IT Essentials: PC Hardware and Software Companion Guide / Edition 4

Hardcover (Print)
Rent
Rent from BN.com
$14.94
(Save 75%)
Est. Return Date: 11/29/2014
Buy Used
Buy Used from BN.com
$36.45
(Save 39%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Hardcover)
  • All (30) from $1.99   
  • New (3) from $98.71   
  • Used (27) from $1.99   

Overview

IT Essentials: PC Hardware and Software Companion Guide, Fourth Edition, supports the Cisco Networking Academy IT Essentials: PC Hardware and Software version 4.1 course. The course provides an introduction to computer components, laptops and portable devices, wireless connectivity, security and safety, environmental concerns, and diagnostic tools.

As a CompTIA Authorized Quality Curriculum, the course helps you prepare for the CompTIA A+ certification. The fundamentals part of the course, covered in Chapters 1–10, helps you prepare for the CompTIA A+ Essentials exam (220-701). You learn the fundamentals of computer technology, networking, and security and validate the communication skills and professionalism required of all entry-level IT professionals. The advanced part of the course, covered in Chapters 11–16, helps you prepare for the CompTIA A+ Practical Application exam (220-702), providing more of a hands-on orientation and scenarios in which troubleshooting and tools must be applied to resolve problems. Students must pass both exams to earn the CompTIA A+ certification.

The features of the Companion Guide are designed to help you study and succeed in this course:

n Chapter objectives—Review core concepts by answering the focus
questions listed at the beginning of each chapter.

n Key terms—Refer to the updated lists of networking vocabulary introduced and turn to the highlighted terms in context.

n Check Your Understanding Questions and Answer Key—Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see on the online course quizzes.

Virtual Desktop, Virtual Laptop, and Packet Tracer Activities, on the CD that accompanies this book, are virtual learning tools to help you develop critical thinking and complex problem-solving skills. New for this edition, Cisco Packet Tracer simulation-based learning activities promote the exploration of networking and network security concepts and allow you to experiment with network behavior.

All the Labs, Worksheets, and Class Discussion Exercises from the course are available in the separate book, IT Essentials: PC Hardware and Software Lab Manual, Fourth Edition. More than 120 activities emphasize the practical application of skills and procedures needed for hardware and software installations, upgrades, and troubleshooting systems.

IT Essentials: PC Hardware and
Software
Lab Manual
Fourth Edition

ISBN-10: 1-58713-262-1
ISBN-13: 978-1-58713-262-9

Related Title:

IT Essentials: PC Hardware and
Software
Course Booklet
Version 4.1

ISBN-10: 1-58713-261-3
ISBN-13: 978-1-58713-261-2

Companion CD-ROM

The CD-ROM contains all of the Virtual Desktop Activities, Virtual Laptop Activities, and Packet Tracer Activities referenced throughout the book. Designed and developed by the Cisco Networking Academy, these standalone tools supplement classroom learning by providing “hands-on” experience where real equipment is limited. (Note: the Packet Tracer software is not included with this CD. Ask your instructor for access to Packet Tracer.)

Read More Show Less

Product Details

  • ISBN-13: 9781587132636
  • Publisher: Cisco Press
  • Publication date: 10/27/2010
  • Series: Companion Guide Series
  • Edition description: Older Edition
  • Edition number: 4
  • Pages: 739
  • Product dimensions: 8.30 (w) x 9.00 (h) x 1.90 (d)

