Acknowledgments |
|
xxvii | |
Introduction |
|
xxix | |
Chapter 1 Safety and Professionalism |
|
1 | (28) |
|
|
1 | (25) |
|
|
1 | (5) |
|
|
2 | (1) |
|
|
3 | (3) |
|
|
6 | (5) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (2) |
|
Expectations and Follow-up |
|
|
10 | (1) |
|
|
11 | (15) |
|
Electrostatic Discharge (ESD) |
|
|
11 | (1) |
|
|
12 | (3) |
|
Electromagnetic Interference (EMI) |
|
|
15 | (1) |
|
Radio Frequency Interference (RFI) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (2) |
|
Troubleshooting Methodology |
|
|
19 | (7) |
|
|
26 | (3) |
|
|
26 | (2) |
|
|
28 | (1) |
Chapter 2 The Visible Computer |
|
29 | (50) |
|
|
30 | (7) |
|
|
30 | (7) |
|
|
32 | (3) |
|
|
35 | (1) |
|
Why the Process Matters to Techs |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (5) |
|
|
37 | (5) |
|
|
42 | (33) |
|
|
42 | (33) |
|
Common Operating System Functions |
|
|
42 | (1) |
|
|
43 | (12) |
|
File Structures and Paths |
|
|
55 | (4) |
|
|
59 | (16) |
|
|
75 | (4) |
|
|
75 | (2) |
|
|
77 | (2) |
Chapter 3 CPUs |
|
79 | (54) |
|
|
79 | (17) |
|
|
79 | (11) |
|
|
80 | (3) |
|
|
83 | (2) |
|
|
85 | (4) |
|
Back to the External Data Bus |
|
|
89 | (1) |
|
|
90 | (6) |
|
|
90 | (2) |
|
|
92 | (4) |
|
|
96 | (32) |
|
|
96 | (18) |
|
|
97 | (4) |
|
|
101 | (13) |
|
Selecting and Installing CPUs |
|
|
114 | (12) |
|
|
114 | (2) |
|
|
116 | (10) |
|
|
126 | (3) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (4) |
|
|
129 | (2) |
|
|
131 | (2) |
Chapter 4 RAM |
|
133 | (36) |
|
|
134 | (7) |
|
|
134 | (5) |
|
|
135 | (1) |
|
|
135 | (2) |
|
|
137 | (2) |
|
|
139 | (1) |
|
|
139 | (2) |
|
|
139 | (2) |
|
|
141 | (1) |
|
|
141 | (24) |
|
|
141 | (3) |
|
|
144 | (1) |
|
|
144 | (2) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (3) |
|
|
150 | (12) |
|
|
150 | (7) |
|
|
157 | (2) |
|
|
159 | (2) |
|
Installing SO-DIMMs in Laptops |
|
|
161 | (1) |
|
|
162 | (3) |
|
|
165 | (4) |
|
|
165 | (2) |
|
|
167 | (2) |
Chapter 5 Firmware |
|
169 | (36) |
|
|
169 | (33) |
|
|
169 | (8) |
|
|
173 | (1) |
|
|
174 | (3) |
|
|
177 | (13) |
|
Typical System Setup Utility |
|
|
178 | (1) |
|
Graphical UEFI System Setup Utility |
|
|
179 | (4) |
|
Text-Based UEFI Intel-Based Setup Utility |
|
|
183 | (5) |
|
Other BIOS Security Settings |
|
|
188 | (1) |
|
Exiting and Saving Settings |
|
|
189 | (1) |
|
Option ROM and Device Drivers |
|
|
190 | (3) |
|
|
190 | (2) |
|
|
192 | (1) |
|
|
193 | (1) |
|
Power-On Self Test (POST) |
|
|
193 | (4) |
|
Before and During the Video Test: The Beep Codes |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (2) |
