Introduction |
|
xxxiii | |
|
Chapter 1 Introduction to Personal Computer Hardware |
|
|
1 | (58) |
|
|
1 | (1) |
|
|
1 | (3) |
|
Introduction to Personal Computers (1.0) |
|
|
4 | (1) |
|
|
4 | (2) |
|
What Is in a Computer? (1.1.1) |
|
|
4 | (1) |
|
Electrical and ESD Safety (1.1.2) |
|
|
5 | (1) |
|
Electrical Safety (1.1.2.1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (47) |
|
Case and Power Supplies (1.2.1) |
|
|
6 | (1) |
|
|
6 | (3) |
|
|
9 | (1) |
|
|
9 | (2) |
|
Power Supply Voltage (1.2.1.4) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
Motherboard Components (1.2.2.2) |
|
|
12 | (2) |
|
Motherboard Chipset (1.2.2.3) |
|
|
14 | (1) |
|
Motherboard Form Factors (1.2.2.4) |
|
|
15 | (1) |
|
CPUs and Cooling Systems (1.2.3) |
|
|
16 | (1) |
|
|
16 | (1) |
|
Cooling Systems (1.2.3.2) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Types of Memory (1.2.4.1) |
|
|
18 | (1) |
|
|
19 | (2) |
|
|
21 | (1) |
|
|
22 | (3) |
|
Adapter Cards and Expansion Slots (1.2.5) |
|
|
25 | (1) |
|
|
25 | (3) |
|
Hard Disk Drives and SSDs (1.2.6) |
|
|
28 | (1) |
|
Types of Storage Devices (1.2.6.1) |
|
|
29 | (1) |
|
Storage Device Interfaces (1.2.6.2) |
|
|
29 | (1) |
|
Magnetic Media Storage (1.2.6.3) |
|
|
30 | (1) |
|
Semiconductor Storage (1.2.6.4) |
|
|
31 | (1) |
|
Optical Storage Devices (1.2.7) |
|
|
32 | (1) |
|
Types of Optical Storage Devices (1.2.7.1) |
|
|
33 | (1) |
|
Ports, Cables, and Adapters (1.2.8) |
|
|
34 | (1) |
|
Video Ports and Cables (1.2.8.1) |
|
|
34 | (4) |
|
Other Ports and Cables (1.2.8.2) |
|
|
38 | (3) |
|
Adapters and Converters (1.2.8.3) |
|
|
41 | (1) |
|
|
42 | (1) |
|
The Original Input Devices (1.2.9.1) |
|
|
42 | (1) |
|
New Input Devices (1.2.9.2) |
|
|
43 | (3) |
|
More New Input Devices (1.2.9.3) |
|
|
46 | (2) |
|
Most Recent Input Devices (1.2.9.4) |
|
|
48 | (2) |
|
|
50 | (1) |
|
What Are Output Devices? (1.2.10.1) |
|
|
50 | (1) |
|
Monitors and Projectors (1.2.10.2) |
|
|
50 | (1) |
|
VR and AR Headsets (1.2.10.3) |
|
|
51 | (1) |
|
|
52 | (1) |
|
Speakers and Headphones (1.2.10.5) |
|
|
53 | (1) |
|
Computer Disassembly (1.3) |
|
|
53 | (1) |
|
The Technician's Toolkit (1.3.1) |
|
|
53 | (1) |
|
Computer Disassembly (1.3.2) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
Check Your Understanding Questions |
|
|
55 | (4) |
|
|
59 | (36) |
|
|
59 | (1) |
|
|
59 | (2) |
|
Introduction to PC Assembly (2.0) |
|
|
61 | (1) |
|
Assemble the Computer (2.1) |
|
|
61 | (29) |
|
General and Fire Safety (2.1.1) |
|
|
61 | (1) |
|
Open the Case and Connect the Power Supply (2.1.2) |
|
|
62 | (1) |
|
Select the Case and Fans (2.1.2.3) |
|
|
62 | (2) |
|
Select a Power Supply (2.1.2.4) |
|
|
64 | (1) |
|
Install the Motherboard Components (2.1.3) |
|
|
65 | (1) |
|
Select the Motherboard (2.1.3.7) |
|
|
66 | (1) |
|
Select the CPU and CPU Cooling (2.1.3.8) |
|
|
67 | (1) |
|
|
68 | (1) |
|
Install Internal Drives (2.1.4) |
|
|
69 | (1) |
|
Select Hard Drives (2.1.4.2) |
|
|
69 | (1) |
|
Select Optical Drives (2.1.4.3) |
|
|
70 | (1) |
|
Install the Hard Drive (2.1.4.4) |
|
|
71 | (2) |
|
Install f he Optical Drive (2.1.4.5) |
|
|
73 | (1) |
|
Install the Adapter Cards (2.1.5) |
|
|
74 | (1) |
|
Select Adapter Cards (2.1.5.2) |
|
|
75 | (2) |
|
Other Factors for Adapter Card Selection (2.1.5.3) |
|
|
77 | (3) |
|
Install the Adapter Cards (2.1.5.4) |
|
|
80 | (1) |
|
Select Additional Storage (2.1.6) |
|
|
81 | (1) |
|
Select a Media Reader (2.1.6.1) |
|
|
81 | (2) |
|
Select External Storage (2.1.6.2) |
|
|
83 | (1) |
|
Install the Cables (2.1.7) |
|
|
84 | (1) |
|
Install the Front Panel Cables (2.1.7.6) |
|
|
85 | (5) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
Check Your Understanding Questions |
|
|
91 | (4) |
|
Chapter 3 Advanced Computer Hardware |
|
|
95 | (68) |
|
|
95 | (1) |
|
|
95 | (3) |
|
Introduction to Advanced Computer Hardware (3.0) |
|
|
98 | (1) |
|
|
98 | (9) |
|
POST, BIOS, CMOS, and UEFI (3.1.1) |
|
|
99 | (1) |
|
|
99 | (2) |
|
|
101 | (1) |
|
|
102 | (2) |
|
BIOS/UEFI Configuration (3.1.2) |
|
|
104 | (1) |
|
BIOS and UEFI Security (3.1.2.2) |
|
|
104 | (1) |
|
Update the Firmware (3.12.3) |
|
|
105 | (2) |
|
|
107 | (4) |
|
Wattage and Voltage (3.2.1) |
|
|
107 | (1) |
|
Wattage and Voltage (3.2.1.1) |
|
|
108 | (1) |
|
Power Supply Voltage Setting (3.2.1.2) |
|
|
108 | (1) |
|
Power Fluctuation and Protection (3.2.2) |
|
|
109 | (1) |
|
Power Fluctuation Types (3.2.2.1) |
|
|
110 | (1) |
|
Power Protection Devices (3.2.2.2) |
|
|
110 | (1) |
|
Advanced Computer Functionality (3.3) |
|
|
111 | (29) |
|
CPU Architectures and Operation (3.3.1) |
|
|
111 | (1) |
|
CPU Architectures (3.3.1.1) |
|
|
112 | (1) |
|
Enhancing CPU Operation (3.3.1.2) |
|
|
112 | (1) |
|
Multicore Processors (3.3.1.3) |
|
|
113 | (1) |
|
CPU Cooling Mechanisms (3.3.1.4) |
|
|
114 | (3) |
|
|
117 | (1) |
|
What Do You Already Know? - RAID (3.3.2.1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
Ports, Connectors, and Cables (3.3.3) |
|
|
119 | (1) |
|
|
120 | (3) |
|
Video and Graphic Ports (3.3.3.2) |
|
|
123 | (2) |
|
USB Cables and Connectors (3.3.3.3) |
|
|
125 | (3) |
|
SATA Cables and Connectors (3.3.3.4) |
|
|
128 | (2) |
|
Twisted Pair Cables and Connectors (3.3.3.5) |
|
|
130 | (1) |
|
Coax Cables and Connectors (3.3.3.6) |
|
|
131 | (2) |
|
SCSI and IDE, Cables and Connectors (3.3.3.7) |
|
|
133 | (2) |
|
|
135 | (1) |
|
Monitor Characteristics (3.3.4.1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
Display Standards (3.3.4.3) |
|
|
138 | (1) |
|
Using Multiple Monitors (3.3.4.4) |
|
|
138 | (2) |
|
Computer Configuration (3.4) |
|
|
140 | (15) |
|
Upgrade Computer Hardware (3.4.1) |
|
|
140 | (1) |
|
Motherboard Upgrade (3.4.1.1) |
|
|
140 | (1) |
|
Steps to Upgrade a Motherboard (3.4.1.2) |
|
|
141 | (1) |
|
|
142 | (1) |
|
Storage Device Upgrade (3.4.1.4) |
|
|
143 | (1) |
|
Peripheral upgrades (3.4.1.5) |
|
|
144 | (1) |
|
Power Supply Upgrade (3.4.1.6) |
