Introduction |
|
xviii | |
Instructor Web Site |
|
xxxiii | |
|
Chapter 1 Safety and Professionalism |
|
|
1 | (23) |
|
|
1 | (1) |
|
|
1 | (3) |
|
|
1 | (1) |
|
|
1 | (3) |
|
|
4 | (4) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
Expectations and Follow-up |
|
|
7 | (1) |
|
|
8 | (11) |
|
Electrostatic Discharge (ESD) |
|
|
9 | (1) |
|
|
9 | (2) |
|
Electromagnetic Interference (EMI) |
|
|
11 | (1) |
|
Radio Frequency Interference (RFI) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (2) |
|
Troubleshooting Methodology |
|
|
14 | (5) |
|
|
19 | (5) |
|
Chapter 2 The Visible Computer |
|
|
24 | (36) |
|
|
25 | (1) |
|
|
25 | (4) |
|
|
26 | (1) |
|
|
27 | (1) |
|
Why the Process Matters to Techs |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (3) |
|
|
32 | (1) |
|
|
32 | (24) |
|
Common Operating System Functions |
|
|
32 | (1) |
|
|
33 | (10) |
|
File Structures and Paths |
|
|
43 | (2) |
|
|
45 | (11) |
|
|
56 | (4) |
|
|
60 | (42) |
|
|
61 | (1) |
|
|
61 | (7) |
|
|
61 | (2) |
|
|
63 | (2) |
|
|
65 | (3) |
|
Back to the External Data Bus |
|
|
68 | (1) |
|
|
68 | (6) |
|
|
69 | (1) |
|
|
70 | (4) |
|
|
74 | (1) |
|
|
74 | (12) |
|
|
74 | (3) |
|
|
77 | (9) |
|
Selecting and Installing CPUs |
|
|
86 | (8) |
|
|
86 | (2) |
|
|
88 | (6) |
|
|
94 | (2) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (5) |
|
|
102 | (30) |
|
|
103 | (1) |
|
|
103 | (5) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (6) |
|
|
109 | (2) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (2) |
|
|
115 | (9) |
|
|
116 | (5) |
|
|
121 | (2) |
|
|
123 | (1) |
|
Installing SO-DIMMs in Laptops |
|
|
124 | (1) |
|
|
124 | (3) |
|
|
127 | (5) |
|
|
132 | (32) |
|
|
133 | (1) |
|
|
133 | (6) |
|
|
135 | (1) |
|
|
136 | (3) |
|
|
139 | (9) |
|
Typical System Setup Utility |
|
|
139 | (1) |
|
Graphical UEFI System Setup Utility |
|
|
139 | (4) |
|
Text-Based UEFI Intel-Based Setup Utility |
|
|
143 | (3) |
|
Other BIOS Security Settings |
|
|
146 | (1) |
|
Exiting and Saving Settings |
|
|
147 | (1) |
|
Option ROM and Device Drivers |
|
|
148 | (2) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
Power-On Self Test (POST) |
|
|
150 | (3) |
|
Before and During the Video Test: The Beep Codes |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
151 | (2) |
|
Care and Feeding of BIOS/UEFI and CMOS |
|
|
153 | (5) |
|
Default/Optimized Settings |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (2) |
|
|
158 | (6) |
|
|
164 | (36) |
|
|
165 | (1) |
|
|
165 | (2) |
|
|
165 | (2) |
|
|
167 | (7) |
|
|
170 | (2) |
|
|
172 | (1) |
|
|
172 | (2) |
|
|
174 | (11) |
|
Structure and Function of the Expansion Bus |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
Installing Expansion Cards |
