Atjaunināt sīkdatņu piekrišanu

IT Essentials Companion Guide v6 6th edition [Hardback]

  • Formāts: Hardback, 928 pages, height x width x depth: 240x210x40 mm, weight: 1680 g
  • Sērija : Companion Guide
  • Izdošanas datums: 13-Feb-2017
  • Izdevniecība: Cisco Press
  • ISBN-10: 1587133555
  • ISBN-13: 9781587133558
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 67,71 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 928 pages, height x width x depth: 240x210x40 mm, weight: 1680 g
  • Sērija : Companion Guide
  • Izdošanas datums: 13-Feb-2017
  • Izdevniecība: Cisco Press
  • ISBN-10: 1587133555
  • ISBN-13: 9781587133558
Citas grāmatas par šo tēmu:

IT Essentials v6 Companion Guide supports the Cisco Networking Academy IT Essentials version 6 course. The course is designed for Cisco Networking Academy students who want to pursue careers in IT and learn how computers work, how to assemble computers, and how to safely and securely troubleshoot hardware and software issues.


As CompTIA Approved Quality Content, the course also helps you prepare for the CompTIA A+ certification exams 220-901 and 220-902. Students must pass both exams to earn the CompTIA A+ certification.


The features of the Companion Guide are designed to help you study and succeed in this course:


  • Chapter objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter.
  • Key terms–Refer to the updated lists of networking vocabulary introduced, and turn to the highlighted terms in context.
  • Course section numbering–Follow along with the course heading numbers to easily jump online to complete labs, activities, and quizzes referred to within the text.
  • Check Your Understanding Questions and Answer Key–Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see on the online course quizzes.


This icon in the Companion Guide indicates when there is a hands-on Lab to do. All the Labs from the course are compiled and published in the separate book, IT Essentials v6 Lab Manual. Practicing and performing all these tasks will reinforce the concepts and help you become a successful PC technician.


Introduction xxix
Chapter 1 Introduction to the Personal Computer System 1(72)
Objectives
1(1)
Key Terms
1(3)
Introduction
4(1)
Welcome
4(1)
Introduction to the Personal Computer
4(1)
Personal Computer Systems
4(45)
Cases and Power Supplies
5(7)
Cases
5(2)
Power Supplies
7(3)
Power Supply Wattage
10(2)
Internal PC Components
12(21)
Motherboards
12(2)
CPU Architectures
14(1)
Enhancing CPU Operation
15(2)
Cooling Systems
17(3)
ROM
20(1)
RAM
21(1)
Memory Modules
22(1)
Adapter Cards and Expansion Slots
23(3)
Storage Devices
26(2)
Storage Device Interfaces and RAID
28(5)
External Ports and Cables
33(8)
Video Ports and Cables
33(3)
Other Ports and Cables
36(4)
Adapters and Converters
40(1)
Input and Output Devices
41(8)
Input Devices
41(4)
Output Devices
45(2)
Monitor Characteristics
47(2)
Select Computer Components
49(13)
Select PC Components
49(13)
Building a Computer
49(1)
Select the Motherboard
50(1)
Select the Case and Fans
51(2)
Select the Power Supply
53(1)
Select the CPU and CPU Cooling System
53(2)
Select RAM
55(1)
Select Adapter Cards
56(1)
Select Hard Drives
57(2)
Select a Media Reader
59(2)
Select Optical Drives
61(1)
Select External Storage
61(1)
Select Input and Output Devices
62(1)
Configurations for Specialized Computer Systems