|
|
145 | (1) |
|
Configurations for Specialized Computers (3.4.2) |
|
|
145 | (1) |
|
What Do You Already Know? - Configure a CAx Workstation (3.4.2.1) |
|
|
145 | (2) |
|
What Do You Already Know? - Configure an Audio Video Editing Workstation (3.4.2.2) |
|
|
147 | (3) |
|
What Do You' Already Know? - Configure a Virtualization Workstation (3.4.2.3) |
|
|
150 | (1) |
|
What Do You Already Know? - Configure a Gaming PC (3.4.2.4) |
|
|
151 | (2) |
|
Thick and Thin Clients (3.4.2.6) |
|
|
153 | (1) |
|
|
154 | (1) |
|
Protecting the Environment (3.5) |
|
|
155 | (3) |
|
Safe Disposal of Equipment and Supplies (3.5.1) |
|
|
155 | (1) |
|
Safe Disposal Methods (3.5.1.1) |
|
|
156 | (1) |
|
Safety Data Sheets (3.5.1.2) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
Check Your Understanding Questions |
|
|
159 | (4) |
|
Chapter 4 Preventive Maintenance and Troubleshooting |
|
|
163 | (30) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
Preventive Maintenance (4.1) |
|
|
164 | (3) |
|
PC Preventive Maintenance Overview (4.1.1) |
|
|
164 | (1) |
|
Benefits to Preventive Maintenance (4.1.1.1) |
|
|
164 | (1) |
|
Preventive Maintenance - Dust (4.1.1.2) |
|
|
165 | (1) |
|
Preventive Maintenance - Internal Components (4.1:1.3) |
|
|
165 | (1) |
|
Preventive Maintenance - Environmental Concerns (4.1.1.4) |
|
|
166 | (1) |
|
Preventive Maintenance - Software (4.1.1.5) |
|
|
167 | (1) |
|
Troubleshooting Process (4.2) |
|
|
167 | (21) |
|
Troubleshooting Process Steps (4.2.1) |
|
|
167 | (1) |
|
Introduction to Troubleshooting (4.2.1.1) |
|
|
167 | (2) |
|
Troubleshooting Process Steps (4.2.1.2) |
|
|
169 | (1) |
|
Identify the Problem (4.2.1.3) |
|
|
169 | (4) |
|
Establish a Theory of Probable Cause (4.2.1.5) |
|
|
173 | (1) |
|
Test the Theory to Determine the Cause (4.2.1.6) |
|
|
173 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (4.2.1.7) |
|
|
174 | (1) |
|
Verify Full Functionality and if Applicable, Implement Preventive Measures (4.2.1.8) |
|
|
175 | (1) |
|
Document Findings, Actions, and Outcomes (4.2.1.9) |
|
|
176 | (1) |
|
Common Problems and Solutions for PCs (4.2.2) |
|
|
176 | (1) |
|
PC Common Problems and Solutions (4.2.2.1) |
|
|
176 | (1) |
|
Common Problems and Solutions for Storage Devices (412.2.2) |
|
|
177 | (1) |
|
Common Problems and Solutions for Motherboards and Internal Components (4.2.2.3) |
|
|
178 | (2) |
|
Common Problems and Solutions for Power Supplies (4.2.2.4) |
|
|
180 | (1) |
|
Common Problems and Solutions for CPUs and Memory (4.2.2.5) |
|
|
181 | (2) |
|
Common Problems and Solutions for Displays (4.2.2.6) |
|
|
183 | (2) |
|
Apply Troubleshooting Process to Computer Components and Peripherals (4.2.3) |
|
|
185 | (1) |
|
Personal Reference Tools (4.2.3.1) |
|
|
185 | (1) |
|
Internet Reference Tools (4.2.3.2) |
|
|
185 | (1) |
|
Advanced Problems and Solutions for Hardware (4.2.3.4) |
|
|
186 | (2) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
Check Your Understanding Questions |
|
|
189 | (4) |
|
Chapter 5 Networking Concepts |
|
|
193 | (74) |
|
|
193 | (1) |
|
|
193 | (3) |
|
|
196 | (1) |
|
Network Components and Types (5.1) |
|
|
196 | (11) |
|
Types of Networks (5.1.1) |
|
|
196 | (1) |
|
|
196 | (2) |
|
Network Topologies and Description (5.1.1.2) |
|
|
198 | (5) |
|
Internet Connection Types (5.1.2) |
|
|
203 | (1) |
|
Brief History of Connection Technologies (5.1.2.1) |
|
|
203 | (1) |
|
DSL, Cable, and Fiber (5.1.2.2) |
|
|
204 | (1) |
|
Line of Sight Wireless Internet Service (5.1.2.3) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
Mobile Hotspot and Tethering (5.1.2.6) |
|
|
207 | (1) |
|
Networking Protocols, Standards, and Services (5.2) |
|
|
207 | (25) |
|
Transport Layer Protocols (5.2.1) |
|
|
208 | (1) |
|
The TCP/IP Model (5.2.1.3) |
|
|
208 | (1) |
|
|
209 | (2) |
|
|
211 | (2) |
|
Application Port Numbers (5.2.2) |
|
|
213 | (1) |
|
Classify Application Port Numbers (5.2.2.2) |
|
|
213 | (4) |
|
Wireless Protocols (5.2.3) |
|
|
217 | (1) |
|
|
217 | (1) |
|
Bluetooth, NFC, and RFID (5.2.3.2) |
|
|
218 | (2) |
|
Zigbee and Z-Wave (5.2.3.3) |
|
|
220 | (1) |
|
Cellular Generations (5.2.3.4) |
|
|
221 | (1) |
|
|
222 | (1) |
|
Client - Server Roles (5.2.4.2) |
|
|
222 | (3) |
|
|
225 | (1) |
|
|
225 | (2) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
Authentication Server (5.2.4.10) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (14) |
|
Basic Network Devices (5.3.1) |
|
|
232 | (1) |
|
Network Interface Card (5.3.1.2) |
|
|
233 | (1) |
|
Repeaters, Bridges, and Hubs (5.3.1.3) |
|
|
233 | (2) |
|
|
235 | (2) |
|
Wireless Access Points (5.3.1.5) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (2) |
|
|
241 | (1) |
|
Endpoint Management Server (5.3.2.5) |
|
|
241 | (1) |
|
Other Network Devices (5.3.3) |
|
|
242 | (1) |
|
Legacy and Embedded Systems (5.3.3.1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
Power over Ethernet and Ethernet over Power (5.3.3.3) |
|
|
244 | (1) |
|
Cloud-Based Network Controller (5.3.3.4) |
|
|
245 | (1) |
|
|
246 | (16) |
|
|
246 | (1) |
|
Network Tools and Descriptions (5.4.1.2) |
|
|
247 | (4) |
|
Copper Cables and Connectors (5.4.2) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Twisted-Pair Cables (5.4.2.3) |
|
|
252 | (2) |
|
Twisted-Pair Category Ratings (5.4.2.4) |
|
|
254 | (1) |
|
Twisted-Pair Wire Schemes (5.4.2.5) |
|
|
255 | (1) |
|
Fiber Cables and Connectors (5.4.3) |
|
|
256 | (1) |
|
Fiber-Optic Cables (5.4.3.1} |
|
|
257 | (1) |
|
Types of Fiber Media (5.4.3.2) |
|
|
258 | (1) |
|
Fiber-Optic Connectors (5.4.3.3) |
|
|
259 | (3) |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
Check Your Understanding Questions |
|
|
263 | (4) |
|
Chapter 6 Applied Networking |
|
|
267 | (58) |
|
|
267 | (1) |
|
|
267 | (2) |
|
|
269 | (1) |
|
Device to Network Connection (6.1) |
|
|
269 | (40) |
|
Network Addressing (6.1.1) |
|
|
269 | (1) |
|
Two Network Addresses (6.1.1.4) |
