Introduction |
|
xxiv | |
Chapter 1 Introduction to the Personal Computer |
|
1 | (74) |
|
|
1 | (1) |
|
|
1 | (3) |
|
|
4 | (1) |
|
Cases and Power Supplies (1.1.1) |
|
|
4 | (7) |
|
|
4 | (2) |
|
|
6 | (2) |
|
|
7 | (1) |
|
Electricity and Ohm's Law (1.1.1.3) |
|
|
8 | (3) |
|
Internal PC Components (1.1.2) |
|
|
11 | (7) |
|
|
11 | (2) |
|
|
13 | (3) |
|
Cooling Systems (1.1.2.3) |
|
|
16 | (2) |
|
|
18 | (13) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (2) |
|
|
22 | (1) |
|
|
22 | (1) |
|
Adapter Cards and Expansion Slots (1.1.2.7) |
|
|
22 | (3) |
|
Storage Devices and RAID (1.1.2.8) |
|
|
25 | (5) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
Types of Drive Interfaces |
|
|
28 | (2) |
|
Internal Cables (1.1.2.9) |
|
|
30 | (1) |
|
External Ports and Cables (1.1.3) |
|
|
31 | (10) |
|
Video Ports and Cables (1.1.3.1) |
|
|
31 | (4) |
|
Other Ports and Cables (1.1.3.2) |
|
|
35 | (6) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
FireWire Ports and Cables |
|
|
37 | (1) |
|
Parallel Ports and Cables |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
Input and Output Devices (1.1.4) |
|
|
41 | (8) |
|
|
41 | (3) |
|
|
41 | (1) |
|
|
42 | (1) |
|
Digital Cameras and Digital Video Cameras |
|
|
42 | (1) |
|
Biometric Identification Devices |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
44 | (2) |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
46 | (1) |
|
Monitor Characteristics (1.1.4.3) |
|
|
46 | (3) |
|
Connecting Multiple Monitors to a Single Computer |
|
|
48 | (1) |
|
Selecting PC Components (1.2.1) |
|
|
49 | (15) |
|
Case and Power Supply (1.2.1.1) |
|
|
49 | (1) |
|
Selecting Motherboards (1.2.1.2) |
|
|
50 | (1) |
|
Selecting the CPU and Heat Sink and Fan Assembly (1.2.1.3) |
|
|
51 | (2) |
|
|
53 | (1) |
|
Selecting Adapter Cards (1.2.1.5) |
|
|
54 | (3) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
Selecting Hard Drives and Floppy Drives (1.2.1.6) |
|
|
57 | (3) |
|
|
57 | (1) |
|
|
57 | (3) |
|
Selecting Solid State Drives and Media Readers (1.2.1.7) |
|
|
60 | (2) |
|
|
60 | (1) |
|
|
61 | (1) |
|
Selecting Optical Drives (1.2.1.8) |
|
|
62 | (1) |
|
Selecting External Storage (1.2.1.9) |
|
|
62 | (1) |
|
Selecting Input and Output Devices (1.2.1.10) |
|
|
63 | (1) |
|
Specialized Computer Systems (1.3.1) |
|
|
64 | (7) |
|
CAx Workstations (1.3.1.1) |
|
|
65 | (1) |
|
Audio and Video Editing Workstations (1.3.1.2) |
|
|
65 | (2) |
|
Virtualization Workstations (1.3.1.3) |
|
|
67 | (1) |
|
|
68 | (1) |
|
Home Theater PCs (1.3.1.5) |
|
|
69 | (2) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (3) |
Chapter 2 Lab Procedures and Tool Use |
|
75 | (30) |
|
|
75 | (1) |
|
|
75 | (2) |
|
|
77 | (1) |
|
Safe Lab Procedures (2.1) |
|
|
77 | (2) |
|
|
77 | (1) |
|
Electrical Safety (2.1.1.2) |
|
|
78 | (1) |
|
|
78 | (1) |
|
Procedures to Protect Equipment and Data (2.1.2) |
|
|
79 | (3) |
|
|
79 | (1) |
|
|
80 | (1) |
|
Power Fluctuation Types (2.1.2.2) |
|
|
80 | (1) |
|
Power Protection Devices (2.1.2.3) |
|
|
81 | (1) |
|
Procedures to Protect the Environment (2.1.3) |
|
|
82 | (2) |
|
Material Safety and Data Sheet (2.1.3.1) |
|
|
82 | (1) |
|
Equipment Disposal (2.1.3.2) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
Toner Kits, Cartridges, and Developers |
|
|
84 | (1) |
|
Chemical Solvents and Aerosol Cans |
|
|
84 | (1) |
|
Proper Use of Tools (2.2) |
|
|
84 | (17) |
|
|
84 | (4) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
Diagnostic Tools (2.2.1.5) |
|
|
86 | (2) |
|
|
88 | (1) |
|
Disk Management Tools (2.2.2.1) |
|
|
88 | (1) |
|
Protection Software Tools (2.2.2.2) |
|
|
89 | (1) |
|
Organizational Tools (2.2.3) |
|
|
89 | (3) |
|
Reference Tools (2.2.3.1) |
|
|
89 | (2) |
|
Miscellaneous Tools (2.2.3.2) |
|
|
91 | (1) |
|
Demonstrate Proper Tool Use (2.2.4) |
|
|
92 | (9) |
|
Antistatic Wrist Strap (2.2.4.1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
94 | (4) |
|
Cleaning Materials (2.2.4.6) |
|
|
98 | (3) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (3) |
Chapter 3 Computer Assembly |
|
105 | (50) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
Open the Case and Install the Power Supply (3.1.1) |
|
|
106 | (2) |
|
|
106 | (1) |
|
Install the Power Supply (3.1.1.2) |
|
|
107 | (1) |
|
Install the Motherboard (3.1.2) |
|
|
108 | (5) |
|
Install the CPU, Heat Sink, and Fan Assembly (3.1.2.1) |
|
|
108 | (3) |
|
|
108 | (2) |
|
Heat Sink and Fan Assembly |
|
|
110 | (1) |
|
|
111 | (1) |
|
Install the Motherboard (3.1.2.3) |
|
|
112 | (1) |
|
Install the Drives (3.1.3) |
|
|
113 | (2) |
|
Install the Internal Drive (3.1.3.1) |
|
|
113 | (1) |
|
Install the Optical Drive (3.1.3.2) |
|
|
113 | (1) |
|
Install the Floppy Drive (3.1.3.3) |
|
|
