you put coins in that is your input then you press a button
373:32 is your input then you press a button and out comes your snack that is your
373:34 and out comes your snack that is your output
373:36 output functions work in a similar fashion you
373:38 functions work in a similar fashion you feed them some data or values as input
373:41 feed them some data or values as input they process it and then they give you
373:42 they process it and then they give you back an
373:44 back an output and now let's explore how to put
373:46 output and now let's explore how to put our functions to work in programming
373:49 our functions to work in programming this is referred to as calling the
373:51 this is referred to as calling the function this involves using its name
373:53 function this involves using its name and passing the function any necessary
373:56 and passing the function any necessary inputs the function can then carry out
373:58 inputs the function can then carry out its tasks and hands you back an
374:01 its tasks and hands you back an output I have provided you with a
374:03 output I have provided you with a definition for functions and we have
374:04 definition for functions and we have disc discussed inputs outputs and calls
374:08 disc discussed inputs outputs and calls while this would be enough information
374:09 while this would be enough information to answer any questions about functions
374:11 to answer any questions about functions on the ITF plus exam I think you would
374:13 on the ITF plus exam I think you would benefit from seeing this concept in
374:15 benefit from seeing this concept in action so here we go for my coding
374:19 action so here we go for my coding example I will be using python okay time
374:22 example I will be using python okay time to go line by line on line one we
374:25 to go line by line on line one we declare a variable named Global number
374:27 declare a variable named Global number and assign it the value of four on line
374:30 and assign it the value of four on line two I have left a space this is common
374:34 two I have left a space this is common practice just before defining a function
374:35 practice just before defining a function as it makes your code easier to
374:38 as it makes your code easier to understand on line three we Define our
374:40 understand on line three we Define our function defa is a keyword used to
374:43 function defa is a keyword used to define a function in Python this is
374:45 define a function in Python this is followed by the function name the
374:47 followed by the function name the function name is what we will use to
374:49 function name is what we will use to call the function when needed I have
374:51 call the function when needed I have named this function double as the
374:53 named this function double as the purpose of this function will be to take
374:55 purpose of this function will be to take a number as an input and output twice
374:57 a number as an input and output twice that numberers value inside the
374:59 that numberers value inside the parentheses we have a parameter in the
375:02 parentheses we have a parameter in the context of a function a parameter is a
375:05 context of a function a parameter is a variable that is used to pass
375:06 variable that is used to pass information into a function here I have
375:09 information into a function here I have named our parameter local number on
375:11 named our parameter local number on lines four and five we have two indented
375:14 lines four and five we have two indented code statements these are the lines of
375:16 code statements these are the lines of code that will execute when the function
375:18 code that will execute when the function is called line 4 reassigns the variable
375:21 is called line 4 reassigns the variable local number with the current value of
375:23 local number with the current value of local number * 2 on line five we output
375:26 local number * 2 on line five we output the new value of the local number
375:28 the new value of the local number variable on line six I have left another
375:31 variable on line six I have left another space to assist in the readability of
375:33 space to assist in the readability of the code on line 7 we call the function
375:36 the code on line 7 we call the function double by using its name inside the
375:39 double by using its name inside the parentheses is our variable Global
375:41 parentheses is our variable Global number this is the input we will pass to
375:44 number this is the input we will pass to the function this input will then become
375:46 the function this input will then become our parameter or variable named local
375:49 our parameter or variable named local number and that is what a function will
375:51 number and that is what a function will look like in
375:52 look like in code Now One More Concept to learn
375:55 code Now One More Concept to learn before I wrap up this video on functions
375:58 before I wrap up this video on functions I would like to teach you about global
376:00 I would like to teach you about global and local variables and I must admit I
376:03 and local variables and I must admit I was deliberate when choosing my variable
376:05 was deliberate when choosing my variable names this time around Global and local
376:08 names this time around Global and local variables are fundamental concepts in
376:10 variables are fundamental concepts in programming that Define the scope or
376:12 programming that Define the scope or accessibility of variables within a
376:14 accessibility of variables within a program a global variable is one that is
376:17 program a global variable is one that is defined outside of any function or code
376:19 defined outside of any function or code block it holds a scope that extends
376:21 block it holds a scope that extends throughout the entire program enabling
376:23 throughout the entire program enabling it to be accessed and modified from any
376:25 it to be accessed and modified from any part of the code these variables are
376:28 part of the code these variables are often declared at the beginning of a
376:30 often declared at the beginning of a program on the other hand local
376:32 program on the other hand local variables are confined within a specific
376:34 variables are confined within a specific function function or code block they
376:36 function function or code block they have a localized scope restricting their
376:39 have a localized scope restricting their accessibility to only the function or
376:41 accessibility to only the function or code Block in which they are defined
376:43 code Block in which they are defined these variables are particularly useful
376:45 these variables are particularly useful for storing temporary data required for
376:47 for storing temporary data required for a specific operation or
376:49 a specific operation or calculation since each function call
376:51 calculation since each function call establishes its own scope local
376:53 establishes its own scope local variables within that scope don't affect
376:55 variables within that scope don't affect other parts of the program in summary
376:58 other parts of the program in summary Global variables offer Universal
377:00 Global variables offer Universal accessibility throughout the program
377:02 accessibility throughout the program while local variables are confined
377:04 while local variables are confined within their resp itive functions or
377:05 within their resp itive functions or code blocks additionally local variables
377:09 code blocks additionally local variables will no longer exist in memory when the
377:11 will no longer exist in memory when the function that defines the variable
377:12 function that defines the variable finishes and passes control back to its
377:14 finishes and passes control back to its calling program exam objective 4.3
377:18 calling program exam objective 4.3 explain the purpose and use of
377:19 explain the purpose and use of programming
377:21 programming Concepts
377:23 Concepts objects to start off this video about
377:26 objects to start off this video about programming objects imagine you have a
377:28 programming objects imagine you have a car a car is a complex system made up of
377:31 car a car is a complex system made up of various parts each with its own unique
377:33 various parts each with its own unique functionality but what if you had to
377:35 functionality but what if you had to remember the details of every part and
377:37 remember the details of every part and how they all work together it would be
377:39 how they all work together it would be overwhelming right well that's where
377:43 overwhelming right well that's where programming objects come in objects help
377:45 programming objects come in objects help us to organize and manage complexity by
377:48 us to organize and manage complexity by grouping related data and functions
377:50 grouping related data and functions together just like a car has wheels an
377:52 together just like a car has wheels an engine and seats an object has its own
377:55 engine and seats an object has its own characteristics and
377:57 characteristics and behaviors so what exactly is an object
378:01 behaviors so what exactly is an object think of it as a self-contained unit
378:03 think of it as a self-contained unit that groups together data and actions
378:06 that groups together data and actions it's a way to represent real world
378:07 it's a way to represent real world things or concepts in a digital format
378:11 things or concepts in a digital format for example if you were developing a
378:13 for example if you were developing a software system for an automotive
378:14 software system for an automotive dealership in this context we could
378:17 dealership in this context we could create an object called car this car
378:20 create an object called car this car object would store details about a
378:22 object would store details about a specific car model including its year
378:24 specific car model including its year make model name and color Additionally
378:27 make model name and color Additionally the car object would have methods that
378:29 the car object would have methods that enable actions such as checking its
378:31 enable actions such as checking its availability calculating loan payments
378:33 availability calculating loan payments and scheduling delivery
378:36 and scheduling delivery now let's talk about object properties
378:38 now let's talk about object properties and attributes these are often used
378:40 and attributes these are often used interchangeably but there's a slight
378:43 interchangeably but there's a slight difference while both deal with the
378:45 difference while both deal with the characteristics of an object attributes
378:47 characteristics of an object attributes are the intrinsic
378:48 are the intrinsic characteristics they Define the object
378:50 characteristics they Define the object State and store information relevant to
378:52 State and store information relevant to the object's identity these data values
378:55 the object's identity these data values collectively provide a snapshot of the
378:57 collectively provide a snapshot of the object's current characteristics at any
378:59 object's current characteristics at any given time as for properties they
379:02 given time as for properties they provide a controlled way to interact
379:03 provide a controlled way to interact with an object's attributes thus acting
379:06 with an object's attributes thus acting as a bridge between the data elements of
379:07 as a bridge between the data elements of an object and the external code that
379:09 an object and the external code that uses that
379:11 uses that object and finally let's explore object
379:14 object and finally let's explore object methods think of methods as the actions
379:17 methods think of methods as the actions an object can perform they're like the
379:19 an object can perform they're like the functions that an object knows how to
379:21 functions that an object knows how to execute referring back to our car object
379:24 execute referring back to our car object from earlier in this video this object
379:26 from earlier in this video this object might have multiple methods like
379:28 might have multiple methods like accelerate and break or refuel these
379:31 accelerate and break or refuel these methods allow us to interact with the
379:32 methods allow us to interact with the object and perform actions Rel Rel ated
379:35 object and perform actions Rel Rel ated to it or for you old school video game
379:37 to it or for you old school video game lovers if you were playing the Super
379:39 lovers if you were playing the Super Mario Brothers video game and wanted to
379:41 Mario Brothers video game and wanted to make Mario run jump or duck you would
379:43 make Mario run jump or duck you would push a button on the video game
379:45 push a button on the video game controller in turn the video games
379:47 controller in turn the video games program would apply a method to the
379:49 program would apply a method to the Mario object causing the desired outcome
379:52 Mario object causing the desired outcome and with that we have completed domain
379:54 and with that we have completed domain four of the CompTIA exam objectives next
379:57 four of the CompTIA exam objectives next up we have database
379:59 up we have database fundamentals Ready Set Let's a go exam
380:02 fundamentals Ready Set Let's a go exam objective 5.1 explain data database
380:05 objective 5.1 explain data database Concepts and the purpose of a
380:07 Concepts and the purpose of a database using a
380:10 database using a database databases have become an
380:12 database databases have become an integral part of our modern world
380:14 integral part of our modern world permeating virtually every aspect of Our
380:16 permeating virtually every aspect of Our Lives from the moment we wake up to the
380:18 Lives from the moment we wake up to the time we go to sleep databases are at
380:20 time we go to sleep databases are at work in the realm of Technology they
380:23 work in the realm of Technology they power the applications on our
380:25 power the applications on our smartphones storing contacts messages
380:27 smartphones storing contacts messages and app data online shopping relies on
380:30 and app data online shopping relies on databases to manage product information
380:33 databases to manage product information inventory and customer accounts even
380:36 inventory and customer accounts even social media platforms utilize databases
380:38 social media platforms utilize databases to store user profiles posts and
380:41 to store user profiles posts and interactions in essence databases are
380:44 interactions in essence databases are the unsung heroes of the digital age
380:46 the unsung heroes of the digital age silently and seamlessly managing vast
380:48 silently and seamlessly managing vast amounts of information making our modern
380:50 amounts of information making our modern world more efficient and interconnected
380:52 world more efficient and interconnected than ever before so what is a database a
380:56 than ever before so what is a database a database is a structured collection of
380:58 database is a structured collection of organized data that is stored and
381:00 organized data that is stored and managed in a way that allows for
381:01 managed in a way that allows for efficient retrieval modification and
381:03 efficient retrieval modification and Analysis of
381:05 Analysis of information if you are still a bit fuzzy
381:07 information if you are still a bit fuzzy with this idea think of it as a digital
381:09 with this idea think of it as a digital filing cabinet providing a centralized
381:12 filing cabinet providing a centralized place to store and manage information
381:14 place to store and manage information creating a database is like setting up a
381:16 creating a database is like setting up a brand new filing cabinet you give it a
381:19 brand new filing cabinet you give it a name Define what information the
381:21 name Define what information the database will store where it will be
381:22 database will store where it will be stored and how the information will be
381:25 stored and how the information will be accessed and just like that voila it's
381:29 accessed and just like that voila it's ready to store your
381:31 ready to store your data once you have created a new
381:33 data once you have created a new database it will be empty now you will
381:36 database it will be empty now you will need to populate the new database with
381:38 need to populate the new database with data records data records can be input
381:41 data records data records can be input manually or imported from another source
381:44 manually or imported from another source whether you input records manually or
381:46 whether you input records manually or import them from another source this is
381:48 import them from another source this is just like placing documents into your
381:49 just like placing documents into your filing
381:51 filing cabinet now that we have all these
381:53 cabinet now that we have all these records that have been placed into our
381:54 records that have been placed into our database what then well we could query
381:57 database what then well we could query the database a query is a question or
382:00 the database a query is a question or request for specific information from a
382:03 request for specific information from a database and is the way in in which we
382:04 database and is the way in in which we retrieve data stored in the database
382:07 retrieve data stored in the database imagine a database that stores Student
382:09 imagine a database that stores Student Records now think of a query as having a
382:12 Records now think of a query as having a magical conversation with your database
382:15 magical conversation with your database you can ask it all sorts of questions
382:17 you can ask it all sorts of questions like who has the highest grade or how
382:20 like who has the highest grade or how many students scored above 90 the
382:22 many students scored above 90 the database with its Lightning Fast search
382:24 database with its Lightning Fast search and retrieval abilities will provide you
382:26 and retrieval abilities will provide you with the exact answers you're looking
382:28 with the exact answers you're looking for helping you make informed decisions
382:30 for helping you make informed decisions and gain valuable insights from your
382:33 and gain valuable insights from your data lastly reporting is about creating
382:36 data lastly reporting is about creating organized visual summaries of queried
382:38 organized visual summaries of queried data reports play a crucial role in
382:41 data reports play a crucial role in transforming raw data into meaningful
382:43 transforming raw data into meaningful organized and Visually appealing
382:45 organized and Visually appealing information think of reports as the
382:47 information think of reports as the polished presentations of your data much
382:49 polished presentations of your data much like the executive summary of a
382:51 like the executive summary of a comprehensive document they are designed
382:53 comprehensive document they are designed to provide a clear concise and
382:55 to provide a clear concise and structured view of the data making it
382:57 structured view of the data making it easier for users to understand and
382:59 easier for users to understand and analyze the information at a glance and
383:02 analyze the information at a glance and that concludes your introduction to
383:04 that concludes your introduction to datab bases from creation to data inputs
383:07 datab bases from creation to data inputs and imports queries and reports
383:10 and imports queries and reports databases are critical to Modern
383:12 databases are critical to Modern information sharing and storage and
383:14 information sharing and storage and understanding them is a fundamental
383:16 understanding them is a fundamental skill that everyone in the it field
383:18 skill that everyone in the it field should have exam objective 5.1 explain
383:22 should have exam objective 5.1 explain database Concepts and the purpose of a
383:25 database Concepts and the purpose of a database flat file versus
383:28 database flat file versus database working with data can be
383:30 database working with data can be accomplished using multiple tools small
383:33 accomplished using multiple tools small data sets that are are shared by one or
383:35 data sets that are are shared by one or two users can be managed in text files
383:37 two users can be managed in text files and or spreadsheets these text files and
383:40 and or spreadsheets these text files and spreadsheets are usually referred to as
383:42 spreadsheets are usually referred to as flat file systems and provide a very
383:44 flat file systems and provide a very simple method of storing data in a flat
383:46 simple method of storing data in a flat file system data is typically stored in
383:49 file system data is typically stored in individual tables or files with little
383:51 individual tables or files with little to no structured relationships between
383:53 to no structured relationships between the data elements it's important to note
383:56 the data elements it's important to note that while flat file systems are easy to
383:58 that while flat file systems are easy to work within many scenarios they may not
384:00 work within many scenarios they may not be suitable for large scale complex data
384:02 be suitable for large scale complex data management tasks that require Advanced
384:04 management tasks that require Advanced dat relationships and querying
384:06 dat relationships and querying capabilities in such cases a database
384:09 capabilities in such cases a database management system would be more
384:11 management system would be more appropriate by using a database in place
384:14 appropriate by using a database in place of a flat file system you gain several
384:16 of a flat file system you gain several key benefits the first of which is a
384:19 key benefits the first of which is a database's ability to handle multiple
384:21 database's ability to handle multiple concurrent users when multiple users or
384:24 concurrent users when multiple users or processes attempt to read or write to
384:26 processes attempt to read or write to the same flat file simultaneously
384:28 the same flat file simultaneously without proper coordination conflicts
384:30 without proper coordination conflicts can occur these conflicts can result in
384:33 can occur these conflicts can result in data corruption loss or inconsistencies
384:35 data corruption loss or inconsistencies due to the absence of built-in
384:37 due to the absence of built-in concurrency controls locking mechanisms
384:39 concurrency controls locking mechanisms and transaction management which are
384:41 and transaction management which are essential features provided by modern
384:44 essential features provided by modern databases by using a database you will
384:46 databases by using a database you will be able to provide simultaneous read and
384:48 be able to provide simultaneous read and write capabilities to tens hundreds or
384:51 write capabilities to tens hundreds or even thousands of users concurrently or
384:53 even thousands of users concurrently or at the same
384:54 at the same time using a database also provides
384:58 time using a database also provides scalability scalability in this context
385:01 scalability scalability in this context refers to the database's capability to
385:03 refers to the database's capability to accommodate a growing volum volume of
385:04 accommodate a growing volum volume of data increased user traffic or
385:06 data increased user traffic or additional workloads by efficiently
385:08 additional workloads by efficiently expanding its storage capacity and
385:10 expanding its storage capacity and compute
385:11 compute resources another advantage of databases
385:14 resources another advantage of databases over flat file systems comes in the form
385:16 over flat file systems comes in the form of increased speed databases are
385:19 of increased speed databases are optimized for data retrieval and
385:21 optimized for data retrieval and manipulation they employ indexing
385:24 manipulation they employ indexing caching query optimization and other
385:26 caching query optimization and other performance-enhancing techniques to
385:28 performance-enhancing techniques to efficiently store sort and retrieve
385:30 efficiently store sort and retrieve large quantities of data
385:32 large quantities of data quickly and as a fin benefit databases
385:35 quickly and as a fin benefit databases can handle a wide range of data types
385:38 can handle a wide range of data types flat file systems are typically limited
385:40 flat file systems are typically limited to Text data while databases can handle
385:43 to Text data while databases can handle a wide variety of data types including
385:45 a wide variety of data types including text numbers dates images audio video
385:49 text numbers dates images audio video and More in summary databases are a
385:52 and More in summary databases are a superior Choice over flat file systems
385:54 superior Choice over flat file systems in scenarios where you need to
385:56 in scenarios where you need to accommodate multiple concurrent users
385:58 accommodate multiple concurrent users achieve scalability for growing data
386:00 achieve scalability for growing data needs ensure fast and efficient data
386:02 needs ensure fast and efficient data access and work with a variety of data
386:04 access and work with a variety of data types exam objective 5.1 explain
386:08 types exam objective 5.1 explain database Concepts and the purpose of a
386:10 database Concepts and the purpose of a database records and
386:13 database records and storage records are a fundamental
386:16 storage records are a fundamental component of databases because they
386:17 component of databases because they serve as the building blocks for
386:19 serve as the building blocks for organizing storing and managing data
386:22 organizing storing and managing data efficiently databases are designed to
386:24 efficiently databases are designed to store vast amounts of information in a
386:26 store vast amounts of information in a structured and organized Manner and
386:28 structured and organized Manner and records are the means by which this data
386:30 records are the means by which this data is logically grouped and categorized so
386:33 is logically grouped and categorized so if I was to Define what what a database
386:34 if I was to Define what what a database record is I would have to say they are
386:36 record is I would have to say they are collections of related data fields that
386:38 collections of related data fields that represent a single unit of information
386:40 represent a single unit of information or entity within a database it is often
386:43 or entity within a database it is often used to store and retrieve specific
386:45 used to store and retrieve specific information about an object or
386:47 information about an object or item in a human resources database an
386:50 item in a human resources database an employee record might include Fields
386:52 employee record might include Fields such as the employee ID employees name
386:54 such as the employee ID employees name job title salary or any other necessary
386:57 job title salary or any other necessary information pertaining to each employee
387:00 information pertaining to each employee each record would therefore represents a
387:01 each record would therefore represents a unique employee within the organization
387:05 unique employee within the organization now it should go without saying but the
387:07 now it should go without saying but the storage of all these records needs to be
387:09 storage of all these records needs to be persistent the persistent storage of a
387:12 persistent the persistent storage of a database refers to the long-term
387:13 database refers to the long-term retention of data within a database
387:15 retention of data within a database management system even when the system
387:17 management system even when the system is not actively running or powered on
387:19 is not actively running or powered on this is a crucial aspect of databases
387:22 this is a crucial aspect of databases because it ensures that data remains
387:23 because it ensures that data remains available and durable even in the face
387:25 available and durable even in the face of system failures power outages or
387:28 of system failures power outages or shutdowns to accomplish this databases
387:31 shutdowns to accomplish this databases are typically stored on various types of
387:33 are typically stored on various types of storage media which can include hard
387:35 storage media which can include hard disk drives hdds solid state drives ssds
387:39 disk drives hdds solid state drives ssds network attached storage or cloud-based
387:41 network attached storage or cloud-based storage
387:43 storage solutions to summarize database records
387:45 solutions to summarize database records are fundamental for efficiently
387:47 are fundamental for efficiently organizing and categorizing data in
387:50 organizing and categorizing data in databases persistent storage ensures
387:52 databases persistent storage ensures data availability and durability and is
387:54 data availability and durability and is achieved through various storage media
387:57 achieved through various storage media options exam objective 5.2 compare and
388:00 options exam objective 5.2 compare and contrast various database
388:02 contrast various database structures data datase structure
388:05 structures data datase structure types database structures are
388:07 types database structures are fundamental to databases in that they
388:09 fundamental to databases in that they help organize and store data efficiently
388:12 help organize and store data efficiently they play a crucial role in how data is
388:14 they play a crucial role in how data is stored accessed and manipulated within a
388:17 stored accessed and manipulated within a database system let's explore three main
388:20 database system let's explore three main types of data structures in the context
388:22 types of data structures in the context of databases structured unstructured and
388:25 of databases structured unstructured and semi-structured
388:27 semi-structured data structured data refers to data that
388:30 data structured data refers to data that is highly organized each piece of data
