IT Essentials
Home > Computing and Information Technology > Computer networking and communications > Networking packages > IT Essentials: (Companion Guide)
IT Essentials: (Companion Guide)

IT Essentials: (Companion Guide)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

IT Essentials: PC Hardware and Software Companion Guide, Fifth Edition IT Essentials: PC Hardware and Software Companion Guide, Fifth Edition, supports the Cisco Networking Academy IT Essentials: PC Hardware and Software version 5 course. The course is designed for Cisco Networking Academy students who want to pursue careers in IT and learn how computers work, how to assemble computers, and how to safely and securely troubleshoot hardware and software issues.   As CompTIA Approved Quality Content, the course also helps you prepare for the CompTIA A+ certification exams 220-801 and 220-802. CompTIA A+ 220-801 covers the fundamentals of computer technology, installation and configuration of PCs, laptops, related hardware, and basic networking. CompTIA A+ 220-802 covers the skills required to install and configure PC operating systems and configure common features, such as network connectivity and email for Android and Apple iOS mobile operating systems. Students must pass both exams to earn the CompTIA A+ certification.   The features of the Companion Guide are designed to help you study and succeed in this course:   --  Chapter objectives—Review core concepts by answering the focus questions listed at the beginning of each chapter. --  Key terms—Refer to the updated lists of networking vocabulary introduced, and turn to the highlighted terms in context.  --  Course section numbering—Follow along with the course heading numbers to easily jump online to complete labs, activities, and quizzes referred to within the text.  --  Check Your Understanding Questions and Answer Key—Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see on the online course quizzes. --  Glossary in the back of the book to define Key Terms   The lab icon in the Companion Guide indicates when there is a hands-on Lab or Worksheet to do. The Labs and Worksheets are compiled and published in the separate book, IT Essentials: PC Hardware and Software Lab Manual, Fifth Edition. With more than 1300 pages of activities, including Windows 7, Windows Vista, and Windows XP variations covered in the CompTIA A+ exam objectives, practicing and performing these tasks will reinforce the concepts and help you become a successful PC technician.  

Table of Contents:
Introduction xxiv Chapter 1 Introduction to the Personal Computer 1 Objectives 1 Key Terms 1 Introduction (1.0.1) 4 Cases and Power Supplies (1.1.1) 4     Computer Cases (1.1.1.1) 4     Power Supplies (1.1.1.2) 6         Connectors 7     Electricity and Ohm’s Law (1.1.1.3) 8 Internal PC Components (1.1.2) 11     Motherboards (1.1.2.1) 11     CPUs (1.1.2.2) 13     Cooling Systems (1.1.2.3) 16 ROM and RAM 18     ROM (1.1.2.4) 18     RAM (1.1.2.5) 19     Memory Modules (1.1.2.6) 20         Cache Memory 22         Error Checking 22     Adapter Cards and Expansion Slots (1.1.2.7) 22     Storage Devices and RAID (1.1.2.8) 25         Floppy Drive 26         Hard Drive 26         Tape Drive 27         Optical Drive 27         External Flash Drive 28         Types of Drive Interfaces 28     Internal Cables (1.1.2.9) 30 External Ports and Cables (1.1.3) 31     Video Ports and Cables (1.1.3.1) 31     Other Ports and Cables (1.1.3.2) 35         Serial Ports and Cables 35         Modem Ports and Cables 36         USB Ports and Cables 36         FireWire Ports and Cables 37         Parallel Ports and Cables 38         eSATA Data Cables 38         SCSI Ports and Cables 38         Network Ports and Cables 39         PS/2 Ports 40         Audio Ports 40 Input and Output Devices (1.1.4) 41     Input Devices (1.1.4.1) 41         Mice and Keyboards 41         Gamepads and Joysticks 42         Digital Cameras and Digital Video Cameras 42         Biometric Identification Devices 43         Touchscreens 43         Digitizers 43         Scanners 44     Output Devices (1.1.4.2) 44         Monitors and Projectors 44         All-in-One Printers 46         Speakers and Headphones 46     Monitor Characteristics (1.1.4.3) 46         Connecting Multiple Monitors to a Single Computer 48 Selecting PC Components (1.2.1) 49     Case and Power Supply (1.2.1.1) 49     Selecting Motherboards (1.2.1.2) 50     Selecting the CPU and Heat Sink and Fan Assembly (1.2.1.3) 51     Selecting RAM (1.2.1.4) 53     Selecting Adapter Cards (1.2.1.5) 54         Graphics Cards 54         Sound Cards 55         Storage Controllers 55         I/O Cards 56         NICs 56         Capture Cards 57     Selecting Hard Drives and Floppy Drives (1.2.1.6) 57         Floppy Disk Drive 57         Hard Drives 57     Selecting Solid State Drives and Media Readers (1.2.1.7) 60         Solid State Drives 60         Media Readers 61     Selecting Optical Drives (1.2.1.8) 62     Selecting External Storage (1.2.1.9) 62     Selecting Input and Output Devices (1.2.1.10) 63 