114 | (1) |
|
Install the Adapter Cards (3.1.4) |
|
|
115 | (3) |
|
Types of Adapter Cards (3.1.4.1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
Install a Wireless NIC (3.1.4.3) |
|
|
116 | (1) |
|
Install a Video Adapter Card (3.1.4.4) |
|
|
117 | (1) |
|
Install the Cables (3.1.5) |
|
|
118 | (10) |
|
Install the Internal Power Cables (3.1.5.1) |
|
|
118 | (2) |
|
Motherboard Power Connections |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
Install the Internal Data Cables (3.1.5.2) |
|
|
120 | (2) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
Install the Front Panel Cables (3.1.5.4) |
|
|
122 | (4) |
|
|
123 | (1) |
|
Power and Drive Activity LEDs |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
Install the Case Assembly (3.1.5.6) |
|
|
126 | (1) |
|
Install the External Cables (3.1.5.7) |
|
|
126 | (2) |
|
|
128 | (3) |
|
BIOS Beep Codes and Setup (3.2.1.1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (2) |
|
BIOS Configuration (3.2.2) |
|
|
131 | (6) |
|
BIOS Component Information (3.2.2.1) |
|
|
131 | (1) |
|
BIOS Configurations (3.2.2.2) |
|
|
131 | (2) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
BIOS Security Configurations (3.2.2.3) |
|
|
133 | (1) |
|
BIOS Hardware Diagnostics and Monitoring (3.2.2.4) |
|
|
134 | (3) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
Motherboard and Related Components (3.3.1) |
|
|
137 | (7) |
|
Motherboard Component Upgrades (3.3.1.1) |
|
|
137 | (2) |
|
|
138 | (1) |
|
|
138 | (1) |
|
CMOS Battery Installation |
|
|
139 | (1) |
|
Upgrade the Motherboard (3.3.1.2) |
|
|
139 | (2) |
|
|
140 | (1) |
|
Upgrade CPU and Heat Sink and Fan Assembly (3.3.1.3) |
|
|
141 | (1) |
|
Upgrade the RAM (3.3.1.4) |
|
|
142 | (1) |
|
Upgrade the BIOS (3.3.1.5) |
|
|
143 | (1) |
|
|
144 | (3) |
|
Upgrade Hard Drives and RAID (3.3.2.1) |
|
|
144 | (3) |
|
Input and Output Devices (3.3.3) |
|
|
147 | (2) |
|
Upgrade Input and Output Devices (3.3.3.1) |
|
|
147 | (2) |
|
|
149 | (1) |
|
|
149 | (2) |
|
Virtual Desktop Activities |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (4) |
Chapter 4 Overview of Preventive Maintenance |
|
155 | (24) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
Preventive Maintenance (4.1) |
|
|
156 | (4) |
|
Benefits of Preventive Maintenance (4.1.1.1) |
|
|
156 | (1) |
|
Preventive Maintenance Tasks (4.1.1.2) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
Clean the Case and Internal Components (4.1.1.3) |
|
|
158 | (1) |
|
Inspect Internal Components (4.1.1.4) |
|
|
159 | (1) |
|
Environmental Concerns (4.1.1.5) |
|
|
160 | (1) |
|
Troubleshooting Process Steps (4.2.1) |
|
|
160 | (15) |
|
Introduction to Troubleshooting (4.2.1.1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
Identify the Problem (4.2.1.2) |
|
|
162 | (4) |
|
|
162 | (1) |
|
Open-Ended and Closed-Ended Questions |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
Establish a Theory of Probable Cause (4.2.1.3) |
|
|
166 | (1) |
|
Test the Theory to Determine Cause (4.2.1.4) |
|
|
166 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (4.2.1.5) |
|
|
167 | (1) |
|
Verify Full System Functionality and, If Applicable, Implement Preventive Measures (4.2.1.6) |
|
|
168 | (1) |
|
Document Findings, Actions, and Outcomes (4.2.1.7) |
|
|
168 | (1) |
|
PC Common Problems and Solutions (4.2.2.1) |
|
|
169 | (6) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (4) |
Chapter 5 Operating Systems |
|
179 | (116) |
|
|
179 | (1) |
|
|
179 | (2) |
|
|
181 | (1) |
|
Modern Operating Systems (5.1) |
|
|
181 | (3) |
|
|
181 | (1) |
|
Basic Functions of an Operating System (5.1.1.2) |
|
|
181 | (2) |
|
|
182 | (1) |
|
File and Folder Management, |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
Processor Architecture (5.1.1.3) |
|
|
183 | (1) |
|
Types of Operating Systems (5.1.2) |
|
|
184 | (3) |
|
Desktop Operating Systems (5.1.2.1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Network Operating Systems (5.1.2.2) |
|
|
186 | (1) |
|
Customer Requirements for an Operating System (5.1.3) |
|
|
187 | (5) |
|
OS-Compatible Applications and Environments (5.1.3.1) |
|
|
187 | (1) |
|
Minimum Hardware Requirements and Compatibility with the OS Platform (5.1.3.2) |
|
|
188 | (1) |
|
Microsoft Compatibility Center |
|
|
188 | (1) |
|
Comparing OS Requirements (5.1.3.3) |
|
|
189 | (3) |
|
Operating System Upgrades (5.1.4) |
|
|
192 | (4) |
|
Checking OS Compatibility (5.1.4.1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
Windows OS Upgrades (5.1.4.2) |
|
|
193 | (2) |
|
|
195 | (1) |
|
User State Migration Tool |
|
|
195 | (1) |
|
|
195 | (1) |
|
File and Settings Transfer Wizard for Windows XP |
|
|
196 | (1) |
|
Operating System Installation (5.2) |
|
|
