Introduction |
|
xxii | |
Instructor Materials |
|
xxxix | |
|
Chapter 1 Safety and Professionalism |
|
|
1 | (25) |
|
|
1 | (1) |
|
|
1 | (3) |
|
Professional Appearance and Attire |
|
|
1 | (1) |
|
|
1 | (3) |
|
|
4 | (5) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
Expectations and Follow-Up |
|
|
7 | (2) |
|
|
9 | (5) |
|
Electrostatic Discharge (ESD) |
|
|
9 | (1) |
|
|
9 | (2) |
|
Electromagnetic Interference (EMI) |
|
|
11 | (1) |
|
Radio Frequency Interference (RFI) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (2) |
|
|
14 | (6) |
|
Troubleshooting Methodology |
|
|
14 | (6) |
|
|
20 | (6) |
|
Chapter 2 The Visible Computer |
|
|
26 | (32) |
|
|
27 | (1) |
|
|
27 | (4) |
|
|
28 | (2) |
|
|
30 | (1) |
|
Why the Process Matters to Techs |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
31 | (3) |
|
|
34 | (1) |
|
|
34 | (20) |
|
Common Operating System Functions |
|
|
35 | (1) |
|
|
35 | (7) |
|
File Structures and Paths |
|
|
42 | (6) |
|
The Tech Utility Launch Points |
|
|
48 | (6) |
|
|
54 | (4) |
|
|
58 | (42) |
|
|
59 | (1) |
|
|
59 | (7) |
|
|
59 | (2) |
|
|
61 | (2) |
|
|
63 | (3) |
|
Back to the External Data Bus |
|
|
66 | (1) |
|
|
66 | (6) |
|
|
67 | (1) |
|
|
68 | (4) |
|
|
72 | (1) |
|
|
72 | (11) |
|
|
72 | (3) |
|
|
75 | (8) |
|
Selecting and Installing CPUs |
|
|
83 | (8) |
|
|
84 | (1) |
|
|
85 | (6) |
|
|
91 | (2) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (5) |
|
|
100 | (28) |
|
|
101 | (1) |
|
|
101 | (4) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
105 | (2) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (5) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (2) |
|
|
112 | (7) |
|
|
112 | (5) |
|
|
117 | (1) |
|
|
118 | (1) |
|
Installing SO-DIMMs in Laptops |
|
|
118 | (1) |
|
|
119 | (3) |
|
|
122 | (6) |
|
|
128 | (32) |
|
|
129 | (1) |
|
|
129 | (7) |
|
|
131 | (5) |
|
CMOS and the System Setup Utility |
|
|
136 | (11) |
|
Touring the System Setup Utility |
|
|
137 | (6) |
|
Noteworthy BIOS/UEFI Security Settings |
|
|
143 | (3) |
|
Exiting and Saving BIOS/UEFI Settings |
|
|
146 | (1) |
|
Power-On Self-Test (POST) |
|
|
147 | (3) |
|
Before and During the Video Test: The Beep Codes |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
148 | (2) |
|
Care and Feeding of BIOS/UEFI |
|
|
150 | (4) |
|
Default/Optimized Settings |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (2) |
|
|
154 | (6) |
|
|
160 | (36) |
|
|
161 | (1) |
|
|
161 | (2) |
|
|
161 | (2) |
|
|
163 | (7) |
|
|
166 | (2) |
|
|
168 | (1) |
|
|
168 | (2) |
|
|
170 | (11) |
|
Structure and Function of the Expansion Bus |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
Installing Expansion Cards |
|
|
173 | (6) |
|
Troubleshooting Expansion Cards |
|
|
179 | (2) |
|
Upgrading and Installing Motherboards |
|
|
181 | (5) |
|
Choosing the Motherboard and Case |
