Introduction |
|
xxxvi | |
|
Chapter 1 Introduction to the Personal Computer |
|
|
1 | (50) |
|
|
1 | (1) |
|
|
1 | (2) |
|
Explain IT Industry Certifications |
|
|
3 | (3) |
|
Identify Education and Certifications |
|
|
4 | (1) |
|
Describe the A+ Certification |
|
|
5 | (1) |
|
Describe the EUCIP Certification |
|
|
5 | (1) |
|
|
5 | (1) |
|
Module 2 Operating Systems |
|
|
5 | (1) |
|
Module 3 Local Area Network and Network Services |
|
|
6 | (1) |
|
Module 4 Expert Network Use |
|
|
6 | (1) |
|
|
6 | (1) |
|
Describe a Computer System |
|
|
6 | (1) |
|
Identify the Names, Purposes, and Characteristics of Cases and Power Supplies |
|
|
7 | (5) |
|
|
7 | (2) |
|
|
9 | (1) |
|
|
9 | (1) |
|
Electricity and Ohm's Law |
|
|
10 | (2) |
|
Identify the Names, Purposes, and Characteristics of Internal Components |
|
|
12 | (18) |
|
Identify the Names, Purposes, and Characteristics of Motherboards |
|
|
13 | (1) |
|
Identify the Names, Purposes, and Characteristics of CPUs |
|
|
14 | (5) |
|
Identify the Names, Purposes, and Characteristics of Cooling Systems |
|
|
19 | (1) |
|
Identify the Names, Purposes, and Characteristics of ROM and RAM |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
Identify the Names, Purposes, and Characteristics of Adapter Cards |
|
|
23 | (1) |
|
Identify the Names, Purposes, and Characteristics of Storage Drives |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
Types of Drive Interfaces |
|
|
26 | (3) |
|
Identify the Names, Purposes, and Characteristics of Internal Cables |
|
|
29 | (1) |
|
Identify the Names, Purposes, and Characteristics of Ports and Cables |
|
|
30 | (7) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
FireWire Ports and Cables |
|
|
32 | (1) |
|
Parallel Ports and Cables |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
Video Ports and Connectors |
|
|
36 | (1) |
|
Identify the Names, Purposes, and Characteristics of Input Devices |
|
|
37 | (2) |
|
Identify the Names, Purposes, and Characteristics of Output Devices |
|
|
39 | (4) |
|
|
39 | (3) |
|
|
42 | (1) |
|
|
42 | (1) |
|
Explain System Resources and Their Purposes |
|
|
43 | (4) |
|
|
43 | (1) |
|
Input/Output (I/O) Port Addresses |
|
|
44 | (1) |
|
|
45 | (2) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (3) |
|
Chapter 2 Safe Lab Procedures and Tool Use |
|
|
51 | (28) |
|
|
51 | (1) |
|
|
51 | (1) |
|
Explain the Purpose of Safe Working Conditions and Procedures |
|
|
52 | (9) |
|
Identify Safety Procedures and Potential Hazards for Users and Technicians |
|
|
52 | (1) |
|
General Safety Guidelines |
|
|
53 | (1) |
|
Electrical Safety Guidelines |
|
|
53 | (1) |
|
|
53 | (2) |
|
Identify Safety Procedures to Protect Equipment from Damage and Data from Loss |
|
|
55 | (1) |
|
|
55 | (1) |
|
Electromagnetic Interference |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
Identify Safety Procedures to Protect the Environment from Contamination |
|
|
58 | (1) |
|
Material Safety Data Sheet |
|
|
58 | (2) |
|
Proper Disposal of Batteries |
|
|
60 | (1) |
|
Proper Disposal of Monitors or CRTs |
|
|
60 | (1) |
|
Proper Disposal of Toner Kits, Cartridges, and Developers |
|
|
61 | (1) |
|
Proper Disposal of Chemical Solvents and Aerosol Cans |
|
|
61 | (1) |
|
Identify Tools and Software Used with Personal Computer Components and Their Purposes |
|
|
61 | (7) |
|
Identify Hardware Tools and Their Purpose |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
Identify Software Tools and Their Purpose |
|
|
63 | (1) |
|
|
63 | (1) |
|
Protection Software Tools |
|
|
64 | (1) |
|
Identify Organizational Tools and Their Purpose |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (2) |
|
Implement Proper Tool Use |
|
|
68 | (8) |
|
Demonstrate Proper Use of an Antistatic Wrist Strap |
|
|
68 | (2) |
|
Demonstrate Proper Use of an Antistatic Mat |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
Demonstrate Proper Use of Various Hand Tools |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
Phillips-Head Screwdriver |
|
|
72 | (1) |
|
|
72 | (1) |
|
Part Retriever, Needle-Nose Pliers, or Tweezers |
|
|
72 | (1) |
|
Demonstrate Proper Use of Cleaning Materials |
|
|
73 | (1) |
|
Computer Cases and Monitors |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (2) |
|
Chapter 3 Computer Assembly---Step by Step |
|
|