196 | (11) |
|
Hard Drive Partitioning (5.2.1.1) |
|
|
196 | (2) |
|
|
197 | (1) |
|
Hard Drive Formatting (5.2.1.2) |
|
|
198 | (2) |
|
Quick Format Versus Full Format |
|
|
200 | (1) |
|
OS Installation with Default Settings (5.2.1.4) |
|
|
200 | (3) |
|
|
202 | (1) |
|
Account Creation (5.2.1.8) |
|
|
203 | (1) |
|
Complete the Installation (5.2.1.12) |
|
|
204 | (3) |
|
|
205 | (1) |
|
|
206 | (1) |
|
Custom Installation Options (5.2.2)' |
|
|
207 | (7) |
|
|
207 | (1) |
|
Other Installation Methods (5.2.2.2) |
|
|
207 | (4) |
|
|
208 | (1) |
|
|
209 | (1) |
|
Unattended Installation in Windows 7 and Vista |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
System Recovery Options (5.2.2.6) |
|
|
211 | (3) |
|
|
211 | (2) |
|
|
213 | (1) |
|
Automated System Recovery in Windows XP Professional |
|
|
214 | (1) |
|
Factory Recovery Partition |
|
|
214 | (1) |
|
Boot Sequence and Registry Files (5.2.3) |
|
|
214 | (4) |
|
Windows Boot Process (5.2.3.1) |
|
|
214 | (3) |
|
|
215 | (1) |
|
Windows Boot Loader and Windows Boot Manager in Windows 7 and Windows Vista |
|
|
216 | (1) |
|
NTLDR and the Windows Boot Menu in Windows XP |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
Windows Registry (5.2.3.3) |
|
|
217 | (1) |
|
|
218 | (6) |
|
Multiboot Procedures (5.2.4.1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
Disk Management Utility (5.2.4.2) |
|
|
220 | (4) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
Directory Structure and File Attributes (5.2) |
|
|
224 | (6) |
|
Directory Structures (5.2.5.1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
User and System File Locations (5.2.5.2) |
|
|
225 | (2) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
File Extensions and Attributes (5.2.5.3) |
|
|
227 | (1) |
|
Application, File, and Folder Properties (5.2.5.4) |
|
|
228 | (2) |
|
Application and File Properties |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
The Windows GUI and Control Panel (5.3) |
|
|
230 | (9) |
|
Windows Desktop (5.3.1.1) |
|
|
230 | (2) |
|
|
231 | (1) |
|
Desktop Properties (5.3.1.2) |
|
|
232 | (1) |
|
Start Menu and Taskbar (5.3.1.3) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (2) |
|
Computer and Windows Explorer (5.3.1.8) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
Launching Applications and Opening Files |
|
|
236 | (1) |
|
Windows 7 Libraries (5.3.1.9) |
|
|
237 | (1) |
|
Install and Uninstall Applications (5.3.1.10) |
|
|
237 | (2) |
|
|
237 | (1) |
|
Uninstalling or Changing a Program |
|
|
238 | (1) |
|
Control Panel Utilities (5.3.2) |
|
|
239 | (13) |
|
Introduction to Control Panel Utilities (5.3.2.1) |
|
|
239 | (2) |
|
|
241 | (1) |
|
User Account Control Settings |
|
|
241 | (1) |
|
Internet Options (5.3.2.6) |
|
|
242 | (1) |
|
Display Settings (5.3.2.10) |
|
|
243 | (2) |
|
Folder Options (5.3.2.11) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
Windows Firewall (5.3.2.13) |
|
|
246 | (1) |
|
|
247 | (1) |
|
System Utility (5.3.2.15) |
|
|
248 | (2) |
|
|
248 | (1) |
|
|
249 | (1) |
|
Device Manager (5.3.2.19) |
|
|
250 | (2) |
|
Regional and Language Options (5.3.2.23) |
|
|
252 | (1) |
|
Administrative Tools (5.3.3) |
|
|
252 | (4) |
|
Computer Management (5.3.3.1) |
|
|
252 | (1) |
|
Event Viewer, Component Services, and Data Sources (5.3.3.2) |
|
|
253 | (1) |
|
|
254 | (1) |
|
Performance and Windows Memory Diagnostic (5.3.3.4) |
|
|
255 | (1) |
|
|
256 | (3) |
|
Disk Defragmenter and Disk Error-Checking Tool (5.3.4.1) |
|
|
256 | (2) |
|
|
256 | (1) |
|
|
257 | (1) |
|
System Information (5.3.4.5) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
259 | (1) |
|
Control Panel Utilities Unique to Specific Windows Versions (5.3.6) |
|
|
260 | (4) |
|
Windows 7 Unique Utilities (5.3.6.1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
RemoteApp and Desktop Connections |
|
|
262 | (1) |
|
|
262 | (1) |
|
Windows Vista Unique Utilities (5.3.6.2) |
|
|
262 | (1) |
|
Windows XP Unique Utilities (5.3.6.3) |
|
|
263 | (1) |
|
Command-Line Tools (5.3.7) |
|
|
264 | (4) |
|
Windows CLI Commands (5.3.7.1) |
|
|
264 | (1) |
|
Run Line Utility (5.3.7.3) |
|
|
265 | (3) |
|
|
267 | (1) |
|
Client-Side Virtualization (5.4) |
|
|
268 | (3) |
|
Purpose of Virtual Machines (5.4.1.1) |
|
|
268 | (1) |
|
Hypervisor: Virtual Machine Manager (5.4.1.2) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
Virtual Machine Requirements (5.4.1.3) |
|
|
270 | (1) |
|
Common Preventive Maintenance Techniques for Operating Systems (5.5) |
|
|
271 | (8) |
|
Preventive Maintenance Plan Contents (5.5.1.1) |
|
|
271 | (2) |
|
Preventive Maintenance Planning |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
274 | (1) |
|
Scheduling Tasks (5.5.1.6) |
|
|
274 | (2) |
|