Meet the Author

Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.
Read More Show Less

Table of Contents

Introduction

Chapter 1 Introduction to the Personal Computer

Objectives

Key Terms

Explain IT Industry Certifications

Identify Education and Certifications

Describe the A+ Certification

Describe the EUCIP Certification

Module 1: PC Hardware

Module 2: Operating Systems

Module 3: Local Area Network and Network Services

Module 4: Expert Network Use

Module 5: IT Security

Describe a Computer System

Identify the Names, Purposes, and Characteristics of Cases and Power Supplies

Describe Cases

Describe Power Supplies

Connectors

Electricity and Ohm’s Law

Identify the Names, Purposes, and Characteristics of Internal Components

Identify the Names, Purposes, and Characteristics of Motherboards

Identify the Names, Purposes, and Characteristics of CPUs

Identify the Names, Purposes, and Characteristics of Cooling Systems

Identify the Names, Purposes, and Characteristics of ROM and RAM

ROM

RAM

Memory Modules

Cache Memory

Error Checking

Identify the Names, Purposes, and Characteristics of Adapter Cards

Identify the Names, Purposes, and Characteristics of Storage Drives

Floppy Drive

Hard Drive

Optical Drive

External Flash Drive

Types of Drive Interfaces

Identify the Names, Purposes, and Characteristics of Internal Cables

Identify the Names, Purposes, and Characteristics of Ports and Cables

Serial Ports and Cables

Modem Ports and Cables

USB Ports and Cables

FireWire Ports and Cables

Parallel Ports and Cables

SCSI Ports and Cables

Network Ports and Cables

PS/2 Ports

Audio Ports

Video Ports and Connectors

Identify the Names, Purposes, and Characteristics of Input Devices

Identify the Names, Purposes, and Characteristics of Output Devices

Monitors and Projectors

All-in-One Printer

Speakers and Headphones

Explain System Resources and Their Purposes

Interrupt Requests

Input/Output (I/O) Port Addresses

Direct Memory Access

Summary

Summary of Exercises

Check Your Understanding

Chapter 2 Safe Lab Procedures and Tool Use

Objectives

Key Terms

Explain the Purpose of Safe Working Conditions and Procedures

Identify Safety Procedures and Potential Hazards for Users and Technicians

General Safety Guidelines

Electrical Safety Guidelines

Fire Safety Guidelines

Identify Safety Procedures to Protect Equipment from Damage and Data from Loss

Electrostatic Discharge

Electromagnetic Interference

Climate

Power Fluctuation Types

Power Protection Devices

Identify Safety Procedures to Protect the Environment from Contamination

Material Safety Data Sheet

Proper Disposal of Batteries

Proper Disposal of Monitors or CRTs

Proper Disposal of Toner Kits, Cartridges, and Developers

Proper Disposal of Chemical Solvents and Aerosol Cans

Identify Tools and Software Used with Personal Computer Components and Their Purposes