|
|
181 | (3) |
|
Installing the Motherboard |
|
|
184 | (2) |
|
Troubleshooting Motherboards |
|
|
186 | (4) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
188 | (2) |
|
|
190 | (6) |
|
|
196 | (32) |
|
|
197 | (1) |
|
Understanding Electricity |
|
|
197 | (2) |
|
|
199 | (1) |
|
|
199 | (4) |
|
|
199 | (4) |
|
|
203 | (4) |
|
|
207 | (8) |
|
|
207 | (8) |
|
Installing and Maintaining Power Supplies |
|
|
215 | (4) |
|
|
215 | (1) |
|
|
216 | (3) |
|
Troubleshooting Power Supplies |
|
|
219 | (3) |
|
|
219 | (1) |
|
When Power Supplies Die Slowly |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
222 | (6) |
|
Chapter 8 Mass Storage Technologies |
|
|
228 | (26) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
229 | (5) |
|
|
230 | (4) |
|
|
234 | (5) |
|
|
234 | (1) |
|
|
235 | (2) |
|
Esata and Other External Drives |
|
|
237 | (1) |
|
Refining Mass Storage Communication |
|
|
238 | (1) |
|
Protecting Data with RAID |
|
|
239 | (5) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
244 | (5) |
|
|
244 | (1) |
|
|
244 | (2) |
|
Connecting Solid-State Drives |
|
|
246 | (1) |
|
BIOS Support: Configuring CMOS and Installing Drivers |
|
|
246 | (2) |
|
Troubleshooting Hard Drive Installation |
|
|
248 | (1) |
|
|
249 | (5) |
|
Chapter 9 Implementing Mass Storage |
|
|
254 | (54) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (7) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
|
261 | (1) |
|
Partition Naming Problems |
|
|
262 | (1) |
|
|
263 | (9) |
|
|
263 | (1) |
|
|
263 | (6) |
|
|
269 | (2) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
The Partitioning, Formatting, and Pooling Process |
|
|
272 | (19) |
|
|
273 | (1) |
|
Partitioning and Formatting with the Installation Media |
|
|
273 | (3) |
|
|
276 | (12) |
|
|
288 | (1) |
|
|
288 | (3) |
|
Maintaining and Troubleshooting Hard Drives |
|
|
291 | (4) |
|
|
291 | (4) |
|
|
295 | (5) |
|
Troubleshooting Hard Drive Implementation |
|
|
295 | (5) |
|
|
300 | (8) |
|
Chapter 10 Essential Peripherals |
|
|
308 | (40) |
|
|
309 | (1) |
|
|
309 | (8) |
|
|
309 | (1) |
|
|
309 | (6) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
317 | (16) |
|
|
317 | (3) |
|
|
320 | (1) |
|
|
321 | (1) |
|
Barcode Scanner/QR Scanner |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
Game Controllers and Joysticks |
|
|
324 | (2) |
|
|
326 | (1) |
|
Multimedia Devices and Formats |
|
|
327 | (6) |
|
Removable Storage Devices |
|
|
333 | (9) |
|
|
334 | (2) |
|
|
336 | (6) |
|
|
342 | (6) |
|
Chapter 11 Installing and Upgrading Operating Systems |
|
|
348 | (30) |
|
|
349 | (1) |
|
Windows Versions and Editions |
|
|
349 | (6) |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
350 | (2) |
|
|
352 | (2) |
|
Windows 10 Pro for Workstations/Windows 10 Enterprise |
|
|
354 | (1) |
|
What Version of Windows Do I Have? |
|
|
355 | (1) |
