larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

IT Essentials: PC Hardware and Software Companion Guide, 4th Edition

eBook

  • Sorry, this book is no longer in print.
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Not for Sale
  • Description
  • Sample Content
  • Updates
  • Copyright 2011
  • Dimensions: 8" x 9-1/4"
  • Edition: 4th
  • eBook
  • ISBN-10: 0-13-287403-2
  • ISBN-13: 978-0-13-287403-8

IT Essentials: PC Hardware and Software Companion Guide, Fourth Edition, supports the Cisco Networking Academy IT Essentials: PC Hardware and Software version 4.1 course. The course provides an introduction to computer components, laptops and portable devices, wireless connectivity, security and safety, environmental concerns, and diagnostic tools.

As a CompTIA Authorized Quality Curriculum, the course helps you prepare for the CompTIA A+ certification. The fundamentals part of the course, covered in Chapters 1–10, helps you prepare for the CompTIA A+ Essentials exam (220-701). You learn the fundamentals of computer technology, networking, and security and validate the communication skills and professionalism required of all entry-level IT professionals. The advanced part of the course, covered in Chapters 11–16, helps you prepare for the CompTIA A+ Practical Application exam (220-702), providing more of a hands-on orientation and scenarios in which troubleshooting and tools must be applied to resolve problems. Students must pass both exams to earn the CompTIA A+ certification.

The features of the Companion Guide are designed to help you study and succeed in this course:

Chapter objectives—Review core concepts by answering the focus
questions listed at the beginning of each chapter.

Key terms—Refer to the updated lists of networking vocabulary introduced and turn to the highlighted terms in context. 

Check Your Understanding Questions and Answer Key—Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see on the online course quizzes.

Virtual Desktop, Virtual Laptop, and Packet Tracer Activities, on the CD that accompanies this book, are virtual learning tools to help you develop critical thinking and complex problem-solving skills. New for this edition, Cisco Packet Tracer simulation-based learning activities promote the exploration of networking and network security concepts and allow you to experiment with network behavior.

All the Labs, Worksheets, and Class Discussion Exercises from the course are available in the separate book, IT Essentials: PC Hardware and Software Lab Manual, Fourth Edition. More than 120 activities emphasize the practical application of skills and procedures needed for hardware and software installations, upgrades, and troubleshooting systems.

IT Essentials: PC Hardware and
Software
Lab Manual
Fourth Edition

ISBN-10: 1-58713-262-1
ISBN-13: 978-1-58713-262-9

Related Title:

IT Essentials: PC Hardware and
Software
Course Booklet
Version 4.1

ISBN-10: 1-58713-261-3
ISBN-13: 978-1-58713-261-2

Companion CD-ROM

The CD-ROM contains all of the Virtual Desktop Activities, Virtual Laptop Activities, and Packet Tracer Activities referenced throughout the book. Designed and developed by the Cisco Networking Academy, these standalone tools supplement classroom learning by providing “hands-on” experience where real equipment is limited. (Note: the Packet Tracer software is not included with this CD. Ask your instructor for access to Packet Tracer.)