|
Care and Feeding of BIOS/UEFI and CMOS |
|
|
197 | (5) |
|
Default/Optimized Settings |
|
|
197 | (1) |
|
|
197 | (2) |
|
|
199 | (1) |
|
|
200 | (2) |
|
|
202 | (3) |
|
|
202 | (2) |
|
|
204 | (1) |
Chapter 6 Motherboards |
|
205 | (44) |
|
|
206 | (3) |
|
|
206 | (3) |
|
|
207 | (2) |
|
|
209 | (36) |
|
|
213 | (2) |
|
|
215 | (1) |
|
|
215 | (3) |
|
|
218 | (16) |
|
Structure and Function of the Expansion Bus |
|
|
218 | (2) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (2) |
|
Installing Expansion Cards |
|
|
223 | (8) |
|
Troubleshooting Expansion Cards |
|
|
231 | (3) |
|
Upgrading and Installing Motherboards |
|
|
234 | (7) |
|
Choosing the Motherboard and Case |
|
|
234 | (3) |
|
Installing the Motherboard |
|
|
237 | (4) |
|
Troubleshooting Motherboards |
|
|
241 | (4) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (2) |
|
|
245 | (4) |
|
|
245 | (2) |
|
|
247 | (2) |
Chapter 7 Power Supplies |
|
249 | (40) |
|
|
250 | (2) |
|
Understanding Electricity |
|
|
250 | (2) |
|
|
252 | (5) |
|
|
252 | (10) |
|
|
253 | (4) |
|
|
257 | (5) |
|
|
262 | (22) |
|
|
262 | (12) |
|
Installing and Maintaining Power Supplies |
|
|
274 | (7) |
|
|
274 | (2) |
|
|
276 | (5) |
|
Troubleshooting Power Supplies |
|
|
281 | (3) |
|
|
282 | (1) |
|
|
283 | (1) |
|
When Power Supplies Die Slowly |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
Temperature and Efficiency |
|
|
285 | (1) |
|
|
285 | (4) |
|
|
285 | (2) |
|
|
287 | (2) |
Chapter 8 Mass Storage Technologies |
|
289 | (34) |
|
|
289 | (2) |
|
|
289 | (2) |
|
|
290 | (1) |
|
|
291 | (28) |
|
|
292 | (3) |
|
|
295 | (1) |
|
|
295 | (9) |
|
|
297 | (1) |
|
|
298 | (3) |
|
eSATA and Other External Drives |
|
|
301 | (1) |
|
Refining Mass Storage Communication |
|
|
302 | (2) |
|
Protecting Data with RAID |
|
|
304 | (8) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
309 | (2) |
|
|
311 | (1) |
|
|
312 | (7) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
Connecting Solid-State Drives |
|
|
315 | (1) |
|
BIOS Support: Configuring CMOS and Installing Drivers |
|
|
316 | (3) |
|
Troubleshooting Hard Drive Installation |
|
|
319 | (1) |
|
|
319 | (4) |
|
|
319 | (2) |
|
|
321 | (2) |
Chapter 9 Implementing Mass Storage |
|
323 | (68) |
|
|
323 | (3) |
|
|
324 | (2) |
|
|
326 | (53) |
|
|
327 | (3) |
|
|
330 | (1) |
|
|
331 | (2) |
|
|
333 | (1) |
|
|
333 | (2) |
|
Partition Naming Problems |
|
|
335 | (1) |
|
|
336 | (13) |
|
|
337 | (1) |
|
|
337 | (8) |
|
|
345 | (3) |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
349 | (1) |