|
274 | (1) |
|
|
275 | (1) |
|
Restore Points (5.5.1.10) |
|
|
276 | (1) |
|
Hard Drive Backup (5.5.1.14) |
|
|
277 | (2) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
Basic Troubleshooting Process for Operating Systems (5.6) |
|
|
279 | (9) |
|
Identify the Problem (5.6.1.1) |
|
|
279 | (1) |
|
Establish a Theory of Probable Cause (5.6.1.2) |
|
|
279 | (1) |
|
Test the Theory to Determine Cause (5.6.1.3) |
|
|
280 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (5.6.1.4) |
|
|
280 | (1) |
|
Verify Full System Functionality and Implement Preventive Measures (5.6.1.5) |
|
|
281 | (1) |
|
Document Findings, Actions, and Outcomes (5.6.1.6) |
|
|
281 | (1) |
|
Common Problems and Solutions (5.6.2.1) |
|
|
282 | (6) |
|
|
288 | (1) |
|
|
288 | (3) |
|
|
288 | (3) |
|
|
291 | (1) |
|
|
291 | (4) |
Chapter 6 Networks |
|
295 | (98) |
|
|
295 | (1) |
|
|
295 | (4) |
|
|
299 | (1) |
|
Principles of Networking (6.1) |
|
|
299 | (3) |
|
Define Computer Networks (6.1.1.1) |
|
|
299 | (2) |
|
Features and Benefits (6.1.1.2) |
|
|
301 | (1) |
|
Require Fewer Peripherals |
|
|
301 | (1) |
|
Increase Communication Capabilities |
|
|
301 | (1) |
|
Avoid File Duplication and Corruption |
|
|
301 | (1) |
|
Lower the Cost of Licensing |
|
|
302 | (1) |
|
Centralize Administration |
|
|
302 | (1) |
|
|
302 | (1) |
|
Identifying Networks (6.2) |
|
|
302 | (5) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
Peer-to-Peer Networks (6.2.1.6) |
|
|
305 | (1) |
|
Client/Server Networks (6.2.1.7) |
|
|
306 | (1) |
|
Basic Networking Concepts and Technologies (6.3) |
|
|
307 | (12) |
|
|
307 | (1) |
|
Data Transmission (6.3.1.2) |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
309 | (2) |
|
|
310 | (1) |
|
|
311 | (2) |
|
|
312 | (1) |
|
|
313 | (1) |
|
Static Addressing (6.3.2.4) |
|
|
314 | (1) |
|
DHCP Addressing (6.3.2.5) |
|
|
315 | (2) |
|
Configuring Alternate IP Settings |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
317 | (2) |
|
Common Ports and Protocols (6.3.3) |
|
|
319 | (3) |
|
|
319 | (1) |
|
TCP and UDP Protocols and Ports (6.3.3.3) |
|
|
320 | (2) |
|
Physical Components of a Network (6.4) |
|
|
322 | (8) |
|
|
322 | (1) |
|
Hubs, Bridges, and Switches (6.4.1.2) |
|
|
323 | (2) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
325 | (1) |
|
Routers and Wireless Access Points (6.4.1.3) |
|
|
325 | (2) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
Hardware Firewalls (6.4.1.6) |
|
|
328 | (1) |
|
Internet Appliances (6.4.1.7) |
|
|
329 | (1) |
|
Purchasing Authentic Networking Devices (6.4.1.8) |
|
|
329 | (1) |
|
Cables and Connectors (6.4.2) |
|
|
330 | (7) |
|
Considerations for Cabling a Network (6.4.2.1) |
|
|
330 | (2) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
332 | (1) |
|
Twisted-Pair Cables (6.4.2.3) |
|
|
332 | (4) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
Fiber-Optic Cables (6.4.2.6) |
|
|
336 | (1) |
|
|
337 | (4) |
|
Logical and Physical Topologies (6.5.1.1) |
|
|
337 | (3) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
339 | (1) |
|
Determining the Network Topology (6.5.1.3) |
|
|
340 | (1) |
|
|
341 | (2) |
|
Standards Organizations (6.6.1.1) |
|
|
341 | (1) |
|
|
342 | (1) |
|
Ethernet Technologies (6.6.1.3) |
|
|
342 | (1) |
|
|
343 | (1) |
|
OSI and TCP/IP Data Models (6.7) |
|
|
343 | (4) |
|
|
343 | (2) |
|
Application Layer Protocols |
|
|
344 | (1) |
|
Transport Layer Protocols |
|
|
344 | (1) |
|
|
344 | (1) |
|
Network Access Layer Protocols |
|
|
345 | (1) |
|
|
345 | (1) |
|
Comparing the OSI and TCP/IP Models (6.7.1.3) |
|
|
346 | (1) |
|
Computer-to-Network Connection (6.8) |
|
|
347 | (6) |
|
Network Installation Completion List (6.8.1.1) |
|
|
347 | (1) |
|
Selecting a NIC (6.8.2.1) |
|
|
348 | (2) |
|
Installing and Updating a NIC (6.8.2.3) |
|
|
350 | (1) |
|
Configuring a NIC (6.8.2.7) |
|
|
351 | (1) |
|
Configure Alternate IP Settings |
|
|
352 | (1) |
|
Advanced NIC Settings (6.8.2.8) |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
353 | (1) |
|
Wireless and Wired Router Configurations (6.8.3) |
|
|
353 | (12) |
|
Connecting to the Router (6.8.3.1) |
|
|
353 | (1) |
|
Setting the Network Location (6.8.3.2) |
|
|
354 | (2) |
|
Logging In to the Router (6.8.3.3) |
|
|
356 | (1) |
|
Basic Network Setup (6.8.3.4) |
|
|
356 | (2) |
|
Basic Wireless Settings (6.8.3.7) |
|
|
358 | (2) |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
359 | (1) |
|
Testing Connectivity with the Windows GUI (6.8.3.12) |
|
|
360 | (1) |
|
Testing Connectivity with the Windows CLI (6.8.3.13) |
|
|
361 | (4) |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
OS Configurations (6.8.4) |
|
|
365 | (7) |
|
Domain and Workgroup (6.8.4.1) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