Identify Hardware Tools and Their Purpose

ESD Tools

Hand Tools

Cleaning Tools

Diagnostic Tools

Identify Software Tools and Their Purpose

Disk Management Tools

Protection Software Tools

Identify Organizational Tools and Their Purpose

Personal Reference Tools

Internet Reference Tools

Miscellaneous Tools

Implement Proper Tool Use

Demonstrate Proper Use of an Antistatic Wrist Strap

Demonstrate Proper Use of an Antistatic Mat

Antistatic Mat

Workbench

Demonstrate Proper Use of Various Hand Tools

Screws

Flat-Head Screwdriver

Phillips-Head Screwdriver

Hex Driver

Part Retriever, Needle-Nose Pliers, or Tweezers

Demonstrate Proper Use of Cleaning Materials

Computer Cases and Monitors

LCD Screens

CRT Screens

Component Contacts

Keyboard

Mouse

Summary

Summary of Exercises

Labs

Worksheets

Check Your Understanding

Chapter 3 Computer Assembly—Step by Step

Objectives

Key Terms

Open the Case

Install the Power Supply

Attach the Components to the Motherboard and Install the Motherboard

Install a CPU and a Heat Sink/Fan Assembly

CPU

Heat Sink/Fan Assembly

Install the RAM

Install the Motherboard

Install Internal Drives

Install Drives in External Bays

Install the Optical Drive

Install the Floppy Drive

Install Adapter Cards

Install the NIC

Install the Wireless NIC

Install the Video Adapter Card

Connect All Internal Cables

Connect the Power Cables

Motherboard Power Connections

SATA Power Connectors

Molex Power Connectors

Berg Power Connectors

Connect the Data Cables

PATA Data Cables

SATA Data Cables

Reattach the Side Panels and Connect External Cables to the Computer

Reattach the Side Panels to the Case

Connect External Cables to the Computer

Floppy Drive Data Cables

Boot the Computer for the First Time

Identify Beep Codes

Describe BIOS Setup

Summary

Summary of Exercises

Labs

Virtual Desktop Activities

Check Your Understanding

Chapter 4 Basics of Preventive Maintenance and Troubleshooting

Objectives

Key Terms

Explain the Purpose of Preventive Maintenance

Hardware

Software

Benefits

Identify the Steps of the Troubleshooting Process

Explain the Purpose of Data Protection

Data Backup

Identify the Problem

Conversation Etiquette

Open-Ended Questions

Closed-Ended Questions

Documenting Responses

Event Viewer

Device Manager

Beep Codes

BIOS Information

Diagnostic Tools

Establish a Theory of Probable Causes

Test the Theory to Determine an Exact Cause

Implement the Solution

Verify Solution, Full System Functionality, and If Applicable, Implement Preventive Measures

Document Findings, Actions, and Outcomes

Summary

Summary of Exercises

Check Your Understanding

Chapter 5 Fundamental Operating Systems

Objectives

Key Terms

Explain the Purpose of an Operating System

Describe Characteristics of Modern Operating Systems

Control Hardware Access

File and Folder Management

User Interface

Application Management

Explain Operating System Concepts

Modes of Operation

Real Mode

Protected Mode

Virtual Real Mode

Compatibility Mode

32-Bit Versus 64-Bit

Processor Architecture

Describe and Compare Operating Systems to Include Purpose, Limitations, and Compatibilities

Describe Desktop Operating Systems

Microsoft Windows

Apple Mac OS

UNIX/Linux

Describe Network Operating Systems

Determine Operating System Based on Customer Needs

Identify Applications and Environments That Are Compatible with an Operating System

Determine Minimum Hardware Requirements and Compatibility with the OS Platform

Hardware Compatibility List

Install an Operating System

Identify Hard Drive Setup Procedures

Partitioning and Formatting

Prepare the Hard Drive

Install the Operating System Using Default Settings

Create User Accounts

Complete the Installation

Describe Custom Installation Options

Disk Cloning

Network Installation

Recovery Disc

Factory Recovery Partition

Identify the Boot Sequence Files and Registry Files

Windows XP Boot Process

NTLDR and the Windows Boot Menu

Windows Registry

NT Kernel

Describe How to Manipulate Operating System Files

Startup Modes

Describe Directory Structures

File Extensions and Attributes

Describe NTFS and FAT32

Navigate a GUI (Windows)

Manipulate Items on the Desktop

Display Properties

Desktop Items

Start Menu

My Computer

Launching Applications

My Network Places

Explore Control Panel Applets

Control Panel Applets

Display Settings

Explore Administrative Tools

Computer Management

Device Manager

Task Manager

Services

Performance Monitor

Event Viewer

MMC

Remote Desktop

Performance Settings

Install, Navigate, and Uninstall an Application

Add or Remove Programs Applet

Add an Application

Uninstall an Application

Describe Upgrading an Operating System

Upgrading the Operating System to Windows XP

Upgrading the Operating System to Windows Vista

Identify and Apply Common Preventive Maintenance Techniques for Operating Systems