|
|
177 | (6) |
|
Troubleshooting Expansion Cards |
|
|
183 | (2) |
|
Upgrading and Installing Motherboards |
|
|
185 | (5) |
|
Choosing the Motherboard and Case |
|
|
185 | (3) |
|
Installing the Motherboard |
|
|
188 | (2) |
|
Troubleshooting Motherboards |
|
|
190 | (4) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
192 | (2) |
|
|
194 | (6) |
|
|
200 | (34) |
|
|
201 | (1) |
|
Understanding Electricity |
|
|
201 | (2) |
|
|
203 | (1) |
|
|
203 | (4) |
|
|
203 | (4) |
|
|
207 | (4) |
|
|
211 | (8) |
|
Installing and Maintaining Power Supplies |
|
|
219 | (4) |
|
|
219 | (1) |
|
|
220 | (3) |
|
Troubleshooting Power Supplies |
|
|
223 | (2) |
|
|
224 | (1) |
|
|
224 | (1) |
|
When Power Supplies Die Slowly |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
Temperature and Efficiency |
|
|
226 | (1) |
|
|
227 | (7) |
|
Chapter 8 Mass Storage Technologies |
|
|
234 | (28) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
235 | (4) |
|
|
236 | (3) |
|
|
239 | (1) |
|
|
239 | (6) |
|
|
240 | (1) |
|
|
241 | (2) |
|
eSATA and Other External Drives |
|
|
243 | (1) |
|
Refining Mass Storage Communication |
|
|
243 | (2) |
|
Protecting Data with RAID |
|
|
245 | (4) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
249 | (7) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
Connecting Solid-State Drives |
|
|
252 | (1) |
|
BIOS Support: Configuring CMOS and Installing Drivers |
|
|
253 | (2) |
|
Troubleshooting Hard Drive Installation |
|
|
255 | (1) |
|
|
256 | (6) |
|
Chapter 9 Implementing Mass Storage |
|
|
262 | (56) |
|
|
263 | (1) |
|
|
263 | (2) |
|
|
265 | (6) |
|
|
265 | (2) |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
Partition Naming Problems |
|
|
270 | (1) |
|
|
271 | (9) |
|
|
272 | (1) |
|
|
272 | (5) |
|
|
277 | (2) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
The Partitioning, Formatting, and Pooling Process |
|
|
280 | (19) |
|
|
280 | (1) |
|
Partitioning and Formatting with the Installation Media |
|
|
281 | (2) |
|
|
283 | (13) |
|
|
296 | (1) |
|
|
297 | (2) |
|
Maintaining and Troubleshooting Hard Drives |
|
|
299 | (4) |
|
|
299 | (4) |
|
|
303 | (5) |
|
Troubleshooting Hard Drive Implementation |
|
|
303 | (5) |
|
|
308 | (3) |
|
Third-Party Partition Tools |
|
|
308 | (3) |
|
|
311 | (7) |
|
Chapter 10 Essential Peripherals |
|
|
318 | (40) |
|
|
319 | (1) |
|
|
319 | (7) |
|
|
319 | (1) |
|
|
319 | (6) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (17) |
|
|
327 | (2) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
332 | (1) |
|
|
333 | (1) |
|
Game Controllers and Joysticks |
|
|
334 | (1) |
|
|
335 | (1) |
|
Multimedia Devices and Formats |
|
|
336 | (7) |
|
|
343 | (9) |
|
|
344 | (3) |
|
|
347 | (5) |
|
|
352 | (6) |