62(7)
Specialized Computer Systems
63(6)
Thick and Thin Clients
63(1)
CAx Workstations
64(1)
Audio and Video Editing Workstations
64(1)
Virtualization Workstations
65(1)
Gaming PCs
66(1)
Home Theater PCs
67(2)
Summary
69(1)
Summary
69(1)
Summary of Exercises
69(1)
Labs
70(1)
Check your Understanding
70(3)
Chapter 2 Introduction to Lab Procedures and Tool Use 73(30)
Objectives
73(1)
Key Terms
73(1)
Introduction
74(1)
Welcome
74(1)
Introduction to Lab Procedures and Tool Use
74(1)
Safe Lab Procedures
74(8)
Procedures to Protect People
74(2)
General Safety
74(1)
Electrical Safety
75(1)
Fire Safety
75(1)
Procedures to Protect Equipment and Data
76(3)
ESD and EMI
76(2)
Power Fluctuation Types
78(1)
Power Protection Devices
78(1)
Procedures to Protect the Environment
79(3)
Safety Data Sheet
79(1)
Equipment Disposal
80(2)
Proper Use of Tools
82(16)
Hardware Tools
82(6)
General Tool Use
82(1)
ESD Tools
83(1)
Hand Tools
84(1)
Cable Tools
85(1)
Cleaning Tools
85(1)
Diagnostic Tools
85(3)
Software Tools
88(1)
Disk Management Tools
88(1)
Protection Software Tools
88(1)
Organizational Tools
89(2)
Reference Tools
89(1)
Miscellaneous Tools
90(1)
Demonstrate Proper Tool Use
91(7)
Antistatic Wrist Strap
91(1)
Antistatic Mat
92(1)
Hand Tools
93(1)
Cleaning Materials
94(3)
Video-Computer Disassembly
97(1)
Summary
98(1)
Summary
98(1)
Summary of Exercises
98(1)
Lab
98(1)
Check Your Understanding
99(4)
Chapter 3 Computer Assembly 103(54)
Objectives
103(1)
Key Terms
103(1)
Introduction
104(1)
Welcome
104(1)
Computer Assembly
104(1)
Assemble the Computer
104(28)
Open the Case and Connect the Power Supply
104(3)
Open the Case
104(1)
Install the Power Supply
105(2)
Install the Motherboard
107(8)
Install the CPU and the Heat Sink and Fan Assembly
107(5)
Install RAM
112(2)
Install Motherboard
114(1)
Install Drives
115(2)
Install the Hard Drive
115(1)
Install the Optical Drive
116(1)
Install the Adapter Cards
117(3)
Types of Adapter Cards
117(1)
Install a Wireless NIC
118(2)
Install a Video Adapter Card
120(1)
Install Cables
120(12)
Connect Power to the Motherboard
121(2)
Connect Power to the Internal Drive and Case Fans
123(2)
Connect the Internal Data Cables
125(1)
Install the Front Panel Cables
126(4)
Reassemble the Case Assembly
130(1)
Install the External Cables
130(2)
Boot the Computer
132(12)
POST, BIOS, UEFI
132(5)
BIOS Beep Codes and Setup
132(1)
BIOS and CMOS
133(3)
BIOS Setup Program
136(1)
UEFI Setup Program
137(1)
BIOS and UEFI Configuration
137(7)
BIOS Component Information
137(1)
BIOS Configurations
137(2)
BIOS Security Configurations
139(1)
BIOS Hardware Diagnostics and Monitoring
140(1)
UEFI EZ Mode
141(2)
UEFI Advanced Mode
143(1)
Upgrade and Configure a Computer
144(7)
Motherboard and Related Components
144(4)
Motherboard Component Upgrades
144(1)
Upgrade the Motherboard
145(1)
Upgrade the BIOS
146(1)
Upgrade CPU and Heat Sink and Fan Assembly
147(1)
Upgrade the Ram
147(1)
Storage Devices
148(1)
Upgrade Hard Drives
148(1)
Peripheral Devices
149(2)
Upgrade Input and Output Devices
149(2)
Summary
151(1)
Summary
151(1)
Summary of Exercises
152(1)
Labs
152(1)
Check Your Understanding
152(5)
Chapter 4 Overview of Preventive Maintenance 157(28)
Objectives
157(1)
Key Terms
157(1)
Introduction
158(1)
Welcome
158(1)
Overview of Preventive Maintenance
158(1)
Preventive Maintenance
158(5)
PC Preventive Maintenance Overview