Create a Preventive Maintenance Plan

Preventive Maintenance Planning

Device Driver Updates

Firmware Updates

Operating System Updates

Security

Startup Programs

Schedule a Task

System Utilities

Automatic Updates

Restore Point

Backup Status and Configuration

ERD and ASR

Back Up the Hard Drive

Normal Backup

Copy Backup

Differential Backup

Incremental Backup

Daily Backup

Backup Media

Troubleshoot Operating Systems

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probable Causes

Step 3: Determine an Exact Cause

Step 4: Implement a Solution

Step 5: Verify Solution and Full System Functionality

Step 6: Document Findings

Identify Common Problems and Solutions

Summary

Summary of Exercises

Labs

Worksheets

Check Your Understanding

Chapter 6 Fundamental Laptops and Portable Devices

Objectives

Key Terms

Describe Laptops and Other Portable Devices

Identify Common Uses of Laptops

Identify Common Uses of PDAs and Smartphones

Identify and Describe the Components of a Laptop

Describe the Components Found on the Outside of the Laptop

Describe Input Devices Found on Laptops

Describe the Components Found on the Laptop Docking Station

Compare and Contrast Desktop and Laptop Components

Compare and Contrast Desktop and Laptop Motherboards

Compare and Contrast Desktop and Laptop Processors

Compare and Contrast Desktop and Laptop Power Management

Compare and Contrast Desktop and Laptop Expansion

Capabilities

Explain How to Configure Laptops

Describe How to Configure Power Settings

Configuring Power Settings in Windows XP and Vista

Managing Power Usage

Power Management for the Hard Drive and the Display

Setting the Laptop Power Options

Adjusting Low Battery Warnings

Describe the Safe Installation and Removal of Laptop Components

Battery Replacement Steps

Optical Drive Replacement Steps

Hard Drive Replacement Steps

Expansion Memory Replacement Steps

PC Expansion Card Replacement Steps

Hot-Swappable Device Removal Steps

Laptop Communication Hardware Installation and Configuration

Ethernet Installation and Configuration Steps

Wireless Ethernet Installation and Configuration Steps

Modem Installation and Configuration Steps

Bluetooth Installation and Configuration Steps

Infrared Installation and Configuration Steps

Cellular WAN Installation and Configuration Steps

Compare the Different Mobile Phone Standards

Identify Common Preventive Maintenance Techniques for Laptops and Portable Devices

Identify Appropriate Cleaning Procedures

Laptop Keyboard Cleaning Procedures

Ventilation Cleaning Procedures

LCD Cleaning Procedures

Touch Pad Cleaning Procedures

Floppy Drive Cleaning Procedures

Optical Drive Cleaning Procedures

Cleaning a CD or DVD Disc

Identify Optimal Operating Environments

Describe How to Troubleshoot Laptops and Portable Devices

Review the Troubleshooting Process

Identify Common Problems and Solutions

Summary

Summary of Exercises

Worksheets

Virtual Laptop Activities

Check Your Understanding

Chapter 7 Fundamental Printers and Scanners

Objectives

Key Terms

Describe the Types of Printers Currently Available

Describe the Characteristics and Capabilities of Printers

Capacity and Speed

Color or Black and White

Quality

Reliability

Total Cost of Ownership

Describe Printer-to-Computer Interfaces

Serial Ports

Parallel Ports

SCSI Interfaces

USB Interfaces

FireWire Connections

Ethernet Connections

Wireless Connections

Describe Laser Printers

Describe Impact Printers

Describe Inkjet Printers

Describe Solid-Ink Printers

Describe Other Printer Types

Thermal Printers

Dye-Sublimation Printers

Describe the Installation and Configuration Process for Printers

Describe How to Set Up a Printer

Explain How to Power and Connect the Device Using a Local or Network Port

Describe How to Install and Update the Device Driver, Firmware, and RAM

Printer Drivers

Firmware

Printer Memory

Identify Configuration Options and Default Settings

Describe How to Optimize Printer Performance

Describe How to Print a Test Page

Printing a Test Page

Printing from an Application

Testing a Printer

Testing the Printer from the Printer Panel

Describe How to Share a Printer

Describe the Types of Scanners Currently Available

Describe Scanner Types, Resolution, and Interfaces

Describe All-in-One Devices

Describe Flatbed Scanners

Describe Handheld Scanners

Describe Drum Scanners

Describe the Installation and Configuration Process for Scanners

Explain How to Power and Connect a Scanner

Describe How to Install and Update the Device Driver

Identify Configuration Options and Default Settings

Identify and Apply Common Preventive Maintenance Techniques for Printers and Scanners

