Acknowledgments |
|
xxix | |
Chapter 1 The Path of the PC Tech |
|
1 | (18) |
|
|
3 | (2) |
|
|
3 | (1) |
|
The Path to Other Certifications |
|
|
4 | (1) |
|
|
5 | (4) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
The Path to Certification |
|
|
9 | (5) |
|
|
10 | (1) |
|
|
10 | (1) |
|
How to Pass the CompTIA A+ Exams |
|
|
11 | (3) |
|
|
14 | (2) |
|
|
16 | (3) |
|
|
16 | (2) |
|
|
18 | (1) |
Chapter 2 Operational Procedures |
|
19 | (28) |
|
|
19 | (25) |
|
|
19 | (6) |
|
|
20 | (1) |
|
|
21 | (4) |
|
|
25 | (5) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
27 | (2) |
|
Expectations and Follow-Up |
|
|
29 | (1) |
|
Tools of the Trade and Personal Safety |
|
|
30 | (14) |
|
Electrostatic Discharge (ESD) |
|
|
30 | (1) |
|
|
31 | (3) |
|
Electromagnetic Interference (EMI) |
|
|
34 | (1) |
|
Radio Frequency Interference (RFI) |
|
|
34 | (1) |
|
|
34 | (3) |
|
|
37 | (1) |
|
|
37 | (7) |
|
|
44 | (3) |
|
|
44 | (2) |
|
|
46 | (1) |
Chapter 3 The Visible Computer |
|
47 | (48) |
|
|
48 | (8) |
|
|
48 | (8) |
|
|
50 | (3) |
|
|
53 | (2) |
|
Why the Process Matters to Techs |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (4) |
|
|
56 | (4) |
|
|
60 | (32) |
|
|
60 | (32) |
|
Common Operating System Functions |
|
|
61 | (1) |
|
|
61 | (12) |
|
File Structures and Paths |
|
|
73 | (5) |
|
|
78 | (14) |
|
|
92 | (3) |
|
|
92 | (2) |
|
|
94 | (1) |
Chapter 4 Microprocessors |
|
95 | (52) |
|
|
95 | (1) |
|
|
95 | (11) |
|
|
96 | (5) |
|
|
101 | (4) |
|
Back to the External Data Bus |
|
|
105 | (1) |
|
|
106 | (6) |
|
|
106 | (2) |
|
|
108 | (4) |
|
|
112 | (31) |
|
|
112 | (17) |
|
|
112 | (5) |
|
|
117 | (12) |
|
Selecting and Installing CPUs |
|
|
129 | (12) |
|
|
129 | (3) |
|
|
132 | (9) |
|
|
141 | (2) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (3) |
|
|
144 | (2) |
|
|
146 | (1) |
Chapter 5 RAM |
|
147 | (38) |
|
|
148 | (1) |
|
|
148 | (5) |
|
|
148 | (1) |
|
|
149 | (2) |
|
|
151 | (2) |
|
|
153 | (1) |
|
|
153 | (2) |
|
|
153 | (2) |
|
|
155 | (1) |
|
|
155 | (26) |
|
|
155 | (9) |
|
|
158 | (1) |
|
|
158 | (2) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (3) |
|
|
164 | (14) |
|
|
165 | (8) |
|
|
173 | (1) |
|
|
174 | (3) |
|
Installing SO-DIMMs in Laptops |
|
|
177 | (1) |
|
|
178 | (3) |
|
|
180 | (1) |
|
|
181 | (4) |
|
|
181 | (2) |
|
|
183 | (2) |
Chapter 6 BIOS |
|
185 | (42) |
|
|
185 | (37) |
|
|
185 | (9) |
|
|
188 | (2) |
|
|
190 | (4) |
|
|
194 | (17) |
|
Modify CMOS: The Setup Program |
|
|
195 | (6) |
|
Typical CMOS Setup Programs |
|
|
201 | (10) |
|
Option ROM and Device Drivers |
|
|
211 | (3) |
|
|
211 | (2) |
|
|
213 | (1) |
|
|
214 | (1) |
|
Power-On Self Test (POST) |
|
|
214 | (4) |
|
