Acknowledgments |
|
xxix | |
Introduction |
|
xxxi | |
|
Chapter 1 Safety and Professionalism |
|
|
1 | (28) |
|
|
1 | (1) |
|
|
1 | (5) |
|
Professional Appearance and Attire |
|
|
2 | (1) |
|
|
3 | (3) |
|
|
6 | (5) |
|
|
6 | (2) |
|
Respectful Communication Getting Answers |
|
|
8 | (2) |
|
Expectations and Follow-Up |
|
|
10 | (1) |
|
|
11 | (8) |
|
Electrostatic Discharge (ESD) |
|
|
11 | (1) |
|
|
12 | (3) |
|
Electromagnetic Interference (EMI) |
|
|
15 | (1) |
|
Radio Frequency Interference (RFI) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (2) |
|
|
19 | (7) |
|
Troubleshooting Methodology |
|
|
19 | (7) |
|
|
26 | (3) |
|
|
26 | (2) |
|
|
28 | (1) |
|
Chapter 2 The Visible Computer |
|
|
29 | (38) |
|
|
30 | (1) |
|
|
30 | (7) |
|
|
32 | (3) |
|
|
35 | (1) |
|
Why the Process Matters to Techs |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (4) |
|
|
41 | (1) |
|
|
41 | (22) |
|
Common Operating System Functions |
|
|
41 | (1) |
|
|
42 | (10) |
|
File Structures and Paths |
|
|
52 | (4) |
|
The Tech Utility Launch Points |
|
|
56 | (7) |
|
|
63 | (4) |
|
|
63 | (2) |
|
|
65 | (2) |
|
|
67 | (54) |
|
|
67 | (1) |
|
|
67 | (11) |
|
|
68 | (3) |
|
|
71 | (2) |
|
|
73 | (3) |
|
Back to the External Data Bus |
|
|
76 | (2) |
|
|
78 | (6) |
|
|
78 | (2) |
|
|
80 | (4) |
|
|
84 | (1) |
|
|
84 | (17) |
|
|
85 | (4) |
|
|
89 | (12) |
|
Selecting and Installing CPUs |
|
|
101 | (13) |
|
|
102 | (2) |
|
|
104 | (10) |
|
|
114 | (2) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (4) |
|
|
117 | (2) |
|
|
119 | (2) |
|
|
121 | (32) |
|
|
122 | (1) |
|
|
122 | (5) |
|
|
123 | (1) |
|
|
123 | (2) |
|
|
125 | (2) |
|
|
127 | (1) |
|
|
127 | (4) |
|
|
127 | (2) |
|
|
129 | (2) |
|
|
131 | (6) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (3) |
|
|
137 | (11) |
|
|
137 | (7) |
|
|
144 | (1) |
|
|
145 | (2) |
|
Installing SO-DIMMs in Laptops |
|
|
147 | (1) |
|
|
148 | (2) |
|
|
150 | (3) |
|
|
150 | (2) |
|
|
152 | (1) |
|
|
153 | (38) |
|
|
153 | (1) |
|
|
153 | (10) |
|
|
157 | (6) |
|
CMOS and the System Setup Utility |
|
|
163 | (15) |
|
Touring the System Setup Utility |
|
|
164 | (9) |
|
Noteworthy BIOS/UEFI Security Settings |
|
|
173 | (4) |
|
Exiting and Saving BIOS/UEFI Settings |
|
|
177 | (1) |
|
Power-On Self-Test (POST) |
|
|
178 | (3) |
|
Before and During the Video Test: The Beep Codes |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
Care and Feeding of BIOS/UEFI |
|
|
181 | (5) |
|
Default/Optimized Settings |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (2) |
|
|
185 | (1) |
|
|
186 | (5) |
|
|
186 | (2) |
|
|
188 | (3) |
|
|
191 | (42) |
|
|
192 | (1) |