366 | (1) |
|
Connecting to a Workgroup or a Domain (6.8.4.2) |
|
|
366 | (1) |
|
Windows 7 Homegroup (6.8.4.3) |
|
|
366 | (2) |
|
Sharing Resources in Windows Vista (6.8.4.4) |
|
|
368 | (1) |
|
Sharing Resources in Windows XP (6.8.4.5) |
|
|
369 | (1) |
|
Network Shares and Mapping Drives (6.8.4.6) |
|
|
369 | (2) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
Select an ISP Connection Type (6.9) |
|
|
372 | (7) |
|
Brief History of Connection Technologies (6.9.1.1) |
|
|
372 | (1) |
|
|
373 | (1) |
|
Integrated Services Digital Network |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
373 | (1) |
|
Line-of-Sight Wireless Internet Service (6.9.1.3) |
|
|
374 | (1) |
|
|
374 | (1) |
|
Other Broadband Technologies (6.9.1.5) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
376 | (1) |
|
|
376 | (1) |
|
|
376 | (1) |
|
Selecting an ISP for the Customer (6.9.1.7) |
|
|
376 | (3) |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
Common Preventive Maintenance Techniques Used for Networks (6.10) |
|
|
379 | (1) |
|
Preventive Maintenance Procedures (6.10.1.1) |
|
|
379 | (1) |
|
Basic Troubleshooting Process for Networks (6.11) |
|
|
380 | (3) |
|
Identify the Problem (6.11.1.1) |
|
|
380 | (1) |
|
Establish a Theory of Probable Cause (6.11.1.2) |
|
|
381 | (1) |
|
Test the Theory to Determine Cause (6.11.1.3) |
|
|
381 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (6.11.1.4) |
|
|
381 | (1) |
|
Verify Full System Functionality and Implement Preventive Measures (6.11.1.5) |
|
|
382 | (1) |
|
Document Findings, Actions, and Outcomes (6.11.1.6) |
|
|
382 | (1) |
|
Common Problems and Solutions for Networks (6.11.2) |
|
|
383 | (2) |
|
Identify Common Problems and Solutions (6.11.2.1) |
|
|
383 | (2) |
|
|
385 | (2) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
388 | (5) |
Chapter 7 Laptops |
|
393 | (58) |
|
|
393 | (1) |
|
|
393 | (2) |
|
|
395 | (1) |
|
|
395 | (10) |
|
External Features Unique to Laptops (7.1.1.1) |
|
|
395 | (4) |
|
Common Input Devices and LEDs in Laptops (7.1.1.2) |
|
|
399 | (2) |
|
Internal Components (7.1.1.3) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
Special Function Keys (7.1.1.4) |
|
|
402 | (1) |
|
Docking Station Versus Port Replicator (7.1.1.5) |
|
|
403 | (2) |
|
Laptop Display Components (7.2) |
|
|
405 | (1) |
|
LCD, LED, OLED, and Plasma Monitors (7.2.1.1) |
|
|
406 | (1) |
|
Internal Components (7.2.2) |
|
|
406 | (2) |
|
Backlights and Inverters (7.2.2.1) |
|
|
406 | (1) |
|
Wi-Fi Antenna Connectors (7.2.2.2) |
|
|
407 | (1) |
|
|
408 | (5) |
|
Power Management (7.3.1.1) |
|
|
408 | (1) |
|
Managing ACPI Settings in the BIOS (7.3.1.2) |
|
|
409 | (1) |
|
Managing Laptop Power Options (7.3.1.4) |
|
|
410 | (3) |
|
|
410 | (1) |
|
Hard Drive and Display Power Management |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
Laptop Wireless Communication Technologies (7.4) |
|
|
413 | (6) |
|
|
413 | (2) |
|
Bluetooth Installation and Configuration |
|
|
414 | (1) |
|
|
415 | (2) |
|
|
417 | (1) |
|
|
417 | (2) |
|
Laptop Hardware and Component Installation and Configuration (7.5) |
|
|
419 | (5) |
|
Expansion Cards (7.5.1.1) |
|
|
419 | (2) |
|
|
421 | (1) |
|
|
421 | (1) |
|
Flash Cards and Flash Card leaders |
|
|
421 | (1) |
|
|
422 | (2) |
|
Replacing Hardware Devices (7.5.2) |
|
|
424 | (13) |
|
Overview of Hardware Replacement (7.5.2.1) |
|
|
424 | (2) |
|
|
426 | (2) |
|
|
427 | (1) |
|
|
427 | (1) |
|
Keyboard, Touchpad, and Screen (7.5.2.4) |
|
|
428 | (3) |
|
|
429 | (1) |
|
|
429 | (1) |
|
|
430 | (1) |
|
Hard Drive and Optical Drive (7.5.2.6) |
|
|
431 | (2) |
|
|
431 | (1) |
|
Replacing an Optical Drive |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
433 | (1) |
|
|
434 | (2) |
|
|
436 | (1) |
|
|
436 | (1) |
|
Preventive Maintenance Techniques for Laptops (7.6) |
|
|
437 | (4) |
|
Scheduling Maintenance (7.6.1.1) |
|
|
437 | (2) |
|
Preventive Maintenance Program |
|
|
437 | (2) |
|
Cleaning Procedures (7.6.1.2) |
|
|
439 | (2) |
|
|
439 | (1) |
|
|
439 | (1) |
|
|
440 | (1) |
|
|
440 | (1) |
|
|
440 | (1) |
|
|
440 | (1) |
|
Basic Troubleshooting Process for Laptops (7.7) |
|
|
441 | (6) |
|
Identify the Problem (7.7.1.1) |
|
|
441 | (1) |
|
Establish a Theory of Probable Cause (7.7.1.2) |
|
|
441 | (1) |
|
Test the Theory to Determine Cause (7.7.1.3) |
|
|
442 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (7.7.1.4) |
|
|
442 | (1) |
|
Verify Full System Functionality and Implement Preventive Measures (7.7.1.5) |
|
|
443 | (1) |
|
Document Findings, Actions, and Outcomes (7.7.1.6) |
|
|
443 | (1) |
|
Identify Common Problems and Solutions (7.7.2.1) |
|
|
443 | (4) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
448 | (1) |