79 | (24) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
Attach the Components to the Motherboard and Install the Motherboard |
|
|
81 | (5) |
|
Install a CPU and a Heat Sink/Fan Assembly |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
Install Drives in External Bays |
|
|
86 | (2) |
|
Install the Optical Drive |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (3) |
|
|
88 | (1) |
|
|
89 | (1) |
|
Install the Video Adapter Card |
|
|
89 | (2) |
|
Connect All Internal Cables |
|
|
91 | (2) |
|
|
91 | (1) |
|
Motherboard Power Connections |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
Reattach the Side Panels and Connect External Cables to the Computer |
|
|
93 | (3) |
|
Reattach the Side Panels to the Case |
|
|
93 | (1) |
|
Connect External Cables to the Computer |
|
|
93 | (1) |
|
|
94 | (2) |
|
Boot the Computer for the First Time |
|
|
96 | (3) |
|
|
96 | (1) |
|
|
97 | (2) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
Virtual Desktop Activities |
|
|
100 | (1) |
|
|
100 | (3) |
|
Chapter 4 Basics of Preventive Maintenance and Troubleshooting |
|
|
103 | (12) |
|
|
103 | (1) |
|
|
103 | (1) |
|
Explain the Purpose of Preventive Maintenance |
|
|
104 | (2) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
Identify the Steps of the Troubleshooting Process |
|
|
106 | (7) |
|
Explain the Purpose of Data Protection |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
Establish a Theory of Probable Causes |
|
|
111 | (1) |
|
Test the Theory to Determine an Exact Cause |
|
|
111 | (1) |
|
|
111 | (1) |
|
Verify Solution, Full System Functionality, and If Applicable, Implement Preventive Measures |
|
|
112 | (1) |
|
Document Findings, Actions, and Outcomes |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
113 | (2) |
|
Chapter 5 Fundamental Operating Systems |
|
|
115 | (72) |
|
|
115 | (1) |
|
|
115 | (2) |
|
Explain the Purpose of an Operating System |
|
|
117 | (6) |
|
Describe Characteristics of Modern Operating Systems |
|
|
117 | (1) |
|
|
117 | (1) |
|
File and Folder Management |
|
|
118 | (1) |
|
|
118 | (2) |
|
|
120 | (1) |
|
Explain Operating System Concepts |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
123 | (3) |
|
Describe and Compare Operating Systems to Include Purpose, Limitations, and Compatibilities |
|
|
123 | (1) |
|
Describe Desktop Operating Systems |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
Describe Network Operating Systems |
|
|
125 | (1) |
|
Determine Operating System Based on Customer Needs |
|
|
126 | (3) |
|
Identify Applications and Environments That Are Compatible with an Operating System |
|
|
126 | (1) |
|
Determine Minimum Hardware Requirements and Compatibility with the OS Platform |
|
|
127 | (1) |
|
Hardware Compatibility List |
|
|
128 | (1) |
|
Install an Operating System |
|
|
129 | (19) |
|
Identify Hard Drive Setup Procedures |
|
|
130 | (1) |
|
Partitioning and Formatting |
|
|
130 | (1) |
|
|
131 | (3) |
|
Install the Operating System Using Default Setting |
|
|
134 | (2) |
|
|
136 | (1) |
|
Complete the Installation |
|
|
137 | (2) |
|
Describe Custom Installation Options |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
Factory Recovery Partition |
|
|
141 | (1) |
|
Identify the Boot Sequence Files and Registry Files |
|
|
141 | (1) |
|
|
141 | (1) |
|
NTLDR and the Windows Boot Menu |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
Describe How to Manipulate Operating System Files |
|
|
143 | (1) |
|
|
144 | (1) |
|
Describe Directory Structures |
|
|
145 | (1) |
|
File Extensions and Attributes |
|
|
145 | (2) |
|
|
147 | (1) |
|
|
148 | (18) |
|
Manipulate Items on the Desktop |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
Explore Control Panel Applets |
|
|
153 | (1) |
|
|
153 | (2) |
|
|
155 | (1) |
|
Explore Administrative Tools |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
Install, Navigate, and Uninstall an Application |
|
|
161 | (1) |
|
Add or Remove Programs Applet |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
Describe Upgrading an Operating System |
|
|
164 | (1) |
|
Upgrading the Operating System to Windows XP |
|
|
164 | (1) |
|
Upgrading the Operating System to Windows Vista |
|
|
165 | (1) |
|
Identify and Apply Common Preventive Maintenance Techniques for Operating Systems |
|
|
166 | (9) |
|
Create a Preventive Maintenance Plan |
|
|
166 | (1) |