Before and During the Video Test: The Beep Codes |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (2) |
|
Care and Feeding of BIOS and CMOS |
|
|
218 | (4) |
|
Default/Optimized Settings |
|
|
218 | (1) |
|
|
218 | (2) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (5) |
|
|
222 | (3) |
|
|
225 | (2) |
Chapter 7 Motherboards |
|
227 | (46) |
|
|
228 | (3) |
|
|
228 | (3) |
|
|
229 | (2) |
|
|
231 | (38) |
|
|
236 | (2) |
|
|
238 | (2) |
|
|
240 | (19) |
|
Structure and Function of the Expansion Bus |
|
|
240 | (3) |
|
|
243 | (2) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
245 | (3) |
|
Installing Expansion Cards |
|
|
248 | (9) |
|
Troubleshooting Expansion Cards |
|
|
257 | (2) |
|
Upgrading and Installing Motherboards |
|
|
259 | (6) |
|
Choosing the Motherboard and Case |
|
|
259 | (3) |
|
Installing the Motherboard |
|
|
262 | (3) |
|
Troubleshooting Motherboards |
|
|
265 | (4) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
267 | (2) |
|
|
269 | (4) |
|
|
269 | (2) |
|
|
271 | (2) |
Chapter 8 Power Supplies |
|
273 | (40) |
|
|
274 | (2) |
|
Understanding Electricity |
|
|
274 | (2) |
|
|
276 | (4) |
|
|
276 | (9) |
|
|
276 | (4) |
|
|
280 | (5) |
|
|
285 | (25) |
|
|
285 | (12) |
|
Installing and Maintaining Power Supplies |
|
|
297 | (8) |
|
|
298 | (2) |
|
|
300 | (5) |
|
Troubleshooting Power Supplies |
|
|
305 | (3) |
|
|
305 | (1) |
|
|
306 | (1) |
|
When Power Supplies Die Slowly |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
308 | (2) |
|
|
308 | (1) |
|
|
309 | (1) |
|
Temperature and Efficiency |
|
|
309 | (1) |
|
|
310 | (3) |
|
|
310 | (2) |
|
|
312 | (1) |
Chapter 9 Hard Drive Technologies |
|
313 | (30) |
|
|
313 | (2) |
|
|
313 | (2) |
|
|
314 | (1) |
|
|
315 | (24) |
|
|
316 | (2) |
|
|
318 | (1) |
|
|
318 | (6) |
|
|
318 | (1) |
|
|
319 | (5) |
|
Protecting Data with RAID |
|
|
324 | (7) |
|
|
326 | (2) |
|
|
328 | (1) |
|
|
328 | (3) |
|
|
331 | (4) |
|
|
331 | (1) |
|
Jumpers and Cabling on PATA Drives |
|
|
332 | (2) |
|
|
334 | (1) |
|
Connecting Solid-State Drives |
|
|
334 | (1) |
|
BIOS Support: Configuring CMOS and Installing Drivers |
|
|
335 | (3) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
Troubleshooting Hard Drive Installation |
|
|
338 | (1) |
|
|
339 | (4) |
|
|
339 | (2) |
|
|
341 | (2) |
Chapter 10 Implementing Hard Drives |
|
343 | (66) |
|
|
343 | (1) |
|
|
344 | (1) |
|
|
344 | (53) |
|
|
344 | (4) |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
351 | (1) |
|
Partition Naming Problems |
|
|
352 | (1) |
|
|
352 | (15) |
|
|
354 | (1) |
|
|
354 | (7) |
|
|
361 | (2) |
|
|
363 | (3) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
The Partitioning, Formatting, and Pooling Process |
|
|
367 | (23) |
|
|
368 | (1) |