|
Virtual Laptop Activities |
|
|
448 | (1) |
|
|
449 | (2) |
Chapter 8 Mobile Devices |
|
451 | (52) |
|
|
451 | (1) |
|
|
451 | (3) |
|
|
454 | (1) |
|
Mobile Device Hardware Overview (8.1) |
|
|
454 | (4) |
|
Non-Field-Serviceable Parts (8.1.1.1) |
|
|
454 | (1) |
|
Non-Upgradeable Hardware (8.1.1.2) |
|
|
455 | (1) |
|
|
456 | (1) |
|
Solid State Drives (8.1.1.4) |
|
|
457 | (1) |
|
Mobile Operating Systems (8.2) |
|
|
458 | (3) |
|
Open Source Versus Closed Source (8.2.1.1) |
|
|
458 | (1) |
|
Application and Content Sources (8.2.1.2) |
|
|
459 | (2) |
|
|
460 | (1) |
|
|
460 | (1) |
|
Android Touch Interface (8.2.2) |
|
|
461 | (5) |
|
Home Screen Items (8.2.2.1) |
|
|
461 | (2) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
462 | (1) |
|
Notification and System Icons |
|
|
462 | (1) |
|
|
463 | (1) |
|
Managing Apps, Widgets, and Folders (8.2.2.2) |
|
|
463 | (3) |
|
|
464 | (1) |
|
|
464 | (1) |
|
|
465 | (1) |
|
|
466 | (1) |
|
iOS Touch Interface (8.2.3) |
|
|
466 | (4) |
|
Home Screen Items (8.2.3.1) |
|
|
466 | (2) |
|
|
467 | (1) |
|
|
467 | (1) |
|
|
468 | (1) |
|
Managing Apps and Folders (8.2.3.2) |
|
|
468 | (2) |
|
|
468 | (1) |
|
|
469 | (1) |
|
|
469 | (1) |
|
Common Mobile Device Features (8.2.4) |
|
|
470 | (3) |
|
Screen Orientation and Calibration (8.2.4.1) |
|
|
470 | (2) |
|
|
470 | (1) |
|
|
471 | (1) |
|
|
472 | (1) |
|
Network Connectivity and Email (8.3) |
|
|
473 | (9) |
|
Wireless Data Network (8.3.1.1) |
|
|
473 | (2) |
|
Cellular Communications (8.3.1.3) |
|
|
475 | (2) |
|
|
476 | (1) |
|
|
476 | (1) |
|
Bluetooth for Mobile Devices (8.3.2.1) |
|
|
477 | (1) |
|
Bluetooth Pairing (8.3.2.2) |
|
|
477 | (2) |
|
Introduction to Email (8.3.3.1) |
|
|
479 | (2) |
|
|
479 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
Android Email Configuration (8.3.3.3) |
|
|
481 | (1) |
|
iOS Email Configuration (8.3.3.4) |
|
|
481 | (1) |
|
Mobile Device Synchronization (8.3.4) |
|
|
482 | (3) |
|
Types of Data to Synchronize (8.3.4.1) |
|
|
482 | (1) |
|
Application Installation Software Requirements (8.3.4.2) |
|
|
483 | (1) |
|
Synchronization Connection Types (8.3.4.3) |
|
|
484 | (1) |
|
Cross-Platform Data Synchronization |
|
|
484 | (1) |
|
Methods for Securing Mobile Devices (8.4) |
|
|
485 | (2) |
|
Overview of Passcode Locks (8.4.1.1) |
|
|
485 | (1) |
|
Restrictions on Failed Login Attempts (8.4.1.3) |
|
|
486 | (1) |
|
Cloud-Enabled Services for Smart Devices (8.4.2) |
|
|
487 | (3) |
|
|
487 | (1) |
|
Locator Applications (8.4.2.2) |
|
|
488 | (1) |
|
Remote Lock and Remote Wipe (8.4.2.3) |
|
|
489 | (1) |
|
Software Security (8.4.3) |
|
|
490 | (2) |
|
|
490 | (1) |
|
|
490 | (1) |
|
Patching and Updating Operating Systems (8.4.3.2) |
|
|
491 | (1) |
|
Applying the Troubleshooting Process to Mobile Devices (8.5.1) |
|
|
492 | (6) |
|
Identify the Problem (8.5.1.1) |
|
|
492 | (1) |
|
Establish a Theory of Probable Cause (8.5.1.2) |
|
|
493 | (1) |
|
Test the Theory to Determine Cause (8.5.1.3) |
|
|
493 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (8.5.1.4) |
|
|
494 | (1) |
|
Verify Full System Functionality and Implement Preventive Measures (8.5.1.5) |
|
|
494 | (1) |
|
Document Findings, Actions, and Outcomes (8.5.1.6) |
|
|
494 | (1) |
|
Identify Common Problems and Solutions (8.5.2.1) |
|
|
495 | (3) |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
499 | (4) |
Chapter 9 Printers |
|
503 | (38) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
504 | (1) |
|
Common Printer Features (9.1) |
|
|
504 | (3) |
|
Characteristics and Capabilities of Printers (9.1.1.1) |
|
|
504 | (2) |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
505 | (1) |
|
|
506 | (1) |
|
Wired Printer Connection Types (9.1.1.2) |
|
|
506 | (1) |
|
|
506 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
507 | (6) |
|
Inkjet Printers (9.2.1.1) |
|
|
508 | (1) |
|
|
509 | (2) |
|
|
509 | (2) |
|
Thermal Printers (9.2.1.3) |
|
|
511 | (1) |
|
Impact Printers (9.2.1.4) |
|
|
511 | (2) |
|
|
512 | (1) |
|
Installing and Configuring Printers (9.3) |
|
|
513 | (1) |
|
Installing a Printer (9.3.1.1) |
|
|
513 | (1) |
|
Types of Print Drivers (9.3.1.5) |
|
|
514 | (4) |
|
Updating and Installing Print Drivers (9.3.1.6) |
|
|
515 | (1) |
|
Printer Test Page (9.3.1.7) |
|
|
516 | (2) |
|
|
516 | (1) |
|
Print from an Application |
|
|
517 | (1) |
|
|
517 | (1) |
|
Test the Printer from the Printer Panel |
|
|
518 | (1) |
|
Configuring Options and Default Settings (9.3.2) |
|
|
518 | (2) |
|
Common Configuration Settings (9.3.2.1) |
|
|
518 | (2) |
|
Global and Individual Document Options (9.3.2.2) |
|
|
520 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
Optimizing Printer Performance (9.3.3) |
|
|
520 | (3) |