|
Preventive Maintenance Planning |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
Backup Status and Configuration |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
Troubleshoot Operating Systems |
|
|
175 | (7) |
|
Review the Troubleshooting Process |
|
|
175 | (1) |
|
Step 1 Identify the Problem |
|
|
175 | (1) |
|
Step 2 Establish a Theory of Probable Causes |
|
|
176 | (1) |
|
Step 3 Determine an Exact Cause |
|
|
176 | (1) |
|
Step 4 Implement a Solution |
|
|
177 | (1) |
|
Step 5 Verify Solution and Full System Functionality |
|
|
177 | (1) |
|
|
178 | (1) |
|
Identify Common Problems and Solutions |
|
|
178 | (4) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (4) |
|
Chapter 6 Fundamental Laptops and Portable Devices |
|
|
187 | (52) |
|
|
187 | (1) |
|
|
187 | (2) |
|
Describe Laptops and other Portable Devices |
|
|
189 | (2) |
|
Identify Common Uses of Laptops |
|
|
190 | (1) |
|
Identify Common Uses of PDAs and Smartphones |
|
|
190 | (1) |
|
Identify and Describe the Components of a Laptop |
|
|
191 | (11) |
|
Describe the Components Found on the Outside of the Laptop |
|
|
192 | (4) |
|
Describe Input Devices Found on Laptops |
|
|
196 | (3) |
|
Describe the Components Found on the Laptop Docking Station |
|
|
199 | (3) |
|
Compare and Contrast Desktop and Laptop Components |
|
|
202 | (6) |
|
Compare and Contrast Desktop and Laptop Motherboards |
|
|
202 | (1) |
|
Compare and Contrast Desktop and Laptop Processors |
|
|
203 | (1) |
|
Compare and Contrast Desktop and Laptop Power Management |
|
|
203 | (1) |
|
Compare and Contrast Desktop and Laptop Expansion Capabilities |
|
|
204 | (4) |
|
Explain How to Configure Laptops |
|
|
208 | (14) |
|
Describe How to Configure Power Settings |
|
|
209 | (2) |
|
Configuring Power Settings in Windows XP and Vista |
|
|
211 | (1) |
|
|
211 | (1) |
|
Power Management for the Hard Drive and the Display |
|
|
212 | (1) |
|
Setting the Laptop Power Options |
|
|
213 | (1) |
|
Adjusting Low Battery Warnings |
|
|
214 | (1) |
|
Describe the Safe Installation and Removal of Laptop Components |
|
|
215 | (1) |
|
Battery Replacement Steps |
|
|
216 | (1) |
|
Optical Drive Replacement Steps |
|
|
216 | (1) |
|
Hard Drive Replacement Steps |
|
|
217 | (1) |
|
Expansion Memory Replacement Steps |
|
|
217 | (1) |
|
PC Expansion Card Replacement Steps |
|
|
217 | (1) |
|
Hot-Swappable Device Removal Steps |
|
|
218 | (1) |
|
Laptop Communication Hardware Installation and Configuration |
|
|
218 | (1) |
|
Ethernet Installation and Configuration Steps |
|
|
218 | (1) |
|
Wireless Ethernet Installation and Configuration Steps |
|
|
219 | (1) |
|
Modem Installation and Configuration Steps |
|
|
219 | (1) |
|
Bluetooth Installation and Configuration Steps |
|
|
220 | (1) |
|
Infrared Installation and Configuration Steps |
|
|
220 | (1) |
|
Cellular WAN Installation and Configuration Steps |
|
|
221 | (1) |
|
Compare the Different Mobile Phone Standards |
|
|
222 | (2) |
|
Identify Common Preventive Maintenance Techniques for Laptops and Portable Devices |
|
|
224 | (4) |
|
Identify Appropriate Cleaning Procedures |
|
|
225 | (1) |
|
Laptop Keyboard Cleaning Procedures |
|
|
225 | (1) |
|
Ventilation Cleaning Procedures |
|
|
225 | (1) |
|
|
226 | (1) |
|
Touch Pad Cleaning Procedures |
|
|
226 | (1) |
|
Floppy Drive Cleaning Procedures |
|
|
226 | (1) |
|
Optical Drive Cleaning Procedures |
|
|
227 | (1) |
|
Cleaning a CD or DVD Disc |
|
|
227 | (1) |
|
Identify Optimal Operating Environments |
|
|
227 | (1) |
|
Describe How to Troubleshoot Laptops and Portable Devices |
|
|
228 | (6) |
|
Review the Troubleshooting Process |
|
|
229 | (2) |
|
Identify Common Problems and Solutions |
|
|
231 | (3) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
Virtual Laptop Activities |
|
|
235 | (1) |
|
|
235 | (4) |
|
Chapter 7 Fundamental Printers and Scanners |
|
|
239 | (38) |
|
|
239 | (1) |
|
|
239 | (1) |
|
Describe the Types of Printers Currently Available |
|
|
240 | (12) |
|
Describe the Characteristics and Capabilities of Printers |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
Describe Printer-to-Computer Interfaces |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (2) |
|
|
247 | (1) |
|
|
248 | (1) |
|
Describe Solid-Ink Printers |
|
|
249 | (1) |
|
Describe Other Printer Types |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