|
|
270 | (2) |
|
Displaying the Addresses (6.1.1.5) |
|
|
272 | (1) |
|
IPv4 Address Format (6.1.1.6) |
|
|
273 | (1) |
|
IPv6 Address Formats (6.1.1.7) |
|
|
274 | (2) |
|
Static Addressing (6.1.1.8) |
|
|
276 | (1) |
|
Dynamic Addressing (6.1.1.9) |
|
|
277 | (1) |
|
Link-Local IPv4 and IPv6 Addresses (6.1.1.10) |
|
|
278 | (2) |
|
|
280 | (1) |
|
|
280 | (1) |
|
Selecting a NIC (6.1.2.3) |
|
|
281 | (1) |
|
Installing and Updating a NIC (6.1.2.4) |
|
|
282 | (1) |
|
Configure a NIC (6.1.2.5) |
|
|
283 | (2) |
|
|
285 | (1) |
|
Configure a Wired and Wireless Network (6.1.3) |
|
|
286 | (1) |
|
Connecting Wired Devices to the Internet (6.1.3.2) |
|
|
287 | (2) |
|
Logging in to the Router (6.1.3.3) |
|
|
289 | (1) |
|
Basic Network Setup (6.1.3.4) |
|
|
290 | (3) |
|
Basic Wireless Settings (6.1.3.5) |
|
|
293 | (3) |
|
Configure a Wireless Mesh Network (6.1.3.6) |
|
|
296 | (1) |
|
|
297 | (1) |
|
Quality of Service (6.1.3.8) |
|
|
298 | (1) |
|
Firewall Settings (6.1.4) |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
300 | (2) |
|
Port Forwarding (6.1.4.4) |
|
|
302 | (1) |
|
MAC Address Filtering (6.1.4.5) |
|
|
303 | (3) |
|
Whitelisting and Blacklisting (6.1.4.6) |
|
|
306 | (1) |
|
IoT Device Configuration (6.1.5) |
|
|
307 | (1) |
|
Internet of Things (6.1.5.1) |
|
|
308 | (1) |
|
IoT Devices in Packet Tracer (6.1.5.2) |
|
|
308 | (1) |
|
Basic Troubleshooting Process for Networks (6.2) |
|
|
309 | (10) |
|
Applying the Troubleshooting Process to Networks (6.2.1) |
|
|
310 | (1) |
|
The Six Steps of the Troubleshooting Process (6.2.1.1) |
|
|
310 | (1) |
|
Identify the Problem (6.2.1.2) |
|
|
310 | (1) |
|
Establish a Theory of Probable Cause (6.2.1.3) |
|
|
311 | (1) |
|
Test the Theory to Determine the Cause (6.2.1.4) |
|
|
311 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (6.2.1.5) |
|
|
312 | (1) |
|
Verify Full Functionality and, if Applicable, Implement Preventive Measures (6.2.1.6) |
|
|
312 | (1) |
|
Document Findings; Actions, and Outcomes (6.2.1.7) |
|
|
313 | (1) |
|
Network Problems and Solutions (6.2.2) |
|
|
313 | (1) |
|
Common Problems and Solutions for Networking (6.2.2.1) |
|
|
314 | (1) |
|
Advanced Problems and Solutions for Network Connections (6.2.2.2) |
|
|
315 | (1) |
|
Advanced Problems and Solutions for FTP and Secure Internet Connections (6.2.2.3) |
|
|
316 | (1) |
|
Advanced Problems and Solutions Using Network Tools (6.2.2.4) |
|
|
317 | (2) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
Check Your Understanding Questions |
|
|
320 | (5) |
|
Chapter 7 Laptops and Other Mobile Devices |
|
|
325 | (82) |
|
|
325 | (1) |
|
|
325 | (3) |
|
|
328 | (1) |
|
Characteristics of Laptops and Other Mobile Devices (7.1) |
|
|
328 | (16) |
|
Mobile Device Overview (7.1.1) |
|
|
329 | (1) |
|
What Do You Already Know? - Mobile Devices (7.1.1.1) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
Smartphone Characteristics (7.1.1.4) |
|
|
331 | (1) |
|
Smartphone Features (7.1.1.5) |
|
|
332 | (1) |
|
Tablets and E-readers (7.1:1.6) |
|
|
332 | (1) |
|
Wearables: Smartwatches and Fitness Trackers (7.1.1.7) |
|
|
333 | (1) |
|
Wearables: Augmented and Virtual Realities (7.1.1.8) |
|
|
334 | (2) |
|
Laptop Components (7.1.2) |
|
|
336 | (1) |
|
|
336 | (1) |
|
Internal Components (7.1.2.4) |
|
|
337 | (3) |
|
Special Function Keys (7.1.2.6) |
|
|
340 | (1) |
|
Laptop Display Components (7.1.3) |
|
|
341 | (1) |
|
LCD, LED, and OLED Displays (7.1.3.1) |
|
|
341 | (1) |
|
Laptop Display Features (7.1.3.2) |
|
|
341 | (2) |
|
Backlights and Inverters (7.1.3.3) |
|
|
343 | (1) |
|
Wi-Fi Antenna Connectors (7.1.3.5) |
|
|
344 | (1) |
|
Webcam and Microphone (7.1.3.6) |
|
|
344 | (1) |
|
Laptop Configuration (7.2) |
|
|
344 | (6) |
|
Power Settings Configuration (7.2.1) |
|
|
344 | (1) |
|
Power Management (7.2.1.1) |
|
|
344 | (1) |
|
Managing ACPI Settings in the BIOS (7.2.1.2) |
|
|
345 | (1) |
|
Wireless Configuration (7.2.2) |
|
|
346 | (1) |
|
|
347 | (1) |
|
Bluetooth Laptop Connections (7.2.2.2) |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
Laptop Hardware and Component Installation and Configuration (7.3) |
|
|
350 | (10) |
|
|
351 | (1) |
|
Expansion Cards (7.3.1.1) |
|
|
351 | (1) |
|
|
352 | (1) |
|
Smart Card Reader (7.3.1.3) |
|
|
353 | (1) |
|
|
354 | (2) |
|
Replacing Laptop Components (7.3.2) |
|
|
356 | (1) |
|
Overview of Hardware Replacement (7.3.2.1) |
|
|
356 | (1) |
|
|
357 | (2) |
|
Internal Storage and Optical Drive (7.3.2.8) |
|
|
359 | (1) |
|
Other Mobile Device Hardware Overview (7.4) |
|
|
360 | (8) |
|
Other Mobile Device Hardware (7.4.1) |
|
|
360 | (1) |
|
Cell Phone Parts (7.4.1.1) |
|
|
360 | (1) |
|
Wired Connectivity (7.4.1.2) |
|
|
361 | (3) |
|
Wireless Connections and Shared Internet Connections (7.4.1.3) |
|
|
364 | (1) |
|
Specialty Mobile Devices (7.4.2) |
|
|
364 | (1) |
|
Wearable Devices (7.4.2.1) |
|
|
365 | (1) |
|
Specialty Devices (7.4.2.2) |
|
|
366 | (2) |
|
Network Connectivity and Email (7.5) |
|
|
368 | (20) |
|
Wireless and Cellular Data Networks (7.5.1) |
|
|
368 | (1) |
|
Wireless Data Networks (7.5.1.1) |
|
|
369 | (1) |
|
Cellular Communication Standards (7.5.1.3) |
|
|
370 | (1) |
|
|
371 | (2) |
|
|
373 | (1) |
|
|
374 | (1) |
|
Bluetooth for Mobile Devices (7.5.2.1) |
|
|
375 | (2) |
|
Bluetooth Pairing (7.5.2.2) |
|
|
377 | (1) |
|
Configuring Email (7.5.3) |
|
|
378 | (1) |
|
Introduction to Email (7.5.3.1) |
|
|
378 | (3) |
|
Android Email Configuration (7.5.3.3) |
|
|
381 | (1) |
|
iOS Email Configuration (7.5.3.4) |
|
|
382 | (1) |
|
|
382 | (1) |
|
Mobile Device Synchronization (7.5.4) |
|
|
383 | (1) |
|
Types of Data to Synchronize (7.5.4.1) |
|
|
383 | (1) |
|
Enabling Synchronization (7.5.4.2) |
|
|
384 | (3) |
|
Synchronization Connection Types (7.5.4.3) |
|
|
387 | (1) |
|
Preventive Maintenance for Laptops and Other Mobile Devices (7.6)% |
|
|
388 | (3) |
|
Scheduled Maintenance for Laptops and Other Mobile Devices % (7.6.1) |