Specialized Computer Systems (1.3.1) 64     CAx Workstations (1.3.1.1) 65     Audio and Video Editing Workstations (1.3.1.2) 65     Virtualization Workstations (1.3.1.3) 67     Gaming PCs (1.3.1.4) 68     Home Theater PCs (1.3.1.5) 69 Summary (1.4.1) 71 Summary of Exercises 71     Worksheets 71 Check Your Understanding 72 Chapter 2 Lab Procedures and Tool Use 75 Objectives 75 Key Terms 75 Introduction (2.0.1) 77 Safe Lab Procedures (2.1) 77     General Safety (2.1.1.1) 77     Electrical Safety (2.1.1.2) 78     Fire Safety (2.1.1.3) 78 Procedures to Protect Equipment and Data (2.1.2) 79     ESD and EMI (2.1.2.1) 79         Climate 80     Power Fluctuation Types (2.1.2.2) 80     Power Protection Devices (2.1.2.3) 81 Procedures to Protect the Environment (2.1.3) 82     Material Safety and Data Sheet (2.1.3.1) 82     Equipment Disposal (2.1.3.2) 83         Batteries 83         Monitors 84         Toner Kits, Cartridges, and Developers 84         Chemical Solvents and Aerosol Cans 84 Proper Use of Tools (2.2) 84     Hardware Tools (2.2.1) 84         ESD Tools (2.2.1.2) 85         Hand Tools (2.2.1.3) 85         Cleaning Tools (2.2.1.4) 86         Diagnostic Tools (2.2.1.5) 86     Software Tools (2.2.2) 88         Disk Management Tools (2.2.2.1) 88         Protection Software Tools (2.2.2.2) 89     Organizational Tools (2.2.3) 89         Reference Tools (2.2.3.1) 89         Miscellaneous Tools (2.2.3.2) 91     Demonstrate Proper Tool Use (2.2.4) 92         Antistatic Wrist Strap (2.2.4.1) 92         Antistatic Mat (2.2.4.2) 93         Hand Tools (2.2.4.3) 94         Cleaning Materials (2.2.4.6) 98 Summary (2.3.1) 101 Summary of Exercises 101     Labs 101     Worksheets 102 Check Your Understanding 102 Chapter 3 Computer Assembly 105 Objectives 105 Key Terms 105 Introduction (3.0.1) 106 Open the Case and Install the Power Supply (3.1.1) 106     Open the Case (3.1.1.1) 106     Install the Power Supply (3.1.1.2) 107 Install the Motherboard (3.1.2) 108     Install the CPU, Heat Sink, and Fan Assembly (3.1.2.1) 108         CPU 108         Heat Sink and Fan Assembly 110     Install RAM (3.1.2.2) 111     Install the Motherboard (3.1.2.3) 112 Install the Drives (3.1.3) 113     Install the Internal Drive (3.1.3.1) 113     Install the Optical Drive (3.1.3.2) 113     Install the Floppy Drive (3.1.3.3) 114 Install the Adapter Cards (3.1.4) 115     Types of Adapter Cards (3.1.4.1) 115     Install a NIC (3.1.4.2) 116     Install a Wireless NIC (3.1.4.3) 116     Install a Video Adapter Card (3.1.4.4) 117 Install the Cables (3.1.5) 118     Install the Internal Power Cables (3.1.5.1) 118         Motherboard Power Connections 118         SATA Power Connectors 119         Molex Power Connectors 119         Berg Power Connectors 119     Install the Internal Data Cables (3.1.5.2) 120         PATA Data Cables 120         SATA Data Cables 121         Floppy Data Cables 121     Install the Front Panel Cables (3.1.5.4) 122         Power and Reset Buttons 123         Power and Drive Activity LEDs 124         System Speaker 124         USB 124         Audio 125     Install the Case Assembly (3.1.5.6) 126     Install the External Cables (3.1.5.7) 126 POST and BIOS (3.2.1) 128     BIOS Beep Codes and Setup (3.2.1.1) 128         POST Card 129     BIOS Setup (3.2.1.2) 129 BIOS Configuration (3.2.2) 131     BIOS Component Information (3.2.2.1) 131     BIOS Configurations (3.2.2.2) 131         Time and Date 131         Disabling Devices 132         Boot Order 132         Clock Speed 132         Virtualization 133     BIOS Security Configurations (3.2.2.3) 133     BIOS Hardware Diagnostics and Monitoring (3.2.2.4) 134         Temperatures 134         Fan Speeds 135         Voltages 135         Clock and Bus Speeds 135         Intrusion Detection 136         Built-In Diagnostics 136 Motherboard and Related Components (3.3.1) 137     Motherboard Component Upgrades (3.3.1.1) 137         CPU Installation 138         Jumper Settings 138         CMOS Battery Installation 139     Upgrade the Motherboard (3.3.1.2) 139         BIOS Updates 140     Upgrade CPU and Heat Sink and Fan Assembly (3.3.1.3) 141     Upgrade the RAM (3.3.1.4) 142     Upgrade the BIOS (3.3.1.5) 143 Storage Devices (3.3.2) 144     Upgrade Hard Drives and RAID (3.3.2.1) 144 Input and Output Devices (3.3.3) 147     Upgrade Input and Output Devices (3.3.3.1) 147 Summary (3.4.1.1) 149 Summary of Exercises 149     Virtual Desktop Activities 150     Labs 150     Worksheets 150 Check Your Understanding 151 Chapter 4 Overview of Preventive Maintenance 155 Objectives 155 Key Terms 155 Introduction (4.0.1) 156 Preventive Maintenance (4.1) 156     Benefits of Preventive Maintenance (4.1.1.1) 156     Preventive Maintenance Tasks (4.1.1.2) 157         Hardware 157         Software 157     Clean the Case and Internal Components (4.1.1.3) 158     Inspect Internal Components (4.1.1.4) 159     Environmental Concerns (4.1.1.5) 160 Troubleshooting Process Steps (4.2.1) 160     Introduction to Troubleshooting (4.2.1.1) 161         Data Backup 161     Identify the Problem (4.2.1.2) 162         