|
|
192 | (3) |
|
|
192 | (1) |
|
|
193 | (2) |
|
|
195 | (8) |
|
|
199 | (3) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
203 | (17) |
|
Structure and Function of the Expansion Bus |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (3) |
|
Installing Expansion Cards |
|
|
209 | (8) |
|
Troubleshooting Expansion Cards |
|
|
217 | (3) |
|
Upgrading and Installing Motherboards |
|
|
220 | (6) |
|
Choosing the Motherboard and Case |
|
|
220 | (3) |
|
Installing the Motherboard |
|
|
223 | (3) |
|
Troubleshooting Motherboards |
|
|
226 | (4) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (2) |
|
|
230 | (3) |
|
|
230 | (2) |
|
|
232 | (1) |
|
|
233 | (40) |
|
|
234 | (1) |
|
Understanding Electricity |
|
|
234 | (2) |
|
|
236 | (1) |
|
|
236 | (6) |
|
|
237 | (5) |
|
|
242 | (5) |
|
|
247 | (12) |
|
|
247 | (12) |
|
Installing and Maintaining Power Supplies |
|
|
259 | (6) |
|
|
259 | (2) |
|
|
261 | (4) |
|
Troubleshooting Power Supplies |
|
|
265 | (5) |
|
|
266 | (1) |
|
When Power Supplies Die Slowly |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
268 | (2) |
|
|
270 | (3) |
|
|
270 | (2) |
|
|
272 | (1) |
|
Chapter 8 Mass Storage Technologies |
|
|
273 | (32) |
|
|
273 | (1) |
|
|
273 | (2) |
|
|
274 | (1) |
|
|
275 | (5) |
|
|
276 | (4) |
|
|
280 | (8) |
|
|
282 | (1) |
|
|
283 | (3) |
|
Esata and Other External Drives |
|
|
286 | (1) |
|
Refining Mass Storage Communication |
|
|
286 | (2) |
|
Protecting Data with RAID |
|
|
288 | (8) |
|
|
291 | (2) |
|
|
293 | (1) |
|
|
293 | (2) |
|
|
295 | (1) |
|
|
296 | (6) |
|
|
296 | (1) |
|
|
297 | (1) |
|
Connecting Solid-State Drives |
|
|
298 | (1) |
|
BIOS Support: Configuring CMOS and Installing Drivers |
|
|
299 | (3) |
|
Troubleshooting Hard Drive Installation |
|
|
302 | (1) |
|
|
302 | (3) |
|
|
302 | (2) |
|
|
304 | (1) |
|
Chapter 9 Implementing Mass Storage |
|
|
305 | (64) |
|
|
305 | (1) |
|
|
306 | (2) |
|
|
308 | (9) |
|
|
309 | (3) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
Partition Naming Problems |
|
|
316 | (1) |
|
|
317 | (14) |
|
|
318 | (1) |
|
|
318 | (7) |
|
|
325 | (4) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
The Partitioning, Formatting, and Pooling Process |
|
|
331 | (24) |
|
|
331 | (1) |
|
Partitioning and Formatting with the Installation Media |
|
|
332 | (2) |
|
|
334 | (17) |
|
|
351 | (1) |
|
|
352 | (3) |
|
Maintaining and Troubleshooting Hard Drives |
|
|
355 | (6) |
|
|
356 | (5) |
|
|
361 | (5) |
|
Troubleshooting Hard Drive Implementation |
|
|
361 | (5) |
|
|
366 | (3) |
|
|
366 | (2) |
|
|
368 | (1) |
|
Chapter 10 Essential Peripherals |
|
|
369 | (50) |
|
|