388:33 is highly organized each piece of data has a well-defined data type and is
388:34 has a well-defined data type and is organized into tables making it easy to
388:37 organized into tables making it easy to query and
388:38 query and analyze unstructured data lacks a
388:41 analyze unstructured data lacks a predefined structure or format it
388:44 predefined structure or format it includes text images videos audio and
388:47 includes text images videos audio and other forms of content that do not fit
388:49 other forms of content that do not fit neatly into a table
388:51 neatly into a table format now semi-structured data is data
388:54 format now semi-structured data is data that doesn't adhere to organized tables
388:56 that doesn't adhere to organized tables but is not completely unstructured
388:58 but is not completely unstructured either this includes data such as text
389:01 either this includes data such as text images videos and audio that is
389:03 images videos and audio that is accompanied with various meta tags meta
389:06 accompanied with various meta tags meta tags categorize or label data elements
389:09 tags categorize or label data elements these tags can be used to indicate the
389:11 these tags can be used to indicate the data's purpose Source or any other
389:13 data's purpose Source or any other relevant information these meta tags
389:16 relevant information these meta tags help in organizing and querying
389:18 help in organizing and querying semi-structured data
389:21 semi-structured data efficiently between these different
389:23 efficiently between these different database structure types there is a
389:24 database structure types there is a distinct trade-off between data
389:26 distinct trade-off between data retrieval speeds when performing a query
389:28 retrieval speeds when performing a query and the rigidity or flexibility in the
389:30 and the rigidity or flexibility in the types of data that can be stored
389:33 types of data that can be stored structured data data typically allows
389:35 structured data data typically allows for faster data retrieval speeds because
389:37 for faster data retrieval speeds because fixed tables enable a database system to
389:39 fixed tables enable a database system to know the exact structure of the data
389:42 know the exact structure of the data unstructured data often has the slowest
389:44 unstructured data often has the slowest data retrieval speeds since there is no
389:47 data retrieval speeds since there is no predefined structure searching for
389:49 predefined structure searching for specific information requires more
389:51 specific information requires more extensive
389:52 extensive processing as for semi-structured data
389:54 processing as for semi-structured data this type falls in the middle and offers
389:56 this type falls in the middle and offers a more balanced
389:58 a more balanced solution in the next video we will take
390:00 solution in the next video we will take a closer look at relational databases
390:02 a closer look at relational databases which are a perfect example of
390:04 which are a perfect example of structured data exam objective 5.2
390:08 structured data exam objective 5.2 compare and contrast various database
390:11 compare and contrast various database structures relational
390:13 structures relational databases a relational database is a
390:16 databases a relational database is a structured data system that stores
390:18 structured data system that stores information in tables a table is
390:20 information in tables a table is comprised of data values stored in a
390:22 comprised of data values stored in a series of columns and rows where columns
390:24 series of columns and rows where columns Align data values vertically and rows
390:26 Align data values vertically and rows Align data values
390:28 Align data values horizontally using this table structure
390:31 horizontally using this table structure each row represents a separate record
390:32 each row represents a separate record and each column represents a single
390:34 and each column represents a single field or attribute within a record
390:36 field or attribute within a record through this table-based structure we
390:38 through this table-based structure we can use fields to compare common traits
390:40 can use fields to compare common traits between data elements in each
390:43 between data elements in each record now that we have defined a table
390:46 record now that we have defined a table let's talk about the relational part of
390:48 let's talk about the relational part of this database a relational database is
390:51 this database a relational database is aptly named because it organizes data
390:53 aptly named because it organizes data into tables that relate to each other
390:56 into tables that relate to each other these tables have relationships or links
390:58 these tables have relationships or links between pieces of information thus
391:00 between pieces of information thus allowing multiple tables to correlate
391:02 allowing multiple tables to correlate data
391:05 data so how are these table relationships
391:08 so how are these table relationships formed in the example behind me we have
391:11 formed in the example behind me we have a customer table where we can store
391:13 a customer table where we can store information about customers like their
391:15 information about customers like their first name last name and phone number
391:18 first name last name and phone number this table helps us keep all our
391:19 this table helps us keep all our customer information
391:21 customer information organized now let's talk about the sales
391:24 organized now let's talk about the sales table here we record details about each
391:27 table here we record details about each sale like who made the purchase the
391:29 sale like who made the purchase the order number date of purchase and the
391:32 order number date of purchase and the amount this table helps us track all our
391:34 amount this table helps us track all our sales
391:36 sales transactions so here is our challenge we
391:39 transactions so here is our challenge we want to connect these tables to
391:41 want to connect these tables to understand which customer made each
391:42 understand which customer made each purchase that is where keys will come
391:44 purchase that is where keys will come into
391:46 into play the customer table has something
391:48 play the customer table has something called a primary key think of it as a
391:51 called a primary key think of it as a unique ID for each customer it's like
391:54 unique ID for each customer it's like assigning a customer number to each
391:56 assigning a customer number to each person this unique number ensures that
391:58 person this unique number ensures that every customer record in the customer
392:00 every customer record in the customer table has their distinct identity and
392:02 table has their distinct identity and cannot be confused with any another
392:04 cannot be confused with any another record in a relational database you will
392:07 record in a relational database you will find that every table has a primary
392:10 find that every table has a primary key now in the sales table we have
392:12 key now in the sales table we have something called a foreign key this is a
392:15 something called a foreign key this is a special kind of key that connects or
392:17 special kind of key that connects or refers back to the unique identifier in
392:19 refers back to the unique identifier in the customer table this customer table
392:21 the customer table this customer table can also be called the parent table in
392:23 can also be called the parent table in this type of relationship for our
392:26 this type of relationship for our example the foreign key helps us link
392:28 example the foreign key helps us link each sale to a specific customer in the
392:30 each sale to a specific customer in the customer
392:31 customer table when we connect the prime primary
392:34 table when we connect the prime primary key in the customer table to the foreign
392:36 key in the customer table to the foreign key in the sales table we create a
392:38 key in the sales table we create a relationship between the two tables now
392:41 relationship between the two tables now we can easily see which customer made
392:43 we can easily see which customer made each
392:44 each purchase so in a nutshell a primary key
392:48 purchase so in a nutshell a primary key is like a unique ID for each customer in
392:50 is like a unique ID for each customer in our customer table and the foreign key
392:52 our customer table and the foreign key is used in the sales table to link each
392:54 is used in the sales table to link each sale to a specific customer great you
392:57 sale to a specific customer great you now know how a relational database works
392:59 now know how a relational database works at a fundamental level next we will take
393:01 at a fundamental level next we will take a step back and look at the overall blue
393:03 a step back and look at the overall blue print for a relational database referred
393:05 print for a relational database referred to as the
393:08 to as the schema a database schema is an outline
393:11 schema a database schema is an outline or a blueprint for a database that
393:12 or a blueprint for a database that describes its components and how they
393:14 describes its components and how they work and a database schema is a critical
393:17 work and a database schema is a critical part of a relational database as it will
393:19 part of a relational database as it will include items such as table names fields
393:21 include items such as table names fields in each table the required data type for
393:23 in each table the required data type for each field and the primary Keys foreign
393:26 each field and the primary Keys foreign keys and any other data
393:28 keys and any other data constraints wait why is constraints in
393:31 constraints wait why is constraints in red because I have not covered the topic
393:34 red because I have not covered the topic yet but don't worry I will cover it
393:37 yet but don't worry I will cover it right
393:38 right now so what exactly are constraints in
393:41 now so what exactly are constraints in the world of
393:42 the world of databases constraints are rules or
393:44 databases constraints are rules or conditions that we set for the data in
393:46 conditions that we set for the data in our database think of them as the
393:48 our database think of them as the Guardians of data Integrity ensuring
393:50 Guardians of data Integrity ensuring only valid values are entered there are
393:53 only valid values are entered there are several types of constraints and each
393:55 several types of constraints and each serves a specific purpose for starters
393:58 serves a specific purpose for starters you already know one type of constraint
394:01 you already know one type of constraint the primary key we just learned about is
394:02 the primary key we just learned about is a uniqueness constraint a uniqueness
394:05 a uniqueness constraint a uniqueness constraint ensures that values in a
394:07 constraint ensures that values in a column are unique across all records in
394:09 column are unique across all records in the
394:10 the table then we have the notnull
394:12 table then we have the notnull constraint it's a rule that says a
394:14 constraint it's a rule that says a column must always have a value it can't
394:16 column must always have a value it can't be left empty you have no doubt come
394:19 be left empty you have no doubt come across this constraint when filling out
394:21 across this constraint when filling out a web
394:22 a web form there is also the check constraint
394:26 form there is also the check constraint this enforces specific conditions on
394:28 this enforces specific conditions on column values for instance you can use
394:31 column values for instance you can use it to make sure an entry meets a
394:32 it to make sure an entry meets a specific requirement before it is
394:34 specific requirement before it is accepted into the
394:35 accepted into the database now these are just a few types
394:37 database now these are just a few types of constraints but hopefully you got the
394:40 of constraints but hopefully you got the idea and not just about constraints but
394:43 idea and not just about constraints but relational databases as a whole and
394:45 relational databases as a whole and remember when you need to store
394:47 remember when you need to store information in a structured manner there
394:49 information in a structured manner there is nothing better than a relational
394:51 is nothing better than a relational database exam objective 5.2 compare and
394:55 database exam objective 5.2 compare and contrast various database
394:57 contrast various database structures non-relational
395:00 structures non-relational databases a relational database is a
395:03 databases a relational database is a structured dat system that stores
395:04 structured dat system that stores information using tables so a
395:07 information using tables so a non-relational database is definitely
395:09 non-relational database is definitely not that instead non-relational
395:12 not that instead non-relational databases use a storage model that is
395:14 databases use a storage model that is optimized for the specific requirements
395:15 optimized for the specific requirements of the type of data being stored you may
395:18 of the type of data being stored you may also see these types of databases
395:20 also see these types of databases referred to as no SQL or non-sql
395:23 referred to as no SQL or non-sql databases as they do not use the
395:25 databases as they do not use the standard query language used in
395:26 standard query language used in relational
395:31 databases to keep in step with the CompTIA exam objectives I will present
395:33 CompTIA exam objectives I will present present two different non-relational
395:35 present two different non-relational database types the first of which is a
395:37 database types the first of which is a key value database this works very much
395:40 key value database this works very much like how it sounds you store objects
395:43 like how it sounds you store objects based on a unique key and each key
395:45 based on a unique key and each key points to a specific item or value key
395:48 points to a specific item or value key value databases are fantastic for
395:50 value databases are fantastic for scenarios where you need fast direct
395:52 scenarios where you need fast direct access to data in web applications this
395:55 access to data in web applications this type of database could be used for
395:57 type of database could be used for caching session management or user
396:01 caching session management or user profiles the second type non-relational
396:04 profiles the second type non-relational database that we will cover is the
396:06 database that we will cover is the document database a document database
396:09 document database a document database works just like the file system on your
396:11 works just like the file system on your computer and is excellent for situations
396:13 computer and is excellent for situations where your data doesn't fit neatly into
396:14 where your data doesn't fit neatly into tables or rows like a blog entry or
396:17 tables or rows like a blog entry or social media post if your data is
396:20 social media post if your data is comprised of text files audio images or
396:23 comprised of text files audio images or videos then a document database may be
396:25 videos then a document database may be your best bet I hope you enjoyed your
396:28 your best bet I hope you enjoyed your brief introduction to non-relational
396:30 brief introduction to non-relational databases specifically key value and
396:32 databases specifically key value and document databases
396:35 document databases exam objective 5.3 summarize methods
396:38 exam objective 5.3 summarize methods used to interface with
396:40 used to interface with databases
396:42 databases SQL SQL or standard query language is a
396:45 SQL SQL or standard query language is a specialized computer programming
396:47 specialized computer programming language used to communicate with and
396:48 language used to communicate with and manipulate
396:50 manipulate databases it provides a way for users
396:52 databases it provides a way for users and applications to interact with
396:54 and applications to interact with databases by sending requests for
396:56 databases by sending requests for specific data or actions to be
396:58 specific data or actions to be performed SQL is mainly designed for
397:01 performed SQL is mainly designed for maintaining the data in relational data
397:03 maintaining the data in relational data databases it is a special language used
397:06 databases it is a special language used by data Professionals for handling
397:08 by data Professionals for handling structured data or data stored in the
397:09 structured data or data stored in the form of tables using a set of predefined
397:12 form of tables using a set of predefined SQL commands you can easily create and
397:15 SQL commands you can easily create and manipulate a database access and modify
397:17 manipulate a database access and modify data and Grant or deny data access for
397:21 data and Grant or deny data access for the purpose of preparing for the CompTIA
397:23 the purpose of preparing for the CompTIA ITF plus certification exam we will
397:25 ITF plus certification exam we will limit our studies to some of the more
397:27 limit our studies to some of the more common commands and classify each of
397:28 common commands and classify each of these commands in accordance with the
397:30 these commands in accordance with the official CompTIA exam objectives speak
397:33 official CompTIA exam objectives speak speaking of command classifications I
397:35 speaking of command classifications I guess it is time to talk about the image
397:37 guess it is time to talk about the image behind me CompTIA has divided SQL
397:40 behind me CompTIA has divided SQL commands into two categories ddl and DML
397:44 commands into two categories ddl and DML ddl or data definition language commands
397:47 ddl or data definition language commands refer to SQL commands that manage the
397:49 refer to SQL commands that manage the structure of your
397:51 structure of your database while DML or data manipulation
397:54 database while DML or data manipulation language commands refer to SQL commands
397:56 language commands refer to SQL commands that manage the
397:57 that manage the data in the next few videos we will
398:00 data in the next few videos we will examine some ddl and DML commands a bit
398:02 examine some ddl and DML commands a bit closer
398:04 closer exam objective 5.3 summarize methods
398:07 exam objective 5.3 summarize methods used to interface with
398:09 used to interface with databases data definition
398:12 databases data definition language ddl or data definition language
398:15 language ddl or data definition language commands are used for defining and
398:17 commands are used for defining and managing the structure of your database
398:20 managing the structure of your database for your CompTIA ITF plus exam you will
398:23 for your CompTIA ITF plus exam you will need to know what a few of these
398:24 need to know what a few of these commands can do at a basic
398:26 commands can do at a basic level first up we have the create
398:29 level first up we have the create command this command is used to create a
398:31 command this command is used to create a new database or add a new table function
398:34 new database or add a new table function or procedure I have a command on the
398:37 or procedure I have a command on the left and the right will be our output
398:40 left and the right will be our output currently now the output shows nothing
398:43 currently now the output shows nothing now we will run the command on the left
398:46 now we will run the command on the left after running the command this would be
398:47 after running the command this would be the result our create command added a
398:51 the result our create command added a new table named employees that has three
398:59 columns next we have the alter command this command allows you to modify
399:01 this command allows you to modify existing database objects
399:04 existing database objects for example you could add delete or
399:06 for example you could add delete or modify a column you could also change a
399:09 modify a column you could also change a column's data type I have another
399:12 column's data type I have another command on the left and the right will
399:13 command on the left and the right will be our output currently the output shows
399:16 be our output currently the output shows the results of our previous create
399:18 the results of our previous create command now we will run the command on
399:21 command now we will run the command on the left after running the command this
399:24 the left after running the command this would be the result our alter command
399:27 would be the result our alter command has renamed the first column in the
399:28 has renamed the first column in the employees table from employee ID to
399:31 employees table from employee ID to employee number
399:37 okay for my last trick I will make the table
399:38 table disappear well not me but the drop
399:41 disappear well not me but the drop command will the drop command is used to
399:44 command will the drop command is used to delete database objects like tables
399:46 delete database objects like tables removing them entirely that includes any
399:49 removing them entirely that includes any data that was in the table too I have
399:52 data that was in the table too I have one last command on the left and the
399:54 one last command on the left and the right will be our output currently the
399:57 right will be our output currently the output shows the results of our previous
399:59 output shows the results of our previous alter command now we will run the
400:01 alter command now we will run the command on the left
400:03 command on the left after running the command this would be
400:05 after running the command this would be the result our drop command has erased
400:08 the result our drop command has erased our employee table completely nothing
400:11 our employee table completely nothing left to see here so on to the next
400:14 left to see here so on to the next video exam objective 5.3 summarize
400:17 video exam objective 5.3 summarize methods used to interface with
400:20 methods used to interface with databases data manipulation
400:23 databases data manipulation language DML or data manipulation
400:25 language DML or data manipulation language commands are used for defining
400:28 language commands are used for defining and managing the data of your database
400:30 and managing the data of your database for your CompTIA ITF plus exam you will
400:33 for your CompTIA ITF plus exam you will need to know what a few of these
400:34 need to know what a few of these commands can do at a basic
400:36 commands can do at a basic level first up we have the insert
400:39 level first up we have the insert command this command is used to add new
400:42 command this command is used to add new records into a table I have a command on
400:45 records into a table I have a command on the left and the right will be our
400:47 the left and the right will be our output currently we have an empty table
400:49 output currently we have an empty table of named employees that has no records
400:51 of named employees that has no records in it now we will run the command on the
400:54 in it now we will run the command on the left after running the command this
400:57 left after running the command this would be the result our insert command
401:00 would be the result our insert command added three new records to our table
401:02 added three new records to our table named employees
401:09 next we have the update command this command allows you to modify existing
401:11 command allows you to modify existing data records in a table I have another
401:14 data records in a table I have another command on the left and the right will
401:16 command on the left and the right will be our output currently the output shows
401:19 be our output currently the output shows the results of our previous insert
401:21 the results of our previous insert command now we will run the command on
401:23 command now we will run the command on the left after running the command this
401:26 the left after running the command this would be the result our update command
401:29 would be the result our update command has replaced the salary of John Smith
401:31 has replaced the salary of John Smith with a new value of 6700
401:39 ,000 and up last we have the delete command the delete command is used to
401:41 command the delete command is used to delete records in a table now for one
401:44 delete records in a table now for one last command currently the output shows
401:47 last command currently the output shows the results of our previous update
401:49 the results of our previous update command now we will run our final
401:52 command now we will run our final command on the left after running the
401:54 command on the left after running the command this would be the result our
401:57 command this would be the result our delete command has erased our employee
401:59 delete command has erased our employee record for Steve Patel looks like he
402:02 record for Steve Patel looks like he found a new job
402:03 found a new job better study these videos hard if you
402:05 better study these videos hard if you want to be Steve's
402:08 want to be Steve's replacement exam objective 5.3 summarize
402:11 replacement exam objective 5.3 summarize methods used to interface with
402:14 methods used to interface with databases
402:16 databases select querying a database is like
402:18 select querying a database is like embarking on an exciting digital
402:20 embarking on an exciting digital treasure hunt with a few lines of code
402:23 treasure hunt with a few lines of code you can uncover valuable information
402:25 you can uncover valuable information transforming raw data into actionable
402:27 transforming raw data into actionable insights it's the art of exploring vast
402:30 insights it's the art of exploring vast data sets discovering patterns and
402:32 data sets discovering patterns and finding answers to critical questions
402:35 finding answers to critical questions whether you're analyzing Financial
402:36 whether you're analyzing Financial records deciphering customer Behavior or
402:39 records deciphering customer Behavior or investigating scientific experiments
402:41 investigating scientific experiments querying a database is your ticket to an
402:43 querying a database is your ticket to an exhilarating journey of Discovery in the
402:45 exhilarating journey of Discovery in the digital age and to set saale on this
402:48 digital age and to set saale on this journey SQL gives us our most powerful
402:50 journey SQL gives us our most powerful command yet the select
402:54 command yet the select command a SQL select command is a very
402:57 command a SQL select command is a very special data manipulation language
402:59 special data manipulation language command as classified by CompTIA and is
403:01 command as classified by CompTIA and is used to query or retrieve specific
403:03 used to query or retrieve specific specific data from a database table
403:05 specific data from a database table here's how it
403:07 here's how it works the SQL query begins with the
403:09 works the SQL query begins with the select keyword which indicates that you
403:11 select keyword which indicates that you want to retrieve data from a table or
403:14 want to retrieve data from a table or tables after select you specify the
403:16 tables after select you specify the columns you want to retrieve or simply
403:18 columns you want to retrieve or simply use an asterisk to select all
403:21 use an asterisk to select all columns following the select statement
403:24 columns following the select statement you use the from Clause to specify the
403:26 you use the from Clause to specify the table or tables from which you want to
403:27 table or tables from which you want to retrieve data this Clause tells the
403:30 retrieve data this Clause tells the database where to look for the
403:31 database where to look for the information you want
403:33 information you want then we have an optional wear Clause the
403:36 then we have an optional wear Clause the wear is used to filter the rows that
403:38 wear is used to filter the rows that meet specific conditions it acts as a
403:41 meet specific conditions it acts as a conditional filter allowing you to
403:43 conditional filter allowing you to retrieve only the rows that satisfy the
403:45 retrieve only the rows that satisfy the criteria you
403:47 criteria you define now it is time to see the select
403:50 define now it is time to see the select command in action on the left we have a
403:53 command in action on the left we have a select command and on the right we have
403:55 select command and on the right we have a database table named student table
403:58 a database table named student table with four records in it when we run the
404:00 with four records in it when we run the command our query will return all
404:02 command our query will return all columns from the student table for each
404:04 columns from the student table for each record that has an entry in the age
404:06 record that has an entry in the age field greater or equal to 20 now we will
404:09 field greater or equal to 20 now we will run the command and take a look at the
404:12 run the command and take a look at the results our select command has
404:14 results our select command has identified and returned two records in
404:16 identified and returned two records in the database's native format that met
404:18 the database's native format that met the condition of age greater than or
404:20 the condition of age greater than or equal to 20 John Smith who is 22 and NTS
404:24 equal to 20 John Smith who is 22 and NTS who is 30 now this is a very simple
404:27 who is 30 now this is a very simple example but much more can be
404:29 example but much more can be accomplished with this powerful SQL
404:30 accomplished with this powerful SQL command when it is wielded by a database
404:32 command when it is wielded by a database map Master exam objective 5.3 summarize