158(5)
Benefits of Preventive Maintenance
159(1)
Preventive Maintenance Tasks
159(1)
Clean the Case and Internal Components
160(1)
Inspect Internal Components
161(1)
Environmental Concerns
162(1)
Troubleshooting Process
163(17)
Troubleshooting Process Steps
163(9)
Introduction to Troubleshooting
163(1)
Identify the Problem
164(4)
Establish a Theory of Probable Cause
168(1)
Test the Theory to Determine Cause
169(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution
170(1)
Verify Full System Functionality and, If Applicable, Implement Preventive Measures
171(1)
Document Findings, Actions, and Outcomes
172(1)
Common Problems and Solutions
172(8)
PC Common Problems and Solutions
172(8)
Summary
180(1)
Summary
180(1)
Summary of Exercises
180(1)
Check your Understanding
180(5)
Chapter 5 Windows Installation 185(60)
Objectives
185(1)
Key Terms
185(3)
Introduction
188(1)
Welcome
188(1)
Windows Installation
188(1)
Modern Operating Systems
188(11)
Operating System Terms and Characteristics
188(5)
Terms
188(2)
Basic Functions of an Operating System
190(2)
Processor Architecture
192(1)
Types of Operating Systems
193(1)
Desktop Operating Systems
193(1)
Network Operating Systems
194(1)
Customer Requirements for an Operating System
194(2)
OS Compatible Applications and Environments
194(1)
Minimum Hardware Requirements and Compatibility with OS Platform
195(1)
Operating Systems Upgrade
196(3)
Checking OS Compatibility
196(1)
Windows OS Upgrades
197(1)
Data Migration
198(1)
Operating System Installation
199(42)
Storage Device Setup Procedures
200(14)
Storage Device Types
200(3)
Hard Drive Partitioning
203(3)
File Systems
206(2)
OS Installation with Default Settings
208(2)
Account Creation
210(2)
Finalize the Installation
212(2)
Custom Installation Options
214(8)
Disk Cloning
214(1)
Other Installation Methods
215(2)
Network Installation
217(2)
Restore, Refresh, and Recover
219(1)
System Recovery Options
220(2)
Boot Sequence and Registry Files
222(4)
Windows Boot Process
222(1)
Startup Modes
223(1)
Windows Registry
224(2)
Multiboot
226(8)
Multiboot Procedures
226(1)
Disk Management Utility
227(3)
Partitions
230(1)
Drive Mapping or Drive Letter Assignment
231(3)
Disk Directories
234(7)
Directory Structures
234(2)
User and System File Locations
236(1)
File Extension and Attributes
237(2)
Application, File and Folder Properties
239(2)
Summary
241(1)
Summary
241(1)
Summary of Exercises
241(1)
Labs
241(1)
Check Your Understanding
242(3)
Chapter 6 Windows Configuration and Management 245(72)
Objectives
245(1)
Key Terms
245(2)
Introduction
247(1)
Welcome
247(1)
Windows Configuration and Management
247(1)
The Windows GUI and Control Panel
247(43)
Windows Desktop, Tools, and Applications
247(13)
Windows Desktop
247(3)
Desktop Properties
250(1)
Start Menu
251(2)
Task Manager
253(3)
Computer and Windows Explorer
256(2)
Windows Libraries
258(1)
Install and Uninstall Applications
258(2)
Control Panel Utilities
260(17)
Introduction to Control Panel Utilities
260(2)
User Accounts
262(2)
Internet Options
264(1)
Display Settings
265(1)
Folder Options
266(1)
Action Center
267(1)
Windows Firewall
268(1)
Power Options
269(1)
System Utility
270(2)
Device Manager, Devices and Printers, and Sound
272(3)
Region, Programs and Features, and Troubleshooting
275(1)
HomeGroup and Network and Sharing Center
276(1)
Administrative Tools
277(7)