369 | (1) |
|
|
369 | (12) |
|
|
369 | (1) |
|
|
370 | (9) |
|
|
379 | (1) |
|
|
380 | (1) |
|
|
381 | (23) |
|
|
382 | (3) |
|
|
385 | (1) |
|
|
385 | (3) |
|
Barcode Scanner/QR Scanner |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
Game Controllers and Joysticks |
|
|
391 | (2) |
|
|
393 | (2) |
|
Multimedia Devices and Formats |
|
|
395 | (9) |
|
Removable Storage Devices |
|
|
404 | (11) |
|
|
404 | (4) |
|
|
408 | (7) |
|
|
415 | (4) |
|
|
415 | (2) |
|
|
417 | (2) |
|
Chapter 11 Installing and Upgrading Operating Systems |
|
|
419 | (38) |
|
|
420 | (1) |
|
Windows Versions and Editions |
|
|
420 | (8) |
|
|
420 | (1) |
|
|
421 | (1) |
|
|
421 | (2) |
|
|
423 | (3) |
|
Windows 10 Pro for Workstations/Windows 10 Enterprise |
|
|
426 | (1) |
|
What Version of Windows Do I Have? |
|
|
427 | (1) |
|
Installing and Upgrading Windows |
|
|
428 | (21) |
|
|
428 | (2) |
|
|
430 | (3) |
|
The OS Installation Process |
|
|
433 | (14) |
|
Troubleshooting Installation Problems |
|
|
447 | (2) |
|
|
449 | (4) |
|
|
449 | (1) |
|
|
449 | (1) |
|
Restoring User Data Files (If Applicable) |
|
|
449 | (1) |
|
Installing Essential Software |
|
|
450 | (1) |
|
Migrating and Retiring Systems |
|
|
450 | (2) |
|
No Installation Is Perfect |
|
|
452 | (1) |
|
|
453 | (4) |
|
|
453 | (2) |
|
|
455 | (2) |
|
Chapter 12 Working with Operating Systems |
|
|
457 | (50) |
|
|
457 | (1) |
|
|
457 | (5) |
|
|
458 | (1) |
|
|
458 | (2) |
|
|
460 | (1) |
|
|
461 | (1) |
|
Command-Line Registry Editing Tools |
|
|
462 | (1) |
|
Your Basic Windows Toolset |
|
|
462 | (13) |
|
|
463 | (1) |
|
|
464 | (3) |
|
|
467 | (8) |
|
Processes, Applications, and Services Tools |
|
|
475 | (18) |
|
|
475 | (7) |
|
|
482 | (2) |
|
Microsoft Management Console |
|
|
484 | (9) |
|
MacOS Preferences and Features |
|
|
493 | (10) |
|
|
494 | (6) |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
502 | (1) |
|
|
503 | (4) |
|
|
503 | (1) |
|
|
504 | (3) |
|
Chapter 13 Users, Groups, and Permissions |
|
|
507 | (44) |
|
|
508 | (1) |
|
Authentication with Users and Groups |
|
|
508 | (12) |
|
|
508 | (2) |
|
|
510 | (1) |
|
Standard Account and Elevated Privileges |
|
|
511 | (1) |
|
Configuring Users and Groups in Windows |
|
|
511 | (5) |
|
|
516 | (4) |
|
Authorization Through NTFS |
|
|
520 | (9) |
|
|
521 | (2) |
|
|
523 | (2) |
|
|
525 | (1) |
|
|
526 | (1) |
|
Permissions in Linux and macOS |
|
|
527 | (2) |
|
Sharing Resources Securely |
|
|
529 | (8) |
|
Sharing Folders and Files |
|
|
530 | (3) |
|
|
533 | (1) |
|
Protecting Data with Encryption |
|
|
534 | (3) |
|
|
537 | (10) |
|
|
537 | (2) |
|
|
539 | (3) |
|
|
542 | (2) |