|
The Partitioning, Formatting, and Pooling Process |
|
|
349 | (25) |
|
|
350 | (1) |
|
Partitioning and Formatting with the Installation Media |
|
|
351 | (3) |
|
|
354 | (16) |
|
|
370 | (1) |
|
|
371 | (3) |
|
Maintaining and Troubleshooting Hard Drives |
|
|
374 | (13) |
|
|
374 | (5) |
|
|
379 | (5) |
|
Troubleshooting Hard Drive Implementation |
|
|
379 | (5) |
|
|
384 | (3) |
|
Third-Party Partition Tools |
|
|
385 | (2) |
|
|
387 | (4) |
|
|
387 | (2) |
|
|
389 | (2) |
Chapter 10 Essential Peripherals |
|
391 | (50) |
|
|
391 | (46) |
|
|
391 | (11) |
|
|
391 | (1) |
|
|
392 | (8) |
|
|
400 | (1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
402 | (23) |
|
|
403 | (2) |
|
|
405 | (2) |
|
|
407 | (2) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
410 | (1) |
|
|
410 | (2) |
|
Game Controllers and Joysticks |
|
|
412 | (1) |
|
|
413 | (3) |
|
Multimedia Devices and Formats |
|
|
416 | (9) |
|
|
425 | (12) |
|
|
425 | (5) |
|
|
430 | (7) |
|
|
437 | (4) |
|
|
437 | (2) |
|
|
439 | (2) |
Chapter 11 Building a PC |
|
441 | (46) |
|
|
441 | (14) |
|
|
441 | (14) |
|
Prerequisites to Building |
|
|
441 | (2) |
|
Custom PCs for Specific Jobs |
|
|
443 | (1) |
|
|
443 | (2) |
|
|
445 | (1) |
|
Virtualization Workstation |
|
|
446 | (1) |
|
|
447 | (2) |
|
Graphics/CAD/CAM Design Workstation |
|
|
449 | (1) |
|
Audio/Video Editing Workstation |
|
|
449 | (2) |
|
Network Attached Storage Devices |
|
|
451 | (4) |
|
|
455 | (27) |
|
Installing and Upgrading Windows |
|
|
455 | (22) |
|
|
455 | (2) |
|
|
457 | (4) |
|
The OS Installation Process |
|
|
461 | (14) |
|
Troubleshooting Installation Problems |
|
|
475 | (2) |
|
|
477 | (6) |
|
Patches, Service Packs, and Updates |
|
|
477 | (1) |
|
|
477 | (1) |
|
Restoring User Data Files (If Applicable) |
|
|
477 | (1) |
|
Install Essential Software |
|
|
478 | (1) |
|
Migrating and Retiring Systems |
|
|
478 | (4) |
|
No Installation Is Perfect |
|
|
482 | (1) |
|
|
482 | (1) |
|
Privacy Concerns with Windows 10 |
|
|
482 | (1) |
|
|
483 | (4) |
|
|
483 | (2) |
|
|
485 | (2) |
Chapter 12 Windows Under the Hood |
|
487 | (40) |
|
|
487 | (37) |
|
|
487 | (5) |
|
|
488 | (1) |
|
|
488 | (2) |
|
|
490 | (1) |
|
|
491 | (1) |
|
Command-Line Registry Editing Tools |
|
|
492 | (1) |
|
|
492 | (1) |
|
Applications, Processes, and Services |
|
|
493 | (28) |
|
|
494 | (22) |
|
|
516 | (1) |
|
|
517 | (4) |
|
|
521 | (3) |
|
|
521 | (1) |
|
|
522 | (2) |
|
|
524 | (3) |
|
|
524 | (1) |
|
|
525 | (2) |
Chapter 13 Users, Groups, and Permissions |
|
527 | (48) |
|
|
528 | (44) |