Describe Printer Maintenance

Describe Scanner Maintenance

Troubleshoot Printers and Scanners

Review the Troubleshooting Process

Identify Common Problems and Solutions

Summary

Summary of Exercises

Labs

Check Your Understanding

Chapter 8 Fundamental Networks

Objectives

Key Terms

Explain the Principles of Networking

Define Computer Networks

Explain the Benefits of Networking

Describe Types of Networks

Describe a LAN

Describe a WAN

Describe a WLAN

Explain Peer-to-Peer Networks

Explain Client/Server Networks

Describe Basic Networking Concepts and Technologies

Explain Bandwidth and Data Transmission

Describe IP Addressing

Dotted Decimal

Classful Subnetting

Subnet Mask

Manual Configuration

Define DHCP

Define NAT

Describe Internet Protocols and Applications

Define ICMP

Describe the Physical Components of a Network

Identify the Names, Purposes, and Characteristics of Network Devices

Hubs

Bridges and Switches

Routers

Wireless Access Points

Multipurpose Devices

Identify the Names, Purposes, and Characteristics of Common Network Cables

Twisted Pair

Category Rating

Coaxial Cable

Fiber-Optic Cable

Describe LAN Topologies and Architectures

Describe LAN Topologies

Physical Topologies

Logical Topologies

Describe LAN Architectures

Ethernet

Token Ring

FDDI

Identify Standards Organizations

Identify Ethernet Standards

Explain Cabled Ethernet Standards

Ethernet Technologies

Summary of Ethernet Technologies

Explain Wireless Ethernet Standards

Explain the OSI and TCP/IP Data Models

Define the TCP/IP Model

Application Layer Protocols

Transport Layer Protocols

Internet Layer Protocols

Network Access Layer Protocols

Define the OSI Model

Compare the OSI and TCP/IP Models

Describe How to Configure a NIC and a Modem

Install or Update a NIC Driver

Uninstall a NIC Driver

Attach the Computer to an Existing Network

Describe the Installation of a Modem

AT Commands

Identify the Names, Purposes, and Characteristics of Other Technologies Used to Establish Connectivity

Describe Telephone Technologies

Analog Telephone

Integrated Services Digital Network (ISDN)

Digital Subscriber Line (DSL)