Table of Contents

Introduction

Chapter 1 Introduction to the Personal Computer

Objectives

Key Terms

Explain IT Industry Certifications

    Identify Education and Certifications

    Describe the A+ Certification

    Describe the EUCIP Certification

        Module 1: PC Hardware

        Module 2: Operating Systems

        Module 3: Local Area Network and Network Services

        Module 4: Expert Network Use

        Module 5: IT Security

Describe a Computer System

Identify the Names, Purposes, and Characteristics of Cases and Power Supplies

    Describe Cases

    Describe Power Supplies

        Connectors

        Electricity and Ohm’s Law

Identify the Names, Purposes, and Characteristics of Internal Components

    Identify the Names, Purposes, and Characteristics of Motherboards

    Identify the Names, Purposes, and Characteristics of CPUs

    Identify the Names, Purposes, and Characteristics of Cooling Systems

    Identify the Names, Purposes, and Characteristics of ROM and RAM

        ROM

        RAM

        Memory Modules

        Cache Memory

        Error Checking

    Identify the Names, Purposes, and Characteristics of Adapter Cards

    Identify the Names, Purposes, and Characteristics of Storage Drives

        Floppy Drive

        Hard Drive

        Optical Drive

        External Flash Drive

        Types of Drive Interfaces

    Identify the Names, Purposes, and Characteristics of Internal Cables

Identify the Names, Purposes, and Characteristics of Ports and Cables

    Serial Ports and Cables

    Modem Ports and Cables

    USB Ports and Cables

    FireWire Ports and Cables

    Parallel Ports and Cables

    SCSI Ports and Cables

    Network Ports and Cables

    PS/2 Ports

    Audio Ports

    Video Ports and Connectors

Identify the Names, Purposes, and Characteristics of Input Devices

Identify the Names, Purposes, and Characteristics of Output Devices

    Monitors and Projectors

    All-in-One Printer

    Speakers and Headphones

Explain System Resources and Their Purposes

    Interrupt Requests

    Input/Output (I/O) Port Addresses

    Direct Memory Access

Summary

Summary of Exercises

Check Your Understanding

Chapter 2 Safe Lab Procedures and Tool Use

Objectives

Key Terms

Explain the Purpose of Safe Working Conditions and Procedures

    Identify Safety Procedures and Potential Hazards for Users and Technicians

        General Safety Guidelines

        Electrical Safety Guidelines

        Fire Safety Guidelines

    Identify Safety Procedures to Protect Equipment from Damage and Data from Loss

        Electrostatic Discharge

        Electromagnetic Interference

        Climate

        Power Fluctuation Types

        Power Protection Devices

    Identify Safety Procedures to Protect the Environment from Contamination

        Material Safety Data Sheet

        Proper Disposal of Batteries

        Proper Disposal of Monitors or CRTs

        Proper Disposal of Toner Kits, Cartridges, and Developers

        Proper Disposal of Chemical Solvents and Aerosol Cans

Identify Tools and Software Used with Personal Computer Components and Their Purposes