|
Software Optimization (9.3.3.1) |
|
|
521 | (1) |
|
Hardware Optimization (9.3.3.2) |
|
|
521 | (2) |
|
|
521 | (1) |
|
|
521 | (1) |
|
Additional Printer Upgrades |
|
|
522 | (1) |
|
|
523 | (3) |
|
Configuring Printer Sharing (9.4.1.1) |
|
|
523 | (2) |
|
Wireless Printer Connections (9.4.1.2) |
|
|
525 | (1) |
|
|
526 | (2) |
|
Purposes of Print Servers (9.4.2.1) |
|
|
526 | (1) |
|
Network, Dedicated, and Computer Shared Print Servers (9.4.2.2) |
|
|
526 | (2) |
|
|
526 | (1) |
|
Dedicated PC Print Servers |
|
|
527 | (1) |
|
|
527 | (1) |
|
Preventive Maintenance Techniques for Printers (9.5) |
|
|
528 | (4) |
|
Vendor Guidelines (9.5.1.1) |
|
|
528 | (1) |
|
Replacing Consumables (9.5.1.2) |
|
|
529 | (1) |
|
Cleaning Methods (9.5.1.3) |
|
|
530 | (2) |
|
|
531 | (1) |
|
Operational Environment (9.5.1.4) |
|
|
532 | (1) |
|
Basic Troubleshooting Process for Printers (9.6) |
|
|
532 | (4) |
|
Identify the Problem (9.6.1.1) |
|
|
533 | (1) |
|
Establish a Theory of Probable Cause (9.6.1.2) |
|
|
533 | (1) |
|
Test the Theory to Determine Cause (9.6.1.3) |
|
|
534 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (9.6.1.4) |
|
|
534 | (1) |
|
Verify Full System Functionality and Implement Preventive Measures (9.6.1.5) |
|
|
535 | (1) |
|
Document Findings, Actions, and Outcomes (9.6.1.6) |
|
|
535 | (1) |
|
Common Problems and Solutions for Printers (9.6.2) |
|
|
536 | (1) |
|
Identify Common Problems and Solutions (9.6.2.1) |
|
|
536 | (1) |
|
|
537 | (1) |
|
|
537 | (1) |
|
|
538 | (1) |
|
|
538 | (1) |
|
|
538 | (3) |
Chapter 10 Security |
|
541 | (66) |
|
|
541 | (1) |
|
|
541 | (3) |
|
|
544 | (1) |
|
|
545 | (11) |
|
Adware, Spyware, and Phishing (10.1.1.1) |
|
|
545 | (1) |
|
|
545 | (1) |
|
|
545 | (1) |
|
|
545 | (1) |
|
|
545 | (1) |
|
Viruses, Worms, Trojans, and Rootkits (10.1.1.2) |
|
|
546 | (1) |
|
|
546 | (1) |
|
|
546 | (1) |
|
|
546 | (1) |
|
Virus Protection Software |
|
|
547 | (1) |
|
|
547 | (1) |
|
|
547 | (3) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
549 | (1) |
|
InPrivate Browsing (10.1.1.4) |
|
|
550 | (1) |
|
|
551 | (1) |
|
TCP/IP Attacks (10.1.1.6) |
|
|
552 | (2) |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
Social Engineering (10.1.2.1) |
|
|
554 | (1) |
|
Data Wiping, Hard Drive Destruction, and Recycling (10.1.2.2) |
|
|
554 | (2) |
|
|
555 | (1) |
|
|
555 | (1) |
|
|
556 | (1) |
|
|
556 | (1) |
|
|
556 | (1) |
|
Security Procedures (10.2) |
|
|
556 | (33) |
|
What Is a Security Policy? (10.2.1.1) |
|
|
557 | (1) |
|
Security Policy Requirements (10.2.1.3) |
|
|
557 | (2) |
|
Usernames and Passwords (10.2.1.4) |
|
|
559 | (1) |
|
|
559 | (1) |
|
Password Requirements (10.2.1.5) |
|
|
560 | (1) |
|
Screensaver Required Password |
|
|
561 | (1) |
|
File and Folder Permissions (10.2.1.6) |
|
|
561 | (4) |
|
Principle of Least Privilege |
|
|
564 | (1) |
|
Restricting User Permissions |
|
|
565 | (1) |
|
Software Firewalls (10.2.2.1) |
|
|
565 | (2) |
|
Biometrics and Smart Cards (10.2.2.2) |
|
|
567 | (1) |
|
|
568 | (1) |
|
|
568 | (1) |
|
|
568 | (1) |
|
Data Encryption (10.2.2.4) |
|
|
569 | (2) |
|
Malicious Software Protection Programs (10.2.3.1) |
|
|
571 | (2) |
|
|
571 | (1) |
|
Remediating Infected Systems |
|
|
572 | (1) |
|
Signature File Updates (10.2.3.3) |
|
|
573 | (2) |
|
Common Communication Encryption Types (10.2.4.1) |
|
|
575 | (2) |
|
|
575 | (1) |
|
|
575 | (1) |
|
|
576 | (1) |
|
Service Set Identifiers (10.2.4.2) |
|
|
577 | (1) |
|
MAC Address Filtering (10.2.4.3) |
|
|
578 | (1) |
|
Wireless Security Modes (10.2.4.4) |
|
|
578 | (1) |
|
Additions to WPA and WPA2 |
|
|
579 | (1) |
|
Wireless Access (10.2.4.6) |
|
|
579 | (2) |
|
|
580 | (1) |
|
|
580 | (1) |
|
|
581 | (1) |
|
|
581 | (2) |
|
|
582 | (1) |
|
Port Forwarding and Port Triggering (10.2.4.9) |
|
|
583 | (2) |
|
Physical Equipment Protection Methods (10.2.5.1) |
|
|
585 | (1) |
|
|
585 | (1) |
|
Two-Factor Authentication |
|
|
586 | (1) |
|
Security Hardware (10.2.5.2) |
|
|
586 | (3) |
|
Protecting Data While in Use |
|
|
587 | (1) |
|
|
588 | (1) |
|
Security Maintenance (10.3.1) |
|
|
589 | (7) |
|
Operating System Service Packs and Security Patches (10.3.1.1) |
|
|
589 | (2) |
|
|
591 | (2) |
|
Configuring Firewall Types (10.3.1.7) |
|
|
593 | (2) |
|
Maintaining Accounts (10.3.1.11) |
|
|
595 | (1) |
|
Terminating Employee Access |
|
|
595 | (1) |
|
|
595 | (1) |
|
Applying the Troubleshooting Process to Security (10.4.1) |
|
|
596 | (6) |
|
Identify the Problem (10.4.1.1) |
|
|
596 | (1) |
|
Establish a Theory of Probable Cause (10.4.1.2) |
|
|
597 | (1) |
|
Test the Theory to Determine Cause (10.4.1.3) |
|
|
597 | (1) |
|
Establish a Plan of Action to Resolve the Problem and Implement the Solution (10.4.1.4) |