404:37 map Master exam objective 5.3 summarize methods used to interface with
404:39 methods used to interface with databases database
404:42 databases database permissions in a relational database
404:44 permissions in a relational database permissions are the rules you establish
404:46 permissions are the rules you establish for who can access and manipulate your
404:48 for who can access and manipulate your structured data tables by using SQL
404:51 structured data tables by using SQL commands you can grant certain users the
404:53 commands you can grant certain users the ability to perform specific actions such
404:55 ability to perform specific actions such as reading or editing data in particular
404:58 as reading or editing data in particular tables conversely Mr deny here can
405:01 tables conversely Mr deny here can restrict your access or actions ensuring
405:03 restrict your access or actions ensuring that only authorized individuals can
405:05 that only authorized individuals can interact with and modify the database's
405:07 interact with and modify the database's organized
405:12 information to control who can or cannot work with our data SQL gives us two
405:14 work with our data SQL gives us two commands Grant and deny Grant allows
405:18 commands Grant and deny Grant allows access while deny takes it away and it
405:21 access while deny takes it away and it is also worth noting that CompTIA has
405:22 is also worth noting that CompTIA has classified these under the data
405:24 classified these under the data definition language or ddl
405:26 definition language or ddl category first up let's talk about
405:28 category first up let's talk about granting permissions when you want to
405:31 granting permissions when you want to give someone access to specific data in
405:33 give someone access to specific data in the database you're essentially giving
405:35 the database you're essentially giving them a key to the Vault to do this we
405:38 them a key to the Vault to do this we use the grant command for example if you
405:41 use the grant command for example if you want user a to only be able to view
405:43 want user a to only be able to view customer data you would use the grant
405:45 customer data you would use the grant command like the example on the left
405:48 command like the example on the left this command would Grant permission for
405:49 this command would Grant permission for user a to use the select command on the
405:51 user a to use the select command on the customer's table now let's talk about
405:54 customer's table now let's talk about denying permissions when you want to
405:57 denying permissions when you want to restrict access to specific data in the
405:59 restrict access to specific data in the database you use the deny command for
406:02 database you use the deny command for example if you want user a to be
406:04 example if you want user a to be restricted from using the delete command
406:06 restricted from using the delete command for customer data you would use the deny
406:08 for customer data you would use the deny command like the example on the right
406:11 command like the example on the right this command would deny permission for
406:12 this command would deny permission for user a to use the delete command on the
406:14 user a to use the delete command on the customer's table in it security is
406:18 customer's table in it security is Paramount and understanding how to
406:19 Paramount and understanding how to control who has access to your data is
406:21 control who has access to your data is crucial good thing databases provide us
406:24 crucial good thing databases provide us with a secure way to store
406:27 with a secure way to store information exam objective 5.3 summarize
406:30 information exam objective 5.3 summarize methods used to interface with databases
406:34 methods used to interface with databases database Import and
406:36 database Import and Export the topic of database Import and
406:39 Export the topic of database Import and Export is quite easy to grasp when you
406:41 Export is quite easy to grasp when you want to get data into a database the
406:44 want to get data into a database the process is known as a database import
406:46 process is known as a database import and when you want to get data out of a
406:48 and when you want to get data out of a database like creating a backup copy of
406:50 database like creating a backup copy of the database this is an export sure that
406:53 the database this is an export sure that sounds easy enough but the trick is in
406:55 sounds easy enough but the trick is in the
406:57 the doing now let's discuss a common method
407:00 doing now let's discuss a common method used to get data into and out of a
407:02 used to get data into and out of a database
407:03 database imagine you have information in a flat
407:05 imagine you have information in a flat file database like a spreadsheet and you
407:07 file database like a spreadsheet and you want to bring it into your database one
407:10 want to bring it into your database one common way to do this is by using CSV
407:12 common way to do this is by using CSV files a CSV or comma separated values
407:16 files a CSV or comma separated values file is a simple and widely used file
407:18 file is a simple and widely used file format for storing structured data a CSV
407:21 format for storing structured data a CSV file is often used for data exchange
407:24 file is often used for data exchange between different software applications
407:26 between different software applications including databases and is easy for both
407:28 including databases and is easy for both humans and computers to read so how does
407:31 humans and computers to read so how does a CSV file work
407:33 a CSV file work CSV files are organized in a tabular
407:36 CSV files are organized in a tabular structure similar to a spreadsheet data
407:39 structure similar to a spreadsheet data is divided into rows and columns each
407:42 is divided into rows and columns each row represents a single record or entry
407:44 row represents a single record or entry and each column represents a field or
407:46 and each column represents a field or attribute of that record the name comma
407:49 attribute of that record the name comma separated values implies that commas are
407:51 separated values implies that commas are used to separate values in the file
407:54 used to separate values in the file however other delimiters like semicolons
407:56 however other delimiters like semicolons or tabs can also be used depending on
407:58 or tabs can also be used depending on the specific application these
408:00 the specific application these delimiters determine how data is
408:02 delimiters determine how data is separated within each row CSV files
408:05 separated within each row CSV files often include a header row at the top
408:07 often include a header row at the top which contains the names of the columns
408:10 which contains the names of the columns these headers provide context for the
408:12 these headers provide context for the data in each column making it easier for
408:14 data in each column making it easier for users to understand the
408:16 users to understand the contents in our example CSV file the
408:19 contents in our example CSV file the columns are listed in the header row at
408:21 columns are listed in the header row at the top and are labeled first name last
408:23 the top and are labeled first name last name and H each subsequent row is a
408:26 name and H each subsequent row is a table record so here in this CSV file we
408:30 table record so here in this CSV file we have three records and just as easy as
408:33 have three records and just as easy as it was to take a table and convert it to
408:35 it was to take a table and convert it to a CSV file we can convert the CSV file
408:37 a CSV file we can convert the CSV file back into a table
408:39 back into a table structure exam objective 5.3 summarize
408:43 structure exam objective 5.3 summarize methods used to interface with
408:45 methods used to interface with databases database access
408:48 databases database access methods database access methods are the
408:51 methods database access methods are the processes by which a user might run SQL
408:53 processes by which a user might run SQL commands in order to update or extract
408:55 commands in order to update or extract information from a database up until now
408:58 information from a database up until now I have mostly displayed the concept of
409:00 I have mostly displayed the concept of direct or manual access in our previous
409:03 direct or manual access in our previous video examples we simulated running a
409:06 video examples we simulated running a SQL code and viewed some native outputs
409:09 SQL code and viewed some native outputs well director manual access is very
409:11 well director manual access is very similar as this method involves logging
409:13 similar as this method involves logging into the database server directly and
409:15 into the database server directly and running the SQL codes from within the
409:16 running the SQL codes from within the database management
409:19 database management system our next method to access a
409:22 system our next method to access a database involves the use of query and
409:24 database involves the use of query and Report Builders these tools come built
409:27 Report Builders these tools come built into many database Management systems or
409:29 into many database Management systems or are offered as thirdparty tools these
409:31 are offered as thirdparty tools these tools still interact act with databases
409:33 tools still interact act with databases directly but the syntax of the SQL
409:35 directly but the syntax of the SQL statements that will be run is
409:37 statements that will be run is abstracted away from the user with a
409:39 abstracted away from the user with a query and Report Builder the user uses a
409:42 query and Report Builder the user uses a graphical interface where actions are
409:44 graphical interface where actions are selected and then converted into SQL
409:46 selected and then converted into SQL commands on the user's
409:49 commands on the user's behalf if neither of those options work
409:51 behalf if neither of those options work for your use case another option is to
409:53 for your use case another option is to integrate with the database using
409:55 integrate with the database using programmatic access most highlevel
409:57 programmatic access most highlevel programming languages have built-in
409:59 programming languages have built-in capabilities to connect with a database
410:01 capabilities to connect with a database and execute queries
410:07 as for our last access method many applications use a database in the
410:08 applications use a database in the background without the user even being
410:10 background without the user even being aware of its presence anytime you are
410:13 aware of its presence anytime you are dealing with a data driven dashboard you
410:15 dealing with a data driven dashboard you are using this type of access method
410:17 are using this type of access method these are userfriendly interfaces and
410:19 these are userfriendly interfaces and software tools that allow non-technical
410:21 software tools that allow non-technical users to interact with a database easily
410:24 users to interact with a database easily so whether you prefer Hands-On control
410:27 so whether you prefer Hands-On control the power of programming or a
410:28 the power of programming or a userfriendly interface there's a method
410:30 userfriendly interface there's a method to suit your needs
410:32 to suit your needs additionally I want to congratulate you
410:34 additionally I want to congratulate you on reaching the end of domain 5.0
410:37 on reaching the end of domain 5.0 database fundamentals exam objective 6.1
410:40 database fundamentals exam objective 6.1 summarize confidentiality integrity and
410:43 summarize confidentiality integrity and availability
410:44 availability concerns
410:46 concerns CIA to begin our study of domain 6.0 of
410:50 CIA to begin our study of domain 6.0 of the CompTIA ITF plus exam objectives we
410:53 the CompTIA ITF plus exam objectives we will discuss the CIA Triad and before
410:56 will discuss the CIA Triad and before your mind wanders the CIA Triad is not
410:58 your mind wanders the CIA Triad is not about secret agents it's about the core
411:00 about secret agents it's about the core principles of information security which
411:02 principles of information security which are confidentiality integrity and
411:05 are confidentiality integrity and availability these principles work
411:07 availability these principles work together to protect and manage data in
411:09 together to protect and manage data in the world of
411:12 the world of it the first pillar of the CIA Triad is
411:16 it the first pillar of the CIA Triad is confidentiality it ensures that data is
411:18 confidentiality it ensures that data is kept private and only accessible to
411:20 kept private and only accessible to authorized users confidentiality employs
411:23 authorized users confidentiality employs measures such as encryption and access
411:31 controls the second pillar is integrity this ensures the accuracy and
411:32 this ensures the accuracy and trustworthiness of data imagine you're
411:35 trustworthiness of data imagine you're writing a letter Integrity ensures that
411:37 writing a letter Integrity ensures that the letter remains unchanged from when
411:39 the letter remains unchanged from when you wrote it to when the recipient reads
411:41 you wrote it to when the recipient reads it security techniques that prevent any
411:44 it security techniques that prevent any unauthorized alterations or alert us to
411:46 unauthorized alterations or alert us to potential tampering would fall into this
411:50 potential tampering would fall into this category the third pillar is
411:52 category the third pillar is availability availability ensures that
411:55 availability availability ensures that data is accessible when needed or you
411:57 data is accessible when needed or you can think of it as the ability of an IT
411:59 can think of it as the ability of an IT system to be up and running without
412:01 system to be up and running without interruption
412:06 by understanding the three parts of the CIA Triad confidentiality integrity and
412:09 CIA Triad confidentiality integrity and availability you can begin to select
412:11 availability you can begin to select security controls that will keep your
412:13 security controls that will keep your data secret make sure your data can be
412:15 data secret make sure your data can be trusted and is accessible when
412:17 trusted and is accessible when needed in the next few videos we will
412:19 needed in the next few videos we will learn about some common security attacks
412:22 learn about some common security attacks we will then classify them as either a
412:24 we will then classify them as either a confidentiality Integrity or
412:26 confidentiality Integrity or availability
412:28 availability concern exam objective 6.1 summarize
412:31 concern exam objective 6.1 summarize confidential ity integrity and
412:33 confidential ity integrity and availability
412:35 availability concerns confidentiality
412:38 concerns confidentiality concerns confidentiality in it refers to
412:41 concerns confidentiality in it refers to the practice of protecting sensitive
412:43 the practice of protecting sensitive information and ensuring that it is only
412:45 information and ensuring that it is only accessible to authorized individuals or
412:47 accessible to authorized individuals or systems it involves the use of various
412:50 systems it involves the use of various security measures such as encryption
412:52 security measures such as encryption access controls and user authentication
412:54 access controls and user authentication to prevent unauthorized access
412:56 to prevent unauthorized access disclosure or theft of data
412:59 disclosure or theft of data confidentiality is essential for
413:01 confidentiality is essential for maintaining the privacy and security of
413:03 maintaining the privacy and security of sensitive data such as personal
413:04 sensitive data such as personal information credit card numbers and
413:07 information credit card numbers and trade secrets in a digital
413:09 trade secrets in a digital environment now to truly understand the
413:12 environment now to truly understand the potential challenges in ensuring data
413:14 potential challenges in ensuring data remains confidential we will explore
413:15 remains confidential we will explore various types of security concerns that
413:17 various types of security concerns that can pose threats to confidentiality in
413:19 can pose threats to confidentiality in the realm of Information
413:25 Technology within it there are many attack methods that threaten
413:27 attack methods that threaten confidentiality and for the CompTIA ITF
413:30 confidentiality and for the CompTIA ITF plus certification exam we will cover a
413:32 plus certification exam we will cover a few of the most common attack vectors so
413:35 few of the most common attack vectors so first up when it comes to
413:36 first up when it comes to confidentiality concerns we have
413:38 confidentiality concerns we have snooping snooping is an attempt to gain
413:41 snooping snooping is an attempt to gain access to information that you are not
413:43 access to information that you are not authorized to view a perfect example of
413:45 authorized to view a perfect example of snooping is shoulder surfing which is a
413:47 snooping is shoulder surfing which is a situation where an attacker merely views
413:49 situation where an attacker merely views a user's device screen or keypad Often
413:52 a user's device screen or keypad Often by peering over a user's shoulder in
413:53 by peering over a user's shoulder in order to obtain confidential
413:56 order to obtain confidential information next up we have
413:58 information next up we have eavesdropping this is a specific form of
414:01 eavesdropping this is a specific form of snooping that involves secretly
414:02 snooping that involves secretly listening to the private conversations
414:04 listening to the private conversations or Communications of others without
414:06 or Communications of others without their consent in order to gather
414:08 their consent in order to gather information this could be a telephone
414:10 information this could be a telephone conversation or a network connection
414:12 conversation or a network connection between
414:13 between devices and building upon the idea of
414:16 devices and building upon the idea of eavesdropping we have wiretapping with
414:19 eavesdropping we have wiretapping with wiretapping an attacker would connect a
414:21 wiretapping an attacker would connect a listening device to a telephone or data
414:23 listening device to a telephone or data line to secretly monitor a
414:25 line to secretly monitor a conversation and for our next
414:27 conversation and for our next confidentiality concern we will cover
414:29 confidentiality concern we will cover the topic of dumpster diving dumpster
414:32 the topic of dumpster diving dumpster diving is the process of investigating a
414:34 diving is the process of investigating a person or business's trash to find
414:36 person or business's trash to find information that can be used in an
414:38 information that can be used in an attack here cyber attackers take the
414:41 attack here cyber attackers take the idiom one man's trash is another man's
414:43 idiom one man's trash is another man's treasure quite literally so be careful
414:46 treasure quite literally so be careful what documents you
414:48 what documents you discard now to wrap up our list of
414:50 discard now to wrap up our list of confidentiality concerns we will briefly
414:53 confidentiality concerns we will briefly cover social engineering this is a big
414:55 cover social engineering this is a big topic but we will only scratch the
414:57 topic but we will only scratch the surface for now social engineering is
415:00 surface for now social engineering is the practice of manipulating influencing
415:02 the practice of manipulating influencing ing or deceiving a person in order to
415:04 ing or deceiving a person in order to gain control over a computer system or
415:06 gain control over a computer system or acquire confidential information it uses
415:09 acquire confidential information it uses psychological manipulation to trick
415:11 psychological manipulation to trick users into making security mistakes or
415:13 users into making security mistakes or giving away sensitive information
415:16 giving away sensitive information attackers use this method because people
415:17 attackers use this method because people are often the weakest link when it comes
415:19 are often the weakest link when it comes to cyber security social engineering
415:22 to cyber security social engineering attacks often involve impersonation or
415:24 attacks often involve impersonation or identity fraud and Can Happen by text
415:26 identity fraud and Can Happen by text email a phone call or even through
415:28 email a phone call or even through face-to-face
415:29 face-to-face communication luckily the solution to
415:31 communication luckily the solution to social engineering attacks and all cyber
415:34 social engineering attacks and all cyber security attacks for that matter is
415:36 security attacks for that matter is education and with you having just
415:38 education and with you having just watched this video the world of it is
415:40 watched this video the world of it is now a little bit safer thanks for doing
415:43 now a little bit safer thanks for doing your part exam objective 6.1 summarize
415:47 your part exam objective 6.1 summarize confidentiality integrity and
415:49 confidentiality integrity and availability
415:51 availability concerns Integrity
415:53 concerns Integrity concerns Integrity as it applies to it
415:57 concerns Integrity as it applies to it is a fundamental security principle that
415:59 is a fundamental security principle that ensures the accuracy and trustworthiness
416:01 ensures the accuracy and trustworthiness of data and information
416:03 of data and information it involves safeguarding data from
416:04 it involves safeguarding data from unauthorized alteration tampering or
416:07 unauthorized alteration tampering or corruption both intentionally and
416:09 corruption both intentionally and unintentionally maintaining data
416:11 unintentionally maintaining data Integrity is crucial because it
416:13 Integrity is crucial because it guarantees that information remains
416:15 guarantees that information remains reliable and consistent throughout its
416:16 reliable and consistent throughout its life cycle this Integrity Assurance is
416:19 life cycle this Integrity Assurance is vital for organizations to make informed
416:21 vital for organizations to make informed decisions maintain customer trust and
416:24 decisions maintain customer trust and comply with regulatory
416:25 comply with regulatory requirements in essence Integrity acts
416:28 requirements in essence Integrity acts as a critical Safeguard to prevent
416:30 as a critical Safeguard to prevent unauthorized changes and maintain the
416:32 unauthorized changes and maintain the overall security and reliability of data
416:34 overall security and reliability of data and
416:36 and systems within it there are many attack
416:39 systems within it there are many attack methods that threaten data integrity and
416:42 methods that threaten data integrity and for the CompTIA ITF plus certification
416:44 for the CompTIA ITF plus certification exam we will cover a few of the most
416:46 exam we will cover a few of the most common attack vectors so first up when
416:49 common attack vectors so first up when it comes to Integrity concerns we have
416:51 it comes to Integrity concerns we have the man in the middle attack a man in
416:54 the man in the middle attack a man in the-middle attack is a sneaky
416:55 the-middle attack is a sneaky eavesdropper in the middle of a
416:57 eavesdropper in the middle of a conversation in it this is when a hacker
417:00 conversation in it this is when a hacker secretly intercepts and potentially
417:01 secretly intercepts and potentially Alters the communication between two
417:03 Alters the communication between two parties without either party knowing
417:06 parties without either party knowing this is not only a confidentiality
417:08 this is not only a confidentiality concern but a huge Integrity concern as
417:12 concern but a huge Integrity concern as well next up we have replay attacks a
417:16 well next up we have replay attacks a replay attack involves an attacker
417:18 replay attack involves an attacker recording your password or security
417:20 recording your password or security token when it is sent for authentication
417:22 token when it is sent for authentication and then using it later to impersonate
417:24 and then using it later to impersonate You by doing this an attacker can gain
417:27 You by doing this an attacker can gain unauthorized access like logging into
417:29 unauthorized access like logging into your account this is a security threat
417:32 your account this is a security threat because it can allow hackers to pretend
417:33 because it can allow hackers to pretend to be you and do things you didn't
417:35 to be you and do things you didn't intend like tamper with corporate data
417:37 intend like tamper with corporate data or steal money from your bank
417:40 or steal money from your bank account and for our last Integrity
417:42 account and for our last Integrity concern we will cover the topic of
417:45 concern we will cover the topic of impersonation while this technique can
417:47 impersonation while this technique can be used as part of a social engineering
417:49 be used as part of a social engineering attack impersonation itself is a
417:51 attack impersonation itself is a significant Integrity concern because it
417:53 significant Integrity concern because it involves someone pretending to be a
417:54 involves someone pretending to be a legitimate user system or entity when an
417:57 legitimate user system or entity when an unauthorized person or program
417:59 unauthorized person or program successfully impersonates a trusted
418:01 successfully impersonates a trusted entity it can result in data breaches
418:03 entity it can result in data breaches unauthorized access and data
418:05 unauthorized access and data manipulation compromising the accuracy
418:07 manipulation compromising the accuracy and reliability of the information
418:10 and reliability of the information whether it is impersonation a man in
418:12 whether it is impersonation a man in the- Middle attack or a replay attack
418:14 the- Middle attack or a replay attack any unauthorized information alteration
418:17 any unauthorized information alteration undermines the fundamental principle of
418:18 undermines the fundamental principle of data Integrity that is why protecting
418:21 data Integrity that is why protecting against any of these attacks is crucial
418:23 against any of these attacks is crucial to maintaining the Integrity of it
418:25 to maintaining the Integrity of it systems and the data they
418:27 systems and the data they handle exam objective 6.1 summarize
418:30 handle exam objective 6.1 summarize confidentiality integrity and
418:32 confidentiality integrity and availability
418:33 availability concerns availability
418:36 concerns availability concerns availability as it applies to
418:39 concerns availability as it applies to it is a fundamental security principle
418:42 it is a fundamental security principle that ensures data is ready and
418:43 that ensures data is ready and accessible whenever you need it in a
418:46 accessible whenever you need it in a broader context availability makes
418:48 broader context availability makes certain that systems services or
418:50 certain that systems services or resources are consistently operational
418:52 resources are consistently operational and can be accessed without
418:54 and can be accessed without interruptions this continuous access is
418:57 interruptions this continuous access is crucial because users whether they are
418:59 crucial because users whether they are individuals or businesses rely on
419:01 individuals or businesses rely on certain services to be available
419:02 certain services to be available whenever they need them ensuring High
419:05 whenever they need them ensuring High availability often requires meticulous
419:07 availability often requires meticulous planning regular maintenance and
419:09 planning regular maintenance and proactive monitoring to prevent and
419:11 proactive monitoring to prevent and address potential issues that might
419:12 address potential issues that might disrupt access any downtime or
419:15 disrupt access any downtime or inaccessibility can hinder productivity
419:17 inaccessibility can hinder productivity disrupt operations and impact user
419:22 disrupt operations and impact user trust within it there are many factors
419:25 trust within it there are many factors that can threaten data availability and
419:27 that can threaten data availability and for the CompTIA ITF plus certification
419:30 for the CompTIA ITF plus certification exam we will cover a few of the most
419:32 exam we will cover a few of the most common availability concerns that can
419:33 common availability concerns that can bring our it world to a
419:35 bring our it world to a standstill to start off we will begin
419:38 standstill to start off we will begin with the threat of a power outage a
419:40 with the threat of a power outage a power outage is one of the most
419:41 power outage is one of the most immediate and palpable threats to
419:44 immediate and palpable threats to availability whether due to natural
419:46 availability whether due to natural causes like storms or technical issues
419:48 causes like storms or technical issues within power grids the sudden loss of
419:50 within power grids the sudden loss of electricity can halt operations
419:53 electricity can halt operations instantaneously without power most
419:55 instantaneously without power most modern equipment from servers to
419:57 modern equipment from servers to workstations can become inoperative
419:59 workstations can become inoperative leading to potential data loss and
420:01 leading to potential data loss and operational downtime