    Identify Hardware Tools and Their Purpose

        ESD Tools

        Hand Tools

        Cleaning Tools

        Diagnostic Tools

    Identify Software Tools and Their Purpose

        Disk Management Tools

        Protection Software Tools

    Identify Organizational Tools and Their Purpose

        Personal Reference Tools

        Internet Reference Tools

        Miscellaneous Tools

Implement Proper Tool Use

    Demonstrate Proper Use of an Antistatic Wrist Strap

    Demonstrate Proper Use of an Antistatic Mat

        Antistatic Mat

        Workbench

    Demonstrate Proper Use of Various Hand Tools

        Screws

        Flat-Head Screwdriver

        Phillips-Head Screwdriver

        Hex Driver

        Part Retriever, Needle-Nose Pliers, or Tweezers

    Demonstrate Proper Use of Cleaning Materials

        Computer Cases and Monitors

        LCD Screens

        CRT Screens

        Component Contacts

        Keyboard

        Mouse

Summary

Summary of Exercises

    Labs

    Worksheets

Check Your Understanding

Chapter 3 Computer Assembly—Step by Step

Objectives

Key Terms

Open the Case

Install the Power Supply

Attach the Components to the Motherboard and Install the Motherboard

    Install a CPU and a Heat Sink/Fan Assembly

        CPU

        Heat Sink/Fan Assembly

    Install the RAM

    Install the Motherboard

Install Internal Drives

Install Drives in External Bays

    Install the Optical Drive

    Install the Floppy Drive

Install Adapter Cards

    Install the NIC

    Install the Wireless NIC

    Install the Video Adapter Card

Connect All Internal Cables

    Connect the Power Cables

        Motherboard Power Connections

        SATA Power Connectors

        Molex Power Connectors

        Berg Power Connectors

    Connect the Data Cables

        PATA Data Cables

        SATA Data Cables

Reattach the Side Panels and Connect External Cables to the Computer

    Reattach the Side Panels to the Case

    Connect External Cables to the Computer

        Floppy Drive Data Cables

Boot the Computer for the First Time

    Identify Beep Codes

    Describe BIOS Setup

Summary

Summary of Exercises

    Labs

    Virtual Desktop Activities

Check Your Understanding

Chapter 4 Basics of Preventive Maintenance and Troubleshooting

Objectives

Key Terms

Explain the Purpose of Preventive Maintenance

    Hardware

    Software

    Benefits

Identify the Steps of the Troubleshooting Process

    Explain the Purpose of Data Protection

        Data Backup

    Identify the Problem

        Conversation Etiquette

        Open-Ended Questions

        Closed-Ended Questions

        Documenting Responses

        Event Viewer

        Device Manager

        Beep Codes

        BIOS Information

        Diagnostic Tools

    Establish a Theory of Probable Causes

    Test the Theory to Determine an Exact Cause

    Implement the Solution

    Verify Solution, Full System Functionality, and If Applicable, Implement Preventive Measures

    Document Findings, Actions, and Outcomes

Summary

Summary of Exercises

Check Your Understanding

Chapter 5 Fundamental Operating Systems

Objectives

Key Terms

Explain the Purpose of an Operating System

    Describe Characteristics of Modern Operating Systems

        Control Hardware Access

        File and Folder Management

        User Interface

        Application Management

    Explain Operating System Concepts

        Modes of Operation

        Real Mode

        Protected Mode

        Virtual Real Mode

        Compatibility Mode

        32-Bit Versus 64-Bit

        Processor Architecture

Describe and Compare Operating Systems to Include Purpose, Limitations, and Compatibilities

    Describe Desktop Operating Systems

        Microsoft Windows

        Apple Mac OS

        UNIX/Linux

    Describe Network Operating Systems

Determine Operating System Based on Customer Needs

    Identify Applications and Environments That Are Compatible with an Operating System

    Determine Minimum Hardware Requirements and Compatibility with the OS Platform

        Hardware Compatibility List

Install an Operating System

    Identify Hard Drive Setup Procedures

        Partitioning and Formatting

    Prepare the Hard Drive

    Install the Operating System Using Default Settings

    Create User Accounts

    Complete the Installation

    Describe Custom Installation Options

        Disk Cloning

        Network Installation

        Recovery Disc

        Factory Recovery Partition

    Identify the Boot Sequence Files and Registry Files

        Windows XP Boot Process

        NTLDR and the Windows Boot Menu

        Windows Registry

        NT Kernel

    Describe How to Manipulate Operating System Files

        Startup Modes

    Describe Directory Structures

        File Extensions and Attributes

        Describe NTFS and FAT32

Navigate a GUI (Windows)

    Manipulate Items on the Desktop

        Display Properties

        Desktop Items

        Start Menu

        My Computer

        Launching Applications

        My Network Places

    Explore Control Panel Applets

        Control Panel Applets

        Display Settings

    Explore Administrative Tools

        Computer Management

        Device Manager

        Task Manager

        Services

        Performance Monitor

        Event Viewer

        MMC

        Remote Desktop

        Performance Settings

    Install, Navigate, and Uninstall an Application

        Add or Remove Programs Applet

        Add an Application

        Uninstall an Application

    Describe Upgrading an Operating System

        Upgrading the Operating System to Windows XP

        Upgrading the Operating System to Windows Vista

Identify and Apply Common Preventive Maintenance Techniques for Operating Systems