|
|
388 | (1) |
|
What Do You Already Know? - Preventive Maintenance (7.6.1.1) |
|
|
388 | (1) |
|
The Reason for Maintenance (7.6.1.2) |
|
|
389 | (1) |
|
Laptop Preventive Maintenance Program (7.6.1.3) |
|
|
389 | (1) |
|
Mobile Device Preventive Maintenance Program (7.6.1.4) |
|
|
390 | (1) |
|
Basic Troubleshooting Process for Laptops and Other Mobile Devices (7.7) |
|
|
391 | (10) |
|
Applying the Troubleshooting Process to Laptops and Other Mobile Devices (7.7.1) |
|
|
391 | (1) |
|
The Troubleshooting Process (7.7.1.1) |
|
|
391 | (1) |
|
Identify the Problem (7.7.1.2) |
|
|
391 | (1) |
|
Establish a Theory of Probable Cause (7.7.1.3) |
|
|
392 | (1) |
|
Test the Theory to Determine Cause (7.7.1.4) |
|
|
393 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (7.7.1.5) |
|
|
393 | (1) |
|
Verify Full System Functionality and, if Applicable, Implement Preventive Measures (7.7.1.6) |
|
|
394 | (1) |
|
Document Findings, Actions, and Outcomes (7.7.1.7) |
|
|
395 | (1) |
|
Common Problems and Solutions for Laptops and Other Mobile Devices (7.7.2) |
|
|
395 | (1) |
|
Identify Common Problems and Solutions (7.7.2.1) |
|
|
395 | (1) |
|
Common Problems and Solutions for Laptops (7.7.2.2) |
|
|
395 | (3) |
|
Common Problems and Solutions for Other Mobile Devices (7.7.2.3) |
|
|
398 | (3) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
402 | (1) |
|
Check Your Understanding Questions |
|
|
402 | (5) |
|
|
407 | (66) |
|
|
407 | (1) |
|
|
407 | (2) |
|
|
409 | (1) |
|
Common Printer Features (8.1) |
|
|
409 | (8) |
|
Characteristics and Capabilities (8.1.1) |
|
|
409 | (1) |
|
Characteristics of Printers (8.1.1.1) |
|
|
409 | (1) |
|
Printer Speed, Quality, and Color (8.1.1.2) |
|
|
410 | (1) |
|
Reliability and Total Cost of Ownership (8.1.1.3) |
|
|
411 | (1) |
|
Automatic Document Feeder (8.1.1.4) |
|
|
412 | (1) |
|
Printer Connections (8.1.2) |
|
|
413 | (1) |
|
Printer Connection Types (8.1.2.1) |
|
|
413 | (4) |
|
Printer Type Comparison (8.2) |
|
|
417 | (21) |
|
|
417 | (1) |
|
Inkjet Printer Characteristics (8.2.1.1) |
|
|
418 | (1) |
|
Inkjet Printer Parts (8:2.1.2) |
|
|
418 | (5) |
|
|
423 | (1) |
|
Laser Printer Characteristics (8.2.2.1) |
|
|
423 | (1) |
|
Laser Printer Parts (8.2.2.2) |
|
|
424 | (3) |
|
Laser Printing Process, (8.2.3) |
|
|
427 | (1) |
|
How Laser Printing Works (8.2.3.1) |
|
|
427 | (7) |
|
Thermal Printers and Impact Printers (8.2.4) |
|
|
434 | (1) |
|
Thermal Printer Characteristics (8.2.4.1) |
|
|
435 | (1) |
|
Impact Printer Characteristics (8.2.4.2) |
|
|
436 | (1) |
|
|
437 | (1) |
|
Virtual Printer Characteristics (8.2.5.1) |
|
|
437 | (1) |
|
|
438 | (1) |
|
|
438 | (1) |
|
3D Printer Characteristics (8.2.6.1) |
|
|
439 | (1) |
|
3D Printer Parts (8.2.6.2) |
|
|
439 | (3) |
|
Installing and Configuring Printers (8.3) |
|
|
442 | (6) |
|
Installing and Updating a Printer (8.3.1) |
|
|
442 | (1) |
|
Installing a Printer (8.3.1.1) |
|
|
442 | (1) |
|
Test Printer Functions (8.3.1.2) |
|
|
443 | (1) |
|
Configuring Options and Default Settings (8.3.2) |
|
|
444 | (1) |
|
Common Configuration Settings (8.3.2.1) |
|
|
444 | (2) |
|
Optimizing Printer Performance (8.3.3) |
|
|
446 | (1) |
|
Software Optimization (8.3.3.1) |
|
|
446 | (1) |
|
Hardware Optimization (8.3.3.2) |
|
|
447 | (1) |
|
|
448 | (6) |
|
Operating System Settings for Sharing Printers (8.4.1) |
|
|
448 | (1) |
|
Configuring Printer Sharing (8.4.1.1) |
|
|
448 | (2) |
|
Wireless Printer Connections (8.4.1.2) |
|
|
450 | (1) |
|
|
451 | (1) |
|
Purposes of Print Servers (8.4.2.1) |
|
|
451 | (1) |
|
Software Print Servers (8.4.2.2) |
|
|
452 | (1) |
|
Hardware Print Servers (8.4.2.3) |
|
|
452 | (1) |
|
Dedicated Print Servers (8.4.2.4) |
|
|
453 | (1) |
|
Maintaining and Troubleshooting, Printers (8.5) |
|
|
454 | (6) |
|
Printer Preventive Maintenance (8.5.1) |
|
|
454 | (1) |
|
Vendor Guidelines (8.5.1.1) |
|
|
455 | (1) |
|
What Do You Already Know? - Printer Operating Environment (8.5.1.2) |
|
|
455 | (1) |
|
Inkjet Printer Preventive Maintenance (8.5.2) |
|
|
456 | (1) |
|
Laser Printer Preventive Maintenance (8.5.3) |
|
|
456 | (1) |
|
Thermal Printer Preventive Maintenance (8.5.4) |
|
|
457 | (1) |
|
Preventive Maintenance on a Thermal Printer (8.5.4.1) |
|
|
458 | (1) |
|
Impact Printer Preventive Maintenance (8.5.5) |
|
|
459 | (1) |
|
Preventive Maintenance of an Impact Printer (8.5.5.1) |
|
|
459 | (1) |
|
3D Printer Preventive Maintenance (8.5.6) |
|
|
460 | (8) |
|
Applying the Troubleshooting Process to Printers (8.5.7) |
|
|
461 | (1) |
|
The Six Steps of the Troubleshooting Process (8.5.7.1) |
|
|
461 | (1) |
|
Identify the Problem (8.5.7.2) |
|
|
461 | (1) |
|
Establish a Theory of Probable Cause (8.5.7.3) |
|
|
462 | (1) |
|
Test the Theory to Determine Cause (8.5.7.4) |
|
|
462 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (8.5.7.5) |
|
|
463 | (1) |
|
Verify Full System Functionality and if Applicable, Implement Preventive Measures (8.5.7.6) |
|
|
463 | (1) |
|
Document Findings, Actions, and Outcomes (8.5.7.7) |
|
|
463 | (1) |
|
Problems and Solutions (8.5.8) |
|
|
464 | (1) |
|
Identify Printer Problems and Solutions (8.5.8.1) |
|
|
464 | (1) |
|
Common Problems and Solutions for Printers (8.5.8.2) |
|
|
464 | (3) |
|
Advanced Problems and Solutions for Printers (8.5.8.3) |
|
|
467 | (1) |
|
|
468 | (1) |
|
|
469 | (1) |
|
|
469 | (1) |
|
Check Your Understanding Questions |
|
|
469 | (4) |
|
Chapter 9 Virtualization and Cloud Computing |
|
|
473 | (20) |
|
|
473 | (1) |
|
|
473 | (1) |
|
|
474 | (1) |
|
|
474 | (9) |
|
|
474 | (1) |
|
Cloud Computing and Virtualization (9.1.1.2) |
|
|
475 | (1) |
|
Traditional Server Deployment (9.1.1.3) |
|
|
475 | (1) |
|
Server Virtualization (9.1.1.4) |
|
|
476 | (1) |
|
Advantages of Server Virtualization (9.1.1.5) |
|
|
477 | (1) |
|
Client-Side Virtualization (9.1.2) |
|
|
478 | (1) |
|
Client-Side Virtualization (9.1.2.1) |