|
|
358 | (38) |
|
|
359 | (1) |
|
|
359 | (11) |
|
Prerequisites to Building |
|
|
359 | (1) |
|
Custom PCs for Specific Jobs |
|
|
360 | (1) |
|
|
360 | (2) |
|
|
362 | (1) |
|
Virtualization Workstation |
|
|
363 | (1) |
|
|
364 | (1) |
|
Graphics/CAD/CAM Design Workstation |
|
|
364 | (1) |
|
Audio/Video Editing Workstation |
|
|
365 | (1) |
|
Network Attached Storage Devices |
|
|
366 | (4) |
|
|
370 | (1) |
|
Installing and Upgrading Windows |
|
|
370 | (15) |
|
|
370 | (1) |
|
|
371 | (3) |
|
The OS Installation Process |
|
|
374 | (9) |
|
Troubleshooting Installation Problems |
|
|
383 | (2) |
|
|
385 | (5) |
|
Patches, Service Packs, and Updates |
|
|
385 | (1) |
|
|
385 | (1) |
|
Restoring User Data Files (If Applicable) |
|
|
386 | (1) |
|
Install Essential Software |
|
|
386 | (1) |
|
Migrating and Retiring Systems |
|
|
386 | (3) |
|
No Installation Is Perfect |
|
|
389 | (1) |
|
|
390 | (1) |
|
Privacy Concerns with Windows 10 |
|
|
390 | (1) |
|
|
391 | (5) |
|
Chapter 12 Windows Under the Hood |
|
|
396 | (32) |
|
|
397 | (1) |
|
|
397 | (4) |
|
|
397 | (1) |
|
|
397 | (2) |
|
|
399 | (1) |
|
|
400 | (1) |
|
Command-Line Registry Editing Tools |
|
|
401 | (1) |
|
|
401 | (1) |
|
Applications, Processes, and Services |
|
|
402 | (19) |
|
|
403 | (14) |
|
|
417 | (1) |
|
|
418 | (3) |
|
|
421 | (2) |
|
|
421 | (1) |
|
|
422 | (1) |
|
|
423 | (5) |
|
Chapter 13 Users, Groups, and Permissions |
|
|
428 | (42) |
|
|
429 | (1) |
|
Authentication with Users and Groups |
|
|
429 | (13) |
|
|
429 | (1) |
|
|
430 | (1) |
|
|
431 | (1) |
|
Standard User and Elevated Privileges |
|
|
432 | (1) |
|
Configuring Users and Groups in Windows |
|
|
433 | (9) |
|
Authorization Through NTFS |
|
|
442 | (7) |
|
|
442 | (2) |
|
|
444 | (1) |
|
|
445 | (1) |
|
|
446 | (1) |
|
Permissions in Linux and macOS |
|
|
447 | (2) |
|
Sharing Resources Securely |
|
|
449 | (7) |
|
Sharing Folders and Files |
|
|
449 | (4) |
|
|
453 | (1) |
|
|
453 | (1) |
|
Protecting Data with Encryption |
|
|
454 | (2) |
|
|
456 | (8) |
|
|
456 | (1) |
|
|
457 | (3) |
|
|
460 | (1) |
|
|
460 | (4) |
|
|
464 | (6) |
|
Chapter 14 Maintaining and Optimizing Operating Systems |
|
|
470 | (46) |
|
|
471 | (1) |
|
Maintaining Operating Systems |
|
|
471 | (20) |
|
|
471 | (7) |
|
Managing Temporary Files in Windows |
|
|
478 | (1) |
|
|
478 | (1) |
|
Disk Maintenance Utilities |
|
|
479 | (2) |
|
|
481 | (3) |
|
Controlling Auto starting Software |
|
|
484 | (4) |
|
Handy Windows Administration Tools |
|
|
488 | (3) |
|
Optimizing Operating Systems |
|
|
491 | (11) |
|
Installing and Removing Software |
|
|
491 | (7) |
|
Installing and Optimizing a Device |
|
|
498 | (1) |
|
|
499 | (3) |
|
|
502 | (8) |
|
|
502 | (5) |
|