|
Installing and Upgrading Windows |
|
|
355 | (15) |
|
|
355 | (1) |
|
|
356 | (3) |
|
The OS Installation Process |
|
|
359 | (8) |
|
Troubleshooting Installation Problems |
|
|
367 | (3) |
|
|
370 | (4) |
|
|
370 | (1) |
|
|
370 | (1) |
|
Restoring User Data Files (If Applicable) |
|
|
371 | (1) |
|
Installing Essential Software |
|
|
371 | (1) |
|
Migrating and Retiring Systems |
|
|
371 | (2) |
|
No Installation Is Perfect |
|
|
373 | (1) |
|
|
374 | (4) |
|
Chapter 12 Working with Operating Systems |
|
|
378 | (46) |
|
|
379 | (1) |
|
|
379 | (4) |
|
|
379 | (1) |
|
|
379 | (2) |
|
|
381 | (1) |
|
|
382 | (1) |
|
Command-Line Registry Editing Tools |
|
|
383 | (1) |
|
Your Basic Windows Toolset |
|
|
383 | (11) |
|
|
383 | (1) |
|
|
384 | (4) |
|
|
388 | (6) |
|
Processes, Applications, and Services Tools |
|
|
394 | (16) |
|
|
394 | (6) |
|
|
400 | (2) |
|
Microsoft Management Console |
|
|
402 | (8) |
|
Macos Preferences and Features |
|
|
410 | (8) |
|
|
410 | (5) |
|
|
415 | (1) |
|
|
415 | (1) |
|
|
415 | (1) |
|
|
416 | (1) |
|
|
416 | (2) |
|
|
418 | (6) |
|
Chapter 13 Users, Groups, and Permissions |
|
|
424 | (36) |
|
|
425 | (1) |
|
Authentication with Users and Groups |
|
|
425 | (9) |
|
|
425 | (1) |
|
|
426 | (1) |
|
Standard Account and Elevated Privileges |
|
|
427 | (1) |
|
Configuring Users and Groups in Windows |
|
|
427 | (5) |
|
|
432 | (2) |
|
Authorization Through NTFS |
|
|
434 | (7) |
|
|
435 | (2) |
|
|
437 | (1) |
|
|
438 | (1) |
|
|
439 | (1) |
|
Permissions in Linux and macOS |
|
|
439 | (2) |
|
Sharing Resources Securely |
|
|
441 | (6) |
|
Sharing Folders and Files |
|
|
441 | (3) |
|
|
444 | (1) |
|
Protecting Data with Encryption |
|
|
445 | (2) |
|
|
447 | (7) |
|
|
447 | (1) |
|
|
448 | (2) |
|
|
450 | (1) |
|
|
451 | (3) |
|
|
454 | (6) |
|
Chapter 14 Maintaining and Optimizing Operating Systems |
|
|
460 | (34) |
|
|
461 | (1) |
|
Maintaining Operating Systems |
|
|
461 | (5) |
|
|
461 | (2) |
|
|
463 | (1) |
|
Controlling Autostarting Software |
|
|
464 | (2) |
|
Optimizing Operating Systems |
|
|
466 | (11) |
|
Installing and Removing Software |
|
|
466 | (10) |
|
|
476 | (1) |
|
|
477 | (10) |
|
Backup and Recovery Options |
|
|
477 | (2) |
|
|
479 | (1) |
|
|
480 | (1) |
|
|
481 | (4) |
|
System Restore in Windows |
|
|
485 | (2) |
|
|
487 | (1) |
|
|
487 | (1) |
|
|
488 | (6) |
|
Chapter 15 Working with the Command-Line Interface |
|
|
494 | (54) |
|
|
495 | (1) |
|
Deciphering the Command-Line Interface |
|
|
495 | (7) |
|
|
496 | (1) |
|
Accessing the Command-Line Interface in Windows |
|
|
496 | (1) |
|
Accessing the Command-Line Interface in macOS and Linux |
|
|
497 | (2) |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
500 | (2) |
|
Mastering Fundamental Commands |
|
|
502 | (10) |
|
Structure: Syntax and Switches |
|
|
502 | (3) |
|