|
|
544 | (3) |
|
|
547 | (4) |
|
|
547 | (2) |
|
|
549 | (2) |
|
Chapter 14 Maintaining and Optimizing Operating Systems |
|
|
551 | (44) |
|
|
552 | (1) |
|
Maintaining Operating Systems |
|
|
552 | (7) |
|
|
552 | (2) |
|
|
554 | (2) |
|
Controlling Autostarting Software |
|
|
556 | (3) |
|
Optimizing Operating Systems |
|
|
559 | (16) |
|
Installing and Removing Software |
|
|
559 | (13) |
|
|
572 | (3) |
|
|
575 | (15) |
|
Backup and Recovery Options |
|
|
575 | (3) |
|
|
578 | (1) |
|
|
579 | (1) |
|
|
580 | (7) |
|
System Restore in Windows |
|
|
587 | (3) |
|
|
590 | (1) |
|
|
590 | (1) |
|
|
591 | (4) |
|
|
591 | (2) |
|
|
593 | (2) |
|
Chapter 15 Working with the Command-Line Interface |
|
|
595 | (56) |
|
|
596 | (1) |
|
Deciphering the Command-Line Interface |
|
|
596 | (9) |
|
|
597 | (1) |
|
Accessing the Command-Line Interface in Windows |
|
|
598 | (2) |
|
Accessing the Command-Line Interface in macOS and Linux |
|
|
600 | (2) |
|
|
602 | (1) |
|
|
603 | (1) |
|
|
603 | (2) |
|
Mastering Fundamental Commands |
|
|
605 | (12) |
|
Structure: Syntax and Switches |
|
|
605 | (5) |
|
Changing Directory Focus: The cd Command |
|
|
610 | (2) |
|
|
612 | (1) |
|
Making Directories: The md/mkdir Command |
|
|
613 | (1) |
|
Removing Directories: The rd/rmdir Command |
|
|
614 | (1) |
|
Running a Program in Windows |
|
|
615 | (1) |
|
Running a Program in macOS and Linux |
|
|
616 | (1) |
|
|
617 | (7) |
|
|
618 | (1) |
|
Using Wildcards to Locate Files |
|
|
619 | (1) |
|
|
620 | (1) |
|
|
621 | (1) |
|
Pruning and Grafting Folder Trees |
|
|
622 | (2) |
|
Assorted Windows Commands |
|
|
624 | (5) |
|
|
624 | (1) |
|
|
624 | (2) |
|
|
626 | (1) |
|
|
626 | (1) |
|
|
626 | (1) |
|
|
627 | (1) |
|
|
627 | (1) |
|
|
628 | (1) |
|
|
628 | (1) |
|
Assorted macOS and Linux Commands |
|
|
629 | (9) |
|
See Running Processes: top and ps |
|
|
629 | (3) |
|
|
632 | (1) |
|
|
632 | (1) |
|
Package Managers: Apt-Get and yum |
|
|
633 | (2) |
|
|
635 | (2) |
|
|
637 | (1) |
|
|
637 | (1) |
|
|
638 | (1) |
|
|
638 | (5) |
|
Script Types and Languages |
|
|
639 | (1) |
|
Ask Not What You Can Do for Scripting |
|
|
640 | (2) |
|
|
642 | (1) |
|
|
643 | (5) |
|
|
643 | (3) |
|
|
646 | (2) |
|
|
648 | (3) |
|
|
648 | (1) |
|
|
649 | (2) |
|
Chapter 16 Troubleshooting Operating Systems |
|
|
651 | (36) |
|
|
651 | (1) |
|
Common Windows Troubleshooting Procedures |
|
|
651 | (14) |
|
Turning Things Off and Back On |
|
|
652 | (1) |
|
|
653 | (1) |
|
Uninstall/Reinstall/Update Applications |
|
|
653 | (1) |
|
|
654 | (1) |
|
Recovering When Windows Breaks |
|
|
654 | (9) |
|
|
663 | (2) |
|