|
Authentication with Users and Groups |
|
|
528 | (16) |
|
|
528 | (1) |
|
|
529 | (2) |
|
|
531 | (1) |
|
Standard User and Elevated Privileges |
|
|
532 | (1) |
|
Configuring Users and Groups in Windows |
|
|
533 | (11) |
|
Authorization Through NTFS |
|
|
544 | (9) |
|
|
544 | (3) |
|
|
547 | (1) |
|
|
548 | (2) |
|
|
550 | (1) |
|
Permissions in Linux and macOS |
|
|
550 | (3) |
|
Sharing Resources Securely |
|
|
553 | (10) |
|
Sharing Folders and Files |
|
|
554 | (4) |
|
|
558 | (1) |
|
|
559 | (1) |
|
Protecting Data with Encryption |
|
|
559 | (4) |
|
|
563 | (9) |
|
|
563 | (1) |
|
|
564 | (4) |
|
|
568 | (1) |
|
|
569 | (3) |
|
|
572 | (3) |
|
|
572 | (2) |
|
|
574 | (1) |
Chapter 14 Maintaining and Optimizing Operating Systems |
|
575 | (52) |
|
|
576 | (47) |
|
Maintaining Operating Systems |
|
|
576 | (24) |
|
|
576 | (8) |
|
Managing Temporary Files in Windows |
|
|
584 | (1) |
|
|
585 | (1) |
|
Disk Maintenance Utilities |
|
|
586 | (3) |
|
|
589 | (3) |
|
Controlling Autostarting Software |
|
|
592 | (3) |
|
Handy Windows Administration Tools |
|
|
595 | (5) |
|
Optimizing Operating Systems |
|
|
600 | (13) |
|
Installing and Removing Software |
|
|
600 | (9) |
|
Installing and Optimizing a Device |
|
|
609 | (2) |
|
|
611 | (2) |
|
|
613 | (10) |
|
|
613 | (6) |
|
System Restore in Windows |
|
|
619 | (4) |
|
|
623 | (4) |
|
|
623 | (2) |
|
|
625 | (2) |
Chapter 15 Working with the Command-Line Interface |
|
627 | (54) |
|
|
628 | (50) |
|
Deciphering the Command-Line Interface |
|
|
628 | (10) |
|
|
629 | (1) |
|
Accessing the Command-Line Interface in Windows |
|
|
629 | (2) |
|
Accessing the Command-Line Interface in macOS and Linux |
|
|
631 | (2) |
|
|
633 | (1) |
|
|
633 | (1) |
|
File Formats and Filenames |
|
|
633 | (2) |
|
|
635 | (3) |
|
Mastering Fundamental Commands |
|
|
638 | (13) |
|
Structure: Syntax and Switches |
|
|
638 | (1) |
|
Viewing Directory Contents: dir and is |
|
|
639 | (2) |
|
Changing Directory Focus: The cd Command |
|
|
641 | (2) |
|
|
643 | (1) |
|
Making Directories: The md/mkdir Command |
|
|
644 | (2) |
|
Removing Directories: The rd/rmdir Command |
|
|
646 | (2) |
|
Running a Program in Windows |
|
|
648 | (1) |
|
Running a Program in macOS and Linux |
|
|
648 | (3) |
|
|
651 | (6) |
|
Using Wildcards to Locate Files |
|
|
651 | (2) |
|
|
653 | (1) |
|
|
654 | (2) |
|
Pruning and Grafting Folder Trees |
|
|
656 | (1) |
|
Assorted Windows Commands |
|
|
657 | (6) |
|
|
658 | (1) |
|
|
658 | (1) |
|
|
659 | (1) |
|
|
659 | (1) |
|
|
659 | (1) |
|
|
660 | (1) |
|
|