Computer Management
277(2)
Event Viewer
279(2)
Services
281(1)
System Configuration
281(1)
Performance Monitor and Windows Memory Diagnostics
282(1)
Programming Tools
283(1)
Disk Defragmenter and Disk Error-Checking Tool
284(2)
Disk Defragmenter and Disk Error-Checking Tool
284(1)
System Information
285(1)
Command Line Tools
286(4)
Windows CLI Commands
286(3)
System Utilities
289(1)
Client-Side Virtualization
290(5)
Purpose and Requirements of Virtualization
290(5)
Purpose of Virtual Machines
290(1)
Hypervisor: Virtual Machine Manager
291(3)
Virtual Machine Requirements
294(1)
Common Preventive Maintenance Techniques for Operating Systems
295(6)
OS Preventive Maintenance Plan
295(6)
Preventive Maintenance Plan Contents
295(1)
Updates
296(1)
Scheduling Tasks
297(1)
Restore Points
298(1)
Hard Drive Backup
299(2)
Basic Troubleshooting Process for Operating Systems
301(10)
Applying the Troubleshooting Process for Operating Systems
302(3)
Identify the Problem
302(1)
Establish a Theory of Probable Cause
302(1)
Test the Theory to Determine Cause
303(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution
304(1)
Verify Full System Functionality and Implement Preventive Measures
304(1)
Document Findings, Actions, and Outcomes
305(1)
Common Problems and Solutions for Operating Systems
305(6)
Common Problems and Solutions
305(6)
Summary
311(1)
Summary
311(1)
Summary of Exercises
311(1)
Labs
311(1)
Check Your Understanding
312(5)
Chapter 7 Networking Concepts 317(66)
Objectives
317(1)
Key Terms
317(3)
Introduction
320(1)
Welcome
320(1)
Networking Concepts
320(1)
Principles of Networking
320(12)
Computer Networks
320(6)
Network Definition
320(1)
Host Devices
321(1)
Intermediary Devices
322(1)
Network Media
323(2)
Bandwidth and Latency
325(1)
Data Transmission
325(1)
Types of Networks
326(6)
LANs
326(1)
WLANs
327(1)
PANS
328(1)
MANS
329(1)
WANs
329(1)
Peer-to-Peer Networks
330(1)
Client-Server Networks
331(1)
Networking Standards
332(13)
Reference Models
333(8)
Open Standards
333(1)
Protocols
334(1)
OSI Reference Model
335(1)
TCP/IP Model
335(3)
Protocol Data Units
338(1)
Encapsulation Example
339(1)
De-Encapsulation Example
340(1)
Comparing the OSI and TCP/IP Models
341(1)
Wired and Wireless Ethernet Standards
341(4)
CSMA/CD
341(1)
Ethernet Cable Standards
342(1)
CSMA/CA
343(1)
Wireless Standards
343(1)
Wireless Security
344(1)
Physical Components of a Network
345(16)
Network Devices
345(6)
Modems
345(1)
Hubs, Bridges, and Switches
345(2)
Wireless Access Points and Routers
347(2)
Hardware Firewalls
349(1)
Other Devices
350(1)
Cables and Connectors
351(10)
Coaxial Cables
351(2)
Twisted-Pair Cables
353(2)
Twisted-Pair Category Ratings
355(1)
Twisted-Pair Wire Schemes
356(2)
Fiber-Optic Cables
358(1)
Types of Fiber Media
359(1)
Fiber-Optic Connectors
359(2)
Basic Networking Concepts and Technologies
361(17)
Networked Equipment Addressing
361(12)
Network Addressing
361(1)
IP Addresses
362(1)
IPv4 Address Format
363(2)
Glassful and Classless IPv4 Addressing
365(1)
Number of IPv6 Addresses
366(1)
IPv6 Address Formats
367(1)
Static Addressing
368(2)
Dynamic Addressing
370(1)
ICMP
371(2)
Transport Layer Protocols
373(5)
Role of the Transport Layer
373(1)
Transport Layer Features
373(1)
Transport Layer Protocol
374(2)
TCP
376(1)
UDP
376(1)
Port Numbers
376(2)
Summary
378(1)
Summary
378(1)
Summary of Exercises
378(1)
Labs