Describe the Installation and Configuration Process for Printers |
|
|
252 | (9) |
|
Describe How to Set Up a Printer |
|
|
253 | (1) |
|
Explain How to Power and Connect the Device Using a Local or Network Port |
|
|
254 | (1) |
|
Describe How to Install and Update the Device Driver, Firmware, and RAM |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
256 | (1) |
|
Identify Configuration Options and Default Settings |
|
|
257 | (1) |
|
Describe How to Optimize Printer Performance |
|
|
258 | (1) |
|
Describe How to Print a Test Page |
|
|
259 | (1) |
|
|
259 | (1) |
|
Printing from an Application |
|
|
259 | (1) |
|
|
259 | (1) |
|
Testing the Printer from the Printer Panel |
|
|
260 | (1) |
|
Describe How to Share a Printer |
|
|
260 | (1) |
|
Describe the Types of Scanners Currently Available |
|
|
261 | (5) |
|
Describe Scanner Types, Resolution, and Interfaces |
|
|
262 | (1) |
|
Describe All-in-One Devices |
|
|
263 | (1) |
|
Describe Flatbed Scanners |
|
|
264 | (1) |
|
Describe Handheld Scanners |
|
|
265 | (1) |
|
|
265 | (1) |
|
Describe the Installation and Configuration Process for Scanners |
|
|
266 | (2) |
|
Explain How to Power and Connect a Scanner |
|
|
266 | (1) |
|
Describe How to Install and Update the Device Driver |
|
|
267 | (1) |
|
Identify Configuration Options and Default Settings |
|
|
267 | (1) |
|
Identify and Apply Common Preventive Maintenance Techniques for Printers and Scanners |
|
|
268 | (2) |
|
Describe Printer Maintenance |
|
|
269 | (1) |
|
Describe Scanner Maintenance |
|
|
269 | (1) |
|
Troubleshoot Printers and Scanners |
|
|
270 | (2) |
|
Review the Troubleshooting Process |
|
|
270 | (1) |
|
Identify Common Problems and Solutions |
|
|
270 | (2) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
273 | (4) |
|
Chapter 8 Fundamental Networks |
|
|
277 | (68) |
|
|
277 | (1) |
|
|
277 | (3) |
|
Explain the Principles of Networking |
|
|
280 | (3) |
|
|
281 | (1) |
|
Explain the Benefits of Networking |
|
|
282 | (1) |
|
Describe Types of Networks |
|
|
283 | (5) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
Explain Peer-to-Peer Networks |
|
|
286 | (1) |
|
Explain Client/Server Networks |
|
|
287 | (1) |
|
Describe Basic Networking Concepts and Technologies |
|
|
288 | (10) |
|
Explain Bandwidth and Data Transmission |
|
|
288 | (2) |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
Describe Internet Protocols and Applications |
|
|
295 | (1) |
|
|
296 | (2) |
|
Describe the Physical Components of a Network |
|
|
298 | (8) |
|
Identify the Names, Purposes, and Characteristics of Network Devices |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
Identify the Names, Purposes, and Characteristics of Common Network Cables |
|
|
302 | (1) |
|
|
302 | (2) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
Describe LAN Topologies and Architectures |
|
|
306 | (4) |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
Describe LAN Architectures |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
Identify Standards Organizations |
|
|
310 | (2) |
|
Identify Ethernet Standards |
|
|
312 | (4) |
|
Explain Cabled Ethernet Standards |
|
|
313 | (1) |
|
|
313 | (2) |
|
Summary of Ethernet Technologies |
|
|
315 | (1) |
|
Explain Wireless Ethernet Standards |
|
|
315 | (1) |
|
Explain the OSI and TCP/IP Data Models |
|
|
316 | (6) |
|
|
317 | (1) |
|
Application Layer Protocols |
|
|
318 | (1) |
|
Transport Layer Protocols |
|
|
318 | (1) |
|
|
319 | (1) |
|
Network Access Layer Protocols |
|
|
319 | (1) |
|
|
319 | (2) |
|
Compare the OSI and TCP/IP Models |
|
|
321 | (1) |
|
Describe How to Configure a NIC and a Modem |
|
|
322 | (6) |
|
Install or Update a NIC Driver |
|
|
322 | (1) |
|
|
323 | (1) |
|
Attach the Computer to an Existing Network |
|
|
323 | (3) |
|
Describe the Installation of a Modem |
|
|
326 | (1) |
|
|
327 | (1) |
|
Identify the Names, Purposes, and Characteristics of Other Technologies Used to Establish Connectivity |
|
|
328 | (6) |
|
Describe Telephone Technologies |
|
|
328 | (1) |
|
|
329 | (1) |
|
Integrated Services Digital Network (ISDN) |
|
|
329 | (1) |
|
Digital Subscriber Line (DSL) |
|
|
329 | (1) |
|
Define Power Line Communication |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
Identify and Apply Common Preventive Maintenance Techniques Used for Networks |