Conversation Etiquette 162         Open-Ended and Closed-Ended Questions 163         Documenting Responses 163         Beep Codes 163         BIOS Information 164         Event Viewer 164         Device Manager 164         Task Manager 165         Diagnostic Tools 165     Establish a Theory of Probable Cause (4.2.1.3) 166     Test the Theory to Determine Cause (4.2.1.4) 166     Establish a Plan of Action to Resolve the Problem and     Implement the Solution (4.2.1.5) 167     Verify Full System Functionality and, If Applicable, Implement     Preventive Measures (4.2.1.6) 168     Document Findings, Actions, and Outcomes (4.2.1.7) 168     PC Common Problems and Solutions (4.2.2.1) 169 Summary (4.3.1) 175 Summary of Exercises 175 Check Your Understanding 175 Chapter 5 Operating Systems 179 Objectives 179 Key Terms 179 Introduction 5.0.1.1 181 Modern Operating Systems (5.1) 181     Terms (5.1.1.1) 181     Basic Functions of an Operating System (5.1.1.2) 181         Hardware Access 182         File and Folder Management 182         User Interface 182         Application Management 183     Processor Architecture (5.1.1.3) 183 Types of Operating Systems (5.1.2) 184     Desktop Operating Systems (5.1.2.1) 185         Microsoft Windows 185         Apple OS X 186         Linux 186     Network Operating Systems (5.1.2.2) 186 Customer Requirements for an Operating System (5.1.3) 187     OS-Compatible Applications and Environments (5.1.3.1) 187     Minimum Hardware Requirements and Compatibility with the OS Platform (5.1.3.2) 188         Microsoft Compatibility Center 188     Comparing OS Requirements (5.1.3.3) 189 Operating System Upgrades (5.1.4) 192     Checking OS Compatibility (5.1.4.1) 192         Upgrade Advisor 192     Windows OS Upgrades (5.1.4.2) 193     Data Migration (5.1.4.3) 195         User State Migration Tool 195         Windows Easy Transfer 195         File and Settings Transfer Wizard for Windows XP 196 Operating System Installation (5.2) 196     Hard Drive Partitioning (5.2.1.1) 196         Partitioning 197     Hard Drive Formatting (5.2.1.2) 198         Quick Format Versus Full Format 200     OS Installation with Default Settings (5.2.1.4) 200         Network Settings 202     Account Creation (5.2.1.8) 203     Complete the Installation (5.2.1.12) 204         Windows Update 205         Device Manager 206 Custom Installation Options (5.2.2) 207     Disk Cloning (5.2.2.1) 207     Other Installation Methods (5.2.2.2) 207         Network Installation 208         PXE Installation 209         Unattended Installation in Windows 7 and Vista 209         Image-Based Installation 210         Remote Installation 210     System Recovery Options (5.2.2.6) 211         System Recovery Options 211         System Image Recovery 213         Automated System Recovery in Windows XP Professional 214         Factory Recovery Partition 214 Boot Sequence and Registry Files (5.2.3) 214     Windows Boot Process (5.2.3.1) 214         Windows Boot Process 215         Windows Boot Loader and Windows Boot Manager in Windows 7 and Windows Vista 216         NTLDR and the Windows Boot Menu in Windows XP 216         NT Kernel 216     Startup Modes (5.2.3.2) 217     Windows Registry (5.2.3.3) 217 Multiboot (5.2.4) 218     Multiboot Procedures (5.2.4.1) 219         BOOTMGR File 219     Disk Management Utility (5.2.4.2) 220         Drive Status 221         Extending Partitions 222         Splitting Partitions 222         Assigning Drive Letters 222         Adding Drives 222         Adding Arrays 223 Directory Structure and File Attributes (5.2) 224     Directory Structures (5.2.5.1) 224         Drive Mapping 224         Mounting a Volume 224     User and System File Locations (5.2.5.2) 225         User File Locations 225         System Folder 225         Fonts 225     Temporary Files 226         Program Files 227     File Extensions and Attributes (5.2.5.3) 227     Application, File, and Folder Properties (5.2.5.4) 228         Application and File Properties 229         Folder Properties 229         Shadow Copy 230 The Windows GUI and Control Panel (5.3) 230     Windows Desktop (5.3.1.1) 230         Gadgets 231     Desktop Properties (5.3.1.2) 232     Start Menu and Taskbar (5.3.1.3) 233         Start Menu 233         Taskbar 234     Task Manager (5.3.1.4) 234     Computer and Windows Explorer (5.3.1.8) 236         Computer 236         Windows Explorer 236         Launching Applications and Opening Files 236     Windows 7 Libraries (5.3.1.9) 237     Install and Uninstall Applications (5.3.1.10) 237         Adding an Application 237         Uninstalling or Changing a Program 238 Control Panel Utilities (5.3.2) 239     Introduction to Control Panel Utilities (5.3.2.1) 239     User Accounts (5.3.2.2) 241         User Account Control Settings 241     Internet Options (5.3.2.6) 242     Display Settings (5.3.2.10) 243     Folder Options (5.3.2.11) 245         General Tab 245         View Tab 245         Search Tab 245     Action Center (5.3.2.12) 245     Windows Firewall (5.3.2.13) 246     Power Options (5.3.2.14) 247     System Utility (5.3.2.15) 248         Performance Settings 248         Windows ReadyBoost 249     Device Manager (5.3.2.19) 250     Regional and Language Options (5.3.2.23) 252 Administrative Tools (5.3.3) 252     Computer Management (5.3.3.1) 252     Event Viewer, Component Services, and Data Sources (5.3.3.2) 253     Services (5.3.3.3) 254     Performance and Windows Memory Diagnostic (5.3.3.4) 255 System Tools (5.3.4) 256     Disk Defragmenter and Disk Error-Checking Tool (5.3.4.1) 256         Disk Defragmenter 256         Disk Error-Checking Tool 257     System Information (5.3.4.5) 258 Accessories (5.3.5) 259     Remote Desktop (5.3.5.1) 259 Control Panel Utilities Unique to Specific Windows Versions (5.3.6) 260     Windows 7 Unique Utilities (5.3.6.1) 261         HomeGroup 261         Action Center 261         Windows Defender 261         RemoteApp and Desktop Connections 262         Troubleshooting 262     Windows Vista Unique Utilities (5.3.6.2) 262     Windows XP Unique Utilities (5.3.6.3) 263 Command-Line Tools (5.3.7) 264     Windows CLI Commands (5.3.7.1) 264     Run Line Utility (5.3.7.3) 265         MSCONFIG 267 Client-Side Virtualization (5.4) 268     Purpose of Virtual Machines (5.4.1.1) 268     Hypervisor: Virtual Machine Manager (5.4.1.2) 269         Windows Virtual PC 269         Windows XP Mode 270     Virtual Machine Requirements (5.4.1.3) 270 Common Preventive Maintenance Techniques for Operating Systems (5.5) 271     Preventive Maintenance Plan Contents (5.5.1.1) 271         Preventive Maintenance Planning 271         Security 272         Startup Programs 272     Updates (5.5.1.5) 273         Device Driver Updates 273         Operating System Updates 273         Firmware Updates 274     Scheduling Tasks (5.5.1.6) 274         Windows Task Scheduler 274         at Command 275     Restore Points (5.5.1.10) 276     Hard Drive Backup (5.5.1.14) 277         Normal Backup 278         Copy Backup 278         Incremental Backup 278         Differential Backup 278         Daily Backup 278 Basic Troubleshooting Process for Operating Systems (5.6) 279     Identify the Problem (5.6.1.1) 279     Establish a Theory of Probable Cause (5.6.1.2) 279     Test the Theory to Determine Cause (5.6.1.3) 280     Establish a Plan of Action to Resolve the Problem and     Implement the Solution (5.6.1.4) 280     Verify Full System Functionality and Implement Preventive Measures (5.6.1.5) 281     Document Findings, Actions, and Outcomes (5.6.1.6) 281     Common Problems and Solutions (5.6.2.1) 282 Summary (5.7.1.1) 288 Summary of Exercises 288     Labs 288     Worksheets 291 Check Your Understanding 291 Chapter 6 Networks 295 Objectives 295 Key Terms 295 Introduction (6.0.1) 299 Principles of Networking (6.1) 299     Define Computer Networks (6.1.1.1) 299     Features and Benefits (6.1.1.2) 301         Require Fewer Peripherals 301         Increase Communication Capabilities 301         Avoid File Duplication and Corruption 301         Lower the Cost of Licensing 302         Centralize Administration 302         Conserve Resources 302 Identifying Networks (6.2) 302     LANs (6.2.1.1) 302     WLANs (6.2.1.2) 303     PANs (6.2.1.3) 304     MANs (6.2.1.4) 304     WANs (6.2.1.5) 304     Peer-to-Peer Networks (6.2.1.6) 305     Client/Server Networks (6.2.1.7) 306 Basic Networking Concepts and Technologies (6.3) 307     Bandwidth (6.3.1.1) 307     Data Transmission (6.3.1.2) 308         Simplex 308         Half-Duplex 309         Full-Duplex 309     IP Addressing (6.3.2.1) 309         IPv4 and IPv6 310     IPv4 (6.3.2.2) 311         IPv4 Subnet Mask 312     IPv6 (6.3.2.3) 313     Static Addressing (6.3.2.4) 314     DHCP Addressing (6.3.2.5) 315         Configuring Alternate IP Settings 317         DNS 317     ICMP (6.3.2.6) 317 Common Ports and Protocols (6.3.3) 319     TCP and UDP (6.3.3.1) 319     TCP and UDP Protocols and Ports (6.3.3.3) 320 Physical Components of a Network (6.4) 322     Modems (6.4.1.1) 322     Hubs, Bridges, and Switches (6.4.1.2) 323         Hubs 323         Bridges and Switches 324         Power over Ethernet 325     Routers and Wireless Access Points (6.4.1.3) 325         Wireless Access Points 325         Routers 326         Multipurpose Devices 326     NAS (6.4.1.4) 327     VoIP Phones (6.4.1.5) 327     Hardware Firewalls (6.4.1.6) 328     Internet Appliances (6.4.1.7) 329     Purchasing Authentic Networking Devices (6.4.1.8) 329 Cables and Connectors (6.4.2) 330     Considerations for Cabling a Network (6.4.2.1) 330         Cost 331         Security 331         Design for the Future 331         Wireless 331     Coaxial Cables (6.4.2.2) 332     Twisted-Pair Cables (6.4.2.3) 332         Category Rating 333         Wire Schemes 334         Straight-Through Cables 335         Crossover Cable 335     Fiber-Optic Cables (6.4.2.6) 336 Network Topologies (6.5) 337     Logical and Physical Topologies (6.5.1.1) 337         Bus 338         Ring 339         Star 339         Hierarchical 339         Mesh 339         Hybrid 339     Determining the Network Topology (6.5.1.3) 340 Ethernet Standards (6.6) 