|
|
478 | (2) |
|
Type 1 and Type 2 Hypervisors (9.1.2.2) |
|
|
480 | (1) |
|
Virtual Machine Requirements (9.1.2.3) |
|
|
481 | (2) |
|
|
483 | (5) |
|
Cloud Computing Applications (9.2.1) |
|
|
483 | (1) |
|
How We Use the Cloud (9.2.1.1) |
|
|
483 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
What Do You Already Know? - Cloud Models (9.2.2.2) |
|
|
485 | (2) |
|
Cloud Computing Characteristics (9.2.2.4) |
|
|
487 | (1) |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
488 | (1) |
|
Check Your Understanding Questions |
|
|
489 | (4) |
|
Chapter 10 Windows Installation |
|
|
493 | (40) |
|
|
493 | (1) |
|
|
493 | (2) |
|
|
495 | (1) |
|
Modern Operating Systems (10.1) |
|
|
495 | (14) |
|
Operating System Features (10.1.1) |
|
|
495 | (1) |
|
|
496 | (1) |
|
Basic Functions of an Operating System (10.1.1.2) |
|
|
497 | (3) |
|
Windows Operating Systems (10.1.1.3) |
|
|
500 | (1) |
|
Customer Requirements for an Operating System (10.1.2) |
|
|
500 | (1) |
|
Compatible System Software and Hardware Requirements (10.1.2.1) |
|
|
501 | (1) |
|
Minimum Hardware Requirements and Compatibility with OS (10.1.2.2) |
|
|
501 | (1) |
|
32-bit vs. 64-bit Processor Architecture (10.1.2.3) |
|
|
502 | (1) |
|
What Do You Already Know? - Choosing a Windows Edition (10.1.2.4) |
|
|
503 | (1) |
|
Operating System Upgrades (10.1.3) |
|
|
504 | (1) |
|
Checking OS Compatibility (10.1.3.1) |
|
|
505 | (1) |
|
Windows OS Upgrades (10.1.3.2) |
|
|
505 | (1) |
|
Data Migration (10.1.3.3) |
|
|
506 | (3) |
|
|
509 | (6) |
|
|
509 | (1) |
|
Storage Device Types (10.2.1.1) |
|
|
509 | (1) |
|
Hard Drive Partitioning (10.2.1.2) |
|
|
510 | (1) |
|
Partitions and Logical Drives (10.2.1.3) |
|
|
511 | (2) |
|
|
513 | (2) |
|
Installation and Boot Sequence (10.3) |
|
|
515 | (13) |
|
Basic Windows Installation (10.3.1) |
|
|
515 | (1) |
|
Account Creation (10.3.1.2) |
|
|
515 | (1) |
|
Finalize the Installation (10.3.1.3) |
|
|
516 | (1) |
|
Custom Installation Options (10.3.2) |
|
|
517 | (1) |
|
|
517 | (1) |
|
Other Installation Methods (10.3.2.2) |
|
|
518 | (1) |
|
Remote Network Installation (10.3.2.3) |
|
|
519 | (1) |
|
Unattended Network Installation (10.3.2.4) |
|
|
520 | (2) |
|
Recovery Partition (10.3.2.6) |
|
|
522 | (1) |
|
Upgrade Methods (10.3.2.7) |
|
|
522 | (2) |
|
Windows Boot Sequence (10.3.3) |
|
|
524 | (1) |
|
Windows Boot Sequence (10.3.3.1) |
|
|
524 | (1) |
|
Windows 7 Startup Modes (10.3.3.2) |
|
|
525 | (1) |
|
Windows 8 and 10 Startup Modes (10.3.3.3) |
|
|
526 | (2) |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
528 | (1) |
|
Check Your Understanding Questions |
|
|
529 | (4) |
|
Chapter 11 Windows Configuration |
|
|
533 | (194) |
|
|
533 | (1) |
|
|
534 | (4) |
|
|
538 | (1) |
|
Windows Desktop and File Explorer (11.1) |
|
|
538 | (29) |
|
Comparing Windows Versions (11.1.1) |
|
|
539 | (1) |
|
Windows Versions (11.1.1.1) |
|
|
539 | (1) |
|
|
540 | (1) |
|
|
540 | (1) |
|
|
540 | (1) |
|
|
540 | (2) |
|
The Windows Desktop (11.1.2) |
|
|
542 | (1) |
|
The Windows 7 Desktop (11.1.2.1) |
|
|
542 | (1) |
|
The Windows 8 Desktop (11.1.2.2) |
|
|
543 | (1) |
|
The Windows 8.1 Desktop (11.1.2.3) |
|
|
544 | (1) |
|
Personalizing the Windows Desktop (11.1.2.4) |
|
|
545 | (3) |
|
The Windows 10 Start Menu (11.1.2.6) |
|
|
548 | (1) |
|
The Windows 8.1 and 8.0 Start Menu (11.1.2.7) |
|
|
548 | (2) |
|
The Windows 7 Start Menu (11.1.2.8) |
|
|
550 | (2) |
|
|
552 | (2) |
|
Windows Task Manager (11.1.3) |
|
|
554 | (1) |
|
Windows 10 Task Manager Functions (11.1.3.2) |
|
|
554 | (1) |
|
Task Manager in Windows 7 (11.1.3.3) |
|
|
555 | (1) |
|
Windows File Explorer (11.1.4) |
|
|
556 | (1) |
|
|
557 | (1) |
|
|
558 | (1) |
|
Run as Administrator (11.1.4.4) |
|
|
559 | (1) |
|
Windows Libraries (11.1.4.5) |
|
|
560 | (1) |
|
Directory Structures (11.1.4.6) |
|
|
560 | (2) |
|
User and System File Locations (11.1.4.7) |
|
|
562 | (2) |
|
File Extensions (11.1.4.8) |
|
|
564 | (1) |
|
File Attributes (11.1.4.9) |
|
|
565 | (2) |
|
Configure Windows with Control Panels (11.2) |
|
|
567 | (47) |
|
Control Panel Utilities (11.2.1) |
|
|
567 | (1) |
|
Windows 10: Settings and Control Panels (11.2.1.1) |
|
|
567 | (2) |
|
Introduction to Control Panel (11.2.1.2) |
|
|
569 | (1) |
|
Control Panel Views (11.2.1.3) |
|
|
570 | (2) |
|
Define Control Panel Categories (11.2.1.4) |
|
|
572 | (3) |
|
User and Account Control Panel Items (11.2.2) |
|
|
575 | (1) |
|
|
575 | (1) |
|
User Account Control Settings (11.2.2.2) |
|
|
576 | (1) |
|
Credential Manager (11.2.2.4) |
|
|
577 | (1) |
|
|
578 | (1) |
|
Network and Internet Control Panels (11.2.3) |
|
|
579 | (1) |
|
Network Settings (11.2.3.1) |
|
|
579 | (1) |
|
Internet Options (11.2.3.2) |
|
|
580 | (4) |
|
Network and Sharing Center (11.2.3.3) |
|
|
584 | (2) |
|
|
586 | (2) |
|
Display Settings and Control Panel (11.2.4) |
|
|
588 | (1) |
|
Display Settings and Configuration (11.2.4.1) |
|
|
588 | (2) |
|
Display Features (11.2.4.2) |
|
|
590 | (1) |
|
Power and System Control Panels (11.2.5) |
|
|
591 | (1) |
|
|
591 | (1) |
|
Power Options Settings (11.2.5.2) |
|
|
592 | (1) |
|
Power Options Actions (11.2.5.3) |
|
|
593 | (2) |
|
System Control Panel Item (11.2.5.5) |
|
|
595 | (1) |
|
System Properties (11.2.5.6) |
|
|
595 | (3) |
|
Increasing Performance (11.2.5.7) |
|
|
598 | (2) |
|
Hardware and Sound Control Panels (11.2.6) |
|
|
600 | (1) |
|
Device Manager (11.2.6.1) |
|
|
600 | (1) |
|
Devices and Printers (11.2.6.3) |
|
|
601 | (2) |
|
|
603 | (1) |
|
Clock, Region, and Language (11.2.7) |
|
|
604 | (1) |
|
|
604 | (1) |
|
|
604 | (2) |
|
|
606 | (2) |
|
Programs and Features Control Panels (11.2.8) |
|
|
608 | (1) |
|
|
608 | (1) |
|
Windows Features and Updates (11.2.8.2) |
|
|
609 | (1) |
|
Default Programs (11.2.8.3) |
|
|
609 | (1) |
|
Other Control Panels (11.2.9) |
|
|
610 | (1) |
|
Troubleshooting (11.2.9.1) |
|
|
611 | (1) |