|
Partitioning and Formatting with the Installation Media |
|
|
368 | (3) |
|
|
371 | (15) |
|
|
386 | (1) |
|
|
386 | (4) |
|
Maintaining and Troubleshooting Hard Drives |
|
|
390 | (7) |
|
|
390 | (7) |
|
|
397 | (8) |
|
Troubleshooting Hard Drive Implementation |
|
|
397 | (5) |
|
|
402 | (3) |
|
Third-Party Partition Tools |
|
|
403 | (2) |
|
|
405 | (4) |
|
|
405 | (2) |
|
|
407 | (2) |
Chapter 11 Essential Peripherals |
|
409 | (66) |
|
|
409 | (63) |
|
|
409 | (12) |
|
|
409 | (9) |
|
|
418 | (2) |
|
|
420 | (1) |
|
|
421 | (1) |
|
|
421 | (35) |
|
|
422 | (3) |
|
|
425 | (1) |
|
|
426 | (1) |
|
|
427 | (1) |
|
|
428 | (1) |
|
|
429 | (1) |
|
|
430 | (1) |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
432 | (2) |
|
|
434 | (16) |
|
|
450 | (3) |
|
|
453 | (3) |
|
Smart TV and Set-Top Boxes |
|
|
456 | (1) |
|
|
456 | (16) |
|
|
457 | (4) |
|
|
461 | (11) |
|
|
472 | (3) |
|
|
472 | (2) |
|
|
474 | (1) |
Chapter 12 Building a PC |
|
475 | (46) |
|
|
475 | (16) |
|
|
475 | (16) |
|
|
475 | (1) |
|
|
476 | (5) |
|
|
481 | (10) |
|
|
491 | (25) |
|
Installing and Upgrading Windows |
|
|
491 | (19) |
|
|
491 | (1) |
|
|
492 | (3) |
|
The Installation and Upgrade Process |
|
|
495 | (13) |
|
Troubleshooting Installation Problems |
|
|
508 | (2) |
|
|
510 | (6) |
|
Patches, Service Packs, and Updates |
|
|
510 | (1) |
|
|
511 | (1) |
|
Restoring User Data Files (If Applicable) |
|
|
511 | (1) |
|
|
511 | (3) |
|
No Installation Is Perfect |
|
|
514 | (2) |
|
|
516 | (1) |
|
|
516 | (1) |
|
|
517 | (4) |
|
|
517 | (2) |
|
|
519 | (2) |
Chapter 13 Windows Under the Hood |
|
521 | (38) |
|
|
521 | (35) |
|
|
521 | (6) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
523 | (2) |
|
|
525 | (1) |
|
Command-Line Registry Editing Tools |
|
|
526 | (1) |
|
|
527 | (1) |
|
Processes, Services, and Threads |
|
|
528 | (26) |
|
|
528 | (21) |
|
|
549 | (5) |
|
|
554 | (2) |
|
|
554 | (1) |
|
|
555 | (1) |
|
|
556 | (3) |
|
|
556 | (2) |
|
|
558 | (1) |
Chapter 14 Users, Groups, and Permissions |
|
559 | (54) |
|
|
559 | (51) |
|
Authentication with Users and Groups |
|
|
559 | (18) |
|
|
560 | (1) |
|
|
561 | (1) |
|
|
562 | (1) |
|
Configuring Users and Groups |
|
|
563 | (11) |
|
|
574 | (3) |
|
Authorization Through NTFS |
|
|
577 | (10) |
|
|
578 | (3) |
|
|
581 | (2) |
|
|
583 | (1) |
|
|
584 | (1) |
|
Permissions in Linux and Mac OS X |
|
|
585 | (2) |
|
Sharing Resources Securely |
|
|
587 | (10) |
|
|
589 | (1) |
|
Add/Edit Users and/or Groups |
|
|
590 | (3) |
|
|
593 | (1) |
|
Protecting Data with Encryption |
|
|
594 | (3) |
|
Beyond Sharing Users and Groups |
|
|
597 | (13) |
|
|
597 | (2) |
|
|
599 | (3) |
|
|
602 | (4) |
|
|
606 | (1) |
|
|
607 | (3) |
|
|