Changing Directory Focus: The cd Command |
|
|
505 | (1) |
|
|
506 | (1) |
|
Making Directories: The md/mkdir Command |
|
|
507 | (2) |
|
Removing Directories: The rd/rmdir Command |
|
|
509 | (1) |
|
Running a Program in Windows |
|
|
509 | (1) |
|
Running a Program in macOS and Linux |
|
|
510 | (2) |
|
|
512 | (6) |
|
|
513 | (1) |
|
Using Wildcards to Locate Files |
|
|
513 | (1) |
|
|
514 | (1) |
|
|
515 | (1) |
|
Pruning and Grafting Folder Trees |
|
|
516 | (2) |
|
Assorted Windows Commands |
|
|
518 | (4) |
|
|
518 | (1) |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
521 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
Assorted macOS and Linux Commands |
|
|
522 | (9) |
|
See Running Processes: Top and ps |
|
|
523 | (2) |
|
|
525 | (1) |
|
|
525 | (1) |
|
Package Managers: Apt-get and yum |
|
|
526 | (1) |
|
|
527 | (2) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
531 | (4) |
|
Script Types and Languages |
|
|
531 | (1) |
|
Ask Not What You Can Do for Scripting |
|
|
532 | (2) |
|
|
534 | (1) |
|
|
535 | (5) |
|
|
535 | (3) |
|
|
538 | (2) |
|
|
540 | (8) |
|
Chapter 16 Troubleshooting Operating Systems |
|
|
548 | (32) |
|
|
549 | (1) |
|
Common Windows Troubleshooting Procedures |
|
|
549 | (11) |
|
Turning Things Off and Back On |
|
|
549 | (1) |
|
|
550 | (1) |
|
Uninstall/Reinstall/Update Applications |
|
|
550 | (1) |
|
|
551 | (1) |
|
Recovering When Windows Breaks |
|
|
551 | (6) |
|
|
557 | (3) |
|
Troubleshooting Common Windows OS Symptoms |
|
|
560 | (9) |
|
|
560 | (1) |
|
|
560 | (1) |
|
|
561 | (1) |
|
|
562 | (1) |
|
|
563 | (2) |
|
|
565 | (1) |
|
|
565 | (1) |
|
USB Controller Resource Warnings |
|
|
565 | (1) |
|
|
566 | (1) |
|
|
567 | (1) |
|
|
567 | (1) |
|
|
568 | (1) |
|
|
569 | (1) |
|
Troubleshooting Problems Related to Motherboard, CPU, RAM, and Power |
|
|
569 | (6) |
|
|
569 | (1) |
|
Proprietary Crash Screens |
|
|
569 | (1) |
|
|
569 | (1) |
|
|
570 | (1) |
|
|
571 | (1) |
|
|
571 | (1) |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
Inaccurate System Date/Time |
|
|
574 | (1) |
|
|
575 | (5) |
|
Chapter 17 Display Technologies |
|
|
580 | (42) |
|
|
581 | (1) |
|
|
581 | (7) |
|
|
581 | (2) |
|
|
583 | (2) |
|
|
585 | (3) |
|
|
588 | (3) |
|
|
588 | (1) |
|
|
589 | (1) |
|
|
590 | (1) |
|
|
590 | (1) |
|
Connector Types and Associated Cables |
|
|
591 | (1) |
|
Installing and Configuring Video |
|
|
591 | (2) |
|
|
592 | (1) |
|
|
593 | (9) |
|
|
600 | (2) |
|
|
602 | (1) |
|
|
602 | (5) |
|
|
602 | (3) |
|
Troubleshooting Projectors |
|
|
605 | (1) |
|
Troubleshooting Video Cards and Drivers |
|
|
606 | (1) |
|
|
607 | (1) |
|
|
607 | (5) |
|
|
608 | (1) |
|
|
609 | (1) |
|
|
609 | (1) |
|
|
609 | (1) |
|
|
609 | (1) |
|
|
610 | (1) |
|
|
610 | (1) |
|
|
610 | (1) |
|
|
611 | (1) |
|
|
611 | (1) |
|
|
611 | (1) |
|
Additional Display Topics |
|
|