379(1)
Packet Tracer Activities
379(1)
Check Your Understanding
379(4)
Chapter 8 Applied Networking 383(62)
Objectives
383(1)
Key Terms
383(2)
Introduction
385(1)
Welcome
385(1)
Applied Networking
385(1)
Computer to Network Connection
385(33)
Networking Cards
386(7)
Network Installation Completion List
386(1)
Selecting a NIC
387(1)
Installing and Updating a NIC
388(1)
Configuring a NIC
389(1)
Advanced NIC Settings
390(3)
Wireless and Wired Router Configurations
393(13)
Connecting the NIC
393(1)
Connecting the Router to the Internet
394(1)
Setting the Network Location
395(2)
Logging in to the Router
397(1)
Basic Network Setup
398(1)
Basic Wireless Settings
399(3)
Testing Connectivity with the Windows GUI
402(1)
Testing Connectivity with the Windows CLI
403(3)
Network Sharing
406(9)
Domain and Workgroup
406(1)
Connecting to a Workgroup or Domain
407(1)
Windows Homegroup
408(1)
Sharing Resources in Windows Vista
409(1)
Network Shares and Mapping Drives
410(2)
Administrative Shares
412(2)
Network Drive Mapping
414(1)
Remote Connections
415(3)
VPN
415(1)
Remote Desktop and Remote Assistance
416(2)
ISP Connection Technologies
418(6)
Broadband Technologies
418(6)
Brief History of Connection Technologies
419(1)
DSL and ADSL
419(1)
Line of Sight Wireless Internet Service
420(1)
WiMAX
420(1)
Other Broadband Technologies
421(2)
Selecting an ISP for the Customer
423(1)
Internet Technologies
424(8)
Data Centers and Cloud Computing
425(2)
Data Center
425(1)
Cloud Computing versus Data Center
425(1)
Characteristics of Cloud Computing
425(1)
SaaS, IaaS and PaaS
426(1)
Cloud Types
426(1)
Networked Host Services
427(5)
DHCP Services
427(1)
DNS Services
427(1)
Web Services
428(1)
File Services
428(1)
Print Services
429(1)
Email Services
430(1)
Proxy Settings
430(1)
Authentication Services
431(1)
Intrusion Detection and Prevention Services
431(1)
Universal Threat Management
431(1)
Common Preventive Maintenance Techniques Used for Networks
432(1)
Network Maintenance
432(1)
Preventive Maintenance Procedures
433(1)
Basic Troubleshooting Process for Networks
433(6)
Applying the Troubleshooting Process to Networks
433(4)
Identify the Problem
434(1)
Establish a Theory of Probable Cause
434(1)
Test the Theory to Determine Cause
435(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution
435(1)
Verify Full System Functionality and Implement Preventive Measures
436(1)
Document Findings, Actions, and Outcomes
436(1)
Common Problems and Solutions for Networks
437(2)
Identify Common Problems and Solutions
437(2)
Summary
439(1)
Summary
439(1)
Summary of Exercises
439(1)
Labs
439(1)
Packet Tracer Activities
440(1)
Check Your Understanding
440(5)
Chapter 9 Laptops and Mobile Devices 445(72)
Objectives
445(1)
Key Terms
445(3)
Introduction
448(1)
Welcome
448(1)
Laptops and Mobile Devices
448(1)
Laptop Components
448(16)
Features of Laptop Components
449(11)
External Features Unique to Laptops
449(4)
Common Input Devices and LEDs in Laptops
453(1)
Internal Components
454(2)
Special Function Keys
456(1)
Docking Station Versus Port Replicator
457(3)
Laptop Displays
460(4)
LCD, LED, and OLED Displays
461(1)
Backlights and Inverters
461(1)
WiFi Antenna Connectors
462(1)
Webcam and Microphone
463(1)
Laptop Configuration
464(8)
Power Settings Configuration
464(4)
Power Management
464(1)
Managing ACPI Settings in the BIOS
465(1)
Managing Laptop Power Options