|
|
334 | (1) |
|
Counterfeiting and the IT Industry |
|
|
335 | (1) |
|
|
335 | (6) |
|
Review the Troubleshooting Process |
|
|
336 | (2) |
|
Identify Common Network Problems and Solutions |
|
|
338 | (3) |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
343 | (2) |
|
Chapter 9 Fundamental Security |
|
|
345 | (32) |
|
|
345 | (1) |
|
|
345 | (2) |
|
Explain Why Security Is Important |
|
|
347 | (1) |
|
Describe Security Threats |
|
|
348 | (6) |
|
Define Viruses, Worms, and Trojans |
|
|
349 | (1) |
|
|
350 | (1) |
|
Define Adware, Spyware, and Grayware |
|
|
350 | (1) |
|
Explain Denial of Service |
|
|
351 | (1) |
|
Describe Spam and Popup Windows |
|
|
351 | (1) |
|
Explain Social Engineering |
|
|
352 | (1) |
|
|
353 | (1) |
|
Explain Data Wiping, Hard Drive Destruction, and Recycling |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
354 | (1) |
|
Identify Security Procedures |
|
|
354 | (10) |
|
Explain what is Required in a Basic Local Security Policy |
|
|
355 | (1) |
|
Explain the Tasks Required to Protect Physical Equipment |
|
|
356 | (1) |
|
Describe Ways to Protect Data |
|
|
357 | (1) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
361 | (1) |
|
|
361 | (1) |
|
Describe Wireless Security Techniques |
|
|
362 | (2) |
|
Identify Common Preventive Maintenance Techniques for Security |
|
|
364 | (3) |
|
Explain How to Update Signature Files for Antivirus and Antispyware Software |
|
|
365 | (1) |
|
Explain How to Install Operating System Service Packs and Security Patches |
|
|
366 | (1) |
|
|
367 | (5) |
|
Review the Troubleshooting Process |
|
|
367 | (1) |
|
Step 1 Identify the Problem |
|
|
367 | (1) |
|
Step 2 Establish a Theory of Probably Causes |
|
|
368 | (1) |
|
Step 3 Determine an Exact Cause |
|
|
368 | (1) |
|
Step 4 Implement the Solution |
|
|
368 | (1) |
|
Step 5 Verify Solution and Full System Functionality |
|
|
369 | (1) |
|
|
369 | (1) |
|
Identify Common Problems and Solutions |
|
|
370 | (2) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
373 | (4) |
|
Chapter 10 Communication Skills |
|
|
377 | (26) |
|
|
377 | (1) |
|
|
377 | (1) |
|
Explain the Relationship Between Communication and Troubleshooting |
|
|
378 | (1) |
|
Describe Good Communication Skills and Professional Behavior |
|
|
379 | (12) |
|
Determine the Computer Problem of the Customer |
|
|
380 | (1) |
|
Display Professional Behavior with the Customer |
|
|
381 | (2) |
|
Focus the Customer on the Problem During the Call |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
386 | (1) |
|
Implement Time and Stress Management Techniques |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
Observe Service Level Agreements |
|
|
389 | (1) |
|
|
390 | (1) |
|
Explain Ethics and Legal Aspects of Working with Computer Technology |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
Describe the Call Center Environment and Technician Responsibilities |
|
|
392 | (5) |
|
Describe the Call Center Environment |
|
|
393 | (1) |
|
Describe Level-One Technician Responsibilities |
|
|
394 | (1) |
|
Describe Level-Two Technician Responsibilities |
|
|
395 | (2) |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
398 | (5) |
|
Chapter 11 Advanced Personal Computers |
|
|
403 | (62) |
|
|
403 | (1) |
|
|
403 | (1) |
|
Give an Overview of Field, Remote, and Bench Technician Jobs |
|
|
404 | (1) |
|
Explain Safe Lab Procedures and Tool Use |
|
|
405 | (6) |
|
Review Safe Working Environments and Procedures |
|
|
406 | (1) |
|
Review Names, Purposes, Characteristics, and Safe and Appropriate Use of Tools |
|
|
407 | (3) |
|
Identify Potential Safety Hazards and Implement Proper Safety Procedures for Computer Components |
|
|
410 | (1) |
|
Describe Environmental Issues |
|
|
411 | (1) |
|
Describe Situations Requiring Replacement of Computer Components |
|
|
411 | (18) |
|
Select a Case and Power Supply |
|
|
412 | (1) |
|
|
413 | (1) |
|
Select the CPU and Heat Sink/Fan Assembly |
|
|
414 | (3) |
|
|
417 | (2) |
|
|
419 | (1) |
|
|
420 | (1) |
|
|
420 | (1) |
|
|
421 | (1) |
|
|
421 | (1) |
|
|
422 | (1) |
|
|
422 | (1) |
|
Select Storage Devices and Hard Drives |
|
|
423 | (2) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
426 | (1) |
|
|
426 | (1) |
|
|
427 | (1) |
|
|
427 | (1) |
|
Select Input and Output Devices |
|
|
428 | (1) |
|