Troubleshooting Common Windows OS Symptoms |
|
|
665 | (11) |
|
|
666 | (1) |
|
|
667 | (1) |
|
|
668 | (1) |
|
|
668 | (3) |
|
|
671 | (1) |
|
|
672 | (1) |
|
|
672 | (1) |
|
USB Controller Resource Warnings |
|
|
672 | (1) |
|
|
673 | (1) |
|
|
674 | (1) |
|
|
675 | (1) |
|
|
675 | (1) |
|
|
676 | (1) |
|
Troubleshooting Problems Related to Motherboard, CPU, RAM, and Power |
|
|
676 | (7) |
|
|
677 | (1) |
|
Proprietary Crash Screens |
|
|
677 | (1) |
|
|
677 | (1) |
|
|
678 | (1) |
|
|
679 | (1) |
|
|
679 | (1) |
|
|
680 | (1) |
|
|
681 | (1) |
|
|
681 | (1) |
|
|
682 | (1) |
|
|
682 | (1) |
|
Inaccurate System Date/Time |
|
|
682 | (1) |
|
|
683 | (4) |
|
|
683 | (2) |
|
|
685 | (2) |
|
Chapter 17 Display Technologies |
|
|
687 | (48) |
|
|
688 | (1) |
|
|
688 | (12) |
|
|
688 | (3) |
|
|
691 | (3) |
|
|
694 | (6) |
|
|
700 | (5) |
|
|
700 | (1) |
|
|
701 | (2) |
|
|
703 | (1) |
|
|
703 | (1) |
|
Connector Types and Associated Cables |
|
|
704 | (1) |
|
Installing and Configuring Video |
|
|
705 | (2) |
|
|
706 | (1) |
|
|
707 | (10) |
|
|
716 | (1) |
|
|
717 | (1) |
|
|
717 | (7) |
|
|
718 | (4) |
|
Troubleshooting Projectors |
|
|
722 | (1) |
|
Troubleshooting Video Cards and Drivers |
|
|
723 | (1) |
|
|
724 | (1) |
|
|
724 | (6) |
|
|
724 | (2) |
|
|
726 | (1) |
|
|
726 | (1) |
|
|
726 | (1) |
|
|
727 | (1) |
|
|
727 | (1) |
|
|
728 | (1) |
|
|
728 | (1) |
|
|
729 | (1) |
|
|
729 | (1) |
|
|
730 | (1) |
|
Additional Display Topics |
|
|
730 | (1) |
|
|
731 | (1) |
|
|
731 | (1) |
|
|
731 | (4) |
|
|
731 | (2) |
|
|
733 | (2) |
|
Chapter 18 Essentials of Networking |
|
|
735 | (34) |
|
|
735 | (1) |
|
Roles Hosts Play in Networks |
|
|
735 | (4) |
|
|
739 | (12) |
|
|
740 | (3) |
|
|
743 | (3) |
|
Ethernet with Twisted Pair |
|
|
746 | (2) |
|
Ethernet with Alternative Connections |
|
|
748 | (3) |
|
|
751 | (15) |
|
|
751 | (1) |
|
|
752 | (13) |
|
|
765 | (1) |
|
|
766 | (3) |
|
|
766 | (1) |
|
|
767 | (2) |
|
Chapter 19 Local Area Networking |
|
|
769 | (60) |
|
|
769 | (1) |
|
|
769 | (22) |
|
Network Addressing with IPv4 |
|
|
772 | (2) |
|
Network Addressing with IPv6 |
|
|
774 | (5) |
|
|
779 | (3) |
|
Entering Client IP Information |
|
|
782 | (1) |
|
|
783 | (1) |
|
|
784 | (1) |
|
|
784 | (5) |
|
|
789 | (1) |
|
Automatic Private IP Addressing |
|
|
790 | (1) |
|
Installing and Configuring a Wired Network |
|
|
791 | (6) |
|
|
791 | (4) |
|
Configuring IP Addressing |
|
|
795 | (1) |
|
|
795 | (2) |
|
Network Organization and Access Control |
|
|
797 | (20) |
|
|
797 | (1) |
|
Organizing with Workgroups |
|
|
798 | (8) |
|
|
806 | (9) |
|
File Servers and Drive Mapping |
|
|
815 | (1) |
|