System Restore in Windows |
|
|
507 | (3) |
|
|
510 | (6) |
|
Chapter 15 Working with the Command-Line Interface |
|
|
516 | (52) |
|
|
517 | (1) |
|
Deciphering the Command-Line Interface |
|
|
517 | (7) |
|
|
518 | (1) |
|
Accessing the Command-Line Interface in Windows |
|
|
518 | (1) |
|
Accessing the Command-Line Interface in macOS and Linux |
|
|
519 | (2) |
|
|
521 | (1) |
|
|
521 | (1) |
|
File Formats and Filenames |
|
|
521 | (1) |
|
|
522 | (2) |
|
Mastering Fundamental Commands |
|
|
524 | (11) |
|
Structure: Syntax and Switches |
|
|
524 | (1) |
|
Viewing Directory Contents: dir and is |
|
|
525 | (2) |
|
Changing Directory Focus: The cd Command |
|
|
527 | (1) |
|
|
528 | (1) |
|
Making Directories: The md/mkdir Command |
|
|
529 | (2) |
|
Removing Directories: The rd/rmdir Command |
|
|
531 | (1) |
|
Running a Program in Windows |
|
|
532 | (1) |
|
Running a Program in macOS and Linux |
|
|
533 | (2) |
|
|
535 | (6) |
|
Using Wildcards to Locate Files |
|
|
535 | (2) |
|
|
537 | (1) |
|
|
538 | (1) |
|
Pruning and Grafting Folder Trees |
|
|
539 | (2) |
|
Assorted Windows Commands |
|
|
541 | (5) |
|
|
541 | (1) |
|
|
542 | (1) |
|
|
543 | (1) |
|
|
543 | (1) |
|
|
543 | (1) |
|
|
544 | (1) |
|
|
545 | (1) |
|
Using Special Keys in Windows |
|
|
545 | (1) |
|
|
545 | (1) |
|
Assorted macOS and Linux Commands |
|
|
546 | (8) |
|
|
547 | (1) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
549 | (1) |
|
|
550 | (1) |
|
|
551 | (1) |
|
|
552 | (1) |
|
|
553 | (1) |
|
|
554 | (1) |
|
|
554 | (7) |
|
Script Types and Languages |
|
|
555 | (1) |
|
|
555 | (4) |
|
|
559 | (2) |
|
|
561 | (7) |
|
Chapter 16 Troubleshooting Operating Systems |
|
|
568 | (48) |
|
|
569 | (1) |
|
|
569 | (18) |
|
Failure to Boot: Hardware or Configuration |
|
|
570 | (1) |
|
|
571 | (15) |
|
|
586 | (1) |
|
Failure to Start Normally |
|
|
587 | (15) |
|
|
587 | (1) |
|
|
588 | (1) |
|
|
589 | (3) |
|
|
592 | (2) |
|
|
594 | (5) |
|
|
599 | (3) |
|
|
602 | (8) |
|
Application Installation Problems |
|
|
603 | (1) |
|
Problems with Uninstalling |
|
|
604 | (1) |
|
|
604 | (2) |
|
Missing File or Incorrect File Version |
|
|
606 | (1) |
|
|
606 | (1) |
|
|
607 | (1) |
|
Volume Shadow Copy Service and System Protection |
|
|
608 | (2) |
|
|
610 | (6) |
|
Chapter 17 Display Technologies |
|
|
616 | (50) |
|
|
617 | (1) |
|
|
617 | (1) |
|
|
617 | (2) |
|
|
619 | (12) |
|
|
625 | (2) |
|
|
627 | (1) |
|
|
627 | (4) |
|
|
631 | (4) |
|
|
631 | (1) |
|
|
632 | (1) |
|
|
633 | (1) |
|
|
634 | (1) |
|
Connector Types and Associated Cables |
|
|
635 | (1) |
|
Installing and Configuring Video |
|
|
635 | (2) |
|
|
636 | (1) |
|
|
637 | (10) |
|
|
645 | (2) |
|
|
647 | (3) |
|
|
647 | (3) |
|
|
650 | (1) |
|