612 | (2) |
|
|
612 | (1) |
|
|
612 | (2) |
|
|
614 | (8) |
|
Chapter 18 Essentials of Networking |
|
|
622 | (26) |
|
|
623 | (1) |
|
Roles Hosts Play in Networks |
|
|
623 | (2) |
|
|
625 | (8) |
|
|
625 | (3) |
|
|
628 | (2) |
|
Ethernet with Twisted Pair |
|
|
630 | (1) |
|
Ethernet with Alternative Connections |
|
|
631 | (2) |
|
|
633 | (10) |
|
|
633 | (1) |
|
|
634 | (8) |
|
|
642 | (1) |
|
|
643 | (5) |
|
Chapter 19 Local Area Networking |
|
|
648 | (46) |
|
|
649 | (1) |
|
|
649 | (15) |
|
Network Addressing with IPv4 |
|
|
650 | (2) |
|
Network Addressing with IPv6 |
|
|
652 | (3) |
|
|
655 | (3) |
|
Entering Client IP Information |
|
|
658 | (1) |
|
|
659 | (1) |
|
|
659 | (1) |
|
|
660 | (3) |
|
|
663 | (1) |
|
Automatic Private IP Addressing |
|
|
664 | (1) |
|
Installing and Configuring a Wired Network |
|
|
664 | (4) |
|
|
665 | (2) |
|
Configuring IP Addressing |
|
|
667 | (1) |
|
|
667 | (1) |
|
Network Organization and Access Control |
|
|
668 | (13) |
|
|
668 | (1) |
|
Organizing with Workgroups |
|
|
669 | (5) |
|
|
674 | (5) |
|
File Servers and Drive Mapping |
|
|
679 | (1) |
|
|
680 | (1) |
|
|
681 | (7) |
|
Repairing Physical Cabling |
|
|
682 | (2) |
|
|
684 | (4) |
|
|
688 | (6) |
|
Chapter 20 Wireless Networking |
|
|
694 | (32) |
|
|
694 | (1) |
|
Wireless Networking Components |
|
|
694 | (2) |
|
|
696 | (2) |
|
Wireless Networking Software |
|
|
696 | (2) |
|
|
698 | (1) |
|
|
698 | (2) |
|
Wireless Networking Security |
|
|
698 | (2) |
|
|
700 | (1) |
|
Wireless Networking Standards and Regulations |
|
|
700 | (8) |
|
IEEE 802.11-Based Wireless Networking |
|
|
701 | (3) |
|
Optimizing Wi-Fi Coverage |
|
|
704 | (2) |
|
|
706 | (2) |
|
|
708 | (1) |
|
Installing and Configuring Wireless Networking |
|
|
708 | (7) |
|
|
708 | (6) |
|
Bluetooth Configuration and Troubleshooting |
|
|
714 | (1) |
|
|
715 | (5) |
|
|
716 | (1) |
|
|
716 | (1) |
|
Connectivity Troubleshooting |
|
|
717 | (1) |
|
Configuration Troubleshooting |
|
|
718 | (2) |
|
|
720 | (6) |
|
|
726 | (48) |
|
|
727 | (1) |
|
|
727 | (3) |
|
TCP/IP: The Common Language of the Internet |
|
|
728 | (1) |
|
Internet Service Providers |
|
|
728 | (1) |
|
|
729 | (1) |
|
|
730 | (1) |
|
Connecting to the Internet |
|
|
730 | (9) |
|
|
730 | (1) |
|
|
731 | (1) |
|
|
731 | (1) |
|
|
732 | (1) |
|
|
733 | (1) |
|
|
733 | (1) |
|
|
734 | (1) |
|
Connection to the Internet |
|
|
735 | (4) |
|
|
739 | (3) |
|
Internet Application Protocols |
|
|
739 | (3) |
|
|
742 | (16) |
|
|
742 | (7) |
|
Communicating with Others |
|
|
749 | (3) |
|
|
752 | (5) |
|
Sharing and Transferring Files |
|
|
757 | (1) |
|
|
758 | (2) |
|
|
758 | (2) |
|
|
760 | (7) |
|
|
761 | (1) |
|
|
761 | (1) |
|
|
762 | (2) |
|
|
764 | (1) |
|
|
764 | (1) |
|
|
765 | (2) |
|
|
767 | (7) |
|
|
774 | (28) |
|
|
775 | (1) |
|
|
775 | (13) |
|
Client-Side Virtualization |