Define Power Line Communication

Define Broadband

Cellular

Cable

DSL

Satellite

Fiber Broadband

Define VoIP

Define VPN

Identify and Apply Common Preventive Maintenance Techniques Used for Networks

Counterfeiting and the IT Industry

Troubleshoot a Network

Review the Troubleshooting Process

Identify Common Network Problems and Solutions

Summary

Summary of Exercises

Labs

Worksheets

Packet Tracer Activities

Check Your Understanding

Chapter 9 Fundamental Security

Objectives

Key Terms

Explain Why Security Is Important

Describe Security Threats

Define Viruses, Worms, and Trojans

Explain Web Security

Define Adware, Spyware, and Grayware

Explain Denial of Service

Describe Spam and Popup Windows

Explain Social Engineering

Explain TCP/IP Attacks

Explain Data Wiping, Hard Drive Destruction, and Recycling

Data Wiping

Hard Drive Destruction

Hard Drive Recycling

Identify Security Procedures

Explain What Is Required in a Basic Local Security Policy

Explain the Tasks Required to Protect Physical Equipment

Describe Ways to Protect Data

Password Protection

Data Encryption

Software Firewall

Data Backups

Smart Card Security

Biometric Security

File System Security

Describe Wireless Security Techniques

Identify Common Preventive Maintenance Techniques for Security

Explain How to Update Signature Files for Antivirus and Antispyware Software

Explain How to Install Operating System Service Packs and Security Patches

Troubleshoot Security

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probably Causes

Step 3: Determine an Exact Cause

Step 4: Implement the Solution

Step 5: Verify Solution and Full System Functionality

Step 6: Document Findings

Identify Common Problems and Solutions

Summary

Summary of Exercises

Worksheets

Packet Tracer Activities

Check Your Understanding

Chapter 10 Communication Skills

Objectives

Key Terms

Explain the Relationship Between Communication and Troubleshooting

Describe Good Communication Skills and Professional Behavior

Determine the Computer Problem of the Customer

Display Professional Behavior with the Customer

Focus the Customer on the Problem During the Call

Talkative Customer

Rude Customer

Angry Customer

Knowledgeable Customer

Inexperienced Customer

Use Proper Netiquette

Implement Time and Stress Management Techniques

Workstation Ergonomics

Time Management

Stress Management

Observe Service Level Agreements

Follow Business Policies

Explain Ethics and Legal Aspects of Working with Computer Technology

Ethical Customs

Legal Rules

Describe the Call Center Environment and Technician Responsibilities

Describe the Call Center Environment

Describe Level-One Technician Responsibilities

Describe Level-Two Technician Responsibilities

Summary

Summary of Exercises

Worksheets

Class Discussions

Check Your Understanding

Chapter 11 Advanced Personal Computers

Objectives

Key Terms

Give an Overview of Field, Remote, and Bench Technician Jobs

Explain Safe Lab Procedures and Tool Use

Review Safe Working Environments and Procedures

Review Names, Purposes, Characteristics, and Safe and Appropriate Use of Tools

Identify Potential Safety Hazards and Implement Proper Safety Procedures for Computer Components

Describe Environmental Issues

Describe Situations Requiring Replacement of Computer Components

Select a Case and Power Supply

Select a Motherboard

Select the CPU and Heat Sink/Fan Assembly

Select RAM

Select Adapter Cards

Graphics Cards

Sound Cards

Storage Controllers

Input/Output Cards

Network Interface Cards

Capture Cards

Select Storage Devices and Hard Drives

Floppy Disk Drive

Media Readers

Hard Drives

Solid State Drives

Optical Drives

External Storage

Select Input and Output Devices

Upgrade and Configure Personal Computer Components and Peripherals

Upgrade and Configure a Motherboard

CPU Installation

Jumper Settings

CMOS Battery Installation

Motherboard Installation

BIOS Updates

Advanced BIOS Settings

Upgrade and Configure a CPU and a Heat Sink/Fan Assembly

Upgrade and Configure RAM

Upgrade and Configure BIOS

Upgrade and Configure Storage Devices and Hard Drives

Upgrade and Configure Input and Output Devices

Identify and Apply Common Preventive Maintenance Techniques for Personal Computer Components

Clean Internal Components

Clean the Case

Inspect Computer Components

CPU and Cooling System

RAM Connections

Storage Devices

Adapter Cards

Power Devices

Loose Screws

Keyboard and Mouse

Cables

Troubleshoot Computer Components and Peripherals

Review the Troubleshooting Process

Identify Common Problems and Solutions

Storage Device Problems

Motherboard and Internal Component Problems

Power Supply Problems

CPU Problems and Memory Problems

Apply Troubleshooting Skills

Summary

Summary of Exercises

Labs

Worksheets

Check Your Understanding

Chapter 12 Advanced Operating Systems

Objectives

Key Terms

Select the Appropriate Operating System Based on Customer Needs

Describe Operating Systems

Describe Network Operating Systems

Windows OS Directory Structures

User File Locations

System File Locations

Fonts

Temporary Files

Program Files

Offline Files and Folders

Install, Configure, and Optimize an Operating System

Compare and Contrast a Default Installation and a Custom Installation

Install Windows XP Professional Using a Custom Installation

Unattended Installation in Windows XP

Unattended Installation in Windows Vista

Image-Based Installation

Remote Installation

Create, View, and Manage Disks, Directories, and Files

Disk Structure

Drive Status

File System

Identify Procedures and Utilities Used to Optimize the Performance of Operating Systems