420:06 Hardware failure is another critical concern as robust as Modern Hardware
420:09 concern as robust as Modern Hardware might seem it is not immune to
420:11 might seem it is not immune to malfunctions a single failed component
420:13 malfunctions a single failed component in a server or network switch can
420:15 in a server or network switch can disrupt access to vital data or Services
420:18 disrupt access to vital data or Services over time wear and tear manufacturing
420:21 over time wear and tear manufacturing defects or external factors like
420:23 defects or external factors like overheating can lead to unexpected
420:25 overheating can lead to unexpected Hardware
420:30 breakdowns external threats also pose significant risks destruction caused by
420:33 significant risks destruction caused by natural disasters such as earthquakes
420:35 natural disasters such as earthquakes floods or fires can physically damage
420:38 floods or fires can physically damage infrastructure similarly human-made
420:40 infrastructure similarly human-made incidents whether accidental like
420:42 incidents whether accidental like construction mishaps or intentional like
420:44 construction mishaps or intentional like acts of vandalism can wreak havoc on
420:46 acts of vandalism can wreak havoc on physical assets leading to availability
420:53 concerns even if all physical components are intact and powered service outages
420:56 are intact and powered service outages can still occur these outages can stem
420:58 can still occur these outages can stem from software glitches overloaded
421:00 from software glitches overloaded systems or issu issues with local and
421:02 systems or issu issues with local and wide area network connection lines a
421:05 wide area network connection lines a service outage can prevent users from
421:07 service outage can prevent users from accessing essential platforms or
421:09 accessing essential platforms or applications disrupting workflows and
421:15 communication as for our last availability concern we have to be weary
421:17 availability concern we have to be weary of denial of service or dos attacks a
421:21 of denial of service or dos attacks a Dos attack is a malicious attempt by
421:23 Dos attack is a malicious attempt by attackers to overwhelm a system service
421:25 attackers to overwhelm a system service or network with an excessive amount of
421:27 or network with an excessive amount of traffic rendering it inaccessible to
421:29 traffic rendering it inaccessible to legitimate users the primary aim is not
421:32 legitimate users the primary aim is not to steal information but to disrupt the
421:34 to steal information but to disrupt the service causing downtime and potential
421:36 service causing downtime and potential Financial or reputational damage these
421:39 Financial or reputational damage these attacks work by flooding the target with
421:41 attacks work by flooding the target with bogus requests making it difficult for
421:43 bogus requests making it difficult for the system to respond to legitimate
421:45 the system to respond to legitimate traffic the sheer volume of these
421:47 traffic the sheer volume of these requests can exhaust the target's
421:49 requests can exhaust the target's resources such as bandwidth processing
421:51 resources such as bandwidth processing power or memory as a result genuine
421:55 power or memory as a result genuine users find themselves locked out unable
421:57 users find themselves locked out unable to access the services or information
421:59 to access the services or information they need in an era where uninterrupted
422:02 they need in an era where uninterrupted access is crucial dos attacks and any of
422:04 access is crucial dos attacks and any of the other mentioned availability
422:05 the other mentioned availability concerns must be accounted for in order
422:08 concerns must be accounted for in order to ensure data that is needed is always
422:11 to ensure data that is needed is always available exam objective 6.2 explain
422:14 available exam objective 6.2 explain methods to secure devices and best
422:17 methods to secure devices and best practices securing
422:20 practices securing devices in the vast realm of Information
422:23 devices in the vast realm of Information Technology the security of your device
422:25 Technology the security of your device stands as a Paramount concern just as
422:28 stands as a Paramount concern just as you wouldn't leave the door to your home
422:29 you wouldn't leave the door to your home unlocked you shouldn't leave your
422:30 unlocked you shouldn't leave your devices unpr detected this video will
422:33 devices unpr detected this video will introduce you to the foundational
422:35 introduce you to the foundational methods of securing your
422:37 methods of securing your devices first up we have antivirus and
422:40 devices first up we have antivirus and antimalware software antivirus and
422:43 antimalware software antivirus and antimalware software are your devic's
422:45 antimalware software are your devic's primary line of defense against
422:46 primary line of defense against malicious threats as it is software
422:48 malicious threats as it is software designed to detect prevent and remove
422:50 designed to detect prevent and remove malicious software known as malware from
422:52 malicious software known as malware from a computer or network you might think of
422:55 a computer or network you might think of it as a Vigilant night protecting your
422:57 it as a Vigilant night protecting your digital realm from would be
422:59 digital realm from would be Intruders now there are two primary
423:01 Intruders now there are two primary methods used by antivirus and
423:03 methods used by antivirus and antimalware software to identify threats
423:07 antimalware software to identify threats signature-based threat detection relies
423:09 signature-based threat detection relies on a database of known malware
423:10 on a database of known malware signatures which are unique bits of code
423:12 signatures which are unique bits of code or characteristics specific to
423:14 or characteristics specific to individual malware strains when you
423:17 individual malware strains when you download or execute a file the antivirus
423:19 download or execute a file the antivirus software scans the file for these
423:21 software scans the file for these signatures if a match is found the
423:24 signatures if a match is found the software Flags it as malicious it's akin
423:27 software Flags it as malicious it's akin to a security guard checking a list of
423:28 to a security guard checking a list of known
423:29 known criminals as for Behavioral threat
423:32 criminals as for Behavioral threat detection it observes the behavior of
423:34 detection it observes the behavior of programs in real time it uses heuristics
423:37 programs in real time it uses heuristics which are sets of rules or algorithms to
423:39 which are sets of rules or algorithms to analyze the actions of software and
423:41 analyze the actions of software and determine if they are typical of
423:43 determine if they are typical of malicious programs for instance if a
423:46 malicious programs for instance if a file tries to access a large number of
423:48 file tries to access a large number of files quickly or attempts to hide its
423:50 files quickly or attempts to hide its presence it might be flagged as
423:52 presence it might be flagged as suspicious this method is particularly
423:54 suspicious this method is particularly useful for detecting new or previously
423:56 useful for detecting new or previously unknown malware that doesn't have a
423:58 unknown malware that doesn't have a known signature yet in essence while
424:01 known signature yet in essence while signature based detection checks for
424:02 signature based detection checks for known threats behavioral-based detection
424:05 known threats behavioral-based detection uses heuristics to predict and catch new
424:07 uses heuristics to predict and catch new or evolving threats based on their
424:10 or evolving threats based on their actions with an up-to-date antivirus and
424:13 actions with an up-to-date antivirus and antimalware in place the next component
424:15 antimalware in place the next component used in securing a device is a host
424:18 used in securing a device is a host firewall this is another type of
424:20 firewall this is another type of software that is installed on a device
424:23 software that is installed on a device its job is to provide protection by
424:24 its job is to provide protection by monitoring and controlling incoming and
424:26 monitoring and controlling incoming and outgoing Network traffic based on
424:28 outgoing Network traffic based on predetermined security Rules by
424:31 predetermined security Rules by filtering incoming and outgoing traffic
424:33 filtering incoming and outgoing traffic a firewall can ensure that harmful data
424:35 a firewall can ensure that harmful data packets are blocked while safe ones are
424:37 packets are blocked while safe ones are allowed through these rules can block an
424:40 allowed through these rules can block an unsafe protocol like telnet or open a
424:42 unsafe protocol like telnet or open a specified port number for Approved
424:45 specified port number for Approved traffic another important part of
424:47 traffic another important part of securing your devices includes enabling
424:49 securing your devices includes enabling password authentication and changing
424:51 password authentication and changing default passwords when applicable
424:54 default passwords when applicable enabling passwords on mobile devices
424:56 enabling passwords on mobile devices workstations network devices and servers
424:59 workstations network devices and servers is a fundamental step in safeguarding
425:01 is a fundamental step in safeguarding personal and professional data passwords
425:04 personal and professional data passwords act as the first line of defense against
425:06 act as the first line of defense against unauthorized access ensuring that only
425:08 unauthorized access ensuring that only those with the correct credentials can
425:10 those with the correct credentials can access the devices contents when devices
425:13 access the devices contents when devices come with default passwords they often
425:15 come with default passwords they often follow predictable patterns known to
425:17 follow predictable patterns known to many including potential attackers these
425:20 many including potential attackers these default passwords are akin to leaving
425:22 default passwords are akin to leaving your front door unlocked with a sign
425:23 your front door unlocked with a sign saying come on in by not changing the
425:26 saying come on in by not changing the default password or neglecting to set
425:28 default password or neglecting to set one altogether users risk exposing
425:30 one altogether users risk exposing sensitive information to to theft misuse
425:32 sensitive information to to theft misuse or cyber attacks so set up up a strong
425:36 or cyber attacks so set up up a strong unique password to keep the digital gate
425:38 unique password to keep the digital gate Crashers
425:40 Crashers out as for our next method for keeping
425:42 out as for our next method for keeping our devices secure we have safe browsing
425:45 our devices secure we have safe browsing practices navigating the vast world of
425:47 practices navigating the vast world of the internet is comparable to attending
425:49 the internet is comparable to attending a sprawling never-ending party to ensure
425:52 a sprawling never-ending party to ensure a smooth and safe experience it's
425:54 a smooth and safe experience it's imperative to follow a few guidelines
425:57 imperative to follow a few guidelines first stick to the VIP section by
425:59 first stick to the VIP section by visiting only trusted sites think of it
426:01 visiting only trusted sites think of it as avoiding the sketchy corners of a
426:03 as avoiding the sketchy corners of a party next keep your browser up to date
426:07 party next keep your browser up to date much like you'd wear the latest fashion
426:08 much like you'd wear the latest fashion to a trendy bash ensuring your browser
426:10 to a trendy bash ensuring your browser is equipped with the latest security
426:12 is equipped with the latest security features updates and patches keeps your
426:14 features updates and patches keeps your searches fashionable also steer clear of
426:18 searches fashionable also steer clear of unsupported browsers using one is like
426:20 unsupported browsers using one is like dancing in shoes with broken heels very
426:23 dancing in shoes with broken heels very risky and prone to
426:24 risky and prone to mishaps lastly set your browser to give
426:27 mishaps lastly set your browser to give you a nudge before downloading anything
426:30 you a nudge before downloading anything this way you're alerted to potential
426:32 this way you're alerted to potential gate Crashers trying to sneak onto your
426:34 gate Crashers trying to sneak onto your device by adhering to these practices
426:37 device by adhering to these practices you can enjoy the digital party with
426:38 you can enjoy the digital party with confidence and
426:40 confidence and flare now the last item on the list for
426:43 flare now the last item on the list for keeping your device secure is to
426:44 keeping your device secure is to regularly install updates and patches
426:48 regularly install updates and patches and in keeping with our party analogy
426:50 and in keeping with our party analogy updates and patches are like the
426:51 updates and patches are like the refreshments and tune-ups at our grand
426:53 refreshments and tune-ups at our grand digital party imagine you're at a bash
426:56 digital party imagine you're at a bash and someone brings in a fresh tray of
426:57 and someone brings in a fresh tray of snacks or tweaks the sound system for
426:59 snacks or tweaks the sound system for better beats that's that's what updates
427:02 better beats that's that's what updates and patches do for your software and
427:04 and patches do for your software and devices updates are the newer versions
427:06 devices updates are the newer versions of your software bringing in cool new
427:08 of your software bringing in cool new features smoother interfaces and often
427:11 features smoother interfaces and often snazzier Graphics patches on the other
427:14 snazzier Graphics patches on the other hand are like quick fixes to a wobbly DJ
427:17 hand are like quick fixes to a wobbly DJ deck or a flickering disco light they
427:19 deck or a flickering disco light they address specific issues or
427:20 address specific issues or vulnerabilities that might have cropped
427:22 vulnerabilities that might have cropped up now why are they the life of the
427:24 up now why are they the life of the party without these refreshments and
427:27 party without these refreshments and tuneups your software might become
427:29 tuneups your software might become outdated or Worse vulnerable to those
427:31 outdated or Worse vulnerable to those part Crashers AKA cyber bullies looking
427:34 part Crashers AKA cyber bullies looking to spoil the fun so always be on the
427:37 to spoil the fun so always be on the lookout for the latest updates and
427:38 lookout for the latest updates and patches for your firewall browser and
427:41 patches for your firewall browser and especially your antivirus software exam
427:44 especially your antivirus software exam objective 6.2 explain methods to secure
427:47 objective 6.2 explain methods to secure devices and best
427:49 devices and best practices device use best
427:52 practices device use best practices before diving head first into
427:54 practices before diving head first into downloading some shiny new software it's
427:57 downloading some shiny new software it's essential to do a bit of detective work
427:58 essential to do a bit of detective work and exercise some common device and
428:00 and exercise some common device and software best practices when obtaining
428:03 software best practices when obtaining software from original equipment
428:05 software from original equipment manufacturers or third-party websites
428:07 manufacturers or third-party websites it's essential to validate the source
428:10 it's essential to validate the source always ensure the legitimacy of the
428:11 always ensure the legitimacy of the provider by checking for certifications
428:14 provider by checking for certifications or other indicators of their validity
428:15 or other indicators of their validity within the industry but validation
428:18 within the industry but validation shouldn't stop at initial Impressions
428:21 shouldn't stop at initial Impressions dive Deeper by searching for user
428:22 dive Deeper by searching for user reviews expert opinions and any signs
428:25 reviews expert opinions and any signs that might suggest the software isn't as
428:27 that might suggest the software isn't as it claims to be in the digital realm it
428:29 it claims to be in the digital realm it is all too easy to be tricked into into
428:31 is all too easy to be tricked into into downloading malicious
428:34 downloading malicious software in Windows a utility referred
428:37 software in Windows a utility referred to as user account control or UAC for
428:39 to as user account control or UAC for short serves as a protective mechanism
428:42 short serves as a protective mechanism for your device against malicious
428:43 for your device against malicious software downloads just in case you were
428:45 software downloads just in case you were a bit lazy in your personal validation
428:47 a bit lazy in your personal validation process whenever software or an
428:50 process whenever software or an application attempts to make significant
428:52 application attempts to make significant changes on a Windows device UAC
428:54 changes on a Windows device UAC intervenes by prompting the user for
428:56 intervenes by prompting the user for permission this proactive approach
428:58 permission this proactive approach ensures that only changes authorized by
429:00 ensures that only changes authorized by the user are implemented offering a
429:02 the user are implemented offering a layer of protection against unwanted
429:05 layer of protection against unwanted installations by acting as a gatekeeper
429:07 installations by acting as a gatekeeper UAC ensures that only trusted software
429:10 UAC ensures that only trusted software can modify the system enhancing the
429:12 can modify the system enhancing the overall security of the
429:15 overall security of the device another best practice to keep the
429:17 device another best practice to keep the attacker at Bay is to remove any
429:19 attacker at Bay is to remove any unwanted or unnecessary software over
429:22 unwanted or unnecessary software over time your computer can get cluttered
429:24 time your computer can get cluttered with software you no longer need or
429:26 with software you no longer need or never wanted in the first place and each
429:28 never wanted in the first place and each piece of software is essentially a door
429:30 piece of software is essentially a door or window providing access into your
429:33 or window providing access into your device the more pieces of software you
429:36 device the more pieces of software you have the more entry points there are for
429:37 have the more entry points there are for potential threats by removing unwanted
429:40 potential threats by removing unwanted or unnecessary software you're
429:42 or unnecessary software you're effectively reducing these potential
429:44 effectively reducing these potential entry points bolstering your computer's
429:46 entry points bolstering your computer's security so don't forget to do a little
429:49 security so don't forget to do a little digital spring cleaning from time to
429:51 digital spring cleaning from time to time out with the old in with the
429:53 time out with the old in with the security and maybe just maybe your
429:55 security and maybe just maybe your computer will stop judging you for all
429:57 computer will stop judging you for all those unused apps exam objective 6.3
430:01 those unused apps exam objective 6.3 summarize behavioral security
430:04 summarize behavioral security Concepts expectations of
430:07 Concepts expectations of privacy over time as Society immerses
430:10 privacy over time as Society immerses itself deeper into the world of
430:11 itself deeper into the world of technology for communication work and
430:13 technology for communication work and Leisure it has become imperative to
430:15 Leisure it has become imperative to discern how private our digital
430:17 discern how private our digital interactions truly are social networking
430:20 interactions truly are social networking sites have become an integral part of
430:22 sites have become an integral part of our daily lives most of these platforms
430:25 our daily lives most of these platforms offer settings that allow users to
430:27 offer settings that allow users to toggle between public and private
430:29 toggle between public and private profiles however a key point to remember
430:32 profiles however a key point to remember is that even with the strictest privacy
430:33 is that even with the strictest privacy settings the information you share might
430:35 settings the information you share might still be accessible to the platform
430:37 still be accessible to the platform staff advertisers or thirdparty
430:40 staff advertisers or thirdparty applications furthermore these platforms
430:43 applications furthermore these platforms are notorious for collecting vast
430:44 are notorious for collecting vast amounts of user data like a user's
430:46 amounts of user data like a user's physical location or search history
430:48 physical location or search history which can be utilized for targeted
430:50 which can be utilized for targeted advertising or analytics a logical
430:53 advertising or analytics a logical takeaway here is to always exercise
430:55 takeaway here is to always exercise caution with what you share and to
430:56 caution with what you share and to familiarize yourself with the platform's
430:58 familiarize yourself with the platform's Privacy policies
431:02 Privacy policies email another primary mode of
431:04 email another primary mode of communication varies in terms of privacy
431:07 communication varies in terms of privacy while some email Services champion and
431:09 while some email Services champion and to end encryption ensuring that only the
431:11 to end encryption ensuring that only the sender and recipient can decode the
431:13 sender and recipient can decode the content not all providers offer this
431:15 content not all providers offer this level of security it's also worth noting
431:17 level of security it's also worth noting that many email providers or employers
431:20 that many email providers or employers might scan your emails and in certain
431:23 might scan your emails and in certain circumstances if legally subpoenaed they
431:25 circumstances if legally subpoenaed they might even have to furnish your email
431:27 might even have to furnish your email content to authorities the best practice
431:29 content to authorities the best practice here is to assume what you send could
431:31 here is to assume what you send could become public and to be circumspect
431:33 become public and to be circumspect about transmitting sensitive information
431:35 about transmitting sensitive information via
431:37 via email file sharing whether through
431:39 email file sharing whether through public platforms cloud storage or on
431:42 public platforms cloud storage or on premises file servers poses its own set
431:44 premises file servers poses its own set of privacy challenges on public sharing
431:47 of privacy challenges on public sharing platforms activities such as downloading
431:49 platforms activities such as downloading or uploading a file might expose your IP
431:52 or uploading a file might expose your IP address to other users as for cloud
431:54 address to other users as for cloud storage Services while incredibly
431:56 storage Services while incredibly convenient May provide third-party
431:58 convenient May provide third-party limited access to the files that their
432:00 limited access to the files that their users up load these files can then be
432:03 users up load these files can then be analyzed for various purposes including
432:05 analyzed for various purposes including advertising or handed over to legal
432:07 advertising or handed over to legal entities if required not to mention file
432:11 entities if required not to mention file sharing is meant for sharing between
432:12 sharing is meant for sharing between multiple users or devices by Nature so
432:16 multiple users or devices by Nature so if you want the highest expectation of
432:17 if you want the highest expectation of privacy you might want to keep that
432:19 privacy you might want to keep that secret document off the server and
432:21 secret document off the server and choose to store it locally
432:24 choose to store it locally instead instant messaging another Staple
432:27 instead instant messaging another Staple in our daily communication has its
432:29 in our daily communication has its nuances when it comes to privacy too
432:32 nuances when it comes to privacy too many contemporary messaging apps boast
432:33 many contemporary messaging apps boast end-to-end encryption ensuring the
432:35 end-to-end encryption ensuring the sanctity of the conversation between the
432:37 sanctity of the conversation between the sender and
432:38 sender and recipient however some residual data
432:41 recipient however some residual data like timestamps or participant details
432:43 like timestamps or participant details might still be stored additionally even
432:46 might still be stored additionally even if a message is purged it could linger
432:48 if a message is purged it could linger in backups some platforms also
432:51 in backups some platforms also facilitate message backups on
432:52 facilitate message backups on third-party cloud services which might
432:54 third-party cloud services which might lack encryption the golden rule for
432:57 lack encryption the golden rule for users is to choose messaging platforms
432:59 users is to choose messaging platforms renowned for robust encryption and
433:01 renowned for robust encryption and privacy features and to think twice
433:03 privacy features and to think twice before sharing sensitive details even in
433:05 before sharing sensitive details even in seemingly private
433:11 chats lastly in the landscape of mobile and desktop software privacy intricacies
433:13 and desktop software privacy intricacies abound many applications on these
433:16 abound many applications on these platforms request permissions to access
433:18 platforms request permissions to access various device components such as
433:20 various device components such as contacts location and Camera while some
433:23 contacts location and Camera while some permissions are pivotal for
433:25 permissions are pivotal for functionality others might be leveraged
433:27 functionality others might be leveraged to gather user data for diverse purposes
433:30 to gather user data for diverse purposes additionally both both mobile and
433:31 additionally both both mobile and desktop operating systems have inherent
433:33 desktop operating systems have inherent privacy settings but they can also amass
433:36 privacy settings but they can also amass data to enhance user experience or for
433:38 data to enhance user experience or for targeted
433:39 targeted advertising furthermore one's online
433:41 advertising furthermore one's online activities can be surveilled when
433:43 activities can be surveilled when connected to mobile or Wi-Fi networks
433:45 connected to mobile or Wi-Fi networks especially on public Wi-Fi heightening
433:47 especially on public Wi-Fi heightening privacy
433:48 privacy concerns All Things Considered keep your
433:51 concerns All Things Considered keep your eyes peeled and your wits about you
433:53 eyes peeled and your wits about you remember expecting privacy is a bit like
433:56 remember expecting privacy is a bit like expecting a cat to obey you hopeful but
433:59 expecting a cat to obey you hopeful but not always realistic
434:01 not always realistic exam objective 6.3 summarize behavioral
434:04 exam objective 6.3 summarize behavioral security
434:06 security Concepts written policies and
434:09 Concepts written policies and procedures the path to understanding
434:12 procedures the path to understanding written policies and procedures in it
434:14 written policies and procedures in it starts with defining the terms
434:16 starts with defining the terms themselves and I will start with the
434:18 themselves and I will start with the definition of a policy a policy is a set
434:21 definition of a policy a policy is a set of rules or guidelines that dictate what
434:23 of rules or guidelines that dictate what actions should be taken under various
434:25 actions should be taken under various circumstances policies are essential for
434:28 circumstances policies are essential for setting the boundaries and expectations
434:30 setting the boundaries and expectations for Behavior with within an
434:35 organization two common examples of policies you'll encounter in it are the
434:37 policies you'll encounter in it are the acceptable use policy or AUP and the
434:40 acceptable use policy or AUP and the non-disclosure agreement or NDA an
434:43 non-disclosure agreement or NDA an acceptable use policy outlines the
434:45 acceptable use policy outlines the acceptable ways in which network and it
434:47 acceptable ways in which network and it resources can be used it sets the rules
434:50 resources can be used it sets the rules for what is and isn't allowed such as
434:52 for what is and isn't allowed such as the types of websites you can visit or
434:54 the types of websites you can visit or the software you can
434:56 the software you can install a non-disclosure agreement on
434:59 install a non-disclosure agreement on the other hand is a legal contract that
435:01 the other hand is a legal contract that outlines the sharing of certain
435:02 outlines the sharing of certain confidential information it specifies
435:05 confidential information it specifies what information can be shared with whom
435:07 what information can be shared with whom and under what
435:09 and under what conditions now let's move on to
435:12 conditions now let's move on to procedures while a policy tells you what
