Provide an interface between the user and the hardware:
Manage computer hardware and resources:
Offer a platform for running applications:
Installation Modes:
Prerequisites:
File Systems:
Control Panel and Settings Interface:
Task Manager:
Ctrl + Shift + Esc or Ctrl + Alt + Delete.Disk Management:
Registry Editor:
ipconfig: Displays and configures IP settings.ping: Tests the connectivity between two devices.tracert: Traces the route data takes to reach its destination.sfc /scannow: Scans and repairs corrupted system files.tasklist/taskkill: Lists and terminates running tasks.diskpart: Manages disk partitions.File Operations:
ls: Lists files in a directory.cd: Changes the current directory.cp: Copies files or directories.mv: Moves or renames files.rm: Deletes files or directories.Permission Management:
chmod: Changes file permissions (e.g., read, write, execute).chown: Changes the ownership of a file or directory.System Status:
top: Displays running processes and system resource usage.df: Shows available disk space.ps: Displays currently running processes.apt-get install [package-name].yum install [package-name]./etc/network/interfaces to configure network settings.ifconfig: Displays or modifies network configurations.ip: A modern replacement for ifconfig.This section introduces the basics of operating systems and their essential features. Start by exploring a desktop OS like Windows to get comfortable, then try using Linux through a virtual machine to practice commands.
A Local Account is created directly on a specific device. It is not connected to any online services.
Pros: Greater privacy, works offline.
Cons: Cannot sync settings or access cloud services.
A Microsoft Account is connected to Microsoft’s cloud ecosystem (Outlook, OneDrive, etc.).
Pros: Syncs settings, apps, and files across devices.
Common in Windows 10/11 home environments.
Administrator accounts have full system-level access. They can install software, change system files, and manage user accounts.
Standard User accounts have limited permissions. They can run most programs but cannot make system-wide changes without approval.
UAC prompts users when a task requires administrative privileges.
Purpose: Prevent unauthorized changes, especially by malware or untrusted apps.
UAC levels can be configured through the Control Panel → User Accounts → "Change User Account Control settings".
UAC protects critical areas like the Registry, Program Files, and system drivers.
These are vital for troubleshooting startup or system errors.
A feature that takes periodic "snapshots" of system settings and configurations.
It allows you to roll back to a previous stable state without affecting personal files.
Useful after driver updates or system changes that cause instability.
A diagnostic startup mode where Windows loads only essential drivers and services.
Variants:
Safe Mode (basic)
Safe Mode with Networking
Safe Mode with Command Prompt
Used to uninstall drivers or updates, run malware scans, or access repair tools.
Many OEM systems include a hidden partition with a factory image.
Allows restoration to factory settings without external media.
Accessed during boot (commonly via F11 or a specific key per manufacturer).
A lightweight OS that includes powerful repair tools:
Startup Repair
System Restore
Command Prompt
Image Recovery
Go back to previous version
Accessed automatically after failed boots or manually through boot options.
Even though you briefly mentioned mobile OSs, CompTIA expects some practical administration knowledge.
Wi-Fi Settings: Connecting to secure networks, forgetting networks, setting static IP.
App Permissions: Managing access to location, microphone, camera, etc.
Software Updates: Keeping the OS and apps updated for security and stability.
Remote Lock/Wipe:
Biometric Security: Use of fingerprint or facial recognition for unlocking.
MDM (Mobile Device Management):
Used in corporate environments to control app installation, enforce encryption, and push policies remotely.
Common platforms: Intune, MobileIron, AirWatch.
This is a commonly tested but often overlooked concept.
A system that allows the user to select between two or more installed operating systems at boot.
Example: A PC with both Windows and Linux installed.
Each OS typically resides on its own partition.
Tools used:
Disk Management in Windows
GParted in Linux
Partitions must be compatible with each OS’s file system (e.g., NTFS for Windows, ext4 for Linux).
Set through BIOS/UEFI → Boot → Boot Priority Order.