System Tools

Administrative Tools

Services

Device Manager

Task Manager

System Monitor

Regional and Language Options

Temporary Files

Identify Procedures and Utilities Used to Optimize the Performance of Browsers

Describe Installation, Use, and Configuration of Email Software

Set Screen Resolution and Update the Video Driver

Describe Installation of a Second Operating System

The Boot.ini File

Windows CLI Commands

MSCONFIG

SFC

Describe How to Upgrade Operating Systems

Describe Preventive Maintenance Procedures for Operating Systems

Schedule Automatic Tasks and Updates

GUI Scheduled Tasks

CLI Scheduled Tasks

Windows Automatic Updates

Set Restore Points

Troubleshoot Operating Systems

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probable Causes

Step 3: Determine an Exact Cause

Step 4: Implement a Solution

Step 5: Verify Solution and Full System Functionality

Step 6: Document Your Findings

Identify Common Problems and Solutions

Apply Troubleshooting Skills

Summary

Summary of Exercises

Labs

Check Your Understanding

Chapter 13 Advanced Laptops and Portable Devices

Objectives

Key Terms

Describe Wireless Communication Methods for Laptops and Portable Devices

Describe Bluetooth Technology

Describe Infrared Technology

Describe Cellular WAN Technology

Describe Wi-Fi Technology

Describe Satellite Technology

Describe Repairs for Laptops and Portable Devices

Select Laptop Components

Select Batteries

Select a Docking Station or Port Replicator

Select Storage Devices

Select Additional RAM

Describe Preventive Maintenance Procedures for Laptops

Describe How to Schedule and Perform Maintenance on Laptops

Explain How to Manage Data Version Control Between Desktops and Laptops

Describe How to Troubleshoot a Laptop

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probable Causes

Step 3: Determine an Exact Cause

Step 4: Implement a Solution

Step 5: Verify Solution and Full System Functionality

Step 6: Document Findings

Identify Common Problems and Solutions

Hard Drive Replacement Steps

Expansion Memory Replacement Steps

Optical Drive Replacement Steps

Battery Replacement Steps

PC Expansion Card Replacement Steps

Hot-Swappable Device Removal Steps

Apply Troubleshooting Skills

Summary

Summary of Exercises

Worksheets

Labs

Check Your Understanding

Chapter 14 Advanced Printers and Scanners

Objectives

Key Terms

Describe Potential Safety Hazards and Safety Procedures Associated with Printers and Scanners

Install and Configure a Local Printer and Scanner

Connect the Device to a Local Port

Install and Configure the Driver and Software

Printer Driver Installation

Page Description Language

Configure Options and Default Settings

Global Method

Per-Document Method

Scanner Calibrations

Printer Calibrations

Verify Functionality

Printer Test

Scanner Test

Describe How to Share a Printer and a Scanner on a Network

Describe the Types of Print Servers

Network Print Server Devices

Dedicated PC Print Servers

Computer-Shared Printers

Describe How to Install Network Printer Software and Drivers on a Computer

Upgrade and Configure Printers and Scanners

Describe Printer Upgrades

Installing Printer Memory

Additional Printer Upgrades

Describe Scanner Optimization

Describe Printer and Scanner Preventive Maintenance Techniques

Determine Scheduled Maintenance According to Vendor Guidelines

Describe a Suitable Environment for Printers and Scanners

Describe Cleaning Methods

Printer Maintenance

Scanner Maintenance

Describe Checking Capacity of Ink Cartridges and Toners

Troubleshoot Printers and Scanners

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probable Causes

Step 3: Determine an Exact Cause

Step 4: Implement a Solution

Step 5: Verify Solution and Full System Functionality

Step 6: Document Findings

Identify Common Problems and Solutions

Apply Troubleshooting Skills

Summary

Summary of Exercises

Labs

Worksheets

Check Your Understanding

Chapter 15 Advanced Networks

Objectives

Key Terms

Identify Potential Safety Hazards and Implement Proper Safety Procedures Related to Networks