|
|
776 | (1) |
|
Benefits of Virtualization |
|
|
777 | (2) |
|
Purpose of Virtual Machines |
|
|
779 | (2) |
|
Creating a Virtual Machine |
|
|
781 | (7) |
|
Server-Side Virtualization |
|
|
788 | (1) |
|
|
788 | (9) |
|
|
790 | (3) |
|
|
793 | (2) |
|
|
795 | (1) |
|
|
796 | (1) |
|
|
797 | (5) |
|
Chapter 23 Portable Computing |
|
|
802 | (40) |
|
|
803 | (1) |
|
Portable Computing Devices |
|
|
803 | (2) |
|
|
803 | (2) |
|
|
805 | (3) |
|
|
805 | (2) |
|
|
807 | (1) |
|
Extending Portable Computers |
|
|
808 | (5) |
|
|
808 | (2) |
|
|
810 | (1) |
|
Portable-Specific Expansion Slots |
|
|
811 | (1) |
|
|
811 | (1) |
|
|
811 | (2) |
|
Managing and Maintaining Portable Computers |
|
|
813 | (9) |
|
|
813 | (1) |
|
|
814 | (4) |
|
|
818 | (1) |
|
|
819 | (1) |
|
|
819 | (3) |
|
Upgrading and Repairing Laptop Computers |
|
|
822 | (7) |
|
|
822 | (2) |
|
|
824 | (2) |
|
Hardware/Device Replacement |
|
|
826 | (3) |
|
Troubleshooting Portable Computers |
|
|
829 | (6) |
|
|
829 | (2) |
|
|
831 | (4) |
|
|
835 | (7) |
|
Chapter 24 Mobile Devices |
|
|
842 | (36) |
|
|
843 | (1) |
|
|
843 | (5) |
|
|
843 | (2) |
|
|
845 | (3) |
|
|
848 | (1) |
|
|
848 | (7) |
|
|
848 | (2) |
|
|
850 | (1) |
|
|
851 | (1) |
|
|
851 | (4) |
|
|
855 | (1) |
|
Configuring a Mobile Device |
|
|
855 | (18) |
|
|
855 | (3) |
|
Installing and Configuring Apps |
|
|
858 | (2) |
|
|
860 | (2) |
|
|
862 | (1) |
|
|
863 | (2) |
|
|
865 | (3) |
|
Mobile Device Communication and Ports |
|
|
868 | (5) |
|
|
873 | (5) |
|
Chapter 25 Maintaining and Securing Mobile Devices |
|
|
878 | (40) |
|
|
879 | (1) |
|
Troubleshooting Mobile Device Issues |
|
|
879 | (15) |
|
|
879 | (3) |
|
Touchscreen and Display Issues |
|
|
882 | (3) |
|
|
885 | (1) |
|
|
885 | (1) |
|
|
886 | (1) |
|
|
886 | (1) |
|
|
887 | (3) |
|
|
890 | (1) |
|
Random Reboots and Freezes |
|
|
890 | (1) |
|
Cannot Broadcast to an External Monitor |
|
|
891 | (1) |
|
|
891 | (1) |
|
Connectivity and Data Usage Issues |
|
|
892 | (1) |
|
GPS and Location Services Problems |
|
|
893 | (1) |
|
|
894 | (1) |
|
|
894 | (8) |
|
Byod Versus Corporate-Owned Devices |
|
|
895 | (1) |
|
Profile Security Requirements |
|
|
895 | (2) |
|
Preventing Physical Damage |
|
|
897 | (1) |
|
|
897 | (1) |
|
|
898 | (1) |
|
|
898 | (1) |
|
|
899 | (3) |
|
Mobile OS and Application Security Issues |
|
|
902 | (8) |
|
|
902 | (2) |
|
Risks, Symptoms, and Clues |
|
|
904 | (6) |
|
|
910 | (8) |
|
Chapter 26 Printers and Multifunction Devices |
|
|
918 | (54) |
|
|
919 | (1) |
|
Printer and Multifunction Device Consumables |
|
|
919 | (17) |
|
|
919 | (11) |
|
|
930 | (4) |
|
|
934 | (1) |
|
Automatic Document Feeders |
|
|
934 | (1) |
|
|
934 | (2) |
|
|
936 | (1) |
|
The Laser Printing Process |
|
|
936 | (4) |
|
|
936 | (2) |
|
|
938 | (1) |
|
|
938 | (1) |
|
|
938 | (1) |
|
|
939 | (1) |