660 | (1) |
|
Using Special Keys in Windows |
|
|
661 | (1) |
|
|
662 | (1) |
|
Assorted macOS and Linux Commands |
|
|
663 | (9) |
|
|
663 | (1) |
|
|
664 | (1) |
|
|
665 | (1) |
|
|
666 | (1) |
|
|
667 | (1) |
|
|
668 | (2) |
|
|
670 | (1) |
|
|
671 | (1) |
|
|
671 | (1) |
|
|
672 | (6) |
|
Script Types and Languages |
|
|
673 | (1) |
|
|
673 | (4) |
|
|
677 | (1) |
|
|
678 | (3) |
|
|
678 | (2) |
|
|
680 | (1) |
Chapter 16 Troubleshooting Operating Systems |
|
681 | (56) |
|
|
682 | (52) |
|
|
682 | (21) |
|
Failure to Boot: Hardware or Configuration |
|
|
682 | (1) |
|
|
683 | (20) |
|
|
703 | (1) |
|
Failure to Start Normally |
|
|
703 | (21) |
|
|
704 | (2) |
|
|
706 | (1) |
|
|
707 | (3) |
|
|
710 | (3) |
|
|
713 | (7) |
|
|
720 | (4) |
|
|
724 | (10) |
|
Application Installation Problems |
|
|
725 | (1) |
|
Problems with Uninstalling |
|
|
726 | (1) |
|
|
727 | (3) |
|
Missing File or Incorrect File Version |
|
|
730 | (1) |
|
|
730 | (1) |
|
|
731 | (1) |
|
Volume Shadow Copy Service and System Protection |
|
|
732 | (2) |
|
|
734 | (3) |
|
|
734 | (2) |
|
|
736 | (1) |
Chapter 17 Display Technologies |
|
737 | (62) |
|
|
738 | (4) |
|
|
738 | (1) |
|
|
738 | (4) |
|
|
742 | (26) |
|
|
750 | (3) |
|
|
753 | (1) |
|
|
754 | (6) |
|
|
760 | (6) |
|
|
760 | (2) |
|
|
762 | (1) |
|
|
763 | (2) |
|
|
765 | (1) |
|
Connector Types and Associated Cables |
|
|
765 | (1) |
|
Installing and Configuring Video |
|
|
766 | (20) |
|
|
768 | (1) |
|
|
768 | (13) |
|
|
778 | (3) |
|
|
781 | (5) |
|
|
781 | (5) |
|
|
786 | (7) |
|
|
787 | (6) |
|
Troubleshooting Video Cards and Drivers |
|
|
787 | (2) |
|
|
789 | (3) |
|
Troubleshooting Projectors |
|
|
792 | (1) |
|
|
793 | (3) |
|
Additional Display Topics |
|
|
793 | (3) |
|
|
794 | (1) |
|
|
794 | (1) |
|
|
795 | (1) |
|
|
795 | (1) |
|
|
795 | (1) |
|
|
796 | (3) |
|
|
796 | (2) |
|
|
798 | (1) |
Chapter 18 Essentials of Networking |
|
799 | (34) |
|
|
799 | (4) |
|
Roles Hosts Play in Networks |
|
|
799 | (4) |
|
|
803 | (1) |
|
|
803 | (1) |
|
|
804 | (26) |
|
|
804 | (3) |
|
|
807 | (3) |
|
Ethernet with Twisted Pair |
|
|
810 | (2) |
|
Ethernet with Alternative Connections |
|
|
812 | (3) |
|
|
815 | (15) |
|
|
816 | (1) |
|
|
817 | (12) |
|
|
829 | (1) |
|
|
830 | (3) |
|
|
830 | (2) |
|
|
832 | (1) |
Chapter 19 Local Area Networking |
|
833 | (62) |
|
|
834 | (58) |
|
|
834 | (20) |
|
Network Addressing with IPv4 |
|
|
834 | (6) |
|
|
840 | (9) |
|
Network Addressing with IPv6 |
|
|
849 | (5) |
|
Installing and Configuring a Wired Network |
|
|
854 | (30) |
|
|
855 | (3) |