|
BitLocker Drive Encryption (11.2.9.2) |
|
|
611 | (1) |
|
File Explorer and Folder Options (11.2.9.3) |
|
|
612 | (2) |
|
System Administration (11.3) |
|
|
614 | (30) |
|
Administrative Tools (11.3.1) |
|
|
614 | (1) |
|
Administrative Tools Control Panel Item (11.3.1.1) |
|
|
614 | (1) |
|
Computer Management (11.3.1.2) |
|
|
615 | (1) |
|
|
616 | (2) |
|
Local Users and Groups (11.3.1.4) |
|
|
618 | (1) |
|
Performance Monitor (11.3.1.5) |
|
|
619 | (1) |
|
Component Services and Data Sources (11.3.1.6) |
|
|
620 | (1) |
|
|
620 | (2) |
|
|
622 | (1) |
|
Print Management (11.3.1.9) |
|
|
622 | (1) |
|
Windows Memory Diagnostics (11.3.1.10) |
|
|
623 | (1) |
|
System Utilities (11.3.2) |
|
|
624 | (1) |
|
System Information (11.3.2.1) |
|
|
624 | (1) |
|
System Configuration (11.3.2.2) |
|
|
625 | (2) |
|
|
627 | (1) |
|
|
628 | (1) |
|
Microsoft Management Console (11.3.2.5) |
|
|
629 | (1) |
|
|
630 | (1) |
|
|
631 | (1) |
|
What Do You Already Know? - Disk Operations (11.3.3.1) |
|
|
631 | (1) |
|
Disk Management Utility (11.3.3.2) |
|
|
632 | (1) |
|
|
633 | (1) |
|
Mounting a Drive (11.3.3.4) |
|
|
634 | (1) |
|
|
635 | (1) |
|
Disk Optimization (11.3.3.6) |
|
|
636 | (2) |
|
Disk Error-Checking (11.3.3.7) |
|
|
638 | (1) |
|
Application Installation and Configuration (11.3.4) |
|
|
639 | (1) |
|
System Requirements (11.3.4.1) |
|
|
639 | (1) |
|
Installation Methods (11.3.4.2) |
|
|
640 | (1) |
|
Installing an Application (11.3.4.3) |
|
|
640 | (2) |
|
Compatibility Mode (11.3.4.4) |
|
|
642 | (1) |
|
Uninstalling or Changing a Program (11.3.4.5) |
|
|
642 | (1) |
|
Security Considerations (11.3.4.7) |
|
|
643 | (1) |
|
Command-Line Tools (11.4) |
|
|
644 | (36) |
|
Using Windows CLI (11.4.1) |
|
|
644 | (1) |
|
|
645 | (1) |
|
The Command Shell (11.4.1.2) |
|
|
645 | (1) |
|
Basic Commands (11.4.1.3) |
|
|
646 | (4) |
|
File System CLI Commands (11.4.2) |
|
|
650 | (1) |
|
Command Syntax Conventions (11.4.2.1) |
|
|
650 | (1) |
|
File System Navigation (11.4.2.2) |
|
|
651 | (1) |
|
File System Navigation - Commands (11.4.2.3) |
|
|
651 | (3) |
|
Manipulating Folders - Commands (11.4.2.5) |
|
|
654 | (4) |
|
Manipulating Files - Commands (11.4.2.6) |
|
|
658 | (8) |
|
Disk CLI Commands (11.4.3) |
|
|
666 | (1) |
|
Disk Operations - Commands (11.4.3.1) |
|
|
666 | (4) |
|
Task and System CLI Commands (11.4.4) |
|
|
670 | (1) |
|
System CLI Commands (11.4.4.1) |
|
|
670 | (5) |
|
Other Useful CLI Commands (11.4.5) |
|
|
675 | (1) |
|
Other Useful Commands (11.4.5.1) |
|
|
675 | (4) |
|
Running System Utilities (11.4.5.2) |
|
|
679 | (1) |
|
Windows Networking (11.5) |
|
|
680 | (20) |
|
Network Sharing and Mapping Drives (11.5.1) |
|
|
680 | (1) |
|
Domain and Workgroup (11.5.1.1) |
|
|
680 | (1) |
|
|
681 | (2) |
|
Network Shares and Mapping Drives (11.5.1.4) |
|
|
683 | (1) |
|
Administrative Shares (11.5.1.5) |
|
|
684 | (1) |
|
Sharing Local Resources with Others (11.5.2) |
|
|
685 | (1) |
|
Sharing Local Resources (11.5.2.1) |
|
|
685 | (1) |
|
Printer Sharing vs. Network Printer Mapping (11.5.2.2) |
|
|
686 | (2) |
|
Configure a Wired Network Connection (11.5.3) |
|
|
688 | (1) |
|
Configuring Wired Network Interfaces in Windows 10 (11.5.3.1) |
|
|
688 | (1) |
|
Configuring a Wired NIC (11.5.3.2) |
|
|
689 | (3) |
|
Setting a Network Profile (11.5.3.3) |
|
|
692 | (1) |
|
Verify Connectivity with the Windows GUI (11.5.3.4) |
|
|
693 | (1) |
|
Ipconfig Command (11.5.3.5) |
|
|
694 | (1) |
|
Network CLI Commands (11.5.3.6) |
|
|
695 | (1) |
|
Configure a Wireless Network Interface in Windows (11.5.4) |
|
|
695 | (1) |
|
Wireless Settings (11.5.4.1) |
|
|
696 | (1) |
|
Remote Access Protocols (11.5.5) |
|
|
697 | (1) |
|
VPN Access in Windows (11.5.5.1) |
|
|
697 | (1) |
|
Telnet and SSH (11.5.5.2) |
|
|
698 | (1) |
|
Remote Desktop and Assistance (11.5.6) |
|
|
699 | (1) |
|
Common Preventive Maintenance Techniques for Operating Systems (11.6) |
|
|
700 | (7) |
|
OS Preventive Maintenance Plan (11.6.1) |
|
|
700 | (1) |
|
Preventive Maintenance Plan Contents (11.6.1.1) |
|
|
700 | (2) |
|
Windows Updates (11.6.1.3) |
|
|
702 | (2) |
|
Backup and Restore (11.6.2) |
|
|
704 | (1) |
|
Restore Points (11.6.2.1) |
|
|
704 | (1) |
|
Hard Drive Backup (11.6.2.2) |
|
|
705 | (2) |
|
Basic Troubleshooting Process for Windows Operating Systems (11.7) |
|
|
707 | (13) |
|
Applying Troubleshooting Process to Windows Operating Systems (11.7.1) |
|
|
707 | (1) |
|
The Six Steps of the Troubleshooting Process (11.7.1.1) |
|
|
707 | (1) |
|
Identify the Problem (11.7.1.2) |
|
|
707 | (1) |
|
Establish a Theory of Provable Cause (11.7.1.3) |
|
|
708 | (1) |
|
Test the Theory to Determine the Cause (11.7.1.4) |
|
|
708 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (11.7.1.5) |
|
|
709 | (1) |
|
Verify Full System Functionality and, if Applicable, Implement Preventive Measures (11.7.1.6) |
|
|
710 | (1) |
|
Document Findings, Actions, and Outcomes (11.7.1.7) |
|
|
710 | (1) |
|
Common Problems and Solutions for Windows Operating Systems (11.7.2) |
|
|
711 | (1) |
|
Common Problems and Solutions for Windows Operating Systems (11.7.2.1) |
|
|
711 | (5) |
|
Advanced Troubleshooting for Windows Operating Systems (11.7.3) |
|
|
716 | (1) |
|
Advanced Problems and Solutions for Windows Operating Systems (11.7.3.1) |
|
|
716 | (4) |
|
|
720 | (1) |
|
|
721 | (1) |
|
|
721 | (1) |
|
|
722 | (1) |
|
Check Your Understanding Questions |
|
|
722 | (5) |
|
Chapter 12 Mobile, Linux, and macOS Operating Systems |
|
|
727 | (87) |
|
|
727 | (1) |
|
|
727 | (2) |
|
|
729 | (1) |
|
Mobile Operating Systems (12.1) |
|
|
729 | (26) |
|
|
729 | (1) |
|
Open Source vs. Closed Source (12.1.1.1) |
|
|
730 | (2) |
|
Applications and Content Sources (12.1.1.2) |
|
|
732 | (2) |
|
Android Touch Interface (12.1.2) |
|
|
734 | (1) |
|
Home Screen Items (12.1.2.1) |
|
|
734 | (3) |
|
iOS Touch Interface (12.1.3) |
|
|
737 | (1) |
|