610 | (3) |
|
|
610 | (2) |
|
|
612 | (1) |
Chapter 15 Maintaining and Optimizing Operating Systems |
|
613 | (40) |
|
|
614 | (36) |
|
Maintaining Operating Systems |
|
|
614 | (15) |
|
|
614 | (3) |
|
Patch Management in Mac OS X and Linux |
|
|
617 | (1) |
|
Managing Temporary Files in Windows |
|
|
618 | (1) |
|
|
619 | (1) |
|
Disk Maintenance Utilities |
|
|
620 | (2) |
|
|
622 | (2) |
|
Controlling Autostarting Software |
|
|
624 | (4) |
|
|
628 | (1) |
|
Optimizing Operating Systems |
|
|
629 | (9) |
|
Installing and Removing Software |
|
|
629 | (5) |
|
Installing/Optimizing a Device |
|
|
634 | (3) |
|
|
637 | (1) |
|
|
638 | (12) |
|
|
638 | (9) |
|
System Restore in Windows |
|
|
647 | (3) |
|
|
650 | (3) |
|
|
650 | (1) |
|
|
651 | (2) |
Chapter 16 Working with the Command-Line Interface |
|
653 | (50) |
|
|
654 | (32) |
|
Deciphering the Command-Line Interface |
|
|
654 | (21) |
|
|
655 | (1) |
|
Accessing the Command-Line Interface in Windows |
|
|
655 | (2) |
|
Accessing the Command-Line Interface in Mac OS X and Linux |
|
|
657 | (2) |
|
|
659 | (1) |
|
|
659 | (1) |
|
Filenames and File Formats |
|
|
659 | (2) |
|
|
661 | (1) |
|
Mastering Fundamental Commands |
|
|
662 | (1) |
|
Structure: Syntax and Switches |
|
|
663 | (1) |
|
Viewing Directory Contents: dir and ls |
|
|
663 | (3) |
|
Changing Directory Focus: The cd Command |
|
|
666 | (1) |
|
|
667 | (1) |
|
Making Directories: The md/mkdir Command |
|
|
668 | (2) |
|
Removing Directories: The rd Command |
|
|
670 | (2) |
|
Running a Program in Windows |
|
|
672 | (1) |
|
Running a Program in Mac OS X and Linux |
|
|
673 | (2) |
|
|
675 | (7) |
|
Using Wildcards to Locate Files |
|
|
675 | (2) |
|
|
677 | (1) |
|
|
678 | (2) |
|
Pruning and Grafting Folder Trees |
|
|
680 | (2) |
|
Assorted Windows Commands |
|
|
682 | (4) |
|
|
682 | (1) |
|
|
682 | (1) |
|
|
683 | (1) |
|
|
684 | (1) |
|
|
684 | (1) |
|
|
684 | (1) |
|
|
685 | (1) |
|
Using Special Keys in Windows |
|
|
685 | (1) |
|
Using Special Keys in Mac OS X and Linux |
|
|
686 | (1) |
|
|
686 | (4) |
|
The compact and cipher Commands |
|
|
686 | (4) |
|
|
690 | (10) |
|
|
690 | (2) |
|
Assorted Mac OS X and Linux Commands |
|
|
692 | (8) |
|
|
692 | (1) |
|
|
693 | (1) |
|
|
693 | (2) |
|
|
695 | (1) |
|
|
695 | (2) |
|
|
697 | (2) |
|
|
699 | (1) |
|
|
699 | (1) |
|
|
700 | (1) |
|
|
700 | (3) |
|
|
700 | (2) |
|
|
702 | (1) |
Chapter 17 Troubleshooting Operating Systems |
|
703 | (56) |
|
|
704 | (52) |
|
|
704 | (25) |
|
Failure to Boot: Hardware or Configuration |
|
|
705 | (1) |
|
Failure to Boot: Windows XP (A CompTIA Retro Moment) |
|
|
706 | (4) |
|
Failure to Boot: Modern Windows |
|
|
710 | (19) |
|
|
729 | (1) |
|
Failure to Start Normally |