|
651 | (5) |
|
Troubleshooting Video Cards and Drivers |
|
|
651 | (1) |
|
|
652 | (3) |
|
Troubleshooting Projectors |
|
|
655 | (1) |
|
|
656 | (1) |
|
Additional Display Topics |
|
|
656 | (3) |
|
|
656 | (1) |
|
|
656 | (1) |
|
|
657 | (1) |
|
|
657 | (1) |
|
|
658 | (1) |
|
|
659 | (7) |
|
Chapter 18 Essentials of Networking |
|
|
666 | (28) |
|
|
667 | (1) |
|
Roles Hosts Play in Networks |
|
|
667 | (2) |
|
|
669 | (1) |
|
|
669 | (1) |
|
|
670 | (8) |
|
|
670 | (2) |
|
|
672 | (3) |
|
Ethernet with Twisted Pair |
|
|
675 | (1) |
|
Ethernet with Alternative Connections |
|
|
676 | (2) |
|
|
678 | (11) |
|
|
678 | (1) |
|
|
679 | (8) |
|
|
687 | (2) |
|
|
689 | (5) |
|
Chapter 19 Local Area Networking |
|
|
694 | (48) |
|
|
695 | (1) |
|
|
695 | (15) |
|
Network Addressing with IPv4 |
|
|
695 | (5) |
|
|
700 | (6) |
|
Network Addressing with IPv6 |
|
|
706 | (4) |
|
Installing and Configuring a Wired Network |
|
|
710 | (19) |
|
|
710 | (3) |
|
Configuring IP Addressing |
|
|
713 | (1) |
|
|
713 | (1) |
|
|
713 | (1) |
|
|
714 | (1) |
|
|
715 | (14) |
|
|
729 | (7) |
|
Repairing Physical Cabling |
|
|
730 | (3) |
|
|
733 | (3) |
|
|
736 | (6) |
|
Chapter 20 Wireless Networking |
|
|
742 | (36) |
|
|
743 | (1) |
|
Wireless Networking Components |
|
|
743 | (1) |
|
|
744 | (3) |
|
Wireless Networking Software |
|
|
745 | (1) |
|
|
745 | (2) |
|
|
747 | (3) |
|
Wireless Networking Security |
|
|
747 | (3) |
|
|
750 | (1) |
|
|
750 | (1) |
|
Wireless Networking Standards |
|
|
751 | (5) |
|
IEEE 802.11-Based Wireless Networking |
|
|
751 | (3) |
|
|
754 | (2) |
|
|
756 | (1) |
|
Installing and Configuring Wireless Networking |
|
|
756 | (9) |
|
|
756 | (8) |
|
|
764 | (1) |
|
|
764 | (1) |
|
|
765 | (5) |
|
|
767 | (1) |
|
|
767 | (1) |
|
Connectivity Troubleshooting |
|
|
767 | (1) |
|
Configuration Troubleshooting |
|
|
768 | (2) |
|
|
770 | (8) |
|
|
778 | (52) |
|
|
779 | (1) |
|
|
779 | (3) |
|
|
779 | (1) |
|
TCP/IP: The Common Language of the Internet |
|
|
780 | (1) |
|
Internet Service Providers |
|
|
781 | (1) |
|
|
782 | (1) |
|
|
782 | (1) |
|
Connecting to the Internet |
|
|
782 | (13) |
|
|
783 | (4) |
|
|
787 | (1) |
|
|
788 | (1) |
|
|
788 | (1) |
|
|
789 | (1) |
|
|
789 | (1) |
|
|
789 | (2) |
|
|
791 | (1) |
|
Connection to the Internet |
|
|
791 | (4) |
|
Internet Application Protocols |
|
|
795 | (3) |
|
|
798 | (17) |
|
|
798 | (5) |
|
|
803 | (2) |
|
File Transfer Protocol (FTP) |
|
|
805 | (1) |
|
|
806 | (1) |
|
|
806 | (1) |
|
|
807 | (1) |
|
|
808 | (2) |
|
|
810 | (2) |
|
|
812 | (2) |
|
Internet Utility Protocols |
|
|
814 | (1) |
|
|
815 | (2) |
|
|
815 | (2) |
|
|
817 | (5) |
|
|
818 | (1) |
|
|
819 | (1) |
|
|
819 | (1) |
|
|
820 | (2) |
|
|
822 | (2) |