435:15 procedures while a policy tells you what and why a procedure tells you how a
435:18 and why a procedure tells you how a procedure is a set of step-by-step
435:20 procedure is a set of step-by-step instructions to perform a task think of
435:23 instructions to perform a task think of it like a recipe just as a recipe guides
435:26 it like a recipe just as a recipe guides you through the process of making a dish
435:28 you through the process of making a dish a procedure guides you through a
435:29 a procedure guides you through a specific task in an it
435:33 specific task in an it environment you may have also come
435:35 environment you may have also come across the term standard operating
435:37 across the term standard operating procedure or sop at one point or another
435:40 procedure or sop at one point or another if not sop is essentially a detailed
435:43 if not sop is essentially a detailed written set of procedures that explains
435:45 written set of procedures that explains how to undertake a particular activity
435:47 how to undertake a particular activity Sops are crucial in it for ensuring that
435:50 Sops are crucial in it for ensuring that operations run smoothly and
435:52 operations run smoothly and consistently now to recap policies set
435:55 consistently now to recap policies set the rules and expectations for Behavior
435:57 the rules and expectations for Behavior with an AUP or an NDA being Prime
436:00 with an AUP or an NDA being Prime examples while procedures provide
436:02 examples while procedures provide step-by-step instructions for performing
436:05 step-by-step instructions for performing tasks exam objective 6.3 summarize
436:09 tasks exam objective 6.3 summarize behavioral security
436:11 behavioral security Concepts confidential
436:13 Concepts confidential information in this video we will cover
436:16 information in this video we will cover the topic of confidential information in
436:19 the topic of confidential information in the IT world confidential information
436:21 the IT world confidential information refers to data that should not be
436:23 refers to data that should not be disclosed to unauthorized
436:25 disclosed to unauthorized individuals this could be anything from
436:27 individuals this could be anything from passwords to personal records and the
436:29 passwords to personal records and the mishandling of such information can lead
436:31 mishandling of such information can lead to severe consequences including legal
436:35 to severe consequences including legal penalties so how should you handle
436:37 penalties so how should you handle confidential information always make
436:39 confidential information always make sure to store it securely whether it's
436:41 sure to store it securely whether it's on a physical device or in the cloud use
436:44 on a physical device or in the cloud use encryption methods to add an extra layer
436:46 encryption methods to add an extra layer of protection and never share
436:49 of protection and never share confidential information unless you're
436:50 confidential information unless you're certain of the recipient's identity and
436:52 certain of the recipient's identity and their need to know to assist with this
436:55 their need to know to assist with this one of the most basic yet effective ways
436:57 one of the most basic yet effective ways to protect confidential information is
436:59 to protect confidential information is through the use of strong password
437:01 through the use of strong password a strong password is typically a mix of
437:04 a strong password is typically a mix of letters numbers and special characters
437:07 letters numbers and special characters it's also a good idea to update your
437:09 it's also a good idea to update your passwords regularly and never reuse them
437:11 passwords regularly and never reuse them across multiple
437:17 platforms next let's discuss a specific category of confidential information
437:19 category of confidential information known to the IT industry as personal
437:21 known to the IT industry as personal identifiable information or pii this
437:24 identifiable information or pii this refers to any information that can be
437:26 refers to any information that can be used to identify an individual and may
437:28 used to identify an individual and may include but is not limited to a person's
437:30 include but is not limited to a person's name name social security number date of
437:32 name name social security number date of birth email address and phone number pii
437:36 birth email address and phone number pii is often subject to Legal protections
437:38 is often subject to Legal protections and must be handled carefully to prevent
437:40 and must be handled carefully to prevent unauthorized access or
437:45 disclosure another category of confidential information is protected
437:47 confidential information is protected health information or Phi this refers to
437:51 health information or Phi this refers to any information about health status
437:53 any information about health status Medical Treatments or healthcare
437:54 Medical Treatments or healthcare services that can be linked to a
437:56 services that can be linked to a specific individual this information is
437:59 specific individual this information is often sensitive and like pi Phi is
438:01 often sensitive and like pi Phi is subject to strict
438:08 regulations in addition to pii and Phi there are a few other forms of data that
438:09 there are a few other forms of data that deserve a certain expectation of
438:11 deserve a certain expectation of confidentiality and
438:13 confidentiality and privacy they include customer
438:16 privacy they include customer information ranging from credit card
438:18 information ranging from credit card details to purchase
438:21 details to purchase history companies information like Trade
438:24 history companies information like Trade Secrets financial data and employee
438:28 Secrets financial data and employee records and lastly SCH schol records the
438:32 records and lastly SCH schol records the list could go on and on but the
438:34 list could go on and on but the objective Remains the Same certain types
438:37 objective Remains the Same certain types of information must be handled in a
438:39 of information must be handled in a secure manner in order to keep it from
438:40 secure manner in order to keep it from being disclosed to unauthorized
438:43 being disclosed to unauthorized individuals exam objective 6.4 compare
438:46 individuals exam objective 6.4 compare and contrast authentication
438:48 and contrast authentication authorization accounting and
438:50 authorization accounting and non-repudiation
438:52 non-repudiation Concepts
438:54 Concepts AAA in this video I will break down the
438:56 AAA in this video I will break down the concept of AAA into its Three core
438:58 concept of AAA into its Three core components Authentication authorization
439:01 components Authentication authorization and accounting but before I Define these
439:04 and accounting but before I Define these three components I want to talk about
439:06 three components I want to talk about AAA as it relates to the previously
439:08 AAA as it relates to the previously discussed topic of CIA in the realm of
439:11 discussed topic of CIA in the realm of Information Technology both AAA and CIA
439:14 Information Technology both AAA and CIA are foundational Concepts but they focus
439:16 are foundational Concepts but they focus on different aspects of security while
439:18 on different aspects of security while CIA is all about the data AAA is
439:21 CIA is all about the data AAA is centered around the user AAA as a user
439:24 centered around the user AAA as a user Centric approach to security ensures
439:26 Centric approach to security ensures that the right individuals have the
439:28 that the right individuals have the right access at the right times on the
439:31 right access at the right times on the other hand CIA is data Centric it
439:34 other hand CIA is data Centric it ensures that data remains private
439:36 ensures that data remains private accurate and is accessible when needed
439:39 accurate and is accessible when needed in essence while triple of focuses on
439:41 in essence while triple of focuses on verifying and managing user identities
439:43 verifying and managing user identities and their actions CIA is dedicated to
439:45 and their actions CIA is dedicated to safeguarding the data itself hopefully
439:48 safeguarding the data itself hopefully this little explanation keeps you from
439:50 this little explanation keeps you from getting these two concepts mixed up next
439:53 getting these two concepts mixed up next I will Define each component of the AAA
439:55 I will Define each component of the AAA concept starting with
440:01 authentication imagine you're trying to log into your computer the system asks
440:04 log into your computer the system asks for your username and password why it
440:07 for your username and password why it wants to verify that you are who you
440:09 wants to verify that you are who you claim to be in it terms this process is
440:13 claim to be in it terms this process is called
440:13 called authentication it's the act of
440:15 authentication it's the act of confirming the truth of an attribute of
440:17 confirming the truth of an attribute of a single piece of data or entity in
440:20 a single piece of data or entity in simpler words it's like asking who are
440:24 simpler words it's like asking who are you next we have
440:26 you next we have authorization let's say you've entered a
440:28 authorization let's say you've entered a building using a key however this
440:31 building using a key however this doesn't mean you can access every room
440:33 doesn't mean you can access every room inside some rooms might require a
440:35 inside some rooms might require a different key similarly in it once
440:39 different key similarly in it once you're authenticated it doesn't mean you
440:40 you're authenticated it doesn't mean you can access everything authorization
440:43 can access everything authorization determines what you can or cannot
440:47 determines what you can or cannot do lastly there's Accounting in the IT
440:50 do lastly there's Accounting in the IT world this doesn't refer to crunching
440:52 world this doesn't refer to crunching numbers or balancing the books instead
440:55 numbers or balancing the books instead it's about tracking user activities and
440:57 it's about tracking user activities and recording them think of it as a log book
441:00 recording them think of it as a log book or computer record that notes every
441:02 or computer record that notes every action you take as a user answering the
441:04 action you take as a user answering the question what did you
441:08 question what did you do together the three pillars of
441:10 do together the three pillars of authentication authorization and
441:12 authentication authorization and accounting make up the AAA security
441:14 accounting make up the AAA security principle in the realm of Information
441:16 principle in the realm of Information Technology authentication verifies a
441:19 Technology authentication verifies a user's identity ensuring that
441:21 user's identity ensuring that individuals are genuinely who they claim
441:23 individuals are genuinely who they claim to be once their identity is confirmed
441:26 to be once their identity is confirmed authorization steps in to determine what
441:28 authorization steps in to determine what actions or resources the user is
441:29 actions or resources the user is permitted toess access ensuring that
441:31 permitted toess access ensuring that they only interact with what they're
441:33 they only interact with what they're allowed to lastly accounting
441:35 allowed to lastly accounting meticulously tracks and Records all user
441:38 meticulously tracks and Records all user activities providing a comprehensive log
441:40 activities providing a comprehensive log that can be reviewed for security
441:42 that can be reviewed for security compliance or audit purposes
441:44 compliance or audit purposes collectively these components not only
441:46 collectively these components not only bolster security but also streamline
441:48 bolster security but also streamline user management and oversight in it
441:51 user management and oversight in it systems exam objective 6.4 compare and
441:55 systems exam objective 6.4 compare and contrast authentication authorization
441:58 contrast authentication authorization accounting and non-repudiation Concepts
442:05 authentication imagine you're trying to log into your computer the system asks
442:07 log into your computer the system asks for your username and password why it
442:11 for your username and password why it wants to verify that you are who you
442:13 wants to verify that you are who you claim to be in it terms this process is
442:16 claim to be in it terms this process is called
442:17 called authentication at its core
442:19 authentication at its core authentication answers the question who
442:21 authentication answers the question who are you ensuring that only authorized
442:24 are you ensuring that only authorized individuals can access certain
442:25 individuals can access certain information or systems now how do
442:28 information or systems now how do systems authenticate you they use
442:31 systems authenticate you they use something called an authentication
442:33 something called an authentication Factor an authentication factor is a
442:35 Factor an authentication factor is a distinct method used to verify a user's
442:37 distinct method used to verify a user's identity before granting access to a
442:39 identity before granting access to a system or resource it represents a
442:42 system or resource it represents a specific piece of evidence that the user
442:44 specific piece of evidence that the user must provide falling into categories
442:46 must provide falling into categories such as something you know something you
442:48 such as something you know something you have something you are and somewhere you
442:50 have something you are and somewhere you are now let's take a closer look at each
442:53 are now let's take a closer look at each of these
442:58 categories first we will discuss something you know this is the most
443:00 something you know this is the most common factor think of passwords pins or
443:04 common factor think of passwords pins or answers to security questions it's
443:07 answers to security questions it's information that resides in your mind
443:09 information that resides in your mind and is known hopefully only to
443:11 and is known hopefully only to you as for a password it is a secret
443:14 you as for a password it is a secret combination of characters that a user
443:16 combination of characters that a user sets to prove their identity and gain
443:18 sets to prove their identity and gain access to digital accounts or
443:21 access to digital accounts or systems a pin or personal identification
443:24 systems a pin or personal identification number is a numeric code used to
443:26 number is a numeric code used to authenticate a user commonly associated
443:28 authenticate a user commonly associated with bank accounts or mobile devices is
443:31 with bank accounts or mobile devices is it is typically shorter than a password
443:33 it is typically shorter than a password but serves a similar purpose in
443:34 but serves a similar purpose in verifying
443:36 verifying identity security questions are preset
443:39 identity security questions are preset queries that a user answers during a
443:41 queries that a user answers during a account setup providing an additional
443:42 account setup providing an additional layer of identity
443:44 layer of identity verification falling under the something
443:46 verification falling under the something you know category they act as a backup
443:48 you know category they act as a backup for authentication especially in
443:50 for authentication especially in scenarios where a password or pin is
443:54 scenarios where a password or pin is forgotten our next authentication factor
443:57 forgotten our next authentication factor is something you have this category
443:59 is something you have this category refers to tangible objects or devices in
444:02 refers to tangible objects or devices in the possession of a user that serves as
444:04 the possession of a user that serves as a means of
444:05 a means of authentication this category emphasizes
444:07 authentication this category emphasizes the physical possession of an item as
444:09 the physical possession of an item as proof of identity examples
444:13 proof of identity examples include a hardware token which is a
444:15 include a hardware token which is a physical device often small enough to be
444:18 physical device often small enough to be carried on a keychain and can generate
444:20 carried on a keychain and can generate and display secure codes for
444:23 and display secure codes for authentication a software token which is
444:25 authentication a software token which is a digital counterpart to the hardware
444:27 a digital counterpart to the hardware token existing as an application or
444:29 token existing as an application or software module on devices like
444:31 software module on devices like smartphones or computers it also
444:34 smartphones or computers it also generates and displays secure codes for
444:36 generates and displays secure codes for authentication but only to users with
444:38 authentication but only to users with the required software
444:40 the required software access onetime passwords also referred
444:43 access onetime passwords also referred to as otps are unique time-sensitive
444:45 to as otps are unique time-sensitive codes sent to a user's device often Via
444:48 codes sent to a user's device often Via SMS text or email for a single use
444:51 SMS text or email for a single use authentication falling under the
444:53 authentication falling under the something you have umbrella otps are
444:55 something you have umbrella otps are often thought of as impossible to
444:58 often thought of as impossible to break continuing on on we have the
445:01 break continuing on on we have the something you are authentication Factor
445:04 something you are authentication Factor this factor is about unique
445:05 this factor is about unique characteristics inherent to the user or
445:07 characteristics inherent to the user or you may have heard the more common term
445:09 you may have heard the more common term biometric data Biometrics can include
445:12 biometric data Biometrics can include many user characteristics but for the
445:14 many user characteristics but for the purpose of brevity I will stick to a few
445:16 purpose of brevity I will stick to a few of the more common biological
445:19 of the more common biological metrics fingerprints are unique patterns
445:22 metrics fingerprints are unique patterns formed by ridges on the tips of human
445:23 formed by ridges on the tips of human fingers and when used for authentication
445:26 fingers and when used for authentication they validate identity based on these
445:27 they validate identity based on these distinct patterns
445:30 distinct patterns the iris and retina are parts of the eye
445:32 the iris and retina are parts of the eye with intricate patterns that are unique
445:34 with intricate patterns that are unique to each individual as facets of the
445:37 to each individual as facets of the something you are category Iris and
445:39 something you are category Iris and retina scans provide biometric
445:41 retina scans provide biometric authentication by analyzing these
445:42 authentication by analyzing these patterns ensuring a high level of
445:44 patterns ensuring a high level of security due to their
445:47 security due to their distinctiveness facial recognition
445:49 distinctiveness facial recognition technology analyzes distinct features of
445:51 technology analyzes distinct features of an individual's face such as the
445:53 an individual's face such as the distance between eyes or the shape of
445:55 distance between eyes or the shape of the nose to authenticate identity facial
445:58 the nose to authenticate identity facial authentication leverages the uniqueness
446:00 authentication leverages the uniqueness one's facial structure to Grant or deny
446:02 one's facial structure to Grant or deny access to systems or
446:09 resources now for one last Factor somewhere you are this authentication
446:11 somewhere you are this authentication factor is based on the geographical or
446:14 factor is based on the geographical or physical location of the user by
446:16 physical location of the user by determining where you are systems can
446:18 determining where you are systems can grant or restrict access based on
446:20 grant or restrict access based on whether the user is logging in from a
446:21 whether the user is logging in from a recognized or safe location examples
446:25 recognized or safe location examples include Geo fencing where access is only
446:27 include Geo fencing where access is only allowed from specific geographic regions
446:29 allowed from specific geographic regions or IP address checks that verify if a
446:31 or IP address checks that verify if a user is connecting from a known Network
446:33 user is connecting from a known Network or country this Factor adds an extra
446:36 or country this Factor adds an extra layer of security by ensuring that even
446:38 layer of security by ensuring that even if someone has your authentication
446:40 if someone has your authentication details they might be prevented from
446:42 details they might be prevented from accessing resources if they're not in an
446:43 accessing resources if they're not in an approved
446:45 approved location exam objective 6.4 compare and
446:49 location exam objective 6.4 compare and contrast authentication authorization
446:51 contrast authentication authorization accounting and non-repudiation
446:54 accounting and non-repudiation Concepts single Factor versus multiactor
446:57 Concepts single Factor versus multiactor when accessing digital systems we often
447:00 when accessing digital systems we often encounter prompts asking for credentials
447:03 encounter prompts asking for credentials using just one authentication Factor
447:05 using just one authentication Factor like a password to verify your identity
447:07 like a password to verify your identity is known as single Factor
447:09 is known as single Factor authentication this straightforward
447:11 authentication this straightforward process often abbreviated as SFA
447:14 process often abbreviated as SFA verifies your identity using only one
447:16 verifies your identity using only one piece of
447:17 piece of evidence however as our security needs
447:20 evidence however as our security needs have evolved so have our authentication
447:22 have evolved so have our authentication methods enter multifactor authentication
447:25 methods enter multifactor authentication or MFA this method requires two or more
447:28 or MFA this method requires two or more pieces of evidence con forming to
447:30 pieces of evidence con forming to multiple authentication factors in order
447:32 multiple authentication factors in order to verify your identity MFA can involve
447:35 to verify your identity MFA can involve a combination of elements something you
447:37 a combination of elements something you know like a password something you have
447:39 know like a password something you have such as a mobile device receiving a code
447:42 such as a mobile device receiving a code something you are like a fingerprint or
447:44 something you are like a fingerprint or facial scan and somewhere you are this
447:47 facial scan and somewhere you are this layered approach to authentication
447:49 layered approach to authentication significantly enhances security by
447:51 significantly enhances security by ensuring that even if one factor is
447:52 ensuring that even if one factor is compromised there are additional
447:54 compromised there are additional barriers to unauthorized access now if
447:57 barriers to unauthorized access now if that was not enough you are also likely
447:59 that was not enough you are also likely to come across the the concept of
448:00 to come across the the concept of two-factor authentication in your It
448:02 two-factor authentication in your It Journey two-factor authentication is
448:05 Journey two-factor authentication is often referred to as 2fa and is a
448:07 often referred to as 2fa and is a specific form of MFA that uses exactly
448:10 specific form of MFA that uses exactly two authentication factors to verify
448:12 two authentication factors to verify your identity it strikes a balance
448:15 your identity it strikes a balance between enhanced security and user
448:16 between enhanced security and user convenience often combining a password
448:19 convenience often combining a password with a mobile code or another easily
448:20 with a mobile code or another easily accessible method in the realm of it
448:24 accessible method in the realm of it understanding the distinctions between
448:25 understanding the distinctions between single Factor two- factor and multiactor
448:28 single Factor two- factor and multiactor authentication is essential
448:30 authentication is essential as you prepare for your CompTIA ITF plus
448:33 as you prepare for your CompTIA ITF plus certification exam remember that the
448:35 certification exam remember that the choice of authentication method can
448:36 choice of authentication method can greatly impact the security of systems
448:38 greatly impact the security of systems and
448:40 and data now let's practice this concept to
448:43 data now let's practice this concept to ensure you are exam ready to do this I
448:46 ensure you are exam ready to do this I will present a few authentication
448:48 will present a few authentication scenarios where two authentication
448:49 scenarios where two authentication elements are used we will then classify
448:52 elements are used we will then classify each authentication element according to
448:54 each authentication element according to its authentication Factor type and then
448:56 its authentication Factor type and then see if a single factor or multiple
448:58 see if a single factor or multiple factors were used overall
449:00 factors were used overall with that explained here is the first
449:02 with that explained here is the first authentication scenario the user has
449:05 authentication scenario the user has provided a username which is something
449:07 provided a username which is something you know and a complex password which is
449:10 you know and a complex password which is also something you know as both
449:13 also something you know as both authentication methods are something you
449:15 authentication methods are something you know factors this would be considered
449:17 know factors this would be considered single Factor authentication or
449:24 SFA authentication scenario number two the user has provided a smart card which
449:26 the user has provided a smart card which is a form of a hardware token This falls
449:29 is a form of a hardware token This falls into the something you have category the
449:32 into the something you have category the user has also provided a PIN number
449:34 user has also provided a PIN number which is something you know in this
449:37 which is something you know in this scenario we have multiple authentication
449:39 scenario we have multiple authentication methods being utilized so this would be
449:41 methods being utilized so this would be considered multiactor authentication or
449:48 MFA okay don't beg I will do one more scenario just for you authentication
449:51 scenario just for you authentication scenario number three in this last
449:54 scenario number three in this last scenario the user is subject to
449:57 scenario the user is subject to geolocation This falls into the someware
450:00 geolocation This falls into the someware category the user must also provide a
450:03 category the user must also provide a retina scan which is something you are
450:06 retina scan which is something you are in this scenario we have multiple
450:07 in this scenario we have multiple authentication methods being utilized so
450:10 authentication methods being utilized so this would be considered multiactor
450:11 this would be considered multiactor authentication or
450:13 authentication or MFA great now you are a certified SFA
450:16 MFA great now you are a certified SFA 2fa and MFA
450:19 2fa and MFA Master exam objective 6.4 compare and
450:23 Master exam objective 6.4 compare and contrast authentication authorization
450:25 contrast authentication authorization accounting and non-repudiation
450:28 accounting and non-repudiation Concepts single sign
450:30 Concepts single sign on how often do you find yourself
450:33 on how often do you find yourself juggling multiple accounts each with its
450:35 juggling multiple accounts each with its own unique username and password this
450:37 own unique username and password this can become cumbersome and challenging to
450:40 can become cumbersome and challenging to manage that is where single sign on
450:42 manage that is where single sign on comes in single signon commonly referred
450:45 comes in single signon commonly referred to as SSO is a user authentication
450:48 to as SSO is a user authentication Service that permits a user to use one
450:50 Service that permits a user to use one set of login credentials like a username
450:52 set of login credentials like a username and password to access multiple
450:54 and password to access multiple applications think of it as a master key
450:57 applications think of it as a master key that unlocks several doors eliminating
450:59 that unlocks several doors eliminating the need to to have multiple keys for
451:01 the need to to have multiple keys for each
451:03 each door so how does single sign on work
451:07 door so how does single sign on work well when you first log into an
451:08 well when you first log into an application that uses single sign on or
451:10 application that uses single sign on or SSO the system checks if you've been
451:13 SSO the system checks if you've been authenticated by the central SSO
451:15 authenticated by the central SSO solution if you haven't it prompts you
451:17 solution if you haven't it prompts you to log in once you provide your
451:19 to log in once you provide your credentials the SSO system validates
451:22 credentials the SSO system validates them against a central database upon