|
|
729 | (18) |
|
|
730 | (1) |
|
|
731 | (1) |
|
|
732 | (4) |
|
|
736 | (6) |
|
|
742 | (5) |
|
|
747 | (9) |
|
Application Installation Problems |
|
|
747 | (2) |
|
Problems with Uninstalling |
|
|
749 | (1) |
|
|
750 | (3) |
|
Missing File or Incorrect File Version |
|
|
753 | (1) |
|
|
753 | (1) |
|
Volume Shadow Copy Service and System Protection |
|
|
754 | (2) |
|
|
756 | (3) |
|
|
756 | (2) |
|
|
758 | (1) |
Chapter 18 Virtualization |
|
759 | (38) |
|
|
760 | (19) |
|
|
760 | (19) |
|
|
762 | (3) |
|
Emulation Versus Virtualization |
|
|
765 | (1) |
|
Client-Side Virtualization |
|
|
766 | (13) |
|
|
779 | (14) |
|
|
779 | (2) |
|
|
779 | (1) |
|
|
779 | (1) |
|
System Management and Security |
|
|
780 | (1) |
|
|
781 | (1) |
|
Real-world Virtualization |
|
|
781 | (3) |
|
|
784 | (9) |
|
|
785 | (5) |
|
|
790 | (2) |
|
|
792 | (1) |
|
|
793 | (4) |
|
|
793 | (2) |
|
|
795 | (2) |
Chapter 19 Display Technologies |
|
797 | (62) |
|
|
798 | (1) |
|
|
798 | (3) |
|
|
798 | (3) |
|
|
801 | (19) |
|
|
802 | (11) |
|
|
813 | (3) |
|
|
816 | (1) |
|
|
816 | (4) |
|
|
820 | (1) |
|
|
820 | (3) |
|
|
820 | (3) |
|
|
823 | (12) |
|
|
823 | (2) |
|
|
825 | (1) |
|
|
826 | (2) |
|
|
828 | (1) |
|
Connector Types and Associated Cables |
|
|
828 | (5) |
|
Installing and Configuring Video |
|
|
833 | (2) |
|
|
834 | (1) |
|
|
835 | (19) |
|
|
844 | (1) |
|
|
844 | (7) |
|
|
851 | (3) |
|
Troubleshooting Video Cards/Drivers |
|
|
851 | (1) |
|
|
852 | (2) |
|
|
854 | (1) |
|
|
854 | (1) |
|
|
855 | (4) |
|
|
855 | (2) |
|
|
857 | (2) |
Chapter 20 Essentials of Networking |
|
859 | (36) |
|
|
859 | (4) |
|
Roles Hosts Play in Networks |
|
|
859 | (4) |
|
|
863 | (1) |
|
|
863 | (1) |
|
|
864 | (28) |
|
|
864 | (3) |
|
|
867 | (3) |
|
Ethernet with Twisted Pair |
|
|
870 | (2) |
|
Ethernet with Alternative Connections |
|
|
872 | (3) |
|
|
875 | (17) |
|
|
875 | (2) |
|
|
877 | (14) |
|
|
891 | (1) |
|
|
892 | (3) |
|
|
892 | (1) |
|
|
893 | (2) |
Chapter 21 Local Area Networking |
|
895 | (50) |
|
|
896 | (45) |
|
|
896 | (19) |
|
Network Addressing with IPv4 |
|
|
896 | (13) |
|
Network Addressing with IPv6 |
|
|
909 | (6) |
|
Installing and Configuring a Wired Network |
|
|
915 | (18) |
|
|
915 | (4) |
|
Configuring a Network Client |
|
|
919 | (1) |
|
|
919 | (1) |
|
|
920 | (1) |
|
|
920 | (13) |
|
|
933 | (8) |
|
Repairing Physical Cabling |
|
|
934 | (4) |
|
|
938 | (3) |
|
|
941 | (4) |
|
|
941 | (1) |
|
|
942 | (3) |
Chapter 22 Wireless Networking |
|
945 | (38) |
|
|
945 | (3) |
|
Wireless Networking Components |
|
|
945 | (3) |
|
|
948 | (4) |
|
Wireless Networking Software |
|
|
949 | (1) |
|
|
950 | (2) |
|
|
952 | (3) |
|
Wireless Networking Security |
|
|