|
|
939 | (1) |
|
|
939 | (1) |
|
Installing a Multifunction Device |
|
|
940 | (5) |
|
Setting Up Printers in Windows |
|
|
940 | (5) |
|
|
945 | (4) |
|
Configuring Print Settings |
|
|
946 | (1) |
|
Optimizing Print Performance |
|
|
947 | (1) |
|
Managing Public/Shared/Networked Devices |
|
|
948 | (1) |
|
|
949 | (1) |
|
Maintaining and Troubleshooting Printers |
|
|
949 | (14) |
|
Maintaining and Troubleshooting General Issues |
|
|
949 | (5) |
|
Maintaining and Troubleshooting Impact Printers |
|
|
954 | (1) |
|
Maintaining and Troubleshooting Thermal Printers |
|
|
955 | (1) |
|
Maintaining and Troubleshooting Inkjet Printers |
|
|
956 | (2) |
|
Maintaining and Troubleshooting Laser Printers |
|
|
958 | (4) |
|
Troubleshooting 3-D Printers |
|
|
962 | (1) |
|
|
963 | (9) |
|
Chapter 27 Securing Computers |
|
|
972 | (54) |
|
|
973 | (1) |
|
Analyzing Threats and Vulnerabilities |
|
|
973 | (9) |
|
|
973 | (8) |
|
|
981 | (1) |
|
Security Concepts and Technologies |
|
|
982 | (11) |
|
|
983 | (2) |
|
|
985 | (8) |
|
|
993 | (12) |
|
|
993 | (4) |
|
Malware Signs and Symptoms |
|
|
997 | (1) |
|
Malware Prevention and Recovery |
|
|
998 | (7) |
|
|
1005 | (9) |
|
|
1005 | (7) |
|
|
1012 | (2) |
|
|
1014 | (4) |
|
Authentication and Encryption |
|
|
1014 | (3) |
|
|
1017 | (1) |
|
|
1018 | (8) |
|
Chapter 28 Operational Procedures |
|
|
1026 | (26) |
|
|
1027 | (1) |
|
Implementing Best Practices Associated with Documentation and Support Systems Information Management |
|
|
1027 | (7) |
|
|
1027 | (3) |
|
Documentation for Policies, Procedures, Industry Standards, and Compliance |
|
|
1030 | (3) |
|
|
1033 | (1) |
|
|
1034 | (1) |
|
Change-Management Best Practices |
|
|
1034 | (4) |
|
Documented Business Processes |
|
|
1034 | (1) |
|
Change-Management Process |
|
|
1035 | (3) |
|
Environmental Impacts and Local Environmental Controls |
|
|
1038 | (3) |
|
Temperature, Humidity, and Ventilation |
|
|
1039 | (1) |
|
|
1040 | (1) |
|
Prohibited Content/Activity and Privacy, Licensing, and Policies |
|
|
1041 | (5) |
|
|
1041 | (1) |
|
|
1042 | (1) |
|
|
1042 | (1) |
|
Licensing, End-User License Agreement, and Digital Rights Management |
|
|
1043 | (1) |
|
|
1044 | (2) |
|
|
1046 | (1) |
|
|
1047 | (5) |
|
Appendix A Mapping to the CompTIA A+ Objectives |
|
|
1052 | (38) |
|
|
1052 | (15) |
|
|
1067 | (23) |
|
Appendix B About the Online Content |
|
|
1090 | (4) |
|
|
1090 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
1090 | (1) |
|
|
1090 | (1) |
|
Single User License Terms and Conditions |
|
|
1091 | (1) |
|
|
1092 | (1) |
|
|
1092 | (1) |
|
Playing the CompTIA A+ Introduction Video |
|
|
1093 | (1) |
|
Mike's CompTIA A+ Video Training Sample |
|
|
1093 | (1) |
|
TotalSims Sample for CompTIA A+ |
|
|
1093 | (1) |
|
|
1093 | (1) |
|
|
1093 | (1) |
Glossary |
|
1094 | (45) |
Index |
|
1139 | |