465(3)
Wireless Configuration
468(4)
Bluetooth
468(3)
Cellular WAN
471(1)
WiFi
471(1)
Laptop Hardware and Component Installation and Configuration
472(20)
Expansion Slots
472(6)
Expansion Cards
472(2)
Flash Memory
474(1)
Smart Card Reader
475(1)
SODIMM Memory
476(2)
Replacing Hardware Devices
478(14)
Overview of Hardware Replacement
478(2)
Power
480(2)
Keyboard, Touchpad, and Screen
482(3)
Internal Storage Drive and Optical Drive
485(2)
Wireless Card
487(1)
Speakers
488(1)
CPU
488(2)
Motherboard
490(1)
Plastic Frames
491(1)
Mobile Device Hardware Overview
492(8)
Mobile Device Hardware
492(6)
Mobile Device Parts
492(1)
Non-Upgradeable Hardware
492(1)
Touchscreens
493(1)
Solid State Drives
494(1)
Connection Types
495(1)
Accessories
496(2)
Other Mobile Devices
498(2)
Wearable Devices
498(1)
Specialty Devices
499(1)
Common Preventive Maintenance Techniques for Laptops and Mobile Devices
500(2)
Scheduled Maintenance for Laptops and Mobile Devices
500(2)
Scheduling Maintenance
500(2)
Basic Troubleshooting Process for Laptops and Mobile Devices
502(10)
Applying
502(4)
Identify the Problem
503(1)
Establish a Theory of Probable Cause
503(1)
Test the Theory to Determine Cause
504(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution
505(1)
Verify Full System Functionality and Implement Preventive Measures
505(1)
Document Findings, Actions, and Outcomes
506(1)
Common Problems and Solutions for Laptops and Mobile Devices
506(6)
Identify Common Problems and Solutions
506(6)
Summary
512(1)
Summary
512(1)
Summary of Exercises
513(1)
Labs
513(1)
Check Your Understanding
514(3)
Chapter 10 Mobile, Linux, and OS X Operating Systems 517(100)
Objectives
517(1)
Key Terms
517(3)
Introduction
520(1)
Welcome
520(1)
Mobile, Linux, and OS X Operating Systems
520(1)
Mobile Operating Systems
520(25)
Android versus iOS
520(5)
Open Source versus Closed Source
520(1)
Mobile Application Development
521(1)
Application and Content Sources
522(3)
Android Touch Interface
525(5)
Home Screen Items
525(2)
Managing Apps, Widgets, and Folders
527(3)
iOS Touch Interface
530(5)
Home Screen Items
530(3)
Managing Apps and Folders
533(2)
Windows Phone Touch Interface
535(3)
Start Screen Items
535(2)
Managing Apps and Folders
537(1)
Common Mobile Device Features
538(7)
Screen Orientation and Calibration
538(2)
GPS
540(1)
Convenience Features
541(2)
Information Features
543(2)
Methods for Securing Mobile Devices
545(12)
Passcode Locks
545(5)
Overview of Passcode Locks
545(4)
Restrictions on Failed Login Attempts
549(1)
Cloud-Enabled Services for Mobile Devices
550(3)
Remote Backup
551(1)
Locator Applications
551(1)
Remote Lock and Remote Wipe
552(1)
Software Security
553(4)
Antivirus
553(3)
Patching and Updating Operating Systems
556(1)
Network Connectivity and Email
557(20)
Wireless and Cellular Data Network
557(6)
Wireless Data Network
557(2)
Cellular Communications
559(4)
Bluetooth
563(3)
Bluetooth for Mobile Devices
563(1)
Bluetooth Pairing
564(2)
Configuring Email
566(6)
Introduction to Email
566(2)
Android Email Configuration
568(2)
iOS Email Configuration
570(1)
Internet Email
571(1)
Mobile Device Synchronization
572(5)
Types of Data to Synchronize
572(4)
Synchronization Connection Types
576(1)
Linux and OS X Operating Systems
577(22)
Linux and OS X Tools and Features
577(15)
Introduction to Linux and OS X Operating Systems