|
Configuring IP Addressing |
|
|
858 | (1) |
|
|
858 | (2) |
|
|
860 | (1) |
|
|
861 | (1) |
|
|
861 | (23) |
|
|
884 | (8) |
|
Repairing Physical Cabling |
|
|
884 | (5) |
|
|
889 | (3) |
|
|
892 | (3) |
|
|
892 | (2) |
|
|
894 | (1) |
Chapter 20 Wireless Networking |
|
895 | (40) |
|
|
895 | (3) |
|
Wireless Networking Components |
|
|
895 | (3) |
|
|
898 | (4) |
|
Wireless Networking Software |
|
|
899 | (1) |
|
|
900 | (2) |
|
|
902 | (4) |
|
Wireless Networking Security |
|
|
902 | (4) |
|
|
906 | (8) |
|
|
906 | (1) |
|
Wireless Networking Standards |
|
|
907 | (7) |
|
IEEE 802.11-Based Wireless Networking |
|
|
907 | (4) |
|
|
911 | (3) |
|
|
914 | (18) |
|
Installing and Configuring Wireless Networking |
|
|
914 | (14) |
|
|
914 | (11) |
|
|
925 | (1) |
|
|
926 | (2) |
|
|
928 | (4) |
|
|
929 | (1) |
|
|
929 | (1) |
|
Connectivity Troubleshooting |
|
|
930 | (1) |
|
Configuration Troubleshooting |
|
|
931 | (1) |
|
|
932 | (3) |
|
|
932 | (2) |
|
|
934 | (1) |
Chapter 21 The Internet |
|
935 | (64) |
|
|
935 | (5) |
|
|
935 | (5) |
|
|
936 | (2) |
|
TCP/IP: The Common Language of the Internet |
|
|
938 | (1) |
|
Internet Service Providers |
|
|
938 | (1) |
|
|
938 | (2) |
|
|
940 | (21) |
|
Connecting to the Internet |
|
|
940 | (17) |
|
|
940 | (5) |
|
|
945 | (2) |
|
|
947 | (1) |
|
|
947 | (1) |
|
|
948 | (1) |
|
|
949 | (1) |
|
|
949 | (2) |
|
|
951 | (2) |
|
Connection to the Internet |
|
|
953 | (4) |
|
Internet Application Protocols |
|
|
957 | (4) |
|
|
961 | (23) |
|
|
961 | (5) |
|
|
966 | (4) |
|
File Transfer Protocol (FTP) |
|
|
970 | (1) |
|
|
970 | (2) |
|
|
972 | (1) |
|
|
972 | (2) |
|
|
974 | (3) |
|
|
977 | (3) |
|
|
980 | (3) |
|
Internet Utility Protocols |
|
|
983 | (1) |
|
|
984 | (10) |
|
|
984 | (4) |
|
|
988 | (8) |
|
|
989 | (2) |
|
|
991 | (1) |
|
|
991 | (1) |
|
|
991 | (3) |
|
|
994 | (2) |
|
|
995 | (1) |
|
|
996 | (3) |
|
|
996 | (2) |
|
|
998 | (1) |
Chapter 22 Virtualization |
|
999 | (36) |
|
|
1000 | (32) |
|
Benefits of Virtualization |
|
|
1000 | (2) |
|
|
1000 | (1) |
|
|
1000 | (1) |
|
System Management and Security |
|
|
1001 | (1) |
|
|
1001 | (1) |
|
Implementing Virtualization |
|
|
1002 | (20) |
|
|
1002 | (4) |
|
Emulation Versus Virtualization |
|
|
1006 | (1) |
|
Client-Side Virtualization |
|
|
1007 | (11) |
|
Server-Side Virtualization |
|
|
1018 | (4) |
|
|
1022 | (10) |
|
|
1023 | (5) |
|
|
1028 | (2) |
|
|
1030 | (2) |
|
|
1032 | (3) |
|
|
1032 | (2) |
|
|
1034 | (1) |
Chapter 23 Portable Computing |
|
1035 | (50) |
|
|
1035 | (4) |
|
Portable Computing Devices |