    Create a Preventive Maintenance Plan

        Preventive Maintenance Planning

        Device Driver Updates

        Firmware Updates

        Operating System Updates

        Security

        Startup Programs

    Schedule a Task

        System Utilities

        Automatic Updates

        Restore Point

        Backup Status and Configuration

        ERD and ASR

    Back Up the Hard Drive

        Normal Backup

        Copy Backup

        Differential Backup

        Incremental Backup

        Daily Backup

        Backup Media

Troubleshoot Operating Systems

    Review the Troubleshooting Process

        Step 1: Identify the Problem

        Step 2: Establish a Theory of Probable Causes

        Step 3: Determine an Exact Cause

        Step 4: Implement a Solution

        Step 5: Verify Solution and Full System Functionality

        Step 6: Document Findings

    Identify Common Problems and Solutions

Summary

Summary of Exercises

    Labs

    Worksheets

Check Your Understanding

Chapter 6 Fundamental Laptops and Portable Devices

Objectives

Key Terms

Describe Laptops and Other Portable Devices

    Identify Common Uses of Laptops

    Identify Common Uses of PDAs and Smartphones

Identify and Describe the Components of a Laptop

    Describe the Components Found on the Outside of the Laptop

    Describe Input Devices Found on Laptops

    Describe the Components Found on the Laptop Docking Station

Compare and Contrast Desktop and Laptop Components

    Compare and Contrast Desktop and Laptop Motherboards

    Compare and Contrast Desktop and Laptop Processors

    Compare and Contrast Desktop and Laptop Power Management

    Compare and Contrast Desktop and Laptop Expansion

    Capabilities

Explain How to Configure Laptops

    Describe How to Configure Power Settings

        Configuring Power Settings in Windows XP and Vista

        Managing Power Usage

        Power Management for the Hard Drive and the Display

        Setting the Laptop Power Options

        Adjusting Low Battery Warnings

    Describe the Safe Installation and Removal of Laptop Components

        Battery Replacement Steps

        Optical Drive Replacement Steps

        Hard Drive Replacement Steps

        Expansion Memory Replacement Steps

        PC Expansion Card Replacement Steps

        Hot-Swappable Device Removal Steps

    Laptop Communication Hardware Installation and Configuration

        Ethernet Installation and Configuration Steps

        Wireless Ethernet Installation and Configuration Steps

        Modem Installation and Configuration Steps

        Bluetooth Installation and Configuration Steps

        Infrared Installation and Configuration Steps

        Cellular WAN Installation and Configuration Steps

Compare the Different Mobile Phone Standards

Identify Common Preventive Maintenance Techniques for Laptops and Portable Devices

    Identify Appropriate Cleaning Procedures

        Laptop Keyboard Cleaning Procedures

        Ventilation Cleaning Procedures

        LCD Cleaning Procedures

        Touch Pad Cleaning Procedures

        Floppy Drive Cleaning Procedures

        Optical Drive Cleaning Procedures

        Cleaning a CD or DVD Disc

    Identify Optimal Operating Environments

Describe How to Troubleshoot Laptops and Portable Devices

    Review the Troubleshooting Process

    Identify Common Problems and Solutions

Summary

Summary of Exercises

    Worksheets

    Virtual Laptop Activities

Check Your Understanding

Chapter 7 Fundamental Printers and Scanners

Objectives

Key Terms

Describe the Types of Printers Currently Available

    Describe the Characteristics and Capabilities of Printers

        Capacity and Speed

        Color or Black and White

        Quality

        Reliability

        Total Cost of Ownership

    Describe Printer-to-Computer Interfaces

        Serial Ports

        Parallel Ports

        SCSI Interfaces

        USB Interfaces

        FireWire Connections

        Ethernet Connections

        Wireless Connections

    Describe Laser Printers

    Describe Impact Printers

    Describe Inkjet Printers

    Describe Solid-Ink Printers

    Describe Other Printer Types

        Thermal Printers

        Dye-Sublimation Printers

Describe the Installation and Configuration Process for Printers

    Describe How to Set Up a Printer

    Explain How to Power and Connect the Device Using a Local or Network Port

    Describe How to Install and Update the Device Driver, Firmware, and RAM

        Printer Drivers

        Firmware

        Printer Memory

    Identify Configuration Options and Default Settings

    Describe How to Optimize Printer Performance

    Describe How to Print a Test Page

        Printing a Test Page

        Printing from an Application

        Testing a Printer

        Testing the Printer from the Printer Panel

    Describe How to Share a Printer

Describe the Types of Scanners Currently Available

    Describe Scanner Types, Resolution, and Interfaces

    Describe All-in-One Devices

    Describe Flatbed Scanners

    Describe Handheld Scanners

    Describe Drum Scanners

Describe the Installation and Configuration Process for Scanners

    Explain How to Power and Connect a Scanner

    Describe How to Install and Update the Device Driver

    Identify Configuration Options and Default Settings

Identify and Apply Common Preventive Maintenance Techniques for Printers and Scanners