Upgrade and Configure Personal Computer Components and Peripherals |
|
|
429 | (14) |
|
Upgrade and Configure a Motherboard |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
431 | (1) |
|
CMOS Battery Installation |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
433 | (1) |
|
Upgrade and Configure a CPU and a Heat Sink/Fan Assembly |
|
|
434 | (3) |
|
Upgrade and Configure RAM |
|
|
437 | (1) |
|
Upgrade and Configure BIOS |
|
|
438 | (2) |
|
Upgrade and Configure Storage Devices and Hard Drives |
|
|
440 | (1) |
|
Upgrade and Configure Input and Output Devices |
|
|
441 | (2) |
|
Identify and Apply Common Preventive Maintenance Techniques for Personal Computer Components |
|
|
443 | (5) |
|
Clean Internal Components |
|
|
443 | (1) |
|
|
444 | (1) |
|
Inspect Computer Components |
|
|
445 | (1) |
|
|
445 | (1) |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
448 | (1) |
|
Troubleshoot Computer Components and Peripherals |
|
|
448 | (13) |
|
Review the Troubleshooting Process |
|
|
448 | (3) |
|
Identify Common Problems and Solutions |
|
|
451 | (1) |
|
|
451 | (3) |
|
Motherboard and Internal Component Problems |
|
|
454 | (2) |
|
|
456 | (1) |
|
CPU Problems and Memory Problems |
|
|
457 | (2) |
|
Apply Troubleshooting Skills |
|
|
459 | (2) |
|
|
461 | (1) |
|
|
461 | (1) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
462 | (3) |
|
Chapter 12 Advanced Operating Systems |
|
|
465 | (50) |
|
|
465 | (1) |
|
|
465 | (1) |
|
Select the Appropriate Operating System Based on Customer Needs |
|
|
466 | (3) |
|
Describe Operating Systems |
|
|
468 | (1) |
|
Describe Network Operating Systems |
|
|
468 | (1) |
|
Windowns OS Directory Structures |
|
|
469 | (2) |
|
|
470 | (1) |
|
|
470 | (1) |
|
|
470 | (1) |
|
|
470 | (1) |
|
|
470 | (1) |
|
Offline Files and Folders |
|
|
471 | (1) |
|
Install, Configure, and Optimize an Operating System |
|
|
471 | (23) |
|
Compare and Contrast a Default Installation and a Custom Installation |
|
|
472 | (1) |
|
Install Windows XP Professional Using a Custom Installation |
|
|
473 | (1) |
|
Unattended Installation in Windows XP |
|
|
474 | (1) |
|
Unattended Installation in Windows Vista |
|
|
475 | (1) |
|
|
475 | (1) |
|
|
475 | (1) |
|
Create, View, and Manage Disks, Directories, and Files |
|
|
476 | (1) |
|
|
476 | (2) |
|
|
478 | (1) |
|
|
479 | (1) |
|
Identify Procedures and Utilities Used to Optimize the Performance of Operating Systems |
|
|
480 | (1) |
|
|
480 | (3) |
|
|
483 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
485 | (1) |
|
Regional and Language Options |
|
|
486 | (1) |
|
|
486 | (1) |
|
Identify Procedures and Utilities Used to Optimize the Performance of Browsers |
|
|
487 | (2) |
|
Describe Installation, Use, and Configuration of Email Software |
|
|
489 | (2) |
|
Set Screen Resolution and Update the Video Driver |
|
|
491 | (2) |
|
Describe Installation of a Second Operating System |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
494 | (1) |
|
|
494 | (1) |
|
|
495 | (1) |
|
Describe How to Upgrade Operating Systems |
|
|
495 | (2) |
|
Describe Preventive Maintenance Procedures for Operating Systems |
|
|
497 | (4) |
|
Schedule Automatic Tasks and Updates |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
498 | (1) |
|
Windows Automatic Updates |
|
|
498 | (1) |
|
|
499 | (2) |
|
Troubleshoot Operating Systems |
|
|
501 | (10) |
|
Review the Troubleshooting Process |
|
|
501 | (1) |
|
Step 1 Identify the Problem |
|
|
501 | (1) |
|
Step 2 Establish a Theory of Probable Causes |
|
|
502 | (1) |
|
Step 3 Determine an Exact Cause |
|
|
502 | (1) |
|
Step 4 Implement a Solution |
|
|
503 | (1) |
|
Step 5 Verify Solution and Full System Functionality |
|
|
503 | (1) |
|
Step 6 Document Your Findings |
|
|
503 | (1) |
|
Identify Common Problems and Solutions |
|
|
504 | (5) |
|
Apply Troubleshooting Skills |
|
|
509 | (2) |
|
|
511 | (1) |
|
|
511 | (1) |
|
|
511 | (1) |
|
|
512 | (3) |
|
Chapter 13 Advanced Laptops and Portable Devices |
|
|
515 | (36) |
|
|
515 | (1) |
|
|
515 | (1) |
|
Describe Wireless Communication Methods for Laptops and Portable Devices |
|
|
516 | (7) |
|
Describe Bluetooth Technology |
|
|
517 | (1) |
|
Describe Infrared Technology |
|
|
518 | (1) |
|
Describe Cellular WAN Technology |
|
|
519 | (1) |
|
Describe Wi-Fi Technology |
|
|
520 | (2) |
|
Describe Satellite Technology |