952 | (3) |
|
|
955 | (7) |
|
|
955 | (1) |
|
Wireless Networking Standards |
|
|
956 | (6) |
|
IEEE 802.11-Based Wireless Networking |
|
|
956 | (3) |
|
|
959 | (3) |
|
|
962 | (17) |
|
Installing and Configuring Wireless Networking |
|
|
962 | (13) |
|
|
962 | (9) |
|
|
971 | (3) |
|
|
974 | (1) |
|
|
975 | (4) |
|
|
976 | (1) |
|
|
976 | (1) |
|
Connectivity Troubleshooting |
|
|
977 | (1) |
|
Configuration Troubleshooting |
|
|
978 | (1) |
|
|
979 | (4) |
|
|
979 | (2) |
|
|
981 | (2) |
Chapter 23 The Internet |
|
983 | (62) |
|
|
983 | (5) |
|
|
983 | (5) |
|
|
984 | (2) |
|
TCP/IPThe Common Language of the Internet |
|
|
986 | (1) |
|
Internet Service Providers |
|
|
986 | (1) |
|
|
986 | (2) |
|
|
988 | (19) |
|
Connecting to the Internet |
|
|
988 | (16) |
|
|
988 | (5) |
|
|
993 | (1) |
|
|
994 | (1) |
|
|
995 | (1) |
|
|
995 | (1) |
|
|
996 | (2) |
|
|
998 | (1) |
|
Connection to the Internet |
|
|
998 | (6) |
|
Internet Application Protocols |
|
|
1004 | (3) |
|
|
1007 | (25) |
|
|
1007 | (7) |
|
|
1014 | (6) |
|
File Transfer Protocol (FTP) |
|
|
1020 | (2) |
|
|
1022 | (1) |
|
|
1023 | (1) |
|
|
1023 | (1) |
|
|
1024 | (4) |
|
|
1028 | (3) |
|
Support Applications (Internet Utilities) |
|
|
1031 | (1) |
|
|
1032 | (5) |
|
|
1032 | (5) |
|
|
1033 | (2) |
|
|
1035 | (1) |
|
|
1035 | (1) |
|
|
1036 | (1) |
|
|
1037 | (5) |
|
|
1038 | (1) |
|
|
1038 | (1) |
|
|
1039 | (3) |
|
|
1042 | (3) |
|
|
1042 | (1) |
|
|
1043 | (2) |
Chapter 24 Portable Computing |
|
1045 | (54) |
|
|
1046 | (6) |
|
Portable Computing Devices |
|
|
1046 | (6) |
|
|
1046 | (6) |
|
|
1052 | (44) |
|
|
1052 | (2) |
|
|
1054 | (2) |
|
Extending Portable Computers |
|
|
1056 | (9) |
|
|
1056 | (4) |
|
|
1060 | (1) |
|
Portable-Specific Expansion Slots |
|
|
1061 | (2) |
|
|
1063 | (1) |
|
|
1063 | (2) |
|
Managing and Maintaining Portable Computers |
|
|
1065 | (13) |
|
|
1065 | (1) |
|
|
1066 | (9) |
|
|
1075 | (1) |
|
|
1075 | (1) |
|
|
1076 | (2) |
|
Upgrading and Repairing Laptop Computers |
|
|
1078 | (12) |
|
|
1078 | (3) |
|
|
1081 | (5) |
|
|
1086 | (4) |
|
Troubleshooting Portable Computers |
|
|
1090 | (6) |
|
|
1090 | (2) |
|
|
1092 | (4) |
|
|
1096 | (3) |
|
|
1096 | (2) |
|
|
1098 | (1) |
Chapter 25 Understanding Mobile Devices |
|
1099 | (48) |
|
|
1100 | (10) |
|
|
1100 | (10) |
|
|
1100 | (2) |
|
|
1102 | (1) |
|
|
1103 | (1) |
|
|
1104 | (1) |
|
Wearable Technology Devices |
|
|
1104 | (3) |
|
|
1107 | (3) |
|
|
1110 | (34) |
|
Meet the Big Three Mobile OSs |
|
|
1110 | (12) |
|
|
1111 | (1) |
|
|
1111 | (2) |
|
|
1113 | (1) |
|
|
1113 | (9) |
|
Configuring a Mobile Device |
|
|
1122 | (22) |
|
|
1122 | (4) |
|
|
1126 | (3) |
|
|
1129 | (2) |
|
|
1131 | (1) |
|
|
1132 | (2) |
|
|