341     Standards Organizations (6.6.1.1) 341     IEEE 802.3 (6.6.1.2) 342     Ethernet Technologies (6.6.1.3) 342     IEEE 802.11 (6.6.1.4) 343 OSI and TCP/IP Data Models (6.7) 343     TCP/IP (6.7.1.1) 343         Application Layer Protocols 344         Transport Layer Protocols 344         Internet Layer Protocols 344         Network Access Layer Protocols 345     OSI (6.7.1.2) 345     Comparing the OSI and TCP/IP Models (6.7.1.3) 346 Computer-to-Network Connection (6.8) 347     Network Installation Completion List (6.8.1.1) 347     Selecting a NIC (6.8.2.1) 348     Installing and Updating a NIC (6.8.2.3) 350     Configuring a NIC (6.8.2.7) 351         Configure Alternate IP Settings 352     Advanced NIC Settings (6.8.2.8) 352         Duplex and Speed 352         Wake on LAN 353         Quality of Service 353 Wireless and Wired Router Configurations (6.8.3) 353     Connecting to the Router (6.8.3.1) 353     Setting the Network Location (6.8.3.2) 354     Logging In to the Router (6.8.3.3) 356     Basic Network Setup (6.8.3.4) 356     Basic Wireless Settings (6.8.3.7) 358         Network Mode 358         SSID 358         Channel 359         Wireless Security 359     Testing Connectivity with the Windows GUI (6.8.3.12) 360     Testing Connectivity with the Windows CLI (6.8.3.13) 361         ipconfig Command Options 362         ping Command Options 362         net Commands 363         tracert Command 364         nslookup Command 364 OS Configurations (6.8.4) 365     Domain and Workgroup (6.8.4.1) 365         Domain 365         Workgroup 366     Connecting to a Workgroup or a Domain (6.8.4.2) 366     Windows 7 Homegroup (6.8.4.3) 366     Sharing Resources in Windows Vista (6.8.4.4) 368     Sharing Resources in Windows XP (6.8.4.5) 369     Network Shares and Mapping Drives (6.8.4.6) 369         Network File Sharing 369         Network Drive Mapping 370     VPN (6.8.4.10) 371 Select an ISP Connection Type (6.9) 372     Brief History of Connection Technologies (6.9.1.1) 372         Analog Telephone 373         Integrated Services Digital Network 373         Broadband 373     DSL and ADSL (6.9.1.2) 373     Line-of-Sight Wireless Internet Service (6.9.1.3) 374     WiMAX (6.9.1.4) 374     Other Broadband Technologies (6.9.1.5) 375         Cellular 375         Cable 376         Satellite 376         Fiber Broadband 376     Selecting an ISP for the Customer (6.9.1.7) 376         POTS 377         ISDN 378         DSL 378         Cable 378         Satellite 378         Cellular 378 Common Preventive Maintenance Techniques Used for Networks (6.10) 379     Preventive Maintenance Procedures (6.10.1.1) 379 Basic Troubleshooting Process for Networks (6.11) 380     Identify the Problem (6.11.1.1) 380     Establish a Theory of Probable Cause (6.11.1.2) 381     Test the Theory to Determine Cause (6.11.1.3) 381     Establish a Plan of Action to Resolve the Problem and     Implement the Solution (6.11.1.4) 381     Verify Full System Functionality and Implement Preventive Measures (6.11.1.5) 382     Document Findings, Actions, and Outcomes (6.11.1.6) 382 Common Problems and Solutions for Networks (6.11.2) 383     Identify Common Problems and Solutions (6.11.2.1) 383 Summary (6.12.1) 385 Summary of Exercises 387     Labs 387     Worksheets 387     Packet Tracer Activities 388 Check Your Understanding 388 Chapter 7 Laptops 393 Objectives 393 Key Terms 393 Introduction (7.0.1.1) 395 Laptop Components (7.1) 395     External Features Unique to Laptops (7.1.1.1) 395     Common Input Devices and LEDs in Laptops (7.1.1.2) 399     Internal Components (7.1.1.3) 401         Motherboards 401         RAM 401         CPUs 402     Special Function Keys (7.1.1.4) 402     Docking Station Versus Port Replicator (7.1.1.5) 403 Laptop Display Components (7.2) 405     LCD, LED, OLED, and Plasma Monitors (7.2.1.1) 406 Internal Components (7.2.2) 406     Backlights and Inverters (7.2.2.1) 406     Wi-Fi Antenna Connectors (7.2.2.2) 407 Laptop Power (7.3) 408     Power Management (7.3.1.1) 408     Managing ACPI Settings in the BIOS (7.3.1.2) 409     Managing Laptop Power Options (7.3.1.4) 410         Laptop Power Options 410         Hard Drive and Display Power Management 411         Sleep Timers 412         Battery Warnings 412 Laptop Wireless Communication Technologies (7.4) 413     Bluetooth (7.4.1.1) 413         Bluetooth Installation and Configuration 414     Infrared (7.4.1.2) 415     Cellular WAN (7.4.1.3) 417     Wi-Fi (7.4.1.4) 417 Laptop Hardware and Component Installation and Configuration (7.5) 419     Expansion Cards (7.5.1.1) 419     Flash Memory (7.5.1.2) 421         External Flash Drive 421         Flash Cards and Flash Card Readers 421     SODIMM Memory (7.5.1.3) 422 Replacing Hardware Devices (7.5.2) 424     Overview of Hardware Replacement (7.5.2.1) 424     Power (7.5.2.2) 426         Replacing a Battery 427         Replacing a DC Jack 427     Keyboard, Touchpad, and Screen (7.5.2.4) 428         Replacing a Keyboard 429         Replacing a Touchpad 429         Replacing a Screen 430     Hard Drive and Optical Drive (7.5.2.6) 