|
816 | (1) |
|
|
817 | (8) |
|
Repairing Physical Cabling |
|
|
817 | (5) |
|
|
822 | (3) |
|
|
825 | (4) |
|
|
825 | (2) |
|
|
827 | (2) |
|
Chapter 20 Wireless Networking |
|
|
829 | (38) |
|
|
829 | (1) |
|
Wireless Networking Components |
|
|
829 | (2) |
|
|
831 | (4) |
|
Wireless Networking Software |
|
|
832 | (1) |
|
|
833 | (2) |
|
|
835 | (3) |
|
Wireless Networking Security |
|
|
835 | (3) |
|
|
838 | (1) |
|
Wireless Networking Standards and Regulations |
|
|
838 | (10) |
|
IEEE 802.11-Based Wireless Networking |
|
|
838 | (5) |
|
Optimizing Wi-Fi Coverage |
|
|
843 | (3) |
|
|
846 | (2) |
|
|
848 | (1) |
|
Installing and Configuring Wireless Networking |
|
|
848 | (10) |
|
|
848 | (8) |
|
Bluetooth Configuration and Troubleshooting |
|
|
856 | (2) |
|
|
858 | (5) |
|
|
859 | (1) |
|
|
860 | (1) |
|
Connectivity Troubleshooting |
|
|
860 | (2) |
|
Configuration Troubleshooting |
|
|
862 | (1) |
|
|
863 | (4) |
|
|
863 | (1) |
|
|
864 | (3) |
|
|
867 | (60) |
|
|
867 | (1) |
|
|
867 | (5) |
|
TCP/IP: The Common Language of the Internet |
|
|
870 | (1) |
|
Internet Service Providers |
|
|
870 | (1) |
|
|
870 | (2) |
|
|
872 | (1) |
|
Connecting to the Internet |
|
|
872 | (13) |
|
|
872 | (1) |
|
|
873 | (1) |
|
|
874 | (1) |
|
|
875 | (1) |
|
|
876 | (1) |
|
|
876 | (3) |
|
|
879 | (1) |
|
Connection to the Internet |
|
|
879 | (6) |
|
|
885 | (4) |
|
Internet Application Protocols |
|
|
886 | (3) |
|
|
889 | (25) |
|
|
889 | (10) |
|
Communicating with Others |
|
|
899 | (5) |
|
|
904 | (8) |
|
Sharing and Transferring Files |
|
|
912 | (2) |
|
|
914 | (2) |
|
|
914 | (2) |
|
|
916 | (8) |
|
|
917 | (2) |
|
|
919 | (1) |
|
|
919 | (1) |
|
|
919 | (3) |
|
|
922 | (1) |
|
|
923 | (1) |
|
|
924 | (3) |
|
|
924 | (2) |
|
|
926 | (1) |
|
Chapter 22 Virtualization |
|
|
927 | (32) |
|
|
927 | (1) |
|
|
927 | (18) |
|
Client-side Virtualization |
|
|
929 | (1) |
|
Benefits of Virtualization |
|
|
930 | (3) |
|
Purpose of Virtual Machines |
|
|
933 | (2) |
|
Creating a Virtual Machine |
|
|
935 | (10) |
|
Server-side Virtualization |
|
|
945 | (1) |
|
|
945 | (10) |
|
|
947 | (5) |
|
|
952 | (1) |
|
|
953 | (2) |
|
|
955 | (1) |
|
|
955 | (4) |
|
|
955 | (2) |
|
|
957 | (2) |
|
Chapter 23 Portable Computing |
|
|
959 | (46) |
|
|
959 | (1) |
|
Portable Computing Devices |
|
|
959 | (3) |
|
|
960 | (2) |
|
|
962 | (5) |
|
|
962 | (3) |
|
|
965 | (2) |
|
Extending Portable Computers |
|
|
967 | (7) |
|
|
967 | (2) |
|
|
969 | (3) |
|
Portable-Specific Expansion Slots |
|
|
972 | (1) |
|
|
972 | (1) |
|
|
972 | (2) |
|
Managing and Maintaining Portable Computers |
|
|
974 | (11) |
|
|
975 | (1) |