    Describe Printer Maintenance

    Describe Scanner Maintenance

Troubleshoot Printers and Scanners

    Review the Troubleshooting Process

    Identify Common Problems and Solutions

Summary

Summary of Exercises

    Labs

Check Your Understanding

Chapter 8 Fundamental Networks

Objectives

Key Terms

Explain the Principles of Networking

    Define Computer Networks

    Explain the Benefits of Networking

Describe Types of Networks

    Describe a LAN

    Describe a WAN

    Describe a WLAN

    Explain Peer-to-Peer Networks

    Explain Client/Server Networks

Describe Basic Networking Concepts and Technologies

    Explain Bandwidth and Data Transmission

    Describe IP Addressing

        Dotted Decimal

        Classful Subnetting

        Subnet Mask

        Manual Configuration

    Define DHCP

    Define NAT

    Describe Internet Protocols and Applications

    Define ICMP

Describe the Physical Components of a Network

    Identify the Names, Purposes, and Characteristics of Network Devices

        Hubs

        Bridges and Switches

        Routers

        Wireless Access Points

        Multipurpose Devices

    Identify the Names, Purposes, and Characteristics of Common Network Cables

        Twisted Pair

        Category Rating

        Coaxial Cable

        Fiber-Optic Cable

Describe LAN Topologies and Architectures

    Describe LAN Topologies

        Physical Topologies

        Logical Topologies

    Describe LAN Architectures

        Ethernet

        Token Ring

        FDDI

Identify Standards Organizations

Identify Ethernet Standards

    Explain Cabled Ethernet Standards

        Ethernet Technologies

        Summary of Ethernet Technologies

    Explain Wireless Ethernet Standards

Explain the OSI and TCP/IP Data Models

    Define the TCP/IP Model

        Application Layer Protocols

        Transport Layer Protocols

        Internet Layer Protocols

        Network Access Layer Protocols

    Define the OSI Model

    Compare the OSI and TCP/IP Models

Describe How to Configure a NIC and a Modem

    Install or Update a NIC Driver

    Uninstall a NIC Driver

    Attach the Computer to an Existing Network

    Describe the Installation of a Modem

        AT Commands

Identify the Names, Purposes, and Characteristics of Other Technologies Used to Establish Connectivity

    Describe Telephone Technologies

        Analog Telephone

        Integrated Services Digital Network (ISDN)

        Digital Subscriber Line (DSL)