|
|
522 | (1) |
|
Describe Repairs for Laptops and Portable Devices |
|
|
523 | (1) |
|
|
524 | (8) |
|
|
525 | (1) |
|
Select a Docking Station or Port Replicator |
|
|
526 | (2) |
|
|
528 | (1) |
|
|
529 | (3) |
|
Describe Preventive Maintenance Procedures for Laptops |
|
|
532 | (4) |
|
Describe How to Schedule and Perform Maintenance on Laptops |
|
|
532 | (3) |
|
Explain How to Manage Data Version Control Between Desktops and Laptops |
|
|
535 | (1) |
|
Describe How to Troubleshoot a Laptop |
|
|
536 | (11) |
|
Review the Troubleshooting Process |
|
|
537 | (1) |
|
Step 1 Identify the Problem |
|
|
537 | (1) |
|
Step 2 Establish a Theory of Probable Causes |
|
|
537 | (1) |
|
Step 3 Determine an Exact Cause |
|
|
538 | (1) |
|
Step 4 Implement a Solution |
|
|
538 | (1) |
|
Step 5 Verify Solution and Full System Functionality |
|
|
539 | (1) |
|
|
539 | (1) |
|
Identify Common Problems and Solutions |
|
|
539 | (5) |
|
Hard Drive Replacement Steps |
|
|
544 | (1) |
|
Expansion Memory Replacement Steps |
|
|
544 | (1) |
|
Optical Drive Replacement Steps |
|
|
544 | (1) |
|
Battery Replacement Steps |
|
|
545 | (1) |
|
PC Expansion Card Replacement Steps |
|
|
545 | (1) |
|
Hot-Swappable Device Removal Steps |
|
|
545 | (1) |
|
Apply Troubleshooting Skills |
|
|
545 | (2) |
|
|
547 | (1) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
548 | (3) |
|
Chapter 14 Advanced Printers and Scanners |
|
|
551 | (34) |
|
|
551 | (1) |
|
|
551 | (1) |
|
Describe Potential Safety Hazards and Safety Procedures Associated with Printers and Scanners |
|
|
552 | (1) |
|
Install and Configure a Local Printer and Scanner |
|
|
553 | (8) |
|
Connect the Device to a Local Port |
|
|
554 | (1) |
|
Install and Configure the Driver and Software |
|
|
555 | (1) |
|
Printer Driver Installation |
|
|
555 | (1) |
|
Page Description Language |
|
|
556 | (1) |
|
Configure Options and Default Settings |
|
|
557 | (1) |
|
|
557 | (1) |
|
|
558 | (1) |
|
|
559 | (1) |
|
|
559 | (1) |
|
|
559 | (1) |
|
|
560 | (1) |
|
|
561 | (1) |
|
Describe how to Share a Printer and a Scanner on a Network |
|
|
561 | (5) |
|
Describe the Types of Print Servers |
|
|
562 | (1) |
|
Network Print Server Devices |
|
|
563 | (1) |
|
Dedicated PC Print Servers |
|
|
563 | (1) |
|
|
564 | (1) |
|
Describe How to Install Network Printer Software and Drivers on a Computer |
|
|
564 | (2) |
|
Upgrade and Configure Printers and Scanners |
|
|
566 | (4) |
|
Describe Printer Upgrades |
|
|
567 | (1) |
|
Installing Printer Memory |
|
|
567 | (1) |
|
Additional Printer Upgrades |
|
|
568 | (1) |
|
Describe Scanner Optimization |
|
|
568 | (2) |
|
Describe Printer and Scanner Preventive Maintenance Techniques |
|
|
570 | (5) |
|
Determine Scheduled Maintenance According to Vendor Guidelines |
|
|
570 | (2) |
|
Describe a Suitable Environment for Printers and Scanners |
|
|
572 | (1) |
|
Describe Cleaning Methods |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
573 | (1) |
|
Describe Checking Capacity of Ink Cartidges and Toners |
|
|
574 | (1) |
|
Troubleshoot Printers and Scanners |
|
|
575 | (5) |
|
Review the Troubleshooting Process |
|
|
575 | (1) |
|
Step 1 Identify the Problem |
|
|
575 | (1) |
|
Step 2 Establish a Theory of Probable Causes |
|
|
576 | (1) |
|
Step 3 Determine an Exact Cause |
|
|
576 | (1) |
|
Step 4 Implement a Solution |
|
|
577 | (1) |
|
Step 5 Verify Solution and Full System Functionality |
|
|
577 | (1) |
|
|
578 | (1) |
|
Identify Common Problems and Solutions |
|
|
578 | (2) |
|
Apply Troubleshooting Skills |
|
|
580 | (1) |
|
|
581 | (1) |
|
|
581 | (1) |
|
|
581 | (1) |
|
|
582 | (1) |
|
|
582 | (3) |
|
Chapter 15 Advanced Networks |
|
|
585 | (48) |
|
|
585 | (1) |
|
|
585 | (1) |
|
Identify Potential Safety Hazards and Implement Proper Safety Procedures Related to Networks |
|
|
586 | (3) |
|
Explain Fiber-Optic Safety |
|
|
587 | (1) |
|
|
587 | (1) |
|
|
588 | (1) |
|
|
588 | (1) |
|
|
588 | (1) |
|
Explain Cable, Cable Cutters, and Cable-Cutting Safety Hazards |
|
|
588 | (1) |
|
Design a Network Based on the Customer's Needs |
|
|
589 | (4) |
|
|
589 | (1) |
|
Determine Protocols and Network Applications |
|
|
590 | (3) |
|
Determine the Components for the Customer's Network |
|
|
593 | (8) |
|
|
593 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
595 | (1) |
|
|