|
|
822 | (2) |
|
|
824 | (6) |
|
|
830 | (34) |
|
|
831 | (1) |
|
Benefits of Virtualization |
|
|
831 | (2) |
|
|
831 | (1) |
|
|
832 | (1) |
|
System Management and Security |
|
|
832 | (1) |
|
|
833 | (1) |
|
Implementing Virtualization |
|
|
833 | (15) |
|
|
834 | (3) |
|
Emulation Versus Virtualization |
|
|
837 | (1) |
|
Client-Side Virtualization |
|
|
837 | (8) |
|
Server-Side Virtualization |
|
|
845 | (3) |
|
|
848 | (10) |
|
|
849 | (4) |
|
|
853 | (2) |
|
|
855 | (3) |
|
|
858 | (6) |
|
Chapter 23 Portable Computing |
|
|
864 | (44) |
|
|
865 | (1) |
|
Portable Computing Devices |
|
|
865 | (2) |
|
|
865 | (2) |
|
|
867 | (3) |
|
|
867 | (2) |
|
|
869 | (1) |
|
Extending Portable Computers |
|
|
870 | (6) |
|
|
870 | (2) |
|
|
872 | (1) |
|
Portable-Specific Expansion Slots |
|
|
873 | (1) |
|
|
874 | (1) |
|
|
874 | (2) |
|
Managing and Maintaining Portable Computers |
|
|
876 | (9) |
|
|
876 | (1) |
|
|
877 | (5) |
|
|
882 | (1) |
|
|
883 | (1) |
|
|
883 | (2) |
|
Upgrading and Repairing Laptop Computers |
|
|
885 | (10) |
|
|
886 | (2) |
|
|
888 | (3) |
|
Hardware/Device Replacement |
|
|
891 | (4) |
|
Troubleshooting Portable Computers |
|
|
895 | (6) |
|
|
895 | (2) |
|
|
897 | (4) |
|
|
901 | (7) |
|
Chapter 24 Understanding Mobile Devices |
|
|
908 | (38) |
|
|
909 | (1) |
|
|
909 | (7) |
|
|
909 | (4) |
|
|
913 | (3) |
|
|
916 | (1) |
|
|
916 | (8) |
|
|
916 | (2) |
|
|
918 | (1) |
|
|
918 | (1) |
|
|
918 | (6) |
|
Configuring a Mobile Device |
|
|
924 | (16) |
|
|
924 | (3) |
|
Installing and Configuring Apps |
|
|
927 | (2) |
|
|
929 | (1) |
|
|
930 | (1) |
|
|
930 | (2) |
|
|
932 | (3) |
|
Mobile Device Communication and Ports |
|
|
935 | (5) |
|
|
940 | (6) |
|
Chapter 25 Care and Feeding of Mobile Devices |
|
|
946 | (38) |
|
|
947 | (1) |
|
Troubleshooting Mobile Device Issues |
|
|
947 | (14) |
|
|
947 | (3) |
|
Touchscreen and Display Issues |
|
|
950 | (2) |
|
|
952 | (1) |
|
|
953 | (1) |
|
|
953 | (1) |
|
|
954 | (2) |
|
|
956 | (1) |
|
|
957 | (1) |
|
Cannot Broadcast to an External Monitor |
|
|
957 | (1) |
|
|
958 | (1) |
|
Connectivity and Data Usage Issues |
|
|
958 | (1) |
|
GPS and Location Services Problems |
|
|
959 | (1) |
|
|
960 | (1) |
|
|
961 | (1) |
|
|
961 | (8) |
|
BYOD Versus Corporate-Owned Devices |
|
|
962 | (1) |
|
Profile Security Requirements |
|
|
962 | (2) |
|
Preventing Physical Damage |
|
|
964 | (1) |
|
|
964 | (1) |
|
|
964 | (2) |
|
|
966 | (1) |
|
|
966 | (3) |
|
Mobile OS and Application Security Issues |
|
|
969 | (8) |
|
|
969 | (2) |
|
Risks, Symptoms, and Clues |
|
|
971 | (6) |
|
|
977 | (7) |
|
Chapter 26 Printers and Multifunction Devices |
|
|
984 | (52) |
|
|
985 | (1) |
|
Printer and Multifunction Device Components and Technologies |