|
|
1035 | (4) |
|
|
1036 | (3) |
|
|
1039 | (43) |
|
|
1039 | (3) |
|
|
1042 | (1) |
|
Extending Portable Computers |
|
|
1043 | (7) |
|
|
1043 | (3) |
|
|
1046 | (2) |
|
Portable-Specific Expansion Slots |
|
|
1048 | (1) |
|
|
1049 | (1) |
|
|
1049 | (1) |
|
Managing and Maintaining Portable Computers |
|
|
1050 | (12) |
|
|
1051 | (1) |
|
|
1052 | (7) |
|
|
1059 | (1) |
|
|
1059 | (1) |
|
|
1060 | (2) |
|
Upgrading and Repairing Laptop Computers |
|
|
1062 | (13) |
|
|
1062 | (2) |
|
|
1064 | (6) |
|
Hardware/Device Replacement |
|
|
1070 | (5) |
|
Troubleshooting Portable Computers |
|
|
1075 | (7) |
|
|
1075 | (2) |
|
|
1077 | (5) |
|
|
1082 | (3) |
|
|
1082 | (2) |
|
|
1084 | (1) |
Chapter 24 Understanding Mobile Devices |
|
1085 | (54) |
|
|
1086 | (12) |
|
|
1086 | (12) |
|
|
1086 | (7) |
|
|
1093 | (5) |
|
|
1098 | (38) |
|
|
1098 | (12) |
|
|
1098 | (2) |
|
|
1100 | (1) |
|
|
1101 | (1) |
|
|
1102 | (8) |
|
Configuring a Mobile Device |
|
|
1110 | (26) |
|
|
1111 | (4) |
|
Installing and Configuring Apps |
|
|
1115 | (4) |
|
|
1119 | (2) |
|
|
1121 | (1) |
|
|
1121 | (4) |
|
|
1125 | (4) |
|
Mobile Device Communication and Ports |
|
|
1129 | (7) |
|
|
1136 | (3) |
|
|
1136 | (2) |
|
|
1138 | (1) |
Chapter 25 Care and Feeding of Mobile Devices |
|
1139 | (42) |
|
|
1139 | (39) |
|
Troubleshooting Mobile Device Issues |
|
|
1139 | (18) |
|
|
1140 | (3) |
|
Touchscreen and Display Issues |
|
|
1143 | (3) |
|
|
1146 | (1) |
|
|
1146 | (1) |
|
|
1147 | (1) |
|
|
1148 | (3) |
|
|
1151 | (1) |
|
|
1151 | (1) |
|
Cannot Broadcast to an External Monitor |
|
|
1152 | (1) |
|
|
1152 | (1) |
|
Connectivity and Data Usage Issues |
|
|
1153 | (1) |
|
GPS and Location Services Problems |
|
|
1154 | (2) |
|
|
1156 | (1) |
|
|
1156 | (1) |
|
|
1157 | (11) |
|
BYOD Versus Corporate-Owned Devices |
|
|
1157 | (1) |
|
Profile Security Requirements |
|
|
1158 | (1) |
|
Preventing Physical Damage |
|
|
1159 | (1) |
|
|
1160 | (1) |
|
|
1161 | (2) |
|
|
1163 | (2) |
|
|
1165 | (3) |
|
Mobile OS and Application Security Issues |
|
|
1168 | (10) |
|
|
1169 | (3) |
|
Risks, Symptoms, and Clues |
|
|
1172 | (6) |
|
|
1178 | (3) |
|
|
1178 | (2) |
|
|
1180 | (1) |
Chapter 26 Printers and Multifunction Devices |
|
1181 | (58) |
|
|
1182 | (35) |
|
Printer and Multifunction Device Components and Technologies |
|
|
1182 | (22) |
|
|
1182 | (16) |
|
|
1198 | (4) |
|
|
1202 | (1) |
|
Automatic Document Feeders |
|
|
1202 | (1) |
|
|
1203 | (1) |
|
The Laser Printing Process |
|
|
1204 | (6) |
|
|
1205 | (1) |
|
|
1206 | (1) |
|
|
1207 | (1) |
|
|