Home Screen Items (12.1.3.1) |
|
|
737 | (4) |
|
Common Mobile Device Features (12.1.4) |
|
|
741 | (1) |
|
Screen Orientation (12.1.4.1) |
|
|
741 | (2) |
|
Screen Calibration (12.1.4.2) |
|
|
743 | (2) |
|
|
745 | (2) |
|
|
747 | (2) |
|
|
749 | (1) |
|
Virtual Private Network (12.1.4.7) |
|
|
749 | (4) |
|
Virtual Assistants (12.1.4.8) |
|
|
753 | (2) |
|
Methods for Securing Mobile Devices (12.2) |
|
|
755 | (12) |
|
Screen Locks and Biometric Authentication (12.2.1) |
|
|
755 | (1) |
|
What Do You Already Know? - Locks (12.2.1.1) |
|
|
755 | (1) |
|
Restrictions on Failed Login Attempts (12.2.1.3) |
|
|
756 | (2) |
|
Cloud-Enabled Services for Mobile Devices (12.2.2) |
|
|
758 | (1) |
|
|
758 | (1) |
|
Locator Applications (12.2.2.2) |
|
|
759 | (2) |
|
Remote Lock and Remote Wipe (12.2.2.3) |
|
|
761 | (2) |
|
Software Security (12.2.3) |
|
|
763 | (1) |
|
|
763 | (1) |
|
Rooting and Jailbreaking (12.2.3.2) |
|
|
764 | (1) |
|
Patching and Updating Operating Systems (12.2.3.3) |
|
|
765 | (2) |
|
Linux and macOS Operating Systems (12.3) |
|
|
767 | (26) |
|
Linux and macOS Tools and Features (12.3.1) |
|
|
767 | (1) |
|
Introduction to Linux and macOS Operating Systems (12.3.1.1) |
|
|
767 | (3) |
|
Overview of Linux GUI (12.3.1.2) |
|
|
770 | (1) |
|
Overview of macOS GUI (12.3.1.3) |
|
|
771 | (2) |
|
Overview of Linux and macOS CLI (12.3.1.4) |
|
|
773 | (2) |
|
Linux Backup and Recovery (12.3.1.5) |
|
|
775 | (1) |
|
macOS Backup and Recovery (12.3.1.6) |
|
|
776 | (1) |
|
Overview of Disk Utilities (12.3.1.7) |
|
|
777 | (1) |
|
Linux and macOS Best Practices (12.3.2) |
|
|
778 | (1) |
|
Scheduled Tasks (12.3.2.1) |
|
|
778 | (2) |
|
Operating System Updates (12.3.2.2) |
|
|
780 | (1) |
|
|
781 | (2) |
|
Basic CLI Commands (12.3.3) |
|
|
783 | (1) |
|
The ls --l Command Output (12.3.3.3) |
|
|
783 | (1) |
|
Basic Unix File and Directory Permissions (12.3.3.4) |
|
|
784 | (2) |
|
Linux Administrative Commands (12.3.3.7) |
|
|
786 | (4) |
|
Linux Administrative Commands Requiring Root Access (12.3.3.8) |
|
|
790 | (3) |
|
Basic Troubleshooting Process for Mobile, Linux, and macOS Operating Systems (12.4) |
|
|
793 | (12) |
|
Applying the Troubleshooting Process to Mobile, Linux, and macOS Operating Systems (12.4.1) |
|
|
794 | (1) |
|
The Six Steps of the Troubleshooting Process (12.4.1.1) |
|
|
794 | (1) |
|
Identify the Problem (12.4.1.2) |
|
|
794 | (1) |
|
Establish a Theory of Probable Cause (12.4.1.3) |
|
|
795 | (1) |
|
Test the Theory to Determine the Cause (12.4.1.4) |
|
|
796 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (12.4.1.5) |
|
|
796 | (1) |
|
Verify Full System Functionality and, if Applicable, Implement Preventive Measures (12.4.1.6) |
|
|
797 | (1) |
|
Document Findings, Actions, and Outcomes (12.4.1.7) |
|
|
797 | (1) |
|
Common Problems and Solutions for Other Operating Systems (12.4.2) |
|
|
798 | (1) |
|
Common Problems and Solutions for Mobile Operating Systems (12.4.2.1) |
|
|
798 | (3) |
|
Common Problems and Solutions for Mobile OS Security (12.4.2.2) |
|
|
801 | (2) |
|
Common Problems and Solutions for Linux and macOS Operating Systems (12.4.2.3) |
|
|
803 | (2) |
|
|
805 | (1) |
|
|
805 | (1) |
|
|
806 | (1) |
|
Check Your Understanding Questions |
|
|
806 | (8) |
|
|
814 | (99) |
|
|
811 | (1) |
|
|
811 | (3) |
|
|
814 | (1) |
|
13.1 Security Threats (13.1) |
|
|
814 | (20) |
|
|
814 | (1) |
|
|
815 | (1) |
|
What Do You Already Know? - Malware (13.1.1.2) |
|
|
815 | (2) |
|
Viruses and Trojan Horses (13.1.1.3) |
|
|
817 | (1) |
|
Types of Malware (13.1:1.4) |
|
|
818 | (2) |
|
Preventing Malware (13.1.2) |
|
|
820 | (1) |
|
Anti-Malware Programs (13.1.2.1) |
|
|
820 | (2) |
|
Signature File Updates (13.1.2.2) |
|
|
822 | (1) |
|
Remediating Infected Systems (13.1.2.4) |
|
|
823 | (2) |
|
|
825 | (1) |
|
Networks Are Targets (13.1.3.1) |
|
|
825 | (1) |
|
Types of TCP/IP Attacks (13.1.3.2) |
|
|
826 | (1) |
|
|
827 | (1) |
|
Protecting Against Network Attacks (13.1.3.5) |
|
|
828 | (2) |
|
Social Engineering Attacks (13.1.4) |
|
|
830 | (1) |
|
Social Engineering (13.1.4.1) |
|
|
830 | (1) |
|
What Do You Already Know? - Social Engineering Techniques (13.1.4.2) |
|
|
830 | (2) |
|
Social Engineering Techniques (13.1.4.3) |
|
|
832 | (1) |
|
Protecting Against Social Engineering (13.1.4.4) |
|
|
833 | (1) |
|
Security Procedures (13.2) |
|
|
834 | (15) |
|
|
834 | (1) |
|
What Is a Security Policy? (13.2.1.1) |
|
|
834 | (1) |
|
Security Policy Category (13.2.1.2) |
|
|
835 | (1) |
|
Securing Devices and Data (13.2.1.3) |
|
|
835 | (1) |
|
Protecting Physical Equipment (13.2.2) |
|
|
835 | (1) |
|
Physical Security (13.2.2.1) |
|
|
835 | (1) |
|
Types of Secure Locks (13.2.2.2) |
|
|
836 | (3) |
|
|
839 | (1) |
|
Securing Computers and Network Hardware (13.2.2.4) |
|
|
840 | (1) |
|
|
841 | (1) |
|
Data - Your Greatest Asset (13.2.3.1) |
|
|
841 | (1) |
|
|
842 | (1) |
|
File and Folder Permissions (13.2.3.3) |
|
|
842 | (2) |
|
File and Folder Encryption (13.2.3.4) |
|
|
844 | (1) |
|
Windows BitLocker and BitLocker To Go (13.2.3.5) |
|
|
844 | (3) |
|
Data Destruction (13.2.4) |
|
|
847 | (1) |
|
Data Wiping Magnetic Media (13.2.4.1) |
|
|
847 | (1) |
|
Data Wiping Other Media (13.2.4.2) |
|
|
848 | (1) |
|
Hard Drive Recycling and Destruction (13.2.4.3) |
|
|
848 | (1) |
|
Securing Windows Workstations (13.3) |
|
|
849 | (36) |
|
Securing a Workstation (13.3.1) |
|
|
849 | (1) |
|
Securing a Computer (13.3.1.1) |
|
|
849 | (1) |
|
|
850 | (1) |
|
Securing Windows Login (13.3.1.3) |
|
|
851 | (2) |
|
Local Password Management (13.3.1.4) |
|
|
853 | (1) |
|
Usernames and Passwords (13.3.1.5) |
|
|
854 | (1) |
|
Windows Local Security Policy (13.3.2) |
|
|
855 | (1) |
|
The Windows Local Security Policy (13.3.2.1) |
|
|
855 | (1) |
|
Account Policies Security Settings (13.3.2.2) |
|
|
856 | (2) |
|
Local Policies Security Settings (13.3.2.3) |
|
|
858 | (1) |
|
Exporting the Local Security Policy (13.3.2.4) |