    Define Power Line Communication

    Define Broadband

        Cellular

        Cable

        DSL

        Satellite

        Fiber Broadband

    Define VoIP

    Define VPN

Identify and Apply Common Preventive Maintenance Techniques Used for Networks

    Counterfeiting and the IT Industry

Troubleshoot a Network

    Review the Troubleshooting Process

    Identify Common Network Problems and Solutions

Summary

Summary of Exercises

    Labs

    Worksheets

    Packet Tracer Activities

Check Your Understanding

Chapter 9 Fundamental Security

Objectives

Key Terms

Explain Why Security Is Important

Describe Security Threats

    Define Viruses, Worms, and Trojans

    Explain Web Security

    Define Adware, Spyware, and Grayware

    Explain Denial of Service

    Describe Spam and Popup Windows

    Explain Social Engineering

    Explain TCP/IP Attacks

    Explain Data Wiping, Hard Drive Destruction, and Recycling

        Data Wiping

        Hard Drive Destruction

        Hard Drive Recycling

Identify Security Procedures

    Explain What Is Required in a Basic Local Security Policy

    Explain the Tasks Required to Protect Physical Equipment

    Describe Ways to Protect Data

        Password Protection

        Data Encryption

        Software Firewall

        Data Backups

        Smart Card Security

        Biometric Security

        File System Security

    Describe Wireless Security Techniques

Identify Common Preventive Maintenance Techniques for Security

    Explain How to Update Signature Files for Antivirus and Antispyware Software

    Explain How to Install Operating System Service Packs and Security Patches  

Troubleshoot Security

    Review the Troubleshooting Process

        Step 1: Identify the Problem

        Step 2: Establish a Theory of Probably Causes

        Step 3: Determine an Exact Cause

        Step 4: Implement the Solution

        Step 5: Verify Solution and Full System Functionality

        Step 6: Document Findings

    Identify Common Problems and Solutions

Summary

Summary of Exercises

    Worksheets

    Packet Tracer Activities

Check Your Understanding

Chapter 10 Communication Skills

Objectives

Key Terms

Explain the Relationship Between Communication and Troubleshooting

Describe Good Communication Skills and Professional Behavior

    Determine the Computer Problem of the Customer

    Display Professional Behavior with the Customer

    Focus the Customer on the Problem During the Call

        Talkative Customer

        Rude Customer

        Angry Customer

        Knowledgeable Customer

        Inexperienced Customer

    Use Proper Netiquette

    Implement Time and Stress Management Techniques

        Workstation Ergonomics

        Time Management

        Stress Management

    Observe Service Level Agreements

    Follow Business Policies

Explain Ethics and Legal Aspects of Working with Computer Technology

    Ethical Customs

    Legal Rules

Describe the Call Center Environment and Technician Responsibilities

    Describe the Call Center Environment

    Describe Level-One Technician Responsibilities

    Describe Level-Two Technician Responsibilities

Summary

Summary of Exercises

    Worksheets

    Class Discussions

Check Your Understanding

Chapter 11 Advanced Personal Computers

Objectives

Key Terms

Give an Overview of Field, Remote, and Bench Technician Jobs

Explain Safe Lab Procedures and Tool Use

    Review Safe Working Environments and Procedures

    Review Names, Purposes, Characteristics, and Safe and Appropriate Use of Tools

    Identify Potential Safety Hazards and Implement Proper Safety Procedures for Computer Components

    Describe Environmental Issues

Describe Situations Requiring Replacement of Computer Components

    Select a Case and Power Supply

    Select a Motherboard

    Select the CPU and Heat Sink/Fan Assembly

    Select RAM

    Select Adapter Cards

        Graphics Cards

        Sound Cards

        Storage Controllers

        Input/Output Cards

        Network Interface Cards

        Capture Cards

    Select Storage Devices and Hard Drives

        Floppy Disk Drive

        Media Readers

        Hard Drives

        Solid State Drives

        Optical Drives

        External Storage

    Select Input and Output Devices

Upgrade and Configure Personal Computer Components and Peripherals

    Upgrade and Configure a Motherboard

        CPU Installation

        Jumper Settings

        CMOS Battery Installation

        Motherboard Installation

        BIOS Updates

        Advanced BIOS Settings

    Upgrade and Configure a CPU and a Heat Sink/Fan Assembly

    Upgrade and Configure RAM

    Upgrade and Configure BIOS

    Upgrade and Configure Storage Devices and Hard Drives

    Upgrade and Configure Input and Output Devices

Identify and Apply Common Preventive Maintenance Techniques for Personal Computer Components

    Clean Internal Components

    Clean the Case

    Inspect Computer Components

        CPU and Cooling System

        RAM Connections

        Storage Devices

        Adapter Cards

        Power Devices

        Loose Screws

        Keyboard and Mouse

        Cables

Troubleshoot Computer Components and Peripherals

    Review the Troubleshooting Process

    Identify Common Problems and Solutions

        Storage Device Problems

        Motherboard and Internal Component Problems

        Power Supply Problems

        CPU Problems and Memory Problems

    Apply Troubleshooting Skills

Summary

Summary of Exercises

    Labs

    Worksheets

Check Your Understanding

Chapter 12 Advanced Operating Systems

Objectives

Key Terms

Select the Appropriate Operating System Based on Customer Needs

    Describe Operating Systems

    Describe Network Operating Systems

Windows OS Directory Structures

    User File Locations

    System File Locations

    Fonts

    Temporary Files

    Program Files

    Offline Files and Folders

Install, Configure, and Optimize an Operating System

    Compare and Contrast a Default Installation and a Custom Installation

    Install Windows XP Professional Using a Custom Installation

        Unattended Installation in Windows XP

        Unattended Installation in Windows Vista

        Image-Based Installation

        Remote Installation

    Create, View, and Manage Disks, Directories, and Files

        Disk Structure

        Drive Status

        File System

    Identify Procedures and Utilities Used to Optimize the Performance of Operating Systems