577(2)
Overview of Linux and OS X GUI
579(3)
Overview of Linux and OS X CLI
582(3)
Overview of Backup and Recovery
585(4)
Overview of Disk Utilities
589(3)
Linux and OS X Best Practices
592(5)
Scheduled Tasks
592(2)
Security
594(3)
Basic CLI
597(2)
File and Folder Commands
597(1)
Administrative Commands
598(1)
Basic Troubleshooting Process for Mobile, Linux, and OS X Operating Systems
599(11)
Applying the Troubleshooting Process to Mobile, Linux, and OS X Operating Systems
600(4)
Identify the Problem
600(1)
Establish a Theory of Probably Cause
601(1)
Test the Theory to Determine Cause
602(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution
602(1)
Verify Full System Functionality and Implement Preventive Measures
603(1)
Document Findings, Actions, and Outcomes
604(1)
Common Problems and Solutions for Mobile, Linux, and OS X Operating Systems
604(6)
Identify Common Problems and Solutions
604(6)
Summary
610(1)
Summary
610(1)
Summary of Exercises
611(1)
Labs
611(1)
Check Your Understanding
611(6)
Chapter 11 Printers 617(46)
Objectives
617(1)
Key Terms
617(2)
Introduction
619(1)
Welcome
619(1)
Printers
619(1)
Common Printer Features
619(12)
Characteristics and Capabilities
619(4)
Characteristics and Capabilities of Printers
620(2)
Printer Connection Types
622(1)
Printer Types
623(8)
Inkjet Printers
623(2)
Laser Printers
625(1)
Laser Printing Process
626(2)
Thermal Printers
628(1)
Impact Printers
629(1)
Virtual Printers
630(1)
Installing and Configuring Printers
631(10)
Installing and Updating a Printer
632(4)
Installing a Printer
632(1)
Types of Print Drivers
632(1)
Updating and Installing Printer Drivers
633(1)
Printer Test Page
634(1)
Test Printer Functions
635(1)
Configuring Options and Default Settings
636(4)
Common Configuration Settings
637(1)
Global and Individual Document Options
638(2)
Optimizing Printer Performance
640(1)
Software Optimization
640(1)
Hardware Optimization
640(1)
Sharing Printers
641(5)
Operating System Settings for Sharing Printers
641(3)
Configuring Printer Sharing
641(1)
Connecting to a Shared Printer
642(2)
Wireless Printer Connections
644(1)
Print Servers
644(2)
Purposes of Print Servers
644(1)
Software Print Servers
645(1)
Hardware Print Servers
645(1)
Dedicated Printer Servers
646(1)
Maintaining and Troubleshooting Printers
646(12)
Printer Preventive Maintenance
647(4)
Vendor Guidelines
647(1)
Replacing Consumables
648(1)
Cleaning Methods
649(2)
Operational Environment
651(1)
Troubleshooting Printer Issues
651(4)
Identify the Problem
652(1)
Establish a Theory of Probable Cause
652(1)
Test the Theory to Determine Cause
653(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution
653(1)
Verify Full System Functionality and Implement Preventive Measures
654(1)
Document Findings, Actions, and Outcomes
654(1)
Common Problems and Solutions for Printers
655(3)
Identify Common Problems and Solutions
655(3)
Summary
658(1)
Summary
658(1)
Summary of Exercises
658(1)
Labs
659(1)
Check Your Understanding
659(4)
Chapter 12 Security 663(66)
Objectives
663(1)
Key Terms
663(3)
Introduction
666(1)
Welcome
666(1)
Security
666(1)
Security Threats
666(8)
Types of Security Threats
666(8)
Malware
667(2)
Phishing
669(1)
Spam
670(1)
TCP/IP Attacks
670(2)
Zero-Day Attacks
672(1)
Social Engineering
673(1)
Security Procedures
674(36)
Windows Local Security Policy
674(5)
What Is a Security Policy?