|
|
985 | (17) |
|
|
985 | (12) |
|
|
997 | (3) |
|
|
1000 | (1) |
|
Automatic Document Feeders |
|
|
1000 | (1) |
|
|
1000 | (2) |
|
The Laser Printing Process |
|
|
1002 | (4) |
|
|
1002 | (2) |
|
|
1004 | (1) |
|
|
1004 | (1) |
|
|
1004 | (1) |
|
|
1004 | (1) |
|
|
1005 | (1) |
|
|
1005 | (1) |
|
Installing a Multifunction Device |
|
|
1006 | (4) |
|
Setting Up Printers in Windows |
|
|
1006 | (4) |
|
|
1010 | (1) |
|
|
1011 | (3) |
|
Configuring Print Settings |
|
|
1011 | (1) |
|
Optimizing Print Performance |
|
|
1012 | (1) |
|
Managing Public/Shared/Networked Devices |
|
|
1013 | (1) |
|
|
1014 | (13) |
|
Troubleshooting General Issues |
|
|
1014 | (4) |
|
Troubleshooting Impact Printers |
|
|
1018 | (1) |
|
Troubleshooting Thermal Printers |
|
|
1019 | (1) |
|
Troubleshooting Inkjet Printers |
|
|
1019 | (2) |
|
Troubleshooting Laser Printers |
|
|
1021 | (5) |
|
Troubleshooting 3-D Printers |
|
|
1026 | (1) |
|
|
1027 | (9) |
|
Chapter 27 Securing Computers |
|
|
1036 | (58) |
|
|
1037 | (1) |
|
|
1037 | (6) |
|
|
1037 | (1) |
|
|
1038 | (1) |
|
|
1039 | (1) |
|
|
1039 | (1) |
|
|
1040 | (1) |
|
System Crash/Hardware Failure |
|
|
1040 | (1) |
|
|
1040 | (1) |
|
|
1041 | (1) |
|
|
1041 | (2) |
|
Security Concepts and Technologies |
|
|
1043 | (14) |
|
|
1043 | (9) |
|
Data Classification and Compliance |
|
|
1052 | (1) |
|
|
1052 | (2) |
|
|
1054 | (3) |
|
|
1057 | (28) |
|
|
1057 | (7) |
|
Malware Signs and Symptoms |
|
|
1064 | (2) |
|
Malware Prevention and Recovery |
|
|
1066 | (6) |
|
|
1072 | (8) |
|
|
1080 | (1) |
|
Authentication and Encryption |
|
|
1080 | (3) |
|
|
1083 | (2) |
|
|
1085 | (9) |
|
Chapter 28 Operational Procedures |
|
|
1094 | (18) |
|
|
1095 | (1) |
|
Documentation Best Practices |
|
|
1095 | (3) |
|
|
1095 | (1) |
|
|
1096 | (1) |
|
|
1097 | (1) |
|
Managing Change Management |
|
|
1098 | (2) |
|
Change Management Processes |
|
|
1098 | (1) |
|
Implementing Change (Scenario) |
|
|
1098 | (2) |
|
Disaster Prevention and Recovery |
|
|
1100 | (7) |
|
|
1100 | (1) |
|
Backup and Recovery Procedures |
|
|
1101 | (5) |
|
|
1106 | (1) |
|
|
1107 | (1) |
|
|
1108 | (4) |
|
Appendix A Mapping to the CompTIA A+ Objectives |
|
|
1112 | (42) |
|
|
1112 | (21) |
|
|
1133 | (21) |
|
Appendix B About the Online Content |
|
|
1154 | (4) |
|
|
1154 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
1154 | (1) |
|
|
1154 | (1) |
|
Single User License Terms and Conditions |
|
|
1155 | (1) |
|
|
1156 | (1) |
|
|
1156 | (1) |
|
Other Online Book Resources |
|
|
1157 | (1) |
|
|
1157 | (1) |
|
|
1157 | (1) |
|
Playing the Mike Meyers Introduction Video |
|
|
1157 | (1) |
|
|
1157 | (1) |
|
|
1157 | (1) |
Glossary |
|
1158 | (59) |
Index |
|
1217 | |