        System Tools

        Administrative Tools

        Services

        Device Manager

        Task Manager

        System Monitor

        Regional and Language Options

        Temporary Files

    Identify Procedures and Utilities Used to Optimize the Performance of Browsers

    Describe Installation, Use, and Configuration of Email Software

    Set Screen Resolution and Update the Video Driver

    Describe Installation of a Second Operating System

        The Boot.ini File

Windows CLI Commands

    MSCONFIG

    SFC

Describe How to Upgrade Operating Systems

Describe Preventive Maintenance Procedures for Operating Systems

    Schedule Automatic Tasks and Updates

        GUI Scheduled Tasks

        CLI Scheduled Tasks

        Windows Automatic Updates

    Set Restore Points

Troubleshoot Operating Systems

    Review the Troubleshooting Process

        Step 1: Identify the Problem

        Step 2: Establish a Theory of Probable Causes

        Step 3: Determine an Exact Cause

        Step 4: Implement a Solution

        Step 5: Verify Solution and Full System Functionality

        Step 6: Document Your Findings

    Identify Common Problems and Solutions

    Apply Troubleshooting Skills

Summary

Summary of Exercises

    Labs

Check Your Understanding

Chapter 13 Advanced Laptops and Portable Devices

Objectives

Key Terms

Describe Wireless Communication Methods for Laptops and Portable Devices

    Describe Bluetooth Technology

    Describe Infrared Technology

    Describe Cellular WAN Technology

    Describe Wi-Fi Technology

    Describe Satellite Technology

Describe Repairs for Laptops and Portable Devices

Select Laptop Components

    Select Batteries

    Select a Docking Station or Port Replicator

    Select Storage Devices

    Select Additional RAM

Describe Preventive Maintenance Procedures for Laptops

    Describe How to Schedule and Perform Maintenance on Laptops

    Explain How to Manage Data Version Control Between Desktops and Laptops

Describe How to Troubleshoot a Laptop

    Review the Troubleshooting Process

        Step 1: Identify the Problem

        Step 2: Establish a Theory of Probable Causes

        Step 3: Determine an Exact Cause

        Step 4: Implement a Solution

        Step 5: Verify Solution and Full System Functionality

        Step 6: Document Findings

    Identify Common Problems and Solutions

        Hard Drive Replacement Steps

        Expansion Memory Replacement Steps

        Optical Drive Replacement Steps

        Battery Replacement Steps

        PC Expansion Card Replacement Steps

        Hot-Swappable Device Removal Steps

    Apply Troubleshooting Skills

Summary

Summary of Exercises

    Worksheets

    Labs

Check Your Understanding

Chapter 14 Advanced Printers and Scanners

Objectives

Key Terms

Describe Potential Safety Hazards and Safety Procedures Associated with Printers and Scanners

Install and Configure a Local Printer and Scanner

    Connect the Device to a Local Port

    Install and Configure the Driver and Software

        Printer Driver Installation

        Page Description Language

    Configure Options and Default Settings

        Global Method

        Per-Document Method

        Scanner Calibrations

        Printer Calibrations

    Verify Functionality

        Printer Test

        Scanner Test

Describe How to Share a Printer and a Scanner on a Network

    Describe the Types of Print Servers

        Network Print Server Devices

        Dedicated PC Print Servers

        Computer-Shared Printers

    Describe How to Install Network Printer Software and Drivers on a Computer

Upgrade and Configure Printers and Scanners

    Describe Printer Upgrades

        Installing Printer Memory

        Additional Printer Upgrades

    Describe Scanner Optimization

Describe Printer and Scanner Preventive Maintenance Techniques

    Determine Scheduled Maintenance According to Vendor Guidelines

    Describe a Suitable Environment for Printers and Scanners

    Describe Cleaning Methods

        Printer Maintenance

        Scanner Maintenance

    Describe Checking Capacity of Ink Cartridges and Toners

Troubleshoot Printers and Scanners

    Review the Troubleshooting Process

        Step 1: Identify the Problem

        Step 2: Establish a Theory of Probable Causes

        Step 3: Determine an Exact Cause

        Step 4: Implement a Solution

        Step 5: Verify Solution and Full System Functionality

        Step 6: Document Findings

    Identify Common Problems and Solutions

Apply Troubleshooting Skills

Summary

Summary of Exercises

    Labs

    Worksheets

Check Your Understanding

Chapter 15 Advanced Networks

Objectives

Key Terms

Identify Potential Safety Hazards and Implement Proper Safety Procedures Related to Networks