451:25 them against a central database upon successful validation the SSO system
451:27 successful validation the SSO system issues a token a kind of digital stamp
451:29 issues a token a kind of digital stamp of approval this token is then used for
451:32 of approval this token is then used for subsequent authentication requests
451:34 subsequent authentication requests during that session as you navigate to
451:37 during that session as you navigate to another integrated application instead
451:39 another integrated application instead of asking for your credentials again the
451:41 of asking for your credentials again the system requests the SSO solution to
451:43 system requests the SSO solution to verify the token's validity if the token
451:46 verify the token's validity if the token is recognized and still valid the second
451:48 is recognized and still valid the second application grants you access without
451:50 application grants you access without requiring another login this process of
451:53 requiring another login this process of token verification repeats for all
451:55 token verification repeats for all integrated applications ensuring a
451:57 integrated applications ensuring a smooth and uninterrupted user experience
452:00 smooth and uninterrupted user experience now that makes things much easier
452:02 now that makes things much easier doesn't it now behind the scenes the SSO
452:06 doesn't it now behind the scenes the SSO solution and the applications
452:07 solution and the applications communicate using special protocols
452:10 communicate using special protocols these protocols Define how the
452:12 these protocols Define how the application request authentication and
452:14 application request authentication and how the SSO solution responds with the
452:16 how the SSO solution responds with the user's authentication status but what
452:19 user's authentication status but what happens when you log out or when the
452:20 happens when you log out or when the session expires simple the token becomes
452:24 session expires simple the token becomes invalid as a result the next time you
452:27 invalid as a result the next time you try to access an application you'll be
452:29 try to access an application you'll be prompted to to authenticate again and a
452:31 prompted to to authenticate again and a new token will be issued for that
452:33 new token will be issued for that session incorporating single sign on not
452:35 session incorporating single sign on not only streamlines the user's experience
452:37 only streamlines the user's experience but also consolidates the authentication
452:39 but also consolidates the authentication process for it
452:41 process for it administrators they can monitor user
452:43 administrators they can monitor user activities manage permissions and
452:45 activities manage permissions and enforce security policies all from a
452:47 enforce security policies all from a centralized location to wrap up as you
452:50 centralized location to wrap up as you continue learning about the intricacies
452:52 continue learning about the intricacies of it and gear up for your CompTIA ITF
452:55 of it and gear up for your CompTIA ITF plus certification grasping the
452:57 plus certification grasping the fundamentals of single sign on is
452:58 fundamentals of single sign on is invaluable it epitomizes the balance
453:01 invaluable it epitomizes the balance between user convenience and robust
453:03 between user convenience and robust security which is always a balancing act
453:06 security which is always a balancing act exam objective 6.4 compare and contrast
453:09 exam objective 6.4 compare and contrast authentication authorization accounting
453:12 authentication authorization accounting and non-repudiation
453:14 and non-repudiation Concepts
453:16 Concepts authorization in our daily lives as it
453:19 authorization in our daily lives as it professionals we often encounter
453:21 professionals we often encounter situations where we need permission to
453:22 situations where we need permission to do something whether it's entering a
453:24 do something whether it's entering a restricted area or accessing specific
453:27 restricted area or accessing specific information in the world of Information
453:29 information in the world of Information Technology
453:30 Technology this concept is known as
453:32 this concept is known as authorization authorization is the
453:34 authorization authorization is the process of determining what actions
453:36 process of determining what actions resources or Services a user is
453:38 resources or Services a user is permitted to access or more simply put
453:41 permitted to access or more simply put it answers the question what can you
453:45 it answers the question what can you do now let's talk about permissions
453:49 do now let's talk about permissions permissions are the specific rights or
453:50 permissions are the specific rights or privileges granted to users or software
453:54 privileges granted to users or software think of them as the detailed rules that
453:56 think of them as the detailed rules that dictate what can and cannot be done for
453:58 dictate what can and cannot be done for instance in a a computer system a user
454:01 instance in a a computer system a user might have permission to read a file but
454:03 might have permission to read a file but not to modify it or for a database the
454:06 not to modify it or for a database the user may be granted permission to use
454:07 user may be granted permission to use the select command but denied access to
454:10 the select command but denied access to the insert update and delete
454:14 the insert update and delete commands a fundamental principle in it
454:16 commands a fundamental principle in it security is the concept of least
454:18 security is the concept of least privilege this means giving users or
454:21 privilege this means giving users or systems only the permissions they
454:23 systems only the permissions they absolutely need to perform a task or job
454:25 absolutely need to perform a task or job function and nothing more this is best
454:28 function and nothing more this is best accomplished by enhancing the granular
454:29 accomplished by enhancing the granular ity of user permissions or being more
454:31 ity of user permissions or being more specific with permission rules rather
454:33 specific with permission rules rather than
454:38 generalizing now how do we decide who gets what permissions this is where
454:40 gets what permissions this is where access control methods come into play
454:43 access control methods come into play there are several methods but we will
454:45 there are several methods but we will only cover the four methods listed in
454:47 only cover the four methods listed in the CompTIA ITF plus exam
454:49 the CompTIA ITF plus exam objectives for our first method we have
454:52 objectives for our first method we have role-based access control or our back
454:55 role-based access control or our back this method assigns permissions based on
454:57 this method assigns permissions based on roles within an
454:58 roles within an organization for example all employees
455:01 organization for example all employees within the accounting department might
455:02 within the accounting department might have access to certain files while
455:04 have access to certain files while regular employees have a different set
455:06 regular employees have a different set of permissions it's like having
455:08 of permissions it's like having different membership tiers where each
455:10 different membership tiers where each tier has its own set of
455:16 benefits next we have rule-based access control here access is granted or denied
455:19 control here access is granted or denied based on a set of rules or policies for
455:22 based on a set of rules or policies for instance a system might be set up to
455:24 instance a system might be set up to only allow access to a financial
455:26 only allow access to a financial application during regular business
455:28 application during regular business hours this would be a time-based rule or
455:32 hours this would be a time-based rule or perhaps access to sensitive data might
455:34 perhaps access to sensitive data might be restricted to devices within the
455:35 be restricted to devices within the company's physical premises this would
455:38 company's physical premises this would be a location-based
455:41 be a location-based Rule now on to mandatory access control
455:44 Rule now on to mandatory access control or Mac this method uses labels often
455:48 or Mac this method uses labels often tied to security classifications to
455:50 tied to security classifications to determine access files and users are
455:53 determine access files and users are assigned these labels and access
455:55 assigned these labels and access decisions are made based on them it's a
455:57 decisions are made based on them it's a bit like a research facility where only
455:59 bit like a research facility where only scientists with a specific clearance
456:01 scientists with a specific clearance level can access certain labs and just a
456:04 level can access certain labs and just a quick note for clarity when we say mac
456:06 quick note for clarity when we say mac here we're not talking about that unique
456:08 here we're not talking about that unique identifier for your computer's network
456:14 interface and for our last method we have discretionary access control or DC
456:18 have discretionary access control or DC with DC the owner of the information or
456:20 with DC the owner of the information or resource decides who gets access it's a
456:23 resource decides who gets access it's a bit like a homeowner deciding who can
456:24 bit like a homeowner deciding who can enter their house and which rooms they
456:26 enter their house and which rooms they can access now here is the real trick to
456:30 can access now here is the real trick to keeping these four methods straight
456:32 keeping these four methods straight focus on the keywords our back is all
456:35 focus on the keywords our back is all about roles or job titles rule-based
456:37 about roles or job titles rule-based involves specific rules Mac uses labels
456:39 involves specific rules Mac uses labels and classifications and DC is all about
456:42 and classifications and DC is all about the
456:43 the owner exam objective 6.4 compare and
456:47 owner exam objective 6.4 compare and contrast authentication authorization
456:49 contrast authentication authorization accounting and non-repudiation
456:52 accounting and non-repudiation Concepts
456:54 Concepts accounting at its core accounting is the
456:57 accounting at its core accounting is the process of recording summarizing and an
456:59 process of recording summarizing and an analyzing Financial transactions
457:01 analyzing Financial transactions ensuring that records of individual
457:03 ensuring that records of individual Financial transactions are accurate and
457:05 Financial transactions are accurate and upto-date this meticulous process has
457:08 upto-date this meticulous process has been the backbone of businesses for
457:09 been the backbone of businesses for centuries helping them understand their
457:11 centuries helping them understand their Financial Health and make informed
457:13 Financial Health and make informed decisions but in the rapidly evolving
457:15 decisions but in the rapidly evolving world of it security accounting takes on
457:18 world of it security accounting takes on an additional meaning here it doesn't
457:20 an additional meaning here it doesn't just deal with dollars and cents it
457:22 just deal with dollars and cents it refers to the tracking of user activity
457:24 refers to the tracking of user activity and system events just as Financial
457:27 and system events just as Financial Accounting keeps track of money it
457:29 Accounting keeps track of money it accounting keeps track of data and user
457:31 accounting keeps track of data and user actions and answers the pivotal question
457:33 actions and answers the pivotal question what did you
457:36 what did you do one of the primary tools used in it
457:39 do one of the primary tools used in it accounting are logs think of logs as the
457:42 accounting are logs think of logs as the digital Footprints left behind in a
457:44 digital Footprints left behind in a system these Footprints or logs are
457:47 system these Footprints or logs are records that provide a chronological
457:48 records that provide a chronological account of events in a system they can
457:51 account of events in a system they can track a wide range of activities from
457:53 track a wide range of activities from user logins file accesses to even the
457:56 user logins file accesses to even the smallest system errors and security
457:58 smallest system errors and security breaches the importance of logs cannot
458:01 breaches the importance of logs cannot be overstated they are the silent
458:03 be overstated they are the silent Guardians of the digital world they
458:06 Guardians of the digital world they assist system administrators and
458:07 assist system administrators and diagnosing problems almost like a doctor
458:10 diagnosing problems almost like a doctor referring to a patient's history they
458:12 referring to a patient's history they provide a clear traceable Trail for
458:14 provide a clear traceable Trail for Auditors to ensure compliance ensuring
458:17 Auditors to ensure compliance ensuring that digital Protocols are being
458:18 that digital Protocols are being followed and perhaps most importantly
458:21 followed and perhaps most importantly they can be instrumental in detecting
458:23 they can be instrumental in detecting unauthorized or potentially malicious
458:25 unauthorized or potentially malicious activity by answering the questions of
458:27 activity by answering the questions of who what when and where logs provide a
458:30 who what when and where logs provide a comprehensive view of system
458:36 activities another significant aspect of accounting in it is the tracking of
458:38 accounting in it is the tracking of online activity let's take a moment to
458:40 online activity let's take a moment to think about your web browser's history
458:43 think about your web browser's history this seemingly simple feature not only
458:45 this seemingly simple feature not only allows you to revisit previously
458:46 allows you to revisit previously accessed sites but also serves as a
458:48 accessed sites but also serves as a detailed record of your online Journey
458:50 detailed record of your online Journey almost like a diary of your digital
458:52 almost like a diary of your digital Adventures for businesses and
458:54 Adventures for businesses and organizations monitoring web history
458:57 organizations monitoring web history isn't just a feature it's a necessity it
458:59 isn't just a feature it's a necessity it ensures employees adhere to company
459:02 ensures employees adhere to company policies it offers protection against
459:04 policies it offers protection against harmful websites serving as a shield
459:06 harmful websites serving as a shield against the darker corners of the web
459:09 against the darker corners of the web and in today's age of cyber threats it
459:11 and in today's age of cyber threats it can be a vital tool in cyber
459:12 can be a vital tool in cyber investigations helping to piece together
459:15 investigations helping to piece together digital
459:16 digital puzzles now it's easy to perceive it
459:18 puzzles now it's easy to perceive it accounting as a big brother watching
459:20 accounting as a big brother watching over your shoulder and to some extent
459:22 over your shoulder and to some extent that's a valid perspective but it's
459:24 that's a valid perspective but it's essential to see the bigger picture the
459:27 essential to see the bigger picture the other half of it accounting the one that
459:29 other half of it accounting the one that often goes unnoticed is its role in
459:31 often goes unnoticed is its role in ensuring a transparent secure and
459:33 ensuring a transparent secure and accountable digital environment for all
459:36 accountable digital environment for all it's about building trust in a digital
459:38 it's about building trust in a digital world that's becoming increasingly
459:41 world that's becoming increasingly untrustworthy exam objective 6.4 compare
459:44 untrustworthy exam objective 6.4 compare and contrast authentication
459:46 and contrast authentication authorization accounting and
459:48 authorization accounting and non-repudiation
459:50 non-repudiation Concepts
459:52 Concepts non-repudiation in simple terms
459:54 non-repudiation in simple terms non-repudiation is a safeguard that
459:56 non-repudiation is a safeguard that guarantees individuals or entities
459:58 guarantees individuals or entities involved in a a digital transaction
460:00 involved in a a digital transaction cannot later refute or deny their
460:02 cannot later refute or deny their participation or the legitimacy of their
460:04 participation or the legitimacy of their actions think of it this way imagine
460:07 actions think of it this way imagine your sending a handwritten letter to a
460:09 your sending a handwritten letter to a friend once it's sent you'd want
460:11 friend once it's sent you'd want concrete assurance that you indeed sent
460:13 concrete assurance that you indeed sent the letter and equally important that
460:15 the letter and equally important that your friend received it you would want
460:17 your friend received it you would want proof that eliminates any room for doubt
460:19 proof that eliminates any room for doubt or denial from either side now translate
460:22 or denial from either side now translate that scenario to the digital realm in
460:25 that scenario to the digital realm in online transactions Communications or
460:28 online transactions Communications or any digital interaction non-repudiation
460:30 any digital interaction non-repudiation serves as this binding Assurance it's
460:33 serves as this binding Assurance it's the digital equivalent of that
460:34 the digital equivalent of that undeniable proof ensuring that parties
460:36 undeniable proof ensuring that parties involved can't backtrack or dispute
460:38 involved can't backtrack or dispute their involvement or the validity of
460:39 their involvement or the validity of their actions it's a foundational
460:42 their actions it's a foundational principle that upholds trust and
460:48 accountability now how does non-repudiation tie into
460:50 non-repudiation tie into authentication authentication verifies
460:52 authentication authentication verifies the identity of a user ensuring that you
460:54 the identity of a user ensuring that you are who you claim to be once
460:57 are who you claim to be once authenticated any action you take like
460:59 authenticated any action you take like sending an email or signing a digital
461:01 sending an email or signing a digital document can be tied back to you
461:03 document can be tied back to you non-repudiation ensures that once these
461:05 non-repudiation ensures that once these actions are taken they cannot be denied
461:09 actions are taken they cannot be denied later but what about accounting we've
461:13 later but what about accounting we've previously discussed how Accounting in
461:14 previously discussed how Accounting in it is about tracking user activities and
461:17 it is about tracking user activities and system events non-repudiation adds a
461:20 system events non-repudiation adds a layer of trust to this tracking it
461:22 layer of trust to this tracking it ensures that the recorded logs of
461:24 ensures that the recorded logs of actions whether it's accessing a file or
461:26 actions whether it's accessing a file or making a transaction are undeniable it's
461:29 making a transaction are undeniable it's the assurance that the digital
461:30 the assurance that the digital Footprints Left Behind are genuine and
461:33 Footprints Left Behind are genuine and can't be
461:35 can't be refuted so what are some of the tools
461:37 refuted so what are some of the tools and methods that reinforce
461:40 and methods that reinforce non-repudiation well we have video in
461:43 non-repudiation well we have video in scenarios where visual confirmation is
461:45 scenarios where visual confirmation is essential video recordings can serve as
461:47 essential video recordings can serve as undeniable evidence think of video calls
461:50 undeniable evidence think of video calls where Agreements are made and decisions
461:52 where Agreements are made and decisions are finalized the recorded footage
461:55 are finalized the recorded footage stands as proof of the conversation
461:57 stands as proof of the conversation ensuring participants can't later deny
461:59 ensuring participants can't later deny what was discussed or what about
462:02 what was discussed or what about Biometrics one of the most personal and
462:05 Biometrics one of the most personal and unique identifiers we possess are our
462:07 unique identifiers we possess are our biometric traits like fingerprints or
462:09 biometric traits like fingerprints or retina scans when used in transactions
462:12 retina scans when used in transactions they offer a high level of
462:14 they offer a high level of non-repudiation it's hard to argue
462:16 non-repudiation it's hard to argue against a fingerprint match or a facial
462:18 against a fingerprint match or a facial recognition hit then there are
462:21 recognition hit then there are signatures digital signatures or their
462:23 signatures digital signatures or their in counterparts are unique to
462:25 in counterparts are unique to individuals when you sign a document
462:27 individuals when you sign a document you're providing a seal of approv that's
462:29 you're providing a seal of approv that's hard to refute it's a commitment that
462:32 hard to refute it's a commitment that the content is endorsed by you and
462:33 the content is endorsed by you and hasn't been tampered with and lastly we
462:36 hasn't been tampered with and lastly we have receipts ever received a delivery
462:39 have receipts ever received a delivery confirmation for an email or a message
462:42 confirmation for an email or a message that's a form of
462:44 that's a form of non-repudiation it confirms that the
462:46 non-repudiation it confirms that the message was not only sent but also
462:48 message was not only sent but also received by the intended party leaving
462:50 received by the intended party leaving no room for Denial in conclusion
462:53 no room for Denial in conclusion non-repudiation is the backbone of trust
462:55 non-repudiation is the backbone of trust in the digital world it's not just about
462:57 in the digital world it's not just about preventing denial it's about fostering
462:59 preventing denial it's about fostering trust accountability and transparency in
463:02 trust accountability and transparency in our digital
463:08 interactions exam objective 6.5 explain password best
463:13 practices passwords serve as a primary method of authentication but
463:15 method of authentication but surprisingly many individuals often
463:17 surprisingly many individuals often Overlook their
463:18 Overlook their significance some might attribute this
463:20 significance some might attribute this to complacency While others simply might
463:22 to complacency While others simply might not be aware of the importance
463:25 not be aware of the importance fortunately there are established
463:26 fortunately there are established password policies and best practices
463:29 password policies and best practices that guide users in creating robust
463:31 that guide users in creating robust passwords ensuring enhanced protection
463:33 passwords ensuring enhanced protection for both personal and professional data
463:35 for both personal and professional data in our digital
463:36 in our digital landscape first and foremost why are
463:38 landscape first and foremost why are good password practices so essential
463:41 good password practices so essential think of passwords as the keys to your
463:43 think of passwords as the keys to your digital home just as you wouldn't want a
463:46 digital home just as you wouldn't want a flimsy lock on your front door you
463:47 flimsy lock on your front door you wouldn't want a weak password guarding
463:49 wouldn't want a weak password guarding your personal and professional data
463:52 your personal and professional data strong password practices ensure that
463:53 strong password practices ensure that your digital doors remain locked against
463:55 your digital doors remain locked against potential Intruders
464:01 now let's look into some key password policies which are designed to fortify
464:03 policies which are designed to fortify our digital security to kick things off
464:06 our digital security to kick things off I will start with a well-known policy
464:08 I will start with a well-known policy the password length policy this policy
464:11 the password length policy this policy is an uncomplicated yet vital aspect of
464:13 is an uncomplicated yet vital aspect of digital security at its Essence this
464:16 digital security at its Essence this policy determines the minimum and
464:18 policy determines the minimum and maximum number of characters that a
464:19 maximum number of characters that a password should contain picture this in
464:22 password should contain picture this in terms of a physical safe just as a safe
464:25 terms of a physical safe just as a safe might have a combination code of varying
464:27 might have a combination code of varying lengths a password has its own length
464:29 lengths a password has its own length criteria the analogy runs deeper when
464:32 criteria the analogy runs deeper when you consider the security
464:33 you consider the security implications for a safe a longer
464:36 implications for a safe a longer combination with more numbers or
464:37 combination with more numbers or sequences to guess naturally becomes
464:40 sequences to guess naturally becomes more challenging for a thief to decipher
464:42 more challenging for a thief to decipher similarly in the digital realm a longer
464:45 similarly in the digital realm a longer password inherently possesses more
464:46 password inherently possesses more potential combinations of characters
464:49 potential combinations of characters this increased variability makes it
464:51 this increased variability makes it exponentially harder for malicious
464:53 exponentially harder for malicious actors to guess or use brute force
464:54 actors to guess or use brute force attack methods against your
464:57 attack methods against your password then there's the password
465:00 password then there's the password complexity policy this policy emphasizes
465:03 complexity policy this policy emphasizes the need for a diverse mix of characters
465:05 the need for a diverse mix of characters in your password it recommends using a
465:08 in your password it recommends using a combination of uppercase letters
465:09 combination of uppercase letters lowercase letters numbers and special
465:12 lowercase letters numbers and special characters such a varied composition not
465:15 characters such a varied composition not only ensures your password's uniqueness
465:17 only ensures your password's uniqueness but also strengthens its defense against
465:19 but also strengthens its defense against typical hacking methods a password with
465:22 typical hacking methods a password with this mix is much harder for hackers to
465:24 this mix is much harder for hackers to guess or breach using Brute Force
465:26 guess or breach using Brute Force techniques it's also crucial to avoid
465:28 techniques it's also crucial to avoid using iary words in your password
465:30 using iary words in your password regardless of their length hackers often
465:33 regardless of their length hackers often use dictionary attacks where they
465:35 use dictionary attacks where they methodically test every dictionary word
465:37 methodically test every dictionary word to decipher passwords by incorporating a
465:40 to decipher passwords by incorporating a variety of character types and steering
465:42 variety of character types and steering clear of standard dictionary words you
465:44 clear of standard dictionary words you substantially lower the chances of
465:46 substantially lower the chances of falling victim to these
465:51 attacks next we have the password history policy this policy's primary
465:54 history policy this policy's primary objective is to deter users from reusing
465:56 objective is to deter users from reusing their recent passwords by monitoring and
465:59 their recent passwords by monitoring and remembering your past passwords the
466:01 remembering your past passwords the system can ensure that when you're
466:02 system can ensure that when you're prompted to update your password you're
466:04 prompted to update your password you're guided towards crafting a new and unique
466:06 guided towards crafting a new and unique one this proactive approach to password
466:09 one this proactive approach to password management is designed for mitigating
466:11 management is designed for mitigating risks for example if an old password was
466:14 risks for example if an old password was ever compromised ensuring it's not
466:16 ever compromised ensuring it's not reused eliminates the chance of that
466:18 reused eliminates the chance of that particular password being a recurring
466:20 particular password being a recurring security weak point in a nutshell the
466:22 security weak point in a nutshell the password history policy serves as a
466:24 password history policy serves as a protective measure encouraging users to
466:27 protective measure encouraging users to consistently renew their passwords
466:28 consistently renew their passwords thereby enhancing their overall digital
466:35 security now our next policy the password expiration policy complements
466:38 password expiration policy complements the previously discussed password
466:39 the previously discussed password history policy by setting an expiration
466:41 history policy by setting an expiration date on your passwords ensuring they
466:43 date on your passwords ensuring they don't remain static for too long by
466:46 don't remain static for too long by doing so it mandates users to refresh
466:48 doing so it mandates users to refresh their passwords at predetermined
466:50 their passwords at predetermined intervals or on a certain date imagine
