Introduction |
|
xxi | |
Assessment Test |
|
xxxi | |
|
Chapter 1 Core Hardware Components |
|
|
1 | (62) |
|
Introducing Internal Components |
|
|
3 | (1) |
|
Exploring Motherboards, Processors, and Memory |
|
|
4 | (29) |
|
|
4 | (18) |
|
|
22 | (5) |
|
|
27 | (6) |
|
Exploring Storage and Expansion Devices |
|
|
33 | (15) |
|
|
33 | (9) |
|
|
42 | (1) |
|
|
43 | (2) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
Exploring Power and Cooling |
|
|
48 | (7) |
|
|
48 | (4) |
|
|
52 | (3) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (3) |
|
|
59 | (4) |
|
Chapter 2 Peripherals and Connectors |
|
|
63 | (58) |
|
Understanding Common Peripherals, Interfaces, and Connectors |
|
|
65 | (49) |
|
|
66 | (14) |
|
External Storage and Communications Connectors |
|
|
80 | (12) |
|
|
92 | (17) |
|
Understanding Installation Basics |
|
|
109 | (4) |
|
Reviewing Connector Types |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
117 | (4) |
|
Chapter 3 Computing Devices and the Internet of Things |
|
|
121 | (52) |
|
Exploring Common Computing Devices |
|
|
123 | (35) |
|
|
123 | (2) |
|
|
125 | (7) |
|
|
132 | (23) |
|
|
155 | (3) |
|
Understanding the Internet of Things |
|
|
158 | (9) |
|
A Brief History of the Internet of Things |
|
|
158 | (1) |
|
|
159 | (3) |
|
|
162 | (3) |
|
|
165 | (2) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (4) |
|
Chapter 4 Operating Systems |
|
|
173 | (78) |
|
Operating System Fundamentals |
|
|
175 | (32) |
|
A Brief History of Operating Systems |
|
|
176 | (4) |
|
Basic Functions of Operating Systems |
|
|
180 | (5) |
|
Types of Operating Systems |
|
|
185 | (22) |
|
Managing an Operating System |
|
|
207 | (34) |
|
Managing Features and Interfaces |
|
|
208 | (21) |
|
Managing Folder and File Structures |
|
|
229 | (12) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
242 | (5) |
|
|
247 | (4) |
|
Chapter 5 Software Applications |
|
|
251 | (74) |
|
Understanding Application Architecture and Installation |
|
|
254 | (22) |
|
Application Design Concepts |
|
|
255 | (5) |
|
Software Management Best Practices |
|
|
260 | (16) |
|
Exploring Common Application Types |
|
|
276 | (42) |
|
|
277 | (3) |
|
|
280 | (5) |
|
|
285 | (4) |
|
|
289 | (4) |
|
|
293 | (11) |
|
|
304 | (14) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
321 | (4) |
|
Chapter 6 Software Development |
|
|
325 | (30) |
|
Exploring Programming Languages |
|
|
327 | (13) |
|
|
328 | (5) |
|
|
333 | (2) |
|
|
335 | (4) |
|
|
339 | (1) |
|
Understanding Programming Concepts and Techniques |
|
|
340 | (7) |
|
|
341 | (2) |
|
|
343 | (4) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
350 | (5) |
|
Chapter 7 Database Fundamentals |
|
|
355 | (34) |
|
|
357 | (23) |
|
Exploring Database Concepts and Structures |
|
|
358 | (9) |
|
|
367 | (13) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
381 | (3) |
|
|
384 | (5) |
|
Chapter 8 Networking Concepts and Technologies |
|
|
389 | (62) |
|
Exploring Connection Types and Features |
|
|
391 | (20) |
|
Choosing External Network Connections |