674(1)
Accessing Windows Local Security Policy
675(1)
Usernames and Passwords
676(1)
Security Settings for Account Policies
677(1)
Local Password Management
678(1)
Security Settings for Local Policies
679(1)
Exporting the Local Security Policy
679(1)
Securing Web Access
679(4)
Web Security
680(1)
ActiveX Filtering
681(1)
Pop-up Blocker
681(1)
SmartScreen Filter
682(1)
InPrivate Browsing
682(1)
Protecting Data
683(11)
Software Firewalls
683(2)
Biometrics and Smart Cards
685(1)
Data Backups
686(1)
File and Folder Permissions
687(2)
File and Folder Encryption
689(1)
Windows BitLocker
689(2)
Data Wiping
691(2)
Hard Drive Recycling and Destruction
693(1)
Protection Against Malicious Software
694(4)
Malicious Software Protection Programs
694(1)
Remediating Infected Systems
695(2)
Signature File Updates
697(1)
Security Techniques
698(8)
Common Communication Encryption Types
698(3)
Service Set Identifiers
701(1)
Wireless Security Modes
702(1)
Universal Plug and Play
703(1)
Firmware Updates
703(1)
Firewalls
703(2)
Port Forwarding and Port Triggering
705(1)
Protecting Physical Equipment
706(4)
Physical Equipment Protection Methods
706(2)
Security Hardware
708(2)
Common Preventive Maintenance Techniques for Security
710(8)
Security Maintenance
710(8)
Operating System Service Packs and Security Patches
710(1)
Data Backups
711(1)
Windows Firewall
711(2)
Maintaining Accounts
713(1)
Managing Users
714(3)
Managing Groups
717(1)
Basic Troubleshooting Process for Security
718(6)
Applying the Troubleshooting Process to Security
718(3)
Identify the Problem
718(1)
Establish a Theory of Probable Cause
719(1)
Test the Theory to Determine Cause
719(1)
Establish a Plan of Action to Resolve the Problem and Implement the Solution
720(1)
Verify Full System Functionality and, If Applicable, Implement Preventive Measures
720(1)
Document Findings, Actions, and Outcomes
721(1)
Common Problems and Solutions for Security
721(3)
Identify Common Problems and Solutions
722(2)
Summary
724(1)
Summary
724(1)
Summary of Exercises
724(1)
Labs
724(1)
Check Your Understanding
724(5)
Chapter 13 The IT Professional 729(32)
Objectives
729(1)
Key Terms
729(1)
Introduction
730(1)
Welcome
730(1)
The IT Professional
730(1)
Communication Skills and the IT Professional
730(13)
Communication Skills, Troubleshooting, and the IT Professional
731(1)
Relationship Between Communication Skills and Troubleshooting
731(1)
Relationship Between Communication Skills and Professional Behavior
732(1)
Working with a Customer
732(6)
Using Communication Skills to Determine Customer Problems
732(1)
Displaying Professional Behavior with Customers
733(2)
Keeping the Customer Focused on the Problem
735(3)
Using Proper Netiquette
738(1)
Employee Best Practices
738(5)
Time and Stress Management Techniques
738(2)
Observing Service-Level Agreements
740(1)
Following Business Policies
741(2)
Ethical and Legal Issues in the IT Industry
743(7)
Ethical and Legal Considerations
743(4)
Ethical Considerations in IT
743(1)
Legal Considerations in IT
744(1)
Licensing
745(2)
Legal Procedures Overview
747(3)
Computer Forensics
747(1)
Cyber Law and First Response
748(1)
Documentation and Chain of Custody
749(1)
Call Center Technicians
750(4)
Call Centers, Level One Technicians, and Level Two Technicians
750(4)
Call Centers
750(2)
Level One Technician Responsibilities
752(1)
Level Two Technician Responsibilities
753(1)
Summary
754(1)
Summary
754(1)
Summary of Exercises
755(1)
Labs
755(1)
Activity Professional Behaviors with Customers
755(1)
Check Your Understanding
756(5)
Chapter 14 Advanced Troubleshooting 761(22)
Objectives
761(1)
Key Terms
761(1)
Introduction
762(1)
Welcome
762(1)
Advanced Troubleshooting
762(1)
Six Steps for Troubleshooting Review
762(1)
Computer Components and Peripherals
763(3)
Apply Troubleshooting Process to Computer Components and Peripherals
763(3)
Advanced Problems and Solutions for Components and Peripherals
763(3)
Operating Systems
766(4)
Apply Troubleshooting Process to Operating Systems
766(4)
Advanced Problems and Solutions for Operating Systems
766(4)
Networks
770(5)
Apply Troubleshooting Process to Networks
770(5)
Advanced Problems and Solutions for Networks
770(5)
Security
775(4)
Apply Troubleshooting Process to Security
775(4)
Advanced Problems and Solutions for Security
775(4)
Summary
779(1)
Summary
779(1)
Summary of Exercises
779(1)
Labs
779(1)
Check Your Understanding
780(3)
Appendix A Answers to "Check Your Understanding" Questions 783(22)
Glossary 805(36)
Index 841
Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.