466:53 intervals or on a certain date imagine this as a routine maintenance check just
466:55 this as a routine maintenance check just as Machinery or software might need
466:57 as Machinery or software might need regular updates to function optimally
466:59 regular updates to function optimally your passwords require periodic changes
467:01 your passwords require periodic changes to remain effective against potential
467:03 to remain effective against potential threats this consistent cycle of change
467:06 threats this consistent cycle of change reduces the window of opportunity for
467:08 reduces the window of opportunity for malicious actors to exploit a possibly
467:10 malicious actors to exploit a possibly compromised password in essence the
467:13 compromised password in essence the password expiration policy acts as a
467:15 password expiration policy acts as a proactive nudge reminding users to stay
467:17 proactive nudge reminding users to stay vigilant and continually reinforce their
467:19 vigilant and continually reinforce their digital
467:22 digital barriers and adding one more to our list
467:24 barriers and adding one more to our list of essential password policies let's
467:26 of essential password policies let's discuss the password lockout policy ever
467:29 discuss the password lockout policy ever mistyped your password several times and
467:31 mistyped your password several times and got locked out of your account that's
467:33 got locked out of your account that's this policy at work the primary purpose
467:36 this policy at work the primary purpose of the password lockout policy is to
467:38 of the password lockout policy is to hinder unauthorized users from endlessly
467:40 hinder unauthorized users from endlessly guessing your password this previously
467:43 guessing your password this previously mentioned attack known as a Brute Force
467:45 mentioned attack known as a Brute Force attack is more common than you might
467:47 attack is more common than you might think the policy works very simply after
467:51 think the policy works very simply after a set number of incorrect login attempts
467:53 a set number of incorrect login attempts the account gets locked it remains
467:55 the account gets locked it remains inaccessible for a set period of time or
467:57 inaccessible for a set period of time or until an admin steps into unlock it this
468:00 until an admin steps into unlock it this strategy not only stops hackers in their
468:02 strategy not only stops hackers in their tracks but also signals to users and
468:05 tracks but also signals to users and administrators about possible
468:06 administrators about possible unauthorized access
468:08 unauthorized access attempts all these password policies
468:11 attempts all these password policies play a role in guiding users to set and
468:13 play a role in guiding users to set and maintain secure
468:14 maintain secure passwords however there are additional
468:17 passwords however there are additional practices that further enhance our
468:18 practices that further enhance our digital
468:19 digital security firstly it's important to avoid
468:22 security firstly it's important to avoid using the same password across multiple
468:25 using the same password across multiple accounts this huge mistake is known as
468:27 accounts this huge mistake is known as password reuse
468:29 password reuse if you reuse the same password
468:31 if you reuse the same password everywhere and it gets compromised all
468:33 everywhere and it gets compromised all your accounts become vulnerable ensure
468:35 your accounts become vulnerable ensure every account has its own distinct
468:37 every account has its own distinct password for optimal
468:39 password for optimal protection for those juggling numerous
468:41 protection for those juggling numerous accounts a password manager can be a
468:44 accounts a password manager can be a lifesaver it's challenging to remember
468:46 lifesaver it's challenging to remember countless complex passwords a password
468:49 countless complex passwords a password manager acts as a secure digital Vault
468:51 manager acts as a secure digital Vault storing and even autofilling your
468:53 storing and even autofilling your passwords for you making sure your
468:54 passwords for you making sure your credentials are organized secure and
468:57 credentials are organized secure and readily available when needed
469:00 readily available when needed lastly I have an important note for
469:02 lastly I have an important note for password
469:03 password administrators when users need to reset
469:05 administrators when users need to reset their passwords always prioritize
469:07 their passwords always prioritize verifying their identity using multiple
469:09 verifying their identity using multiple verification methods if possible after
469:12 verification methods if possible after confirming their identity assist them in
469:14 confirming their identity assist them in the reset process highlighting the need
469:16 the reset process highlighting the need to establish a strong and unique new
469:19 to establish a strong and unique new password exam objective 6.6 explain
469:22 password exam objective 6.6 explain common uses of
469:24 common uses of encryption plain text versus Cipher text
469:29 encryption plain text versus Cipher text understanding the distinction between
469:30 understanding the distinction between plain text and Cipher text is the very
469:32 plain text and Cipher text is the very first step when venturing into the
469:34 first step when venturing into the expansive realm of encryption and its
469:36 expansive realm of encryption and its study termed cryptography so let's take
469:39 study termed cryptography so let's take that first step and begin with a quick
469:41 that first step and begin with a quick look into plain text picture yourself
469:43 look into plain text picture yourself jotting down a message to a friend this
469:46 jotting down a message to a friend this message in its original readable form is
469:49 message in its original readable form is what we term as plain text in the realm
469:51 what we term as plain text in the realm of it plain text is any data or text
469:54 of it plain text is any data or text that hasn't undergone encryption making
469:56 that hasn't undergone encryption making it readable by both humans and computer
470:00 it readable by both humans and computer but here's where the plot thickens when
470:02 but here's where the plot thickens when we aim to safeguard our data or message
470:04 we aim to safeguard our data or message especially in the digital domain we
470:06 especially in the digital domain we resort to encryption this encrypted form
470:09 resort to encryption this encrypted form of our plain text is what we refer to as
470:11 of our plain text is what we refer to as Cipher text think of Cipher text as a
470:14 Cipher text think of Cipher text as a coded message to the untrained eye it
470:17 coded message to the untrained eye it appears as mere gibberish this
470:19 appears as mere gibberish this encryption ensures our data's
470:21 encryption ensures our data's confidentiality shielding it from
470:23 confidentiality shielding it from unwanted
470:25 unwanted attention to reiterate and further
470:27 attention to reiterate and further Define this concept plain text is data
470:30 Define this concept plain text is data presented in a format that is
470:31 presented in a format that is immediately understandable and
470:33 immediately understandable and accessible it's in its most basic
470:36 accessible it's in its most basic unaltered state free from any form of
470:38 unaltered state free from any form of encryption or coding this means that
470:40 encryption or coding this means that there are no protective layers or
470:42 there are no protective layers or barriers concealing its content whether
470:45 barriers concealing its content whether it's a simple message a document or any
470:47 it's a simple message a document or any other form of data if it's in plain text
470:50 other form of data if it's in plain text it retains its original Clarity and
470:52 it retains its original Clarity and meaning anyone who comes across or
470:54 meaning anyone who comes across or accesses this data be it a human or a
470:56 accesses this data be it a human or a computer can easily read an interpret
470:58 computer can easily read an interpret its contents in essence plain text is
471:02 its contents in essence plain text is like an open book transparent and
471:04 like an open book transparent and straightforward waiting to be read by
471:06 straightforward waiting to be read by anyone who stumbles upon
471:08 anyone who stumbles upon it as for Cipher text it stands in stark
471:12 it as for Cipher text it stands in stark contrast to plain text it is the result
471:14 contrast to plain text it is the result of taking understandable clear data and
471:17 of taking understandable clear data and transforming it into a format that
471:18 transforming it into a format that appears random and nonsensical at first
471:21 appears random and nonsensical at first glance this transformation is achieved
471:23 glance this transformation is achieved through a process called encryption
471:25 through a process called encryption which employs specific mathematical
471:27 which employs specific mathematical algorithms to Jumble the original data
471:30 algorithms to Jumble the original data these algorithms rearrange the data in
471:32 these algorithms rearrange the data in such a way that its original meaning
471:33 such a way that its original meaning becomes obscured the primary purpose of
471:36 becomes obscured the primary purpose of this scrambling is to protect the data's
471:38 this scrambling is to protect the data's integrity and
471:40 integrity and confidentiality without the correct
471:41 confidentiality without the correct decryption key or method which acts as a
471:44 decryption key or method which acts as a sort of digital password or blueprint to
471:46 sort of digital password or blueprint to reverse the encryption the cipher text
471:48 reverse the encryption the cipher text remains a puzzling array of characters
471:50 remains a puzzling array of characters numbers and symbols only those
471:53 numbers and symbols only those possessing the right key can revert the
471:54 possessing the right key can revert the cipher text back to its original plain
471:56 cipher text back to its original plain text form making it a perfect me
471:58 text form making it a perfect me mechanism to safeguard sensitive
472:00 mechanism to safeguard sensitive information from unauthorized eyes in
472:02 information from unauthorized eyes in the vast digital landscape where data
472:04 the vast digital landscape where data breaches and cyber attacks are prevalent
472:06 breaches and cyber attacks are prevalent Cipher text serves as a fortified Shield
472:09 Cipher text serves as a fortified Shield ensuring that even if data is
472:10 ensuring that even if data is intercepted it remains indecipherable to
472:12 intercepted it remains indecipherable to those without the means to decrypt
472:14 those without the means to decrypt it exam objective 6.6 explain common
472:18 it exam objective 6.6 explain common uses of
472:20 uses of encryption data at
472:22 encryption data at rest imagine a calm Serene lake with the
472:25 rest imagine a calm Serene lake with the sun setting in the background the
472:27 sun setting in the background the Stillness of the water is reminiscent of
472:29 Stillness of the water is reminiscent of data at rest in the world of Information
472:32 data at rest in the world of Information Technology simply put data at rest
472:34 Technology simply put data at rest refers to data stored on devices like
472:36 refers to data stored on devices like computers or servers not actively being
472:39 computers or servers not actively being used or transmitted more specifically it
472:42 used or transmitted more specifically it is the files and documents that sit
472:44 is the files and documents that sit quietly on your hard drive however this
472:47 quietly on your hard drive however this Stillness doesn't guarantee safety
472:49 Stillness doesn't guarantee safety that's where encryption comes
472:52 that's where encryption comes in the first type of data at rest
472:55 in the first type of data at rest encryption we will discuss is file level
472:57 encryption we will discuss is file level encryption additionally referred to as
472:59 encryption additionally referred to as file-based encryption or file folder
473:01 file-based encryption or file folder encryption this method is distinct in
473:03 encryption this method is distinct in its approach to data protection instead
473:06 its approach to data protection instead of encrypting an entire storage medium
473:08 of encrypting an entire storage medium or device file level encryption zeros in
473:11 or device file level encryption zeros in on individual files or directories
473:13 on individual files or directories encrypting them directly through the
473:14 encrypting them directly through the file system this granularity offers a
473:17 file system this granularity offers a unique Advantage it provides each user
473:19 unique Advantage it provides each user with the autonomy to decide which
473:21 with the autonomy to decide which specific files or folders they wish to
473:23 specific files or folders they wish to encrypt by allowing each user to encrypt
473:26 encrypt by allowing each user to encrypt their own files or folders it ensures
473:28 their own files or folders it ensures that even if someone else has access to
473:30 that even if someone else has access to the storage medium they cannot decipher
473:32 the storage medium they cannot decipher the encrypted content without the
473:33 the encrypted content without the appropriate decryption key moreover this
473:36 appropriate decryption key moreover this method establishes controls against
473:38 method establishes controls against potential misuse by privileged users or
473:41 potential misuse by privileged users or system
473:42 system administrators in many it environments
473:44 administrators in many it environments administrators have overarching access
473:46 administrators have overarching access to systems and data however with file
473:49 to systems and data however with file level encryption even they cannot access
473:52 level encryption even they cannot access the encrypted content without the user's
473:54 the encrypted content without the user's decryption key this decentralization of
473:56 decryption key this decentralization of encryption power not only enhances data
473:59 encryption power not only enhances data security but also Fosters a sense of
474:01 security but also Fosters a sense of ownership and responsibility among users
474:03 ownership and responsibility among users regarding their data
474:06 regarding their data safety while file level encryption
474:08 safety while file level encryption focuses on safeguarding specific files
474:10 focuses on safeguarding specific files or directories disk level encryption
474:12 or directories disk level encryption takes a more comprehensive approach
474:15 takes a more comprehensive approach think of disk level encryption as a
474:17 think of disk level encryption as a protective shield that encompasses the
474:18 protective shield that encompasses the entirety of a storage device such as a
474:21 entirety of a storage device such as a computer's hard drive or an external
474:22 computer's hard drive or an external storage disk when we talk about
474:25 storage disk when we talk about protecting everything on your computer
474:27 protecting everything on your computer dis level encryption is the goto
474:29 dis level encryption is the goto solution now let's delve deeper into a
474:32 solution now let's delve deeper into a real world scenario the theft of a
474:34 real world scenario the theft of a laptop laptops given their portability
474:37 laptop laptops given their portability are prime targets for theft when a
474:39 are prime targets for theft when a laptop is stolen the thief isn't just
474:42 laptop is stolen the thief isn't just after the hardware the real treasure
474:43 after the hardware the real treasure often lies and the data stored within
474:46 often lies and the data stored within this could be personal photos sensitive
474:48 this could be personal photos sensitive documents financial information or even
474:51 documents financial information or even proprietary business data without
474:53 proprietary business data without encryption a Savvy Thief could
474:55 encryption a Savvy Thief could potentially extract this data directly
474:57 potentially extract this data directly from the hard drive Le leading to
474:58 from the hard drive Le leading to breaches of privacy or even Financial
475:01 breaches of privacy or even Financial loss however with dis level encryption
475:04 loss however with dis level encryption activated the entire contents of the
475:06 activated the entire contents of the hard drive is rendered unreadable
475:07 hard drive is rendered unreadable without the correct decryption key even
475:10 without the correct decryption key even if the thief removes the hard drive and
475:12 if the thief removes the hard drive and tries to access it using another device
475:14 tries to access it using another device the data remains encrypted and
475:16 the data remains encrypted and inaccessible in short dis level
475:18 inaccessible in short dis level encryption transforms your computer into
475:20 encryption transforms your computer into a digital Fortress even in the
475:23 a digital Fortress even in the unfortunate event of theft the data
475:25 unfortunate event of theft the data within remains shielded ensuring that
475:27 within remains shielded ensuring that your personal and professional
475:28 your personal and professional information stays confidential and
475:31 information stays confidential and secure exam objective 6.6 explain common
475:35 secure exam objective 6.6 explain common uses of
475:36 uses of encryption data in
475:39 encryption data in transit for this topic I would like you
475:41 transit for this topic I would like you to picture a massive freight train
475:43 to picture a massive freight train chugging along the tracks loaded with
475:45 chugging along the tracks loaded with valuable raw materials like coal as the
475:48 valuable raw materials like coal as the train moves from the mining site to its
475:50 train moves from the mining site to its destination the coal is in transit
475:52 destination the coal is in transit exposed to the elements and potential
475:54 exposed to the elements and potential theft unless it's properly safeguarded
475:56 theft unless it's properly safeguarded in the digital world when data travels
475:58 in the digital world when data travels from one point to another we refer to
476:00 from one point to another we refer to this as data in transit just as the coal
476:03 this as data in transit just as the coal on its Journey can be vulnerable so to
476:06 on its Journey can be vulnerable so to can data unless it's adequately
476:09 can data unless it's adequately protected sending an email is a great
476:12 protected sending an email is a great example of data in transit as it
476:14 example of data in transit as it involves transmitting data across
476:15 involves transmitting data across networks to reach its intended recipient
476:18 networks to reach its intended recipient as the email travels it passes through
476:20 as the email travels it passes through various servers and networks making it
476:22 various servers and networks making it vulnerable to interception by malicious
476:25 vulnerable to interception by malicious actors without proper protection these
476:27 actors without proper protection these actors can EES drop on the content of
476:29 actors can EES drop on the content of the email potentially leading to
476:31 the email potentially leading to breaches of privacy or Data Theft
476:34 breaches of privacy or Data Theft encryption plays a pivotal role in
476:36 encryption plays a pivotal role in safeguarding this data when you send an
476:38 safeguarding this data when you send an encrypted email the content is
476:40 encrypted email the content is transformed into a scrambled code making
476:42 transformed into a scrambled code making it nearly impossible to decipher the
476:44 it nearly impossible to decipher the original
476:46 original message another example of data in
476:49 message another example of data in transit is internet traffic when
476:51 transit is internet traffic when browsing you might notice https at the
476:54 browsing you might notice https at the far left of your browser's address bar
476:57 far left of your browser's address bar this signifies the use of SSL encryption
476:59 this signifies the use of SSL encryption or its successor TLS encryption to
477:02 or its successor TLS encryption to protect the communication between your
477:04 protect the communication between your browser and the websites you visit by
477:06 browser and the websites you visit by using the https protocol you are
477:09 using the https protocol you are ensuring that sensitive information like
477:11 ensuring that sensitive information like passwords or credit card details are
477:13 passwords or credit card details are transmitted securely over the Internet
477:16 transmitted securely over the Internet essentially SSL and TLS act as digital
477:18 essentially SSL and TLS act as digital handshakes agreeing on encryption
477:20 handshakes agreeing on encryption methods to keep your online interactions
477:24 methods to keep your online interactions private continuing with our study of
477:26 private continuing with our study of data in transit another encryption
477:28 data in transit another encryption option that we have at our disposal is a
477:30 option that we have at our disposal is a VPN a VPN or virtual private Network
477:34 VPN a VPN or virtual private Network creates a secure encrypted connection
477:36 creates a secure encrypted connection between your device and a remote server
477:38 between your device and a remote server acting as a protective tunnel for your
477:40 acting as a protective tunnel for your data this is especially vital for secure
477:43 data this is especially vital for secure remote access to servers allowing users
477:45 remote access to servers allowing users to retrieve or send information without
477:47 to retrieve or send information without exposing sensitive data to potential
477:54 threats lastly think about the mobile applications on your smartphone every
477:56 applications on your smartphone every time you use an app data is sent and
477:59 time you use an app data is sent and received to and from servers it's
478:01 received to and from servers it's important that these apps use secure
478:03 important that these apps use secure protocols to protect this data during
478:05 protocols to protect this data during transmission this ensures that your
478:07 transmission this ensures that your personal information conversations and
478:10 personal information conversations and other sensitive data remain confidential
478:12 other sensitive data remain confidential and aren't compromised by potential
478:15 and aren't compromised by potential threats in summary data in transit
478:18 threats in summary data in transit refers to information as it's being
478:20 refers to information as it's being transferred from one location to another
478:22 transferred from one location to another in the same way you'd want valuable
478:24 in the same way you'd want valuable Goods to be safe during transport in the
478:26 Goods to be safe during transport in the digital realm we employ encryption
478:28 digital realm we employ encryption techniques to make sure our data is
478:30 techniques to make sure our data is delivered securely and
478:32 delivered securely and intact exam objective 6.7 explain
478:35 intact exam objective 6.7 explain business continuity
478:37 business continuity Concepts business
478:40 Concepts business continuity in today's digital age
478:42 continuity in today's digital age businesses heavily rely on technology
478:45 businesses heavily rely on technology but what happens when disruptions like
478:47 but what happens when disruptions like software glitches system failures or
478:50 software glitches system failures or power outages occur this is where the
478:52 power outages occur this is where the concept of business continuity in
478:54 concept of business continuity in Information Technology comes into play
478:57 Information Technology comes into play business continuity is not just about
478:59 business continuity is not just about recovering from disruptions it's a
479:00 recovering from disruptions it's a proactive approach to ensure that
479:02 proactive approach to ensure that essential business functions persist
479:04 essential business functions persist during and after any unforeseen
479:07 during and after any unforeseen events now the first thing we can do to
479:10 events now the first thing we can do to achieve business continuity is to avoid
479:12 achieve business continuity is to avoid a complete failure of any business
479:14 a complete failure of any business function this is achieved through fault
479:16 function this is achieved through fault tolerance fault tolerance is the ability
479:19 tolerance fault tolerance is the ability of a system to continue operating
479:21 of a system to continue operating without interruption even when one or
479:22 without interruption even when one or more of its components fail it ensures
479:25 more of its components fail it ensures that system failures do not result in
479:27 that system failures do not result in downtime or data a loss due to a single
479:29 downtime or data a loss due to a single week
479:31 week link by now you are probably feeling
479:33 link by now you are probably feeling like this is a vocabulary lesson and
479:35 like this is a vocabulary lesson and that is mostly because it is and next up
479:38 that is mostly because it is and next up is the word redundancy at its core
479:41 is the word redundancy at its core redundancy is the duplication of
479:43 redundancy is the duplication of critical components or functions to
479:45 critical components or functions to increase reliability and prevent system
479:47 increase reliability and prevent system failure it ensures that backup options
479:50 failure it ensures that backup options are available in case of a primary
479:52 are available in case of a primary components
479:53 components malfunction so to summarize today's
479:55 malfunction so to summarize today's vocabulary lesson business continuity is
479:58 vocabulary lesson business continuity is about keeping business functions up and
479:59 about keeping business functions up and running fault tolerance assist business
480:02 running fault tolerance assist business continuity by providing resiliency to
480:04 continuity by providing resiliency to our business functions and one way to
480:07 our business functions and one way to become more fault tolerant is to
480:09 become more fault tolerant is to incorporate
480:10 incorporate redundancies at a minimum always have a
480:12 redundancies at a minimum always have a backup or contingency plan and if the
480:15 backup or contingency plan and if the business function is Mission critical
480:17 business function is Mission critical why not have a backup for your backup
480:19 why not have a backup for your backup too exam objective 6.7 explain business
480:23 too exam objective 6.7 explain business continuity
480:25 continuity Concepts Network redundancy
480:28 Concepts Network redundancy in a bustling City traffic flows
480:30 in a bustling City traffic flows smoothly until a main Bridge collapses
480:33 smoothly until a main Bridge collapses leading to complete chaos so why am I
480:36 leading to complete chaos so why am I talking about bridges in an IT training
480:38 talking about bridges in an IT training video because this scenario mirrors the
480:40 video because this scenario mirrors the importance of network redundancy in it
480:43 importance of network redundancy in it just as a backup route or detour can
480:45 just as a backup route or detour can prevent traffic chaos when a bridge
480:47 prevent traffic chaos when a bridge collapses Network redundancy can ensure
480:49 collapses Network redundancy can ensure that data continues to flow even if a
480:51 that data continues to flow even if a part of the system fails without such
480:54 part of the system fails without such redundancy a single point of failure can
480:56 redundancy a single point of failure can disrupt the entire
480:59 disrupt the entire network network redundancy is an
481:02 network network redundancy is an important strategy used in it to ensure
481:04 important strategy used in it to ensure uninterrupted service and it frequently
481:06 uninterrupted service and it frequently hinges on the deployment of redundant
481:08 hinges on the deployment of redundant network devices to paint a clearer
481:11 network devices to paint a clearer picture consider a business that relies
481:13 picture consider a business that relies on a network to access resources across
481:15 on a network to access resources across the internet if this business uses only
481:18 the internet if this business uses only a single router to manage and direct all
481:20 a single router to manage and direct all its incoming and outgoing traffic it
481:22 its incoming and outgoing traffic it places itself at risk why because if
481:26 places itself at risk why because if that Soul router encounters any issues
481:28 that Soul router encounters any issues or fails the entire network can come to
481:30 or fails the entire network can come to a standstill potentially causing
481:32 a standstill potentially causing significant disruptions to
481:35 significant disruptions to operations to mitigate such risks many
481:38 operations to mitigate such risks many businesses opt for a more robust
481:39 businesses opt for a more robust approach by deploying two or more
481:41 approach by deploying two or more routers by doing so they create a safety
481:44 routers by doing so they create a safety net in a scenario where one router
481:47 net in a scenario where one router malfunctions or goes offline the other
481:49 malfunctions or goes offline the other router or routers is already on standby
481:52 router or routers is already on standby ready to take on the
481:53 ready to take on the responsibility this transition is often