595 | (1) |
|
Select the ISP Connection Type |
|
|
595 | (1) |
|
Plain Old Telephone Service |
|
|
595 | (1) |
|
Integrated Services Digital Network |
|
|
595 | (1) |
|
|
596 | (1) |
|
|
596 | (1) |
|
|
596 | (1) |
|
|
596 | (1) |
|
|
597 | (1) |
|
Compare ISP Connection Types |
|
|
597 | (1) |
|
|
598 | (1) |
|
Select the Network Device |
|
|
599 | (1) |
|
|
599 | (1) |
|
|
600 | (1) |
|
|
600 | (1) |
|
|
601 | (1) |
|
Implement the Customer's Network |
|
|
601 | (5) |
|
Install and Test the Customer's Network |
|
|
602 | (1) |
|
Configure the Customer's Internet and Network Resources |
|
|
603 | (1) |
|
|
603 | (1) |
|
|
604 | (1) |
|
|
604 | (1) |
|
|
605 | (1) |
|
Upgrade the Customer's Network |
|
|
606 | (8) |
|
Install and Configure a Wireless NIC |
|
|
606 | (1) |
|
Install and Configure a Wireless Router |
|
|
607 | (1) |
|
802.11 Protocol Selection |
|
|
608 | (1) |
|
Static IP Address Configuration |
|
|
609 | (1) |
|
|
609 | (1) |
|
|
609 | (1) |
|
|
609 | (1) |
|
|
610 | (2) |
|
|
612 | (1) |
|
|
612 | (1) |
|
|
612 | (1) |
|
|
613 | (1) |
|
|
613 | (1) |
|
Describe the Installation, Configuration, and Management of a Simple Mail Server |
|
|
614 | (5) |
|
|
615 | (1) |
|
|
616 | (1) |
|
|
616 | (1) |
|
|
616 | (1) |
|
Email Server Installation |
|
|
617 | (2) |
|
Describe Preventive Maintenance Procedures for Networks |
|
|
619 | (1) |
|
|
619 | (10) |
|
Review the Troubleshooting Process |
|
|
620 | (1) |
|
Step 1 Identify the Problem |
|
|
620 | (1) |
|
Step 2 Establish a Theory of Probable Causes |
|
|
621 | (1) |
|
Step 3 Determine an Exact Cause |
|
|
621 | (1) |
|
Step 4 Implement a Solution |
|
|
622 | (1) |
|
Step 5 Verify Solution and Full System Functionality |
|
|
622 | (1) |
|
|
622 | (1) |
|
Identify Common Problems and Solutions |
|
|
623 | (4) |
|
Apply Troubleshooting Skills |
|
|
627 | (2) |
|
|
629 | (1) |
|
|
629 | (1) |
|
|
629 | (1) |
|
|
630 | (1) |
|
|
630 | (1) |
|
|
630 | (3) |
|
Chapter 16 Advanced Security |
|
|
633 | (38) |
|
|
633 | (1) |
|
|
633 | (1) |
|
Outline Security Requirements Based on Customer Needs |
|
|
634 | (6) |
|
Outline a Local Security Policy |
|
|
635 | (2) |
|
Explain When and How to Use Security Hardware |
|
|
637 | (2) |
|
Explain When and How to Use Security Application Software |
|
|
639 | (1) |
|
Select Security Components Based on Customer Needs |
|
|
640 | (6) |
|
Describe and Compare Security Techniques |
|
|
640 | (1) |
|
|
640 | (1) |
|
|
641 | (1) |
|
|
641 | (1) |
|
|
641 | (2) |
|
Describe and Compare Access Control Devices |
|
|
643 | (1) |
|
|
643 | (1) |
|
|
644 | (1) |
|
Describe and Compare Firewall Types |
|
|
645 | (1) |
|
Implement a Customer's Security Policy |
|
|
646 | (8) |
|
Configure Security Settings |
|
|
646 | (1) |
|
Permission Levels for Folders and Files |
|
|
646 | (1) |
|
|
647 | (1) |
|
Network Device Access Permissions |
|
|
647 | (1) |
|
|
648 | (1) |
|
|
648 | (1) |
|
|
649 | (1) |
|
|
649 | (1) |
|
Port Forwarding and Port Triggering |
|
|
650 | (1) |
|
Describe Configuring Firewall Types |
|
|
651 | (1) |
|
|
652 | (1) |
|
|
652 | (1) |
|
|
652 | (1) |
|
Describe Protection Against Malicious Software |
|
|
653 | (1) |
|
Perform Preventive Maintenance on Security |
|
|
654 | (4) |
|
Describe the Configuration of Operating System Updates |
|
|
654 | (1) |
|
|
655 | (1) |
|
Terminating Employee Access |
|
|
655 | (1) |
|
|
655 | (1) |
|
Explain Data Backup Procedures, Access to Backups, and Secure Physical Backup Media |
|
|
656 | (2) |
|
|
658 | (10) |
|
Review the Troubleshooting Process |
|
|
659 | (1) |
|
Step 1 Identify the Problem |
|
|
659 | (1) |
|
Step 2 Establish a Theory of Probable Solutions |
|
|
659 | (1) |
|
Step 3 Determine an Exact Cause |
|
|
660 | (1) |
|
Step 4 Implement a Solution |
|
|
660 | (1) |
|
Step 5 Verify the Solution and Verify Full System Functionality |
|
|
660 | (1) |
|
Step 6 Document Your Findings |
|
|
661 | (1) |
|
Identify Common Problems and Solutions |
|
|
661 | (1) |
|
|
661 | (1) |
|
User Accounts and Permissions |
|
|
661 | (1) |
|
|
661 | (1) |
|
Firewall and Proxy Settings |
|
|
662 | (4) |
|
Apply Troubleshooting Skills |
|
|
666 | (2) |
|
|
668 | (1) |
|
|
668 | (1) |
|
|
668 | (1) |
|
|
669 | (1) |
|
|
669 | (2) |
Appendix: Answers to Check Your Understanding Questions |
|
671 | (4) |
Glossary |
|
675 | (38) |
Index |
|
713 | |