431         Replacing a Hard Drive 431         Replacing an Optical Drive 432     Wireless Card (7.5.2.8) 433     Speakers (7.5.2.9) 433     CPU (7.5.2.10) 434     System Board (7.5.2.11) 436     Plastics (7.5.2.12) 436 Preventive Maintenance Techniques for Laptops (7.6) 437     Scheduling Maintenance (7.6.1.1) 437         Preventive Maintenance Program 437     Cleaning Procedures (7.6.1.2) 439         Keyboard 439         Vents 439         LCD Display 440         Touchpad 440         Optical Drive 440         CD and DVD Discs 440 Basic Troubleshooting Process for Laptops (7.7) 441     Identify the Problem (7.7.1.1) 441     Establish a Theory of Probable Cause (7.7.1.2) 441     Test the Theory to Determine Cause (7.7.1.3) 442     Establish a Plan of Action to Resolve the Problem and     Implement the Solution (7.7.1.4) 442     Verify Full System Functionality and Implement Preventive Measures (7.7.1.5) 443     Document Findings, Actions, and Outcomes (7.7.1.6) 443     Identify Common Problems and Solutions (7.7.2.1) 443 Summary (7.8.1) 447 Summary of Exercises 448     Worksheets 448     Virtual Laptop Activities 448 Check Your Understanding 449 Chapter 8 Mobile Devices 451 Objectives 451 Key Terms 451 Introduction (8.0.1) 454 Mobile Device Hardware Overview (8.1) 454     Non-Field-Serviceable Parts (8.1.1.1) 454     Non-Upgradeable Hardware (8.1.1.2) 455     Touchscreens (8.1.1.3) 456     Solid State Drives (8.1.1.4) 457 Mobile Operating Systems (8.2) 458     Open Source Versus Closed Source (8.2.1.1) 458     Application and Content Sources (8.2.1.2) 459         Push Versus Pull 460         Sideloading 460 Android Touch Interface (8.2.2) 461     Home Screen Items (8.2.2.1) 461         Navigation Icons 461         Google Search 462         Special Enhancements 462         Notification and System Icons 462         TouchFLO 463     Managing Apps, Widgets, and Folders (8.2.2.2) 463         Apps 464         Widgets 464         Folders 465         All Apps Icon 466 iOS Touch Interface (8.2.3) 466     Home Screen Items (8.2.3.1) 466         Home Button 467         Notification Center 467         Search 468     Managing Apps and Folders (8.2.3.2) 468         Apps 468         Multitasking Bar 469         Folders 469 Common Mobile Device Features (8.2.4) 470     Screen Orientation and Calibration (8.2.4.1) 470         Screen Orientation 470         Screen Calibration 471     GPS (8.2.4.2) 472 Network Connectivity and Email (8.3) 473     Wireless Data Network (8.3.1.1) 473     Cellular Communications (8.3.1.3) 475         WiMAX and LTE 476         Airplane Mode 476     Bluetooth for Mobile Devices (8.3.2.1) 477     Bluetooth Pairing (8.3.2.2) 477     Introduction to Email (8.3.3.1) 479         POP3 479         IMAP 480         SMTP 480         MIME 480         SSL 480         Exchange 480     Android Email Configuration (8.3.3.3) 481     iOS Email Configuration (8.3.3.4) 481 Mobile Device Synchronization (8.3.4) 482     Types of Data to Synchronize (8.3.4.1) 482     Application Installation Software Requirements (8.3.4.2) 483     Synchronization Connection Types (8.3.4.3) 484         Cross-Platform Data Synchronization 484 Methods for Securing Mobile Devices (8.4) 485     Overview of Passcode Locks (8.4.1.1) 485     Restrictions on Failed Login Attempts (8.4.1.3) 486 Cloud-Enabled Services for Smart Devices (8.4.2) 487     Remote Backup (8.4.2.1) 487     Locator Applications (8.4.2.2) 488     Remote Lock and Remote Wipe (8.4.2.3) 489 Software Security (8.4.3) 490     Antivirus (8.4.3.1) 490         Rooting and Jailbreaking 490     Patching and Updating Operating Systems (8.4.3.2) 491 Applying the Troubleshooting Process to Mobile Devices (8.5.1) 492     Identify the Problem (8.5.1.1) 492     Establish a Theory of Probable Cause (8.5.1.2) 493     Test the Theory to Determine Cause (8.5.1.3) 493     Establish a Plan of Action to Resolve the Problem and     Implement the Solution (8.5.1.4) 494     Verify Full System Functionality and Implement Preventive Measures (8.5.1.5) 494     Document Findings, Actions, and Outcomes (8.5.1.6) 494     Identify Common Problems and Solutions (8.5.2.1) 495 Summary (8.6.1) 498 Summary of Exercises 499     Labs 499     Worksheets 499 Check Your Understanding 499 Chapter 9 Printers 503 Objectives 503 Key Terms 503 Introduction (9.0.1) 504 Common Printer Features (9.1) 504     Characteristics and Capabilities of Printers (9.1.1.1) 504         Capabilities and Speed 505         Color or Black and White 505         Quality 505         Reliability 505         Total Cost of Ownership 506     Wired Printer Connection Types (9.1.1.2) 506         Serial 506         Parallel 507         SCSI 507         USB 507         FireWire 507         Ethernet 507 Types of Printers (9.2) 507     Inkjet Printers (9.2.1.1) 508     Laser Printers (9.2.1.2) 509         Printing Process 509     Thermal Printers (9.2.1.3) 511     Impact Printers (9.2.1.4) 511         Types of Impact Printers 512 Installing and Configuring Printers (9.3) 513     Installing a Printer (9.3.1.1) 513 Types of Print Drivers (9.3.1.5) 514     Updating and Installing Print Drivers (9.3.1.6) 515     Printer Test Page (9.3.1.7) 516         Print Test Page 516         Print from an Application 517         Test the Printer 517         Test the Printer from the Printer Panel 518 Configuring Options and Default Settings (9.3.2) 518     Common Configuration Settings (9.3.2.1) 518     Global and Individual Document Options (9.3.2.2) 520         Global Method 520         Per Document Method 520 Optimizing Printer Performance (9.3.3) 520     Software Optimization (9.3.3.1) 521     Hardware Optimization (9.3.3.2) 521         Firmware 521         Printer Memory 521         Additional Printer Upgrades 522 Sharing Printers (9.4) 523     Configuring Printer Sharing (9.4.1.1) 523     Wireless Printer Connections (9.4.1.2) 525 Print Servers (9.4.2) 526     Purposes of Print Servers (9.4.2.1) 526     Network, Dedicated, and Computer Shared Print Servers (9.4.2.2) 526         Hardware Print Servers 526         Dedicated PC Print Servers 527         Computer-Shared Printers 527 Preventive Maintenance Techniques for Printers (9.5) 528     Vendor Guidelines (9.5.1.1) 528     Replacing Consumables (9.5.1.2) 529     Cleaning Methods (9.5.1.3) 530         Printer Maintenance 531     Operational Environment (9.5.1.4) 532 Basic Troubleshooting Process for Printers (9.6) 532     Identify the Problem (9.6.1.1) 533     Establish a Theory of Probable Cause (9.6.1.2) 533     Test the Theory to Determine Cause (9.6.1.3) 534     Establish a Plan of Action to Resolve the Problem and Implement the Solution (9.6.1.4) 534     Verify Full System Functionality and Implement Preventive Measures (9.6.1.5) 535     Document Findings, Actions, and Outcomes (9.6.1.6) 535 Common Problems and Solutions for Printers (9.6.2) 536     Identify Common Problems and Solutions (9.6.2.1) 536 Summary (9.7.1.1) 537 Summary of Exercises 537     Labs 538     Worksheets 538 Check Your Understanding 538 Chapter 10 Security 541 Objectives 541 Key Terms 541 Introduction (10.0.1) 544 Security Threats (10.1) 545     Adware, Spyware, and Phishing (10.1.1.1) 545         Adware 545         Spyware 545         Grayware 545         Phishing 545     Viruses, Worms, Trojans, and Rootkits (10.1.1.2) 546         Viruses 546         Worms 546         Trojans 546         Virus Protection Software 547         Rootkits 547     Web Security (10.1.1.3) 547         ActiveX Filtering 548         Pop-Up Blocker 548         SmartScreen Filter 549     InPrivate Browsing (10.1.1.4) 550     Spam (10.1.1.5) 551     TCP/IP Attacks (10.1.1.6) 552         Denial of Service 552         Distributed DoS 552         SYN Flood 552         Spoofing 553         Man-in-the-Middle 553         Replay 553         DNS Poisoning 553     Social Engineering (10.1.2.1) 554     Data Wiping, Hard Drive Destruction, and Recycling (10.1.2.2) 554         Data Wiping 555         Degaussing 555         Hard Drive Destruction 556         Solid State Drives 556         Hard Drive Recycling 556 Security Procedures (10.2) 556     What Is a Security Policy? (10.2.1.1) 557     Security Policy Requirements (10.2.1.3) 557     Usernames and Passwords (10.2.1.4) 559         Requiring Passwords 559     Password Requirements (10.2.1.5) 560         Screensaver Required Password 561     File and Folder Permissions (10.2.1.6) 561         Principle of Least Privilege 564         Restricting User Permissions 565     Software Firewalls (10.2.2.1) 565     Biometrics and Smart Cards (10.2.2.2) 567         Smart Card Security 568         Security Key Fob 568     Data Backups (10.2.2.3) 568     Data Encryption (10.2.2.4) 569     Malicious Software Protection Programs (10.2.3.1) 571         Rogue Antivirus 571         Remediating Infected Systems 572     Signature File Updates (10.2.3.3) 573     Common Communication Encryption Types (10.2.4.1) 575         Hash Encoding 575         Symmetric Encryption 575         Asymmetric Encryption 576     Service Set Identifiers (10.2.4.2) 577     MAC Address Filtering (10.2.4.3) 578     Wireless Security Modes (10.2.4.4) 578         Additions to WPA and WPA2 579     Wireless Access (10.2.4.6) 579         Wireless Antennae 580         Network Device Access 580         Wi-Fi Protected Setup 581     Firewalls (10.2.4.7) 581         Demilitarized Zone 582     Port Forwarding and Port Triggering (10.2.4.9) 583     Physical Equipment Protection Methods (10.2.5.1) 585         Disabling AutoRun 585         Two-Factor Authentication 586     Security Hardware (10.2.5.2) 586         Protecting Data While in Use 587         The Right Security Mix 588 Security Maintenance (10.3.1) 589     Operating System Service Packs and Security Patches (10.3.1.1) 589     Data Backups (10.3.1.3) 591     Configuring Firewall Types (10.3.1.7) 593     Maintaining Accounts (10.3.1.11) 595         Terminating Employee Access 595         Guest Accounts 595 Applying the Troubleshooting Process to Security (10.4.1) 596     Identify the Problem (10.4.1.1) 596     Establish a Theory of Probable Cause (10.4.1.2) 597     Test the Theory to Determine Cause (10.4.1.3) 597     Establish a Plan of Action to Resolve the Problem and Implement the Solution (10.4.1.4) 598     Verify Full System Functionality and, If Applicable, Implement Preventive Measures (10.4.1.5) 598     Document Findings, Actions, and Outcomes (10.4.1.6) 599     Identify Common Problems and Solutions (10.4.2.1) 599 Summary (10.5.1.1) 602 Summary of Exercises 602     Labs 602     Worksheets 603 Check Your Understanding 603 Chapter 11 The IT Professional 607 Objectives 607 Key Terms 607 Introduction (11.0.1) 608 Communication Skills and the IT Professional (11.1) 608     Relationship Between Communication Skills and Troubleshooting (11.1.1.1) 608     Relationship Between Communication Skills and Professional Behavior (11.1.1.2) 609 Working with a Customer (11.1.2) 610     Using Communication Skills to Determine Customer Problems (11.1.2.1) 610     Displaying Professional Behavior with Customers (11.1.2.2) 611     Keeping the Customer Focused on the Problem (11.1.2.5) 613         Talkative Customers 613         Rude Customers 613         Angry Customers 614         Knowledgeable Customers 614         Inexperienced Customers 615     Using Proper Netiquette (11.1.2.6) 615 Employee Best Practices (11.1.3) 616     Time and Stress Management Techniques (11.1.3.1) 616     Workstation Ergonomics 616         Time Management 616         Stress Management 617     Observing Service Level Agreements (11.1.3.2) 618     Following Business Policies (11.1.3.3) 619         Customer Call Rules 619         Call Center Employee Rules 619         Customer Satisfaction 620 Ethical and Legal Issues in the IT Industry (11.2) 620     Ethical Considerations in IT (11.2.1.1) 620     Legal Considerations in IT (11.2.1.2) 621 Legal Procedures Overview (11.2.2) 621     Computer Forensics (11.2.2.1) 622     Cyber Law and First Response (11.2.2.2) 622         Cyber Law 622         First Response 623     Documentation and Chain of Custody (11.2.2.3) 623         Documentation 624         Chain of Custody 624 Call Center Technicians (11.3) 625     Call Centers (11.3.1.1) 625     Level One Technician Responsibilities (11.3.1.2) 626     Level Two Technician Responsibilities (11.3.1.3) 627 Summary (11.4.1) 628 Summary of Exercises 629     Worksheets 629 Check Your Understanding 629 Chapter 12 Advanced Troubleshooting 633 Objectives 633 Key Terms 633 Introduction (12.0.1) 634 Apply Troubleshooting Process to Computer Components and Peripherals (12.1.1) 634     Six Steps for Advanced Troubleshooting Computer Components and Peripherals (12.1.1.1) 634     Common Problems and Solutions for Components and Peripherals (12.1.1.2) 637     Apply Troubleshooting Skills to Computer Components and Peripherals (12.1.1.3) 639 Operating Systems (12.2) 641     Six Steps for Advanced Troubleshooting Operating Systems (12.2.1.1) 641     Common Problems and Solutions for Operating Systems (12.2.1.2) 643     Apply Troubleshooting Skills to Operating Systems (12.2.1.3) 648 Apply Troubleshooting Process to Networks (12.3.1) 650     Six Steps for Advanced Troubleshooting Networks (12.3.1.1) 650     Common Problems and Solutions for Networks (12.3.1.2) 652         Network Connection Problems 652         Email Failure 654         FTP and Secure Internet Connection Problems 654         Problems Revealed by CLI Commands 655     Apply Troubleshooting Skills to Networks (12.3.1.3) 656 Apply Troubleshooting Process to Laptops (12.4.1) 658     Six Steps for Advanced Troubleshooting Laptops (12.4.1.1) 658     Common Problems and Solutions for Laptops (12.4.1.2) 661     Apply Troubleshooting Skills to Laptops (12.4.1.3) 664     Apply Troubleshooting Process to Printers (12.5.1) 665     Six Steps for Advanced Troubleshooting Printers (12.5.1.1) 665     Common Problems and Solutions for Printers (12.5.1.2) 668     Apply Troubleshooting Skills to Printers (12.5.1.3) 669 Apply Troubleshooting Process to Security (12.6.1) 670     Six Steps for Advanced Troubleshooting Security (12.6.1.1) 670     Common Problems and Solutions for Security (12.6.1.2) 673         Malware Settings 673         User Accounts and Permissions 674         Computer Security 674         Firewall and Proxy Settings 675     Apply Troubleshooting Skills to Security (12.6.1.3) 676 Summary (12.7.1) 678 Summary of Exercises 678     Labs 678 Check Your Understanding 679 Appendix A Answers to “Check Your Understanding” Questions 683 Glossary 699     9781587133084   TOC   6/6/2013  

About the Author :
Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.


Best Sellers


Product Details
  • ISBN-13: 9780133256659
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • Series Title: Companion Guide
  • ISBN-10: 0133256650
  • Publisher Date: 12 Jun 2013
  • Binding: Digital download
  • No of Pages: 816
  • Weight: 1 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
IT Essentials: (Companion Guide)
Pearson Education (US) -
IT Essentials: (Companion Guide)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

IT Essentials: (Companion Guide)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!