481:55 responsibility this transition is often seamless with the backup router stepping
481:58 seamless with the backup router stepping in almost instantly to manage the
482:00 in almost instantly to manage the traffic as a result data continues to
482:03 traffic as a result data continues to flow smoothly and the business can
482:05 flow smoothly and the business can operate without missing a beat this
482:07 operate without missing a beat this strategy not only ensures an
482:08 strategy not only ensures an uninterrupted flow of data but also
482:10 uninterrupted flow of data but also provides peace of mind to businesses
482:12 provides peace of mind to businesses knowing that they have safeguards in
482:13 knowing that they have safeguards in place against unforeseen network
482:17 place against unforeseen network issues another vital concept related to
482:20 issues another vital concept related to network redundancy is failover failover
482:23 network redundancy is failover failover is a safety mechanism designed to ensure
482:25 is a safety mechanism designed to ensure that systems remain operational even
482:27 that systems remain operational even when un foreseen issues arise it is the
482:30 when un foreseen issues arise it is the automatic process where in the event of
482:32 automatic process where in the event of a failure the system switches to a
482:34 a failure the system switches to a redundant or standby system to visualize
482:37 redundant or standby system to visualize this picture a data center housing
482:39 this picture a data center housing numerous servers among these servers
482:42 numerous servers among these servers there's a primary one responsible for
482:44 there's a primary one responsible for critical tasks and a backup server
482:46 critical tasks and a backup server waiting in the wings now servers like
482:49 waiting in the wings now servers like any technology can sometimes face issues
482:52 any technology can sometimes face issues be it due to Hardware malfunctions
482:53 be it due to Hardware malfunctions software glitches or external factors if
482:57 software glitches or external factors if for any reason the primary server
482:59 for any reason the primary server falters failover mechanisms can spring
483:01 falters failover mechanisms can spring into action without requiring manual
483:04 into action without requiring manual intervention a failover can redirect
483:06 intervention a failover can redirect tasks and operations to the backup
483:08 tasks and operations to the backup server this transition is so smooth and
483:11 server this transition is so smooth and Swift that users accessing applications
483:14 Swift that users accessing applications or Services hosted on that server often
483:16 or Services hosted on that server often remain oblivious to the change now there
483:19 remain oblivious to the change now there are several more methods to establish
483:20 are several more methods to establish Network redundancy and as you delve
483:23 Network redundancy and as you delve deeper into information technology and
483:24 deeper into information technology and Advance pass the CompTIA ITF plus
483:27 Advance pass the CompTIA ITF plus certification exam you will certainly
483:29 certification exam you will certainly encounter them but for now having a
483:31 encounter them but for now having a conceptual idea about Network redundancy
483:34 conceptual idea about Network redundancy and failover will be
483:35 and failover will be sufficient exam objective 6.7 explain
483:39 sufficient exam objective 6.7 explain business continuity
483:41 business continuity Concepts power
483:44 Concepts power redundancy power redundancy within the
483:46 redundancy power redundancy within the context of Information Technology refers
483:48 context of Information Technology refers to the strategy of ensuring that systems
483:51 to the strategy of ensuring that systems remain operational even if the primary
483:52 remain operational even if the primary power source fails think of it as having
483:55 power source fails think of it as having backup batteries for your flashlight and
483:57 backup batteries for your flashlight and ensuring you're never left in the dark
484:00 ensuring you're never left in the dark one of the primary ways to achieve power
484:02 one of the primary ways to achieve power redundancy is through redundant power
484:04 redundancy is through redundant power supplies consider a server in a data
484:07 supplies consider a server in a data center instead of relying on just one
484:09 center instead of relying on just one power supply which could become a
484:11 power supply which could become a potential point of failure the server is
484:13 potential point of failure the server is equipped with two or more power supplies
484:16 equipped with two or more power supplies if one fails or encounters an issue the
484:18 if one fails or encounters an issue the other takes over ensuring the server
484:20 other takes over ensuring the server continues its operations without
484:26 interruption in situations where there are sudden and unexpected power
484:27 are sudden and unexpected power interruptions a UPS or uninterruptible
484:30 interruptions a UPS or uninterruptible power supply becomes an invaluable asset
484:33 power supply becomes an invaluable asset while providing a certain level of fault
484:34 while providing a certain level of fault tolerance a UPS is a device designed to
484:37 tolerance a UPS is a device designed to provide immediate and uninterrupted
484:39 provide immediate and uninterrupted emergency power to Connected equipment
484:41 emergency power to Connected equipment when the main power source is lost this
484:44 when the main power source is lost this seamless transition of power is
484:46 seamless transition of power is especially important in it environments
484:48 especially important in it environments where servers are constantly processing
484:50 where servers are constantly processing and transmitting data even a momentary
484:53 and transmitting data even a momentary power disruption can lead to unsaved
484:55 power disruption can lead to unsaved data being lost or systems shutting down
484:57 data being lost or systems shutting down improperly which can cause potential
484:59 improperly which can cause potential damage when there's a sudden loss of
485:01 damage when there's a sudden loss of power a UPS instantly kicks in ensuring
485:04 power a UPS instantly kicks in ensuring that there's no break in the electricity
485:06 that there's no break in the electricity Supply this immediate response allows it
485:09 Supply this immediate response allows it professionals the time to either switch
485:10 professionals the time to either switch to a longer-term power solution like a
485:13 to a longer-term power solution like a generator or to safely shut down systems
485:15 generator or to safely shut down systems and save critical
485:18 and save critical data in situations where power outages
485:21 data in situations where power outages extend beyond just a few minutes the
485:22 extend beyond just a few minutes the importance of having a reliable
485:24 importance of having a reliable long-term backup power solution becomes
485:26 long-term backup power solution becomes evident this this is where a generator
485:28 evident this this is where a generator steps in as a savior a generator in its
485:32 steps in as a savior a generator in its Essence is a Marvel of engineering that
485:33 Essence is a Marvel of engineering that transforms mechanical energy often
485:36 transforms mechanical energy often derived from fuel sources like diesel or
485:38 derived from fuel sources like diesel or gas into electrical energy this
485:41 gas into electrical energy this conversion ensures that even when the
485:42 conversion ensures that even when the regular power grid fails businesses and
485:45 regular power grid fails businesses and operations don't have to when the
485:47 operations don't have to when the primary power source is compromised a
485:50 primary power source is compromised a generator can be activated either
485:51 generator can be activated either manually or automatically to take over
485:53 manually or automatically to take over the role of supplying
485:55 the role of supplying electricity however it's important to
485:57 electricity however it's important to note that a generator's response is not
486:00 note that a generator's response is not instantaneous there's typically a brief
486:02 instantaneous there's typically a brief delay before it fully Powers up and
486:04 delay before it fully Powers up and starts delivering
486:05 starts delivering electricity now both UPS devices and
486:08 electricity now both UPS devices and generators are essential for maintaining
486:10 generators are essential for maintaining uninterrupted power while the UPS
486:13 uninterrupted power while the UPS provides immediate backup to prevent any
486:15 provides immediate backup to prevent any power interruptions the generator offers
486:17 power interruptions the generator offers a solution for extended outages by using
486:20 a solution for extended outages by using both you will have established a
486:22 both you will have established a comprehensive power backup
486:24 comprehensive power backup system exam objective 6.7 explain
486:27 system exam objective 6.7 explain business continuity
486:29 business continuity Concepts data
486:32 Concepts data redundancy have you ever made a copy of
486:34 redundancy have you ever made a copy of an important document just in case
486:36 an important document just in case something happens to the original in it
486:39 something happens to the original in it this concept is referred to as data
486:41 this concept is referred to as data redundancy data redundancy simply means
486:44 redundancy data redundancy simply means having a backup or duplicate of your
486:46 having a backup or duplicate of your data to ensure its availability in the
486:48 data to ensure its availability in the realm of it this concept of data
486:50 realm of it this concept of data redundancy is achieved through a process
486:52 redundancy is achieved through a process known as data replication data
486:55 known as data replication data replication is the process of copying
486:57 replication is the process of copying data from one location to another
486:59 data from one location to another ensuring that both locations maintain
487:01 ensuring that both locations maintain the same up-to-date information by
487:03 the same up-to-date information by creating copies of your data using
487:05 creating copies of your data using replication we ensure that if one system
487:07 replication we ensure that if one system or storage medium fails the data remains
487:10 or storage medium fails the data remains accessible on
487:12 accessible on another now let's explore a method
487:15 another now let's explore a method designed specifically for this purpose
487:17 designed specifically for this purpose called raid raid or redundant array of
487:20 called raid raid or redundant array of independent diss is a technology used to
487:22 independent diss is a technology used to combine multiple hard drives into a
487:24 combine multiple hard drives into a single unit to improve data reliability
487:27 single unit to improve data reliability performance or both with business
487:29 performance or both with business continuity in mind RAID storage
487:31 continuity in mind RAID storage solutions provide us with varying levels
487:33 solutions provide us with varying levels of fault tolerance and each of these
487:36 of fault tolerance and each of these raid Solutions also referenced as raid
487:38 raid Solutions also referenced as raid levels will have its own unique approach
487:40 levels will have its own unique approach to redundancy and
487:46 performance raid zero for instance prioritizes speed and speed alone in
487:49 prioritizes speed and speed alone in this setup data is striped across two or
487:51 this setup data is striped across two or more diss where striped refers to the
487:53 more diss where striped refers to the method of dividing up and distributing
487:55 method of dividing up and distributing data across multiple hard drives
487:58 data across multiple hard drives or to State this another way each block
488:00 or to State this another way each block of data is sequentially written to each
488:02 of data is sequentially written to each disk in the array raid zero however does
488:05 disk in the array raid zero however does not offer redundancy worse if one dis
488:08 not offer redundancy worse if one dis fails all data is compromised if you are
488:12 fails all data is compromised if you are following along with the image behind me
488:14 following along with the image behind me each blue cylindrical column represents
488:16 each blue cylindrical column represents a hard drive each letter A through e
488:19 a hard drive each letter A through e represents a block of data and the
488:21 represents a block of data and the numbers 1 through 5 are used to
488:23 numbers 1 through 5 are used to represent the sequential order in which
488:25 represent the sequential order in which the divided parts of a block of data are
488:28 the divided parts of a block of data are written to the drive
488:30 written to the drive array our next raid level raid one
488:33 array our next raid level raid one operates like a mirror data is
488:36 operates like a mirror data is duplicated or mirrored across two diss
488:38 duplicated or mirrored across two diss ensuring that if one fails the other
488:40 ensuring that if one fails the other retains all the data while this type of
488:43 retains all the data while this type of raid configuration offers redundancy it
488:45 raid configuration offers redundancy it doesn't enhance performance in the way
488:46 doesn't enhance performance in the way raid zero
488:49 raid zero does then there is raid five which
488:51 does then there is raid five which strikes a balance between raid zero and
488:54 strikes a balance between raid zero and raid one it employs striping just like
488:56 raid one it employs striping just like raid but introduces an element called
488:59 raid but introduces an element called parity parity provides a means to
489:02 parity parity provides a means to reconstruct data if a single disc in the
489:04 reconstruct data if a single disc in the array fails this raid level offers a bit
489:07 array fails this raid level offers a bit of both performance and
489:14 redundancy lastly RAID 10 often referred to as raid 1 plus 0 merges the mirroring
489:16 to as raid 1 plus 0 merges the mirroring capabilities of raid one with the
489:18 capabilities of raid one with the striping technique of raid zero this
489:20 striping technique of raid zero this combination allows RAID 10 to deliver
489:22 combination allows RAID 10 to deliver both fast performance and data
489:25 both fast performance and data redundancy in conclusion grasp in the
489:27 redundancy in conclusion grasp in the concept of data redundancy and the
489:29 concept of data redundancy and the techniques to implement it like raid is
489:32 techniques to implement it like raid is essential it provides a foundational
489:34 essential it provides a foundational approach to ensuring both reliability
489:36 approach to ensuring both reliability and enhanced performance for those
489:37 and enhanced performance for those handling Digital
489:39 handling Digital Data exam objective 6.7 explain business
489:43 Data exam objective 6.7 explain business continuity
489:45 continuity Concepts disaster
489:47 Concepts disaster recovery for the last few videos we have
489:50 recovery for the last few videos we have been focused on fault tolerance and the
489:52 been focused on fault tolerance and the many ways in which we can keep our
489:54 many ways in which we can keep our business operations and it
489:55 business operations and it infrastructure up and running
489:58 infrastructure up and running this includes the use of Network Power
490:00 this includes the use of Network Power and data
490:01 and data redundancies but what if despite all our
490:04 redundancies but what if despite all our efforts all of our backup or contingency
490:06 efforts all of our backup or contingency plans still manage to fail leading to a
490:08 plans still manage to fail leading to a halt in
490:09 halt in operations this is where Disaster
490:11 operations this is where Disaster Recovery comes into play while fault
490:14 Recovery comes into play while fault tolerance and system redundancies are
490:16 tolerance and system redundancies are designed to maintain operational uptime
490:18 designed to maintain operational uptime Disaster Recovery is designed to step in
490:20 Disaster Recovery is designed to step in when the worst should happen and
490:22 when the worst should happen and operations go
490:24 operations go down so what is disaster recovery it is
490:28 down so what is disaster recovery it is the process of restoring and recovering
490:30 the process of restoring and recovering it systems and operations after an
490:32 it systems and operations after an unforeseen disruption or
490:34 unforeseen disruption or catastrophe it is the emergency plan
490:37 catastrophe it is the emergency plan activated when all other fault tolerant
490:39 activated when all other fault tolerant redundancy strategies fail and has the
490:41 redundancy strategies fail and has the primary aim of reducing downtime looking
490:44 primary aim of reducing downtime looking a bit closer one aspect of Disaster
490:46 a bit closer one aspect of Disaster Recovery is data
490:48 Recovery is data restoration when a system fails there's
490:50 restoration when a system fails there's a risk that valuable data might be lost
490:52 a risk that valuable data might be lost or become inaccessible data restoration
490:55 or become inaccessible data restoration is the process of retrieving the lost or
490:57 is the process of retrieving the lost or inaccessible data and making it
490:59 inaccessible data and making it available once again to achieve this
491:02 available once again to achieve this there are typically two primary methods
491:04 there are typically two primary methods the first is to use a backup which is a
491:07 the first is to use a backup which is a saved copy of the data usually stored in
491:09 saved copy of the data usually stored in a separate off-site location this backup
491:12 a separate off-site location this backup can be loaded back into the system to
491:14 can be loaded back into the system to replace the lost data the second method
491:17 replace the lost data the second method is to switch to an alternate system
491:18 is to switch to an alternate system where an identical copy of the data has
491:20 where an identical copy of the data has been stored often referred to as a
491:22 been stored often referred to as a replicated system this ensures that even
491:25 replicated system this ensures that even if one system faces issues another
491:27 if one system faces issues another standby system can take
491:31 standby system can take over another aspect of Disaster Recovery
491:34 over another aspect of Disaster Recovery is prioritization and in the midst of
491:36 is prioritization and in the midst of chaos prioritization becomes
491:38 chaos prioritization becomes Paramount in the face of a significant
491:41 Paramount in the face of a significant disaster a multitude of business
491:42 disaster a multitude of business critical systems could become
491:44 critical systems could become compromised or fail entirely worse
491:47 compromised or fail entirely worse reacting to such a situation often
491:49 reacting to such a situation often involves navigating through limited
491:50 involves navigating through limited resources and tight time constraints
491:53 resources and tight time constraints therefore a well-structured disaster
491:55 therefore a well-structured disaster recovery plan is essential
491:58 recovery plan is essential this plan should not only specify which
492:00 this plan should not only specify which systems need to be restored first based
492:02 systems need to be restored first based on their importance but also recognize
492:04 on their importance but also recognize the interdependencies between these
492:06 the interdependencies between these systems as an illustration if a
492:08 systems as an illustration if a company's website servers rely on
492:10 company's website servers rely on specific database servers to function
492:12 specific database servers to function they might become ineffective or
492:14 they might become ineffective or inoperable if those database servers are
492:16 inoperable if those database servers are down recognizing and planning for such
492:18 down recognizing and planning for such dependencies ensures a smoother recovery
492:23 dependencies ensures a smoother recovery process one last aspect to consider is
492:26 process one last aspect to consider is when to restore access back to the users
492:29 when to restore access back to the users restoring access to users too early in
492:31 restoring access to users too early in the disaster recovery process can risk
492:33 the disaster recovery process can risk data integrity and security premature
492:36 data integrity and security premature access might lead to further data
492:38 access might lead to further data corruption potential data breaches or
492:40 corruption potential data breaches or exacerbate existing system issues
492:42 exacerbate existing system issues hindering the overall recovery effort
492:45 hindering the overall recovery effort only after confirming the reliability of
492:47 only after confirming the reliability of the backup or recovered system would you
492:49 the backup or recovered system would you grant users access and resume normal
492:52 grant users access and resume normal operations it might also be beneficial
492:54 operations it might also be beneficial to limit the number of users at first if
492:56 to limit the number of users at first if conditions permit in order to ensure the
492:58 conditions permit in order to ensure the system operates as
493:00 system operates as expected exam objective 6.7 explain
493:04 expected exam objective 6.7 explain business continuity
493:06 business continuity Concepts backup
493:09 Concepts backup considerations imagine the daunting
493:11 considerations imagine the daunting scenario where all your vital documents
493:13 scenario where all your vital documents or essential business data vanishes in a
493:15 or essential business data vanishes in a blink this unsettling thought
493:17 blink this unsettling thought underscores the extreme importance of
493:19 underscores the extreme importance of backups in any it environment
493:22 backups in any it environment essentially backups serve as a digital
493:24 essentially backups serve as a digital safety net ensuring that even in the
493:26 safety net ensuring that even in the face of data loss or compromise a
493:28 face of data loss or compromise a restoration pathway exists think of
493:30 restoration pathway exists think of backups as a protective insurance policy
493:33 backups as a protective insurance policy for your invaluable
493:35 for your invaluable data so which types of data should you
493:38 data so which types of data should you create a backup for the answer varies
493:41 create a backup for the answer varies based on the nature and significance of
493:43 based on the nature and significance of the data and is a selective process
493:45 the data and is a selective process tailored to a user's necessity and
493:47 tailored to a user's necessity and preference at the most basic level there
493:50 preference at the most basic level there are file backups which pertain to
493:52 are file backups which pertain to specific files or folders you opt to
493:54 specific files or folders you opt to safeguard such as photos or documents
493:57 safeguard such as photos or documents then we have critical data which
493:58 then we have critical data which encompasses indispensable business files
494:01 encompasses indispensable business files or personal data sets where the loss of
494:03 or personal data sets where the loss of such data could spell disaster
494:05 such data could spell disaster emphasizing the need for prioritized
494:07 emphasizing the need for prioritized backup for those managing applications
494:09 backup for those managing applications that store user or customer information
494:12 that store user or customer information backing up the entire database becomes
494:14 backing up the entire database becomes imperative and lastly there's the OS
494:17 imperative and lastly there's the OS backup a comprehensive process that
494:19 backup a comprehensive process that captures everything on your system from
494:21 captures everything on your system from settings to
494:22 settings to Applications it is just like creating a
494:24 Applications it is just like creating a holistic digital snapshot of your
494:26 holistic digital snapshot of your computer
494:31 now the question arises where should these backups reside one viable Avenue
494:34 these backups reside one viable Avenue is locally stored backups also known as
494:37 is locally stored backups also known as an on-site backup the advantages of this
494:40 an on-site backup the advantages of this method include speed as restoring from a
494:42 method include speed as restoring from a local source is typically swifter and
494:44 local source is typically swifter and grants users direct oversight over their
494:46 grants users direct oversight over their backup processes and data however it's
494:49 backup processes and data however it's not without its drawbacks local backups
494:52 not without its drawbacks local backups are susceptible to physical damage from
494:54 are susceptible to physical damage from unforeseen natural disasters like fires
494:56 unforeseen natural disasters like fires or floods and can also be targets for
494:59 or floods and can also be targets for theft Additionally the finite space of
495:01 theft Additionally the finite space of physical storage devices can pose
495:04 physical storage devices can pose limitations an alternative to this is
495:06 limitations an alternative to this is cloud storage backups which is a type of
495:09 cloud storage backups which is a type of off-site backup the cloud offers the
495:11 off-site backup the cloud offers the convenience of data accessibility from
495:13 convenience of data accessibility from virtually anywhere provided there's an
495:15 virtually anywhere provided there's an internet connection it also boasts
495:18 internet connection it also boasts scalability allowing users to increase
495:20 scalability allowing users to increase or decrease storage space as required
495:23 or decrease storage space as required moreover storing data offsite inherently
495:25 moreover storing data offsite inherently reduces the risks associated with local
495:28 reduces the risks associated with local disasters but like all things it has its
495:31 disasters but like all things it has its cons a stable internet connection
495:34 cons a stable internet connection becomes a pre-requisite and there's the
495:36 becomes a pre-requisite and there's the aspect of ongoing costs usually in the
495:38 aspect of ongoing costs usually in the form of subscription fees additionally
495:41 form of subscription fees additionally while many Cloud providers prioritize
495:43 while many Cloud providers prioritize security there's always an inherent risk
495:45 security there's always an inherent risk especially if the provider's defenses
495:47 especially if the provider's defenses are ever breached and for one final note
495:50 are ever breached and for one final note in the vast digital Cosmos the need for
495:53 in the vast digital Cosmos the need for a backup isn't a matter of if but when
495:56 a backup isn't a matter of if but when congrat congatulations on completing our
495:58 congrat congatulations on completing our CompTIA ITF plus training course the
496:01 CompTIA ITF plus training course the commitment and drive you have
496:02 commitment and drive you have demonstrated to arrive at this Milestone
496:04 demonstrated to arrive at this Milestone is truly commendable whether you started
496:07 is truly commendable whether you started with no prior it knowledge or you had
496:09 with no prior it knowledge or you had some previous experience to draw upon
496:11 some previous experience to draw upon you've journeyed a great distance now
496:13 you've journeyed a great distance now you stand at the threshold of your next
496:15 you stand at the threshold of your next big step towards obtaining your CompTIA
496:17 big step towards obtaining your CompTIA ITF plus
496:19 ITF plus certification but before you go ahead
496:21 certification but before you go ahead and book your test we have a new
496:22 and book your test we have a new challenge lined up for
496:25 challenge lined up for you we've assembled an exclusive
496:28 you we've assembled an exclusive practice exam on our Channel packed with
496:30 practice exam on our Channel packed with 200 plus questions meticulously designed
496:32 200 plus questions meticulously designed to test your knowledge and simulate the
496:34 to test your knowledge and simulate the format and difficulty of the actual exam
496:37 format and difficulty of the actual exam it's essential to remember that
496:38 it's essential to remember that repetition is the key to Mastery the
496:41 repetition is the key to Mastery the more you practice the more confident
496:43 more you practice the more confident you'll feel also as you navigate through
496:46 you'll feel also as you navigate through our practice exam be sure to make notes
496:48 our practice exam be sure to make notes of areas you're unsure about and feel
496:50 of areas you're unsure about and feel free to revisit any part of our training
496:52 free to revisit any part of our training course as
496:53 course as needed so are you prepared for our
496:55 needed so are you prepared for our practice exam
496:57 practice exam great then click on the link to my left
497:00 great then click on the link to my left to get started this CompTIA ITF plus
497:03 to get started this CompTIA ITF plus practice exam will challenge you gaau
497:05 practice exam will challenge you gaau your Readiness and move you one step
497:07 your Readiness and move you one step closer to your certification goal we
497:09 closer to your certification goal we wish you all the best and here's to you
497:11 wish you all the best and here's to you passing that exam