|
|
976 | (5) |
|
|
981 | (1) |
|
|
981 | (1) |
|
|
982 | (3) |
|
Upgrading and Repairing Laptop Computers |
|
|
985 | (10) |
|
|
985 | (3) |
|
|
988 | (3) |
|
Hardware/Device Replacement |
|
|
991 | (4) |
|
Troubleshooting Portable Computers |
|
|
995 | (6) |
|
|
995 | (2) |
|
|
997 | (4) |
|
|
1001 | (4) |
|
|
1001 | (2) |
|
|
1003 | (2) |
|
Chapter 24 Mobile Devices |
|
|
1005 | (50) |
|
|
1006 | (1) |
|
|
1006 | (8) |
|
|
1006 | (3) |
|
|
1009 | (5) |
|
|
1014 | (1) |
|
|
1014 | (11) |
|
|
1014 | (2) |
|
|
1016 | (2) |
|
|
1018 | (1) |
|
|
1019 | (6) |
|
|
1025 | (1) |
|
Configuring a Mobile Device |
|
|
1025 | (27) |
|
|
1025 | (4) |
|
Installing and Configuring Apps |
|
|
1029 | (4) |
|
|
1033 | (5) |
|
|
1038 | (1) |
|
|
1038 | (3) |
|
|
1041 | (4) |
|
Mobile Device Communication and Ports |
|
|
1045 | (7) |
|
|
1052 | (3) |
|
|
1052 | (2) |
|
|
1054 | (1) |
|
Chapter 25 Maintaining and Securing Mobile Devices |
|
|
1055 | (46) |
|
|
1055 | (1) |
|
Troubleshooting Mobile Device Issues |
|
|
1055 | (19) |
|
|
1056 | (3) |
|
Touchscreen and Display Issues |
|
|
1059 | (4) |
|
|
1063 | (1) |
|
|
1063 | (1) |
|
|
1064 | (1) |
|
|
1064 | (1) |
|
|
1065 | (4) |
|
|
1069 | (1) |
|
Random Reboots and Freezes |
|
|
1069 | (1) |
|
Cannot Broadcast to an External Monitor |
|
|
1070 | (1) |
|
|
1070 | (1) |
|
Connectivity and Data Usage Issues |
|
|
1071 | (1) |
|
GPS and Location Services Problems |
|
|
1072 | (2) |
|
|
1074 | (1) |
|
|
1074 | (12) |
|
BYOD Versus Corporate-Owned Devices |
|
|
1075 | (1) |
|
Profile Security Requirements |
|
|
1076 | (1) |
|
Preventing Physical Damage |
|
|
1076 | (1) |
|
|
1077 | (2) |
|
|
1079 | (1) |
|
|
1080 | (1) |
|
|
1081 | (5) |
|
Mobile OS and Application Security Issues |
|
|
1086 | (11) |
|
|
1086 | (4) |
|
Risks, Symptoms, and Clues |
|
|
1090 | (7) |
|
|
1097 | (4) |
|
|
1097 | (1) |
|
|
1098 | (3) |
|
Chapter 26 Printers and Multifunction Devices |
|
|
1101 | (60) |
|
|
1102 | (1) |
|
Printer and Multifunction Device Consumables |
|
|
1102 | (22) |
|
|
1102 | (15) |
|
|
1117 | (5) |
|
|
1122 | (1) |
|
Automatic Document Feeders |
|
|
1122 | (1) |
|
|
1123 | (1) |
|
|
1124 | (1) |
|
The Laser Printing Process |
|
|
1124 | (6) |
|
|
1125 | (1) |
|
|
1126 | (1) |
|
|
1127 | (1) |
|
|
1127 | (1) |
|
|
1128 | (1) |
|
|
1128 | (1) |
|
|
1129 | (1) |
|
Installing a Multifunction Device |
|
|
1130 | (7) |
|
Setting Up Printers in Windows |
|
|
1130 | (7) |
|
|
1137 | (4) |
|
Configuring Print Settings |
|
|
1137 | (2) |
|
Optimizing Print Performance |
|
|
1139 | (1) |
|
Managing Public/Shared/Networked Devices |
|
|
1140 | (1) |
|
|
1141 | (1) |
|