1207 | (1) |
|
|
1208 | (1) |
|
|
1208 | (1) |
|
|
1209 | (1) |
|
Installing a Multifunction Device |
|
|
1210 | (8) |
|
Setting Up Printers in Windows |
|
|
1210 | (7) |
|
|
1217 | (1) |
|
|
1218 | (18) |
|
Configuring Print Settings |
|
|
1218 | (1) |
|
Optimizing Print Performance |
|
|
1219 | (1) |
|
Managing Public/Shared/Networked Devices |
|
|
1220 | (1) |
|
|
1221 | (15) |
|
Troubleshooting General Issues |
|
|
1221 | (6) |
|
Troubleshooting Impact Printers |
|
|
1227 | (1) |
|
Troubleshooting Thermal Printers |
|
|
1228 | (1) |
|
Troubleshooting Inkjet Printers |
|
|
1228 | (3) |
|
Troubleshooting Laser Printers |
|
|
1231 | (5) |
|
Troubleshooting 3-D Printers |
|
|
1236 | (1) |
|
|
1236 | (3) |
|
|
1236 | (2) |
|
|
1238 | (1) |
Chapter 27 Securing Computers |
|
1239 | (62) |
|
|
1239 | (59) |
|
|
1239 | (8) |
|
|
1240 | (1) |
|
|
1241 | (1) |
|
|
1242 | (1) |
|
|
1242 | (1) |
|
|
1243 | (1) |
|
System Crash/Hardware Failure |
|
|
1243 | (1) |
|
|
1243 | (1) |
|
|
1244 | (1) |
|
|
1244 | (3) |
|
Security Concepts and Technologies |
|
|
1247 | (18) |
|
|
1247 | (12) |
|
Data Classification and Compliance |
|
|
1259 | (1) |
|
|
1260 | (1) |
|
|
1261 | (4) |
|
|
1265 | (33) |
|
|
1265 | (8) |
|
Malware Signs and Symptoms |
|
|
1273 | (2) |
|
Malware Prevention and Recovery |
|
|
1275 | (8) |
|
|
1283 | (9) |
|
|
1292 | (1) |
|
Authentication and Encryption |
|
|
1293 | (4) |
|
|
1297 | (1) |
|
|
1298 | (3) |
|
|
1298 | (2) |
|
|
1300 | (1) |
Chapter 28 Operational Procedures |
|
1301 | (18) |
|
|
1301 | (14) |
|
Documentation Best Practices |
|
|
1301 | (94) |
|
|
1301 | (2) |
|
|
1303 | (1) |
|
|
1304 | (91) |
|
Managing Change Management |
|
|
1395 | |
|
Change Management Processes |
|
|
1305 | (1) |
|
Implementing Change (Scenario) |
|
|
1306 | (2) |
|
Disaster Prevention and Recovery |
|
|
1308 | (8) |
|
|
1308 | (1) |
|
Backup and Recovery Procedures |
|
|
1308 | (7) |
|
|
1315 | (1) |
|
|
1315 | (1) |
|
|
1316 | (3) |
|
|
1316 | (2) |
|
|
1318 | (1) |
Appendix A Mapping to the CompTIA A+ Objectives |
|
1319 | (40) |
|
|
1319 | (20) |
|
|
1339 | (20) |
Appendix B About the Online Content |
|
1359 | (4) |
|
|
1359 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
1359 | (1) |
|
|
1359 | (1) |
|
Single User License Terms and Conditions |
|
|
1360 | (1) |
|
|
1361 | (1) |
|
|
1361 | (1) |
|
Other Online Book Resources |
|
|
1362 | (1) |
|
|
1362 | (1) |
|
|
1362 | (1) |
|
Playing the Mike Meyers Introduction Video |
|
|
1362 | (1) |
|
|
1362 | (1) |
|
|
1362 | (1) |
Glossary |
|
1363 | (96) |
Index |
|
1459 | |