Alternatively, use a bootloader:
Windows Boot Manager: Used when installing multiple versions of Windows.
GRUB: Default bootloader for most Linux systems.
You can also install third-party boot managers like EasyBCD to customize options.
| Subtopic | Why It Matters for A+ and Real Work |
|---|---|
| User accounts and UAC | Core to permission troubleshooting and system security |
| Recovery tools | Essential for diagnosing and repairing boot issues |
| Mobile OS management | Increasingly relevant as mobile devices dominate IT work |
| Multi-boot and partition setup | Common in dual-OS environments and exam questions |
A technician needs to repair a corrupted Windows boot sector preventing the OS from starting. Which command-line recovery utility should be used?
Use the Windows Recovery Environment command bootrec /fixboot.
The bootrec /fixboot command rewrites the boot sector on the system partition. It is used when the boot sector becomes corrupted due to malware, disk errors, or improper shutdowns. In Windows troubleshooting scenarios, technicians typically access this command through the Windows Recovery Environment (WinRE) using installation media or advanced startup options. This command restores the boot sector while preserving installed operating system files and user data.
A common mistake is attempting to reinstall the OS immediately without attempting boot repair utilities. Another related command is bootrec /fixmbr, which repairs the master boot record rather than the partition boot sector.
Demand Score: 82
Exam Relevance Score: 90
A user cannot install an application because their system reports it is running a 32-bit version of Windows. What limitation is most relevant to this operating system architecture?
A 32-bit operating system can address a maximum of about 4 GB of RAM.
The fundamental limitation of 32-bit operating systems is memory addressing. A 32-bit CPU architecture can only address 2³² memory locations, which equals approximately 4 GB of addressable memory. In practice, the usable amount may be slightly lower because some memory addresses are reserved for hardware resources.
This limitation affects application compatibility and system performance. Many modern applications require 64-bit operating systems because they support much larger memory addressing and improved processing capabilities. When technicians encounter software installation failures related to architecture mismatch, verifying whether the OS is 32-bit or 64-bit is a standard troubleshooting step.
Demand Score: 75
Exam Relevance Score: 85
A technician needs to determine whether a Windows computer is joined to a domain or configured as a workgroup. Where can this information be verified?
It can be verified in System Properties under the Computer Name tab.
System Properties provides information about the system’s domain membership. Within the Computer Name tab, technicians can see whether the system is part of a domain environment or a workgroup configuration. Domain membership is commonly used in enterprise networks where centralized authentication and management occur through Active Directory.
Understanding the distinction is important for troubleshooting authentication issues, network resource access, and policy enforcement. For example, if a user cannot access domain resources, verifying domain membership is one of the first diagnostic steps.
Demand Score: 72
Exam Relevance Score: 83
A technician must start Windows with minimal drivers and services to troubleshoot a startup problem. Which boot option should be used?
Safe Mode.
Safe Mode starts Windows using only essential system services and drivers required for basic operation. It disables most third-party drivers and startup programs, which helps isolate software conflicts or problematic drivers. Technicians often use Safe Mode to uninstall faulty drivers, remove malware, or roll back system changes.
There are multiple Safe Mode variants, including Safe Mode with Networking and Safe Mode with Command Prompt. Choosing the correct variant depends on whether network access or command-line tools are required during troubleshooting.
Demand Score: 70
Exam Relevance Score: 85
A technician wants to automate repetitive administrative tasks in Windows environments. Which built-in scripting technology is most commonly used?
PowerShell.
PowerShell is a powerful command-line shell and scripting environment designed for system administration and automation. It allows technicians to manage operating system tasks such as configuring services, managing files, modifying system settings, and interacting with Active Directory.
Unlike traditional command prompt utilities, PowerShell uses object-based output and a consistent verb-noun command structure. Automation through scripts significantly reduces manual administrative effort and improves consistency when performing repetitive system management tasks.
Demand Score: 74
Exam Relevance Score: 86