|
|
392 | (11) |
|
Choosing Internal Network Connections |
|
|
403 | (8) |
|
Understanding Network Connectivity Essentials |
|
|
411 | (17) |
|
Common Networking Devices |
|
|
411 | (4) |
|
Networking Protocol Basics |
|
|
415 | (1) |
|
|
416 | (8) |
|
|
424 | (4) |
|
Setting Up a Wireless Network |
|
|
428 | (17) |
|
|
428 | (10) |
|
|
438 | (2) |
|
Additional Wireless Router Services |
|
|
440 | (5) |
|
|
445 | (1) |
|
|
445 | (1) |
|
|
446 | (1) |
|
Part 1 Setting Up Your Wireless Router |
|
|
446 | (1) |
|
Part 2 Testing Your Neighbors |
|
|
446 | (1) |
|
|
447 | (4) |
|
Chapter 9 Security Concepts and Threats |
|
|
451 | (38) |
|
Understanding Hackers and Motives |
|
|
454 | (3) |
|
Understanding Security Threats |
|
|
457 | (19) |
|
|
458 | (5) |
|
|
463 | (2) |
|
|
465 | (3) |
|
Software-Based Security Threats |
|
|
468 | (8) |
|
Understanding Access Control |
|
|
476 | (6) |
|
|
476 | (3) |
|
|
479 | (1) |
|
|
480 | (2) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
483 | (1) |
|
|
484 | (1) |
|
|
485 | (4) |
|
Chapter 10 Security Best Practices |
|
|
489 | (46) |
|
Understanding Security Best Practices |
|
|
491 | (36) |
|
|
491 | (24) |
|
|
515 | (5) |
|
|
520 | (7) |
|
|
527 | (1) |
|
|
528 | (1) |
|
|
529 | (1) |
|
|
530 | (5) |
|
Chapter 11 Business Continuity and Computer Support |
|
|
535 | (54) |
|
Understanding Business Continuity |
|
|
537 | (15) |
|
|
537 | (14) |
|
|
551 | (1) |
|
Exploring Computer Support Concepts |
|
|
552 | (29) |
|
Understanding Troubleshooting Theory |
|
|
552 | (11) |
|
|
563 | (18) |
|
|
581 | (1) |
|
|
582 | (1) |
|
|
583 | (1) |
|
|
584 | (5) |
|
Appendix A Answers to Written Labs |
|
|
589 | (8) |
|
Chapter 1 Core Hardware Components |
|
|
590 | (1) |
|
Chapter 2 Peripherals and Connectors |
|
|
590 | (1) |
|
Chapter 3 Computing Devices and the Internet of Things |
|
|
591 | (1) |
|
Chapter 4 Operating Systems |
|
|
592 | (1) |
|
Chapter 5 Software Applications |
|
|
592 | (1) |
|
Chapter 6 Software Development |
|
|
592 | (1) |
|
Chapter 7 Database Fundamentals |
|
|
593 | (1) |
|
Chapter 8 Networking Concepts and Technologies |
|
|
593 | (1) |
|
Chapter 9 Security Concepts and Threats |
|
|
594 | (1) |
|
Chapter 10 Security Best Practices |
|
|
594 | (1) |
|
Chapter 11 Business Continuity and Computer Support |
|
|
594 | (3) |
|
Appendix B Answers to Review Questions |
|
|
597 | (16) |
|
Chapter 1 Core Hardware Components |
|
|
598 | (1) |
|
Chapter 2 Peripherals and Connectors |
|
|
599 | (1) |
|
Chapter 3 Computing Devices and the Internet of Things |
|
|
600 | (1) |
|
Chapter 4 Operating Systems |
|
|
601 | (1) |
|
Chapter 5 Software Applications |
|
|
602 | (2) |
|
Chapter 6 Software Development |
|
|
604 | (1) |
|
Chapter 7 Database Fundamentals |
|
|
605 | (1) |
|
Chapter 8 Networking Concepts and Technologies |
|
|
606 | (1) |
|
Chapter 9 Security Concepts and Threats |
|
|
607 | (2) |
|
Chapter 10 Security Best Practices |
|
|
609 | (1) |
|
Chapter 11 Business Continuity and Computer Support |
|
|
610 | (3) |
Index |
|
613 | |