    Explain Fiber-Optic Safety

        Chemicals

        Tools

        Harmful Light

        Glass Shards

    Explain Cable, Cable Cutters, and Cable-Cutting Safety Hazards

Design a Network Based on the Customer’s Needs

    Determine a Topology

    Determine Protocols and Network Applications

Determine the Components for the Customer’s Network

    Select Cable Types

        Wireless

        Cost

        Security

        Design for the Future

    Select the ISP Connection Type

        Plain Old Telephone Service

        Integrated Services Digital Network

        Digital Subscriber Line

        Cable

        Satellite

        Cellular

        Wireless

        Compare ISP Connection Types

    Select Network Cards

    Select the Network Device

        Hubs

        Switches

        Routers

        ISP Equipment

Implement the Customer’s Network

    Install and Test the Customer’s Network

    Configure the Customer’s Internet and Network Resources

        Temporary Internet Files

        Default Browser

        File Sharing

        Printer Sharing

Upgrade the Customer’s Network

    Install and Configure a Wireless NIC

    Install and Configure a Wireless Router

        802.11 Protocol Selection

        Static IP Address Configuration

        SSID Setting

        Firmware Update

    Test the Connection

        Network Connections

        ipconfig

        ping

        tracert

        net

        nslookup

Describe the Installation, Configuration, and Management of a Simple Mail Server

    SMTP

    POP

    IMAP

    Email Server

    Email Server Installation

Describe Preventive Maintenance Procedures for Networks  

Troubleshoot the Network

    Review the Troubleshooting Process

        Step 1: Identify the Problem

        Step 2: Establish a Theory of Probable Causes

        Step 3: Determine an Exact Cause

        Step 4: Implement a Solution

        Step 5: Verify Solution and Full System Functionality

        Step 6: Document Findings

    Identify Common Problems and Solutions

    Apply Troubleshooting Skills

Summary

Summary of Exercises

    Labs

    Worksheets

    Packet Tracer Activities

Check Your Understanding

Chapter 16 Advanced Security

Objectives

Key Terms

Outline Security Requirements Based on Customer Needs

    Outline a Local Security Policy

    Explain When and How to Use Security Hardware

    Explain When and How to Use Security Application Software

Select Security Components Based on Customer Needs

    Describe and Compare Security Techniques

        Passwords

        Logging and Auditing

        Wireless Configurations

        Security Technologies

    Describe and Compare Access Control Devices

        Physical Security

        Data Security

    Describe and Compare Firewall Types

Implement a Customer’s Security Policy

    Configure Security Settings

        Permission Levels for Folders and Files

        Wireless Antennae

        Network Device Access Permissions

        Wireless Security Modes

        SSID

        MAC Address Filtering

        Firewalls

        Port Forwarding and Port Triggering

    Describe Configuring Firewall Types

        Software Firewalls

        Windows XP Firewalls

        Windows Vista Firewalls

    Describe Protection Against Malicious Software

Perform Preventive Maintenance on Security

    Describe the Configuration of Operating System Updates

    Maintain Accounts

        Terminating Employee Access

        Guest Accounts

    Explain Data Backup Procedures, Access to Backups, and Secure Physical Backup Media

Troubleshoot Security

    Review the Troubleshooting Process

        Step 1: Identify the Problem

        Step 2: Establish a Theory of Probable Solutions

        Step 3: Determine an Exact Cause

        Step 4: Implement a Solution

        Step 5: Verify the Solution and Verify Full System Functionality

        Step 6: Document Your Findings

    Identify Common Problems and Solutions

        Malware Settings

        User Accounts and Permissions

        Computer Security

        Firewall and Proxy Settings

    Apply Troubleshooting Skills

Summary

Summary of Exercises

    Labs

    Worksheets

Check Your Understanding

Appendix: Answers to Check Your Understanding Questions

Glossary

9781587132636    TOC    9/7/2010

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020