Computing Fundamentals

The Computing Fundamentals examination objectives are designed to help you gain a foundational understanding of computing, including knowledge and use of computer hardware, software, and operations systems.

 

Mobile devices

Mobile devices are small handheld computers that allow us to check our emails, surf the internet, play games, and make calls. Mobile devices have LCD or LED touch screens that allow us to interact with the Graphical User Interface (GUI).

Mobile Devices & Hardware - 27 min.

Hardware

Hardware Devices are the internal and external components of any computer. The case, monitor, mouse, hard drives, and DVD/CD ROMS. Small hardware devices are in our smartphones, tablets, and Fitbits.

Hardware - 32 min.

computer software architecture

Software are computer programs that tell the hardware in our computers how to execute a task. Without software, our computers couldn't function.  Examples of software are operating systems, macOS, Word, and Adobe Photoshop.

Computer Software Architecture - 28 min.

Backup & Restore

Software systems that allow us to recover saved data on a device or cloud. With backup and restore, we can back up and store files, applications, and even operating systems.

File sharing

File sharing is the ability to transfer files from one device to the other. Digital media, computer programs, and electronic books are examples of files that can be shared. File-sharing can be done via flash drive, CD-ROMs, and peer-to-peer software.

CSA, Backup and Restore, File Sharing - 25 min.

cloud computing

Cloud computing is an online resource that provides services like email and data storage. Cloud computing lets users access their saved documents anywhere in the world with an internet connection.

Cloud Computing - 23 min.

security

Security is the prevention of damage, theft, and infiltration on any computer hardware and software. Three Categories of Security are operational, management, and physical security. Recognizing these categories can prevent unwanted intruders.

Security - 30 min.