Maintaining and Troubleshooting Printers |
|
|
1141 | (17) |
|
Maintaining and Troubleshooting General Issues |
|
|
1141 | (7) |
|
Maintaining and Troubleshooting Impact Printers |
|
|
1148 | (1) |
|
Maintaining and Troubleshooting Thermal Printers |
|
|
1149 | (1) |
|
Maintaining and Troubleshooting Inkjet Printers |
|
|
1150 | (2) |
|
Maintaining and Troubleshooting Laser Printers |
|
|
1152 | (5) |
|
Troubleshooting 3-D Printers |
|
|
1157 | (1) |
|
|
1158 | (3) |
|
|
1158 | (1) |
|
|
1159 | (2) |
|
Chapter 27 Securing Computers |
|
|
1161 | (58) |
|
|
1161 | (1) |
|
Analyzing Threats and Vulnerabilities |
|
|
1161 | (10) |
|
|
1162 | (8) |
|
|
1170 | (1) |
|
Security Concepts and Technologies |
|
|
1171 | (14) |
|
|
1172 | (4) |
|
|
1176 | (9) |
|
|
1185 | (15) |
|
|
1185 | (4) |
|
Malware Signs and Symptoms |
|
|
1189 | (2) |
|
Malware Prevention and Recovery |
|
|
1191 | (9) |
|
|
1200 | (11) |
|
|
1200 | (10) |
|
|
1210 | (1) |
|
|
1211 | (5) |
|
Authentication and Encryption |
|
|
1211 | (4) |
|
|
1215 | (1) |
|
|
1216 | (3) |
|
|
1216 | (2) |
|
|
1218 | (1) |
|
Chapter 28 Operational Procedures |
|
|
1219 | (26) |
|
|
1219 | (1) |
|
Implementing Best Practices Associated with Documentation and Support Systems Information Management |
|
|
1219 | (9) |
|
|
1220 | (3) |
|
Documentation for Policies, Procedures, Industry Standards, and Compliance |
|
|
1223 | (4) |
|
|
1227 | (1) |
|
|
1228 | (1) |
|
Change-Management Best Practices |
|
|
1228 | (5) |
|
Documented Business Processes |
|
|
1229 | (1) |
|
Change-Management Process |
|
|
1230 | (3) |
|
Environmental Impacts and Local Environmental Controls |
|
|
1233 | (3) |
|
Temperature, Humidity, and Ventilation |
|
|
1233 | (2) |
|
|
1235 | (1) |
|
Prohibited Content/Activity and Privacy, Licensing, and Policies |
|
|
1236 | (5) |
|
|
1236 | (1) |
|
|
1237 | (1) |
|
|
1238 | (1) |
|
Licensing, End-User License Agreement, and Digital Rights Management |
|
|
1238 | (2) |
|
|
1240 | (1) |
|
|
1241 | (1) |
|
|
1242 | (3) |
|
|
1242 | (2) |
|
|
1244 | (1) |
|
Appendix A Mapping to the CompTIAA+ Objectives |
|
|
1245 | (34) |
|
|
1245 | (14) |
|
|
1259 | (20) |
|
Appendix B About the Online Content |
|
|
1279 | (4) |
|
|
1279 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
1279 | (1) |
|
|
1279 | (1) |
|
Single User License Terms and Conditions |
|
|
1280 | (1) |
|
|
1281 | (1) |
|
|
1281 | (1) |
|
Playing the CompTIA A+ Introduction Video |
|
|
1282 | (1) |
|
Mike's CompTIA A+ Video Training Sample |
|
|
1282 | (1) |
|
TotalSims Sample for CompTIA A+ |
|
|
1282 | (1) |
|
|
1282 | (1) |
|
|
1282 | (1) |
Glossary |
|
1283 | (74) |
Index |
|
1357 | |