|
|
859 | (1) |
|
Managing Users and Groups (13.3.3) |
|
|
860 | (1) |
|
Maintaining Accounts (13.3.3.1) |
|
|
860 | (1) |
|
Managing User Account Tools and User Account Tasks (13.3.3.2) |
|
|
861 | (1) |
|
Local Users and Groups Manager (13.3.3.3) |
|
|
862 | (2) |
|
Managing Groups (13.3.3.4) |
|
|
864 | (3) |
|
Active Directory Users and Computers (13.3.3.5) |
|
|
867 | (2) |
|
Windows Firewall (13.3.4) |
|
|
869 | (1) |
|
|
869 | (2) |
|
Software Firewalls (13.3.4.2) |
|
|
871 | (1) |
|
Windows Firewall (13.3.4.3) |
|
|
872 | (2) |
|
Configuring Exceptions in Windows Firewall (13.3.4.4) |
|
|
874 | (1) |
|
Windows Firewall with Advanced Security (13.3.4.5) |
|
|
875 | (1) |
|
|
876 | (1) |
|
|
876 | (1) |
|
InPrivate Browsing (13.3.5.2) |
|
|
877 | (2) |
|
Pop-up Blocker (13.3.5.3) |
|
|
879 | (1) |
|
SmartScreen Filter (13.3.5.4) |
|
|
880 | (1) |
|
ActiveX Filtering (13.3.5.5) |
|
|
881 | (1) |
|
Security Maintenance (13.3.6) |
|
|
882 | (1) |
|
Restrictive Settings (13.3.6.1) |
|
|
883 | (1) |
|
Disable Auto-Play (13.3.6.2) |
|
|
883 | (1) |
|
Operating System Service Packs and Security Patches (13.3.6.3) |
|
|
884 | (1) |
|
|
885 | (15) |
|
Configure Wireless Security (13.4.1) |
|
|
886 | (1) |
|
What Do You Already Know? - Wireless Security (13.4.1.1) |
|
|
886 | (1) |
|
Common Communication Encryption Types (13.4.1.2) |
|
|
887 | (2) |
|
Wi-Fi Configuration Best Practices (13.4.1.3) |
|
|
889 | (2) |
|
Authentication Methods (13.4.1.4) |
|
|
891 | (1) |
|
Wireless Security Modes (13.4.1.5) |
|
|
892 | (1) |
|
Firmware Updates (13.4.1.6) |
|
|
893 | (1) |
|
|
894 | (2) |
|
Port Forwarding and Port Triggering (13.4.1.8) |
|
|
896 | (2) |
|
Universal Plug and Play (13.4.1.9) |
|
|
898 | (2) |
|
Basic Troubleshooting Process for Security (13.5) |
|
|
900 | (6) |
|
Applying the Troubleshooting Process to Security (13.5.1) |
|
|
900 | (1) |
|
The Six Steps of the Troubleshooting Process (13.5.1.1) |
|
|
900 | (1) |
|
Identify the Problem (13.5.1.2) |
|
|
901 | (1) |
|
Establish a Theory of Probable Cause (13.5.1.3) |
|
|
901 | (1) |
|
Test the Theory to Determine Cause (13.5.1.4) |
|
|
902 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (13.5.1.5) |
|
|
903 | (1) |
|
Verify Full System Functionality and, if Applicable Implement Preventive Measures (13.5.1.6) |
|
|
903 | (1) |
|
Document Findings, Actions, and Outcomes (13.5.1.7) |
|
|
904 | (1) |
|
Common problems and Solutions for Security (13.5.2) |
|
|
904 | (1) |
|
Common Problems and Solutions for Security (13.5.2.1) |
|
|
904 | (2) |
|
|
906 | (1) |
|
|
907 | (1) |
|
|
907 | (1) |
|
|
907 | (1) |
|
Check Your Understanding Questions |
|
|
908 | (5) |
|
Chapter 14 The IT Professional |
|
|
913 | (52) |
|
|
913 | (1) |
|
|
913 | (2) |
|
|
915 | (1) |
|
Communication Skills and the IT Professional (14.1) |
|
|
915 | (10) |
|
Communication Skills, Troubleshooting, and Professional Behavior (14.1.1) |
|
|
915 | (1) |
|
Relationship Between Communication Skills and Troubleshooting (14.1:1.1) |
|
|
916 | (1) |
|
Relationship Between Communication Skills and Professional Behavior (14.1.1.3) |
|
|
917 | (1) |
|
Working with a Customer (14.1.2) |
|
|
917 | (1) |
|
Know, Relate, and Understand (14.1.2.1) |
|
|
917 | (1) |
|
Active Listening (14.1.2.2) |
|
|
918 | (1) |
|
Professional Behavior (14.1.3) |
|
|
919 | (1) |
|
Using Professional Behavior with the Customer (14.1.3.1) |
|
|
919 | (1) |
|
Tips for Hold and Transfer (14.1.3.2) |
|
|
920 | (1) |
|
14.1.3.4 What Do You Already Know? - Netiquette (14.1.3.4) |
|
|
921 | (1) |
|
The Customer Call (14.1.4) |
|
|
922 | (1) |
|
Keeping the Customer Call Focused (14.1.4.1) |
|
|
922 | (3) |
|
Operational Procedures (14.2) |
|
|
925 | (9) |
|
|
925 | (1) |
|
Documentation Overview (14.2.1.1) |
|
|
925 | (1) |
|
IT Department Documentation (14.2.1.2) |
|
|
926 | (1) |
|
Regulatory Compliance Requirements (14.2.1.3) |
|
|
927 | (1) |
|
Change Management (14.2.2) |
|
|
928 | (1) |
|
Change Control Process (14.2.2.1) |
|
|
928 | (3) |
|
Disaster Prevention and Recovery (14.2.3) |
|
|
931 | (1) |
|
Disaster Recovery Overview (14.2.3.1) |
|
|
931 | (1) |
|
Preventing Downtime and Data Loss (14.2.3.2) |
|
|
931 | (2) |
|
Elements of a Disaster Recovery Plan (14.2.3.3) |
|
|
933 | (1) |
|
Ethical and Legal Considerations (14.3) |
|
|
934 | (10) |
|
Ethical and Legal Considerations in the IT Profession (14.3.1) |
|
|
935 | (1) |
|
Ethical and Legal Considerations in IT (14.3.1.1) |
|
|
935 | (1) |
|
Personally Identifiable Information (PII) (14.3.1.2) |
|
|
935 | (1) |
|
Payment Card Industry (PCI) (14.3.1.3) |
|
|
936 | (1) |
|
Protected Health Information (PHI) (14.3.1.4) |
|
|
936 | (1) |
|
Legal Considerations in IT (14.3.1.6) |
|
|
937 | (1) |
|
|
938 | (2) |
|
Legal Procedures Overview {14.3.2) |
|
|
940 | (1) |
|
Computer Forensics (14.3.2.1) |
|
|
940 | (1) |
|
Data Collected in Computer Forensics (14.3.2.2) |
|
|
941 | (1) |
|
|
942 | (1) |
|
First Response (14.3.2.4) |
|
|
942 | (1) |
|
|
942 | (1) |
|
Chain of Custody (14.3.2.6) |
|
|
943 | (1) |
|
Call Center Technicians (14.4) |
|
|
944 | (14) |
|
Call Centers, Level One and Level Two Technicians (14.4.1) |
|
|
944 | (1) |
|
|
944 | (2) |
|
Level One Technician Responsibilities (14.4.1.2) |
|
|
946 | (1) |
|
Level Two Technician Responsibilities (14.4.1.3) |
|
|
947 | (2) |
|
Basic Scripting and the IT Professional (14.4.2) |
|
|
949 | (1) |
|
Script Examples (14.4.2.1) |
|
|
949 | (1) |
|
Scripting Languages (14.4.2.2) |
|
|
950 | (1) |
|
Basic Script Commands (14.4.2.3) |
|
|
951 | (1) |
|
Variables/Environmental Variables (14.4.2.4) |
|
|
952 | (1) |
|
Conditional Statements (14.4.2.5) |
|
|
953 | (2) |
|
|
955 | (3) |
|
|
958 | (1) |
|
|
959 | (1) |
|
|
959 | (1) |
|
Check Your Understanding Questions |
|
|
959 | (6) |
Appendix A Answers to "Check Your Understanding" Questions |
|
965 | (20) |
Glossary |
|
985 | (56) |
Index |
|
1041 | |