Explain Fiber-Optic Safety

Chemicals

Tools

Harmful Light

Glass Shards

Explain Cable, Cable Cutters, and Cable-Cutting Safety Hazards

Design a Network Based on the Customer’s Needs

Determine a Topology

Determine Protocols and Network Applications

Determine the Components for the Customer’s Network

Select Cable Types

Wireless

Cost

Security

Design for the Future

Select the ISP Connection Type

Plain Old Telephone Service

Integrated Services Digital Network

Digital Subscriber Line

Cable

Satellite

Cellular

Wireless

Compare ISP Connection Types

Select Network Cards

Select the Network Device

Hubs

Switches

Routers

ISP Equipment

Implement the Customer’s Network

Install and Test the Customer’s Network

Configure the Customer’s Internet and Network Resources

Temporary Internet Files

Default Browser

File Sharing

Printer Sharing

Upgrade the Customer’s Network

Install and Configure a Wireless NIC

Install and Configure a Wireless Router

802.11 Protocol Selection

Static IP Address Configuration

SSID Setting

Firmware Update

Test the Connection

Network Connections

ipconfig

ping

tracert

net

nslookup

Describe the Installation, Configuration, and Management of a Simple Mail Server

SMTP

POP

IMAP

Email Server

Email Server Installation

Describe Preventive Maintenance Procedures for Networks

Troubleshoot the Network

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probable Causes

Step 3: Determine an Exact Cause

Step 4: Implement a Solution

Step 5: Verify Solution and Full System Functionality

Step 6: Document Findings

Identify Common Problems and Solutions

Apply Troubleshooting Skills

Summary

Summary of Exercises

Labs

Worksheets

Packet Tracer Activities

Check Your Understanding

Chapter 16 Advanced Security

Objectives

Key Terms

Outline Security Requirements Based on Customer Needs

Outline a Local Security Policy

Explain When and How to Use Security Hardware

Explain When and How to Use Security Application Software

Select Security Components Based on Customer Needs

Describe and Compare Security Techniques

Passwords

Logging and Auditing

Wireless Configurations

Security Technologies

Describe and Compare Access Control Devices

Physical Security

Data Security

Describe and Compare Firewall Types

Implement a Customer’s Security Policy

Configure Security Settings

Permission Levels for Folders and Files

Wireless Antennae

Network Device Access Permissions

Wireless Security Modes

SSID

MAC Address Filtering

Firewalls

Port Forwarding and Port Triggering

Describe Configuring Firewall Types

Software Firewalls

Windows XP Firewalls

Windows Vista Firewalls

Describe Protection Against Malicious Software

Perform Preventive Maintenance on Security

Describe the Configuration of Operating System Updates

Maintain Accounts

Terminating Employee Access

Guest Accounts

Explain Data Backup Procedures, Access to Backups, and Secure Physical Backup Media

Troubleshoot Security

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probable Solutions

Step 3: Determine an Exact Cause

Step 4: Implement a Solution

Step 5: Verify the Solution and Verify Full System Functionality

Step 6: Document Your Findings

Identify Common Problems and Solutions

Malware Settings

User Accounts and Permissions

Computer Security

Firewall and Proxy Settings

Apply Troubleshooting Skills

Summary

Summary of Exercises

Labs

Worksheets

Check Your Understanding

Appendix: Answers to Check Your Understanding Questions

Glossary

9781587132636 TOC 9/7/2010

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)