|
|
598 | (1) |
|
Verify Full System Functionality and, If Applicable, Implement Preventive Measures (10.4.1.5) |
|
|
598 | (1) |
|
Document Findings, Actions, and Outcomes (10.4.1.6) |
|
|
599 | (1) |
|
Identify Common Problems and Solutions (10.4.2.1) |
|
|
599 | (3) |
|
|
602 | (1) |
|
|
602 | (1) |
|
|
602 | (1) |
|
|
603 | (1) |
|
|
603 | (4) |
Chapter 11 The IT Professional |
|
607 | (26) |
|
|
607 | (1) |
|
|
607 | (1) |
|
|
608 | (1) |
|
Communication Skills and the IT Professional (11.1) |
|
|
608 | (2) |
|
Relationship Between Communication Skills and Troubleshooting (11.1.1.1) |
|
|
608 | (1) |
|
Relationship Between Communication Skills and Professional Behavior (11.1.1.2) |
|
|
609 | (1) |
|
Working with a Customer (11.1.2) |
|
|
610 | (6) |
|
Using Communication Skills to Determine Customer Problems (11.1.2.1) |
|
|
610 | (1) |
|
Displaying Professional Behavior with Customers (11.1.2.2) |
|
|
611 | (2) |
|
Keeping the Customer Focused on the Problem (11.1.2.5) |
|
|
613 | (2) |
|
|
613 | (1) |
|
|
613 | (1) |
|
|
614 | (1) |
|
|
614 | (1) |
|
|
615 | (1) |
|
Using Proper Netiquette (11.1.2.6) |
|
|
615 | (1) |
|
Employee Best Practices (11.1.3) |
|
|
616 | (4) |
|
Time and Stress Management Techniques (11.1.3.1) |
|
|
616 | (1) |
|
|
616 | (2) |
|
|
616 | (1) |
|
|
617 | (1) |
|
Observing Service Level Agreements (11.1.3.2) |
|
|
618 | (1) |
|
Following Business Policies (11.1.3.3) |
|
|
619 | (1) |
|
|
619 | (1) |
|
Call Center Employee Rules |
|
|
619 | (1) |
|
|
620 | (1) |
|
Ethical and Legal Issues in the IT Industry (11.2) |
|
|
620 | (1) |
|
Ethical Considerations in IT (11.2.1.1) |
|
|
620 | (1) |
|
Legal Considerations in IT (11.2.1.2) |
|
|
621 | (1) |
|
Legal Procedures Overview (11.2.2) |
|
|
621 | (4) |
|
Computer Forensics (11.2.2.1) |
|
|
622 | (1) |
|
Cyber Law and First Response (11.2.2.2) |
|
|
622 | (1) |
|
|
622 | (1) |
|
|
623 | (1) |
|
Documentation and Chain of Custody (11.2.2.3) |
|
|
623 | (2) |
|
|
624 | (1) |
|
|
624 | (1) |
|
Call Center Technicians (11.3) |
|
|
625 | (3) |
|
|
625 | (1) |
|
Level One Technician Responsibilities (11.3.1.2) |
|
|
626 | (1) |
|
Level Two Technician Responsibilities (11.3.1.3) |
|
|
627 | (1) |
|
|
628 | (1) |
|
|
629 | (1) |
|
|
629 | (1) |
|
|
629 | (4) |
Chapter 12 Advanced Troubleshooting |
|
633 | (50) |
|
|
633 | (1) |
|
|
633 | (1) |
|
|
634 | (1) |
|
Apply Troubleshooting Process to Computer Components and Peripherals (12.1.1) |
|
|
634 | (7) |
|
Six Steps for Advanced Troubleshooting Computer Components and Peripherals (12.1.1.1) |
|
|
634 | (3) |
|
Common Problems and Solutions for Components and Peripherals (12.1.1.2) |
|
|
637 | (2) |
|
Apply Troubleshooting Skills to Computer Components and Peripherals (12.1.1.3) |
|
|
639 | (2) |
|
|
641 | (9) |
|
Six Steps for Advanced Troubleshooting Operating Systems (12.2.1.1) |
|
|
641 | (2) |
|
Common Problems and Solutions for Operating Systems (12.2.1.2) |
|
|
643 | (5) |
|
Apply Troubleshooting Skills to Operating Systems (12.2.1.3) |
|
|
648 | (2) |
|
Apply Troubleshooting Process to Networks (12.3.1) |
|
|
650 | (8) |
|
Six Steps for Advanced Troubleshooting Networks (12.3.1.1) |
|
|
650 | (2) |
|
Common Problems and Solutions for Networks (12.3.1.2) |
|
|
652 | (4) |
|
Network Connection Problems |
|
|
652 | (2) |
|
|
654 | (1) |
|
FTP and Secure Internet Connection Problems |
|
|
654 | (1) |
|
Problems Revealed by CH Commands |
|
|
655 | (1) |
|
Apply Troubleshooting Skills to Networks (12.3.1.3) |
|
|
656 | (2) |
|
Apply Troubleshooting Process to Laptops (12.4.1) |
|
|
658 | (12) |
|
Six Steps for Advanced Troubleshooting Laptops (12.4.1.1) |
|
|
658 | (3) |
|
Common Problems and Solutions for Laptops (12.4.1.2) |
|
|
661 | (3) |
|
Apply Troubleshooting Skills to Laptops (12.4.1.3) |
|
|
664 | (1) |
|
Apply Troubleshooting Process to Printers (12.5.1) |
|
|
665 | (1) |
|
Six Steps for Advanced Troubleshooting Printers (12.5.1.1) |
|
|
665 | (3) |
|
Common Problems and Solutions for Printers (12.5.1.2) |
|
|
668 | (1) |
|
Apply Troubleshooting Skills to Printers (12.5.1.3) |
|
|
669 | (1) |
|
Apply Troubleshooting Process to Security (12.6.1) |
|
|
670 | (8) |
|
Six Steps for Advanced Troubleshooting Security (12.6.1.1) |
|
|
670 | (3) |
|
Common Problems and Solutions for Security (12.6.1.2) |
|
|
673 | (3) |
|
|
673 | (1) |
|
User Accounts and Permissions |
|
|
674 | (1) |
|
|
674 | (1) |
|
Firewall and Proxy Settings |
|
|
675 | (1) |
|
Apply Troubleshooting Skills to Security (12.6.1.3) |
|
|
676 | (2) |
|
|
678 | (1) |
|
|
678 | (1) |
|
|
678 | (1) |
|
|
679 | (4) |
Appendix A Answers to "Check Your Understanding" Questions |
|
683 | (16) |
Glossary |
|
699 | (38) |
Index |
|
737 | |