1134 | (5) |
|
Mobile Device Communication and Ports |
|
|
1139 | (5) |
|
|
1144 | (3) |
|
|
1144 | (2) |
|
|
1146 | (1) |
Chapter 26 Care and Feeding of Mobile Devices |
|
1147 | (32) |
|
|
1147 | (28) |
|
Troubleshooting Mobile Device Issues |
|
|
1147 | (11) |
|
Touchscreen Is Nonresponsive |
|
|
1148 | (1) |
|
|
1149 | (1) |
|
|
1149 | (1) |
|
|
1149 | (2) |
|
|
1151 | (1) |
|
|
1152 | (1) |
|
|
1153 | (1) |
|
|
1153 | (1) |
|
Cannot Broadcast to an External Monitor |
|
|
1154 | (1) |
|
|
1154 | (1) |
|
GPS and Location Services Problems |
|
|
1154 | (2) |
|
|
1156 | (1) |
|
Troubleshooting Steps and Tools |
|
|
1157 | (1) |
|
|
1158 | (11) |
|
BYOD vs. Corporate-Owned Devices |
|
|
1158 | (1) |
|
Profile Security Requirements |
|
|
1158 | (2) |
|
Preventing Physical Damage |
|
|
1160 | (1) |
|
|
1161 | (1) |
|
|
1162 | (2) |
|
|
1164 | (1) |
|
|
1165 | (4) |
|
Mobile OS and Application Security Issues |
|
|
1169 | (6) |
|
Connectivity and Data Usage Issues |
|
|
1169 | (2) |
|
|
1171 | (1) |
|
|
1171 | (1) |
|
Unauthorized Account Access |
|
|
1172 | (1) |
|
|
1172 | (1) |
|
Unauthorized Location Tracking |
|
|
1173 | (1) |
|
Unauthorized Camera and Microphone Activation |
|
|
1173 | (1) |
|
Troubleshooting Steps arid Tools |
|
|
1174 | (1) |
|
|
1175 | (4) |
|
|
1175 | (2) |
|
|
1177 | (2) |
Chapter 27 Printers and Multifunction Devices |
|
1179 | (52) |
|
|
1180 | (48) |
|
Printer and Multifunction Device Components and Technologies |
|
|
1180 | (20) |
|
|
1180 | (14) |
|
|
1194 | (5) |
|
|
1199 | (1) |
|
|
1199 | (1) |
|
The Laser Printing Process |
|
|
1200 | (6) |
|
|
1201 | (1) |
|
|
1202 | (1) |
|
|
1203 | (1) |
|
|
1203 | (1) |
|
|
1204 | (1) |
|
|
1204 | (1) |
|
|
1204 | (2) |
|
Installing a Multifunction Device |
|
|
1206 | (9) |
|
Setting Up Printers in Windows |
|
|
1206 | (6) |
|
Configuring Print Settings |
|
|
1212 | (2) |
|
Optimizing Print Performance |
|
|
1214 | (1) |
|
Managing Shared/Public/Networked Devices |
|
|
1214 | (1) |
|
|
1215 | (13) |
|
Troubleshooting General Issues |
|
|
1215 | (5) |
|
Troubleshooting Impact Printers |
|
|
1220 | (1) |
|
Troubleshooting Thermal Printers |
|
|
1220 | (1) |
|
Troubleshooting Inkjet Printers |
|
|
1220 | (3) |
|
Troubleshooting Laser Printers |
|
|
1223 | (5) |
|
|
1228 | (3) |
|
|
1228 | (1) |
|
|
1229 | (2) |
Chapter 28 Securing Computers |
|
1231 | (58) |
|
|
1231 | (55) |
|
|
1231 | (8) |
|
|
1232 | (1) |
|
|
1232 | (2) |
|
|
1234 | (1) |
|
|
1234 | (1) |
|
System Crash/Hardware Failure |
|
|
1235 | (1) |
|
|
1235 | (1) |
|
|
1236 | (1) |
|
|
1236 | (3) |
|
Security Concepts and Technologies |
|
|
1239 | (15) |
|
|
1239 | (10) |
|
Data Classification and Compliance |
|
|
1249 | (1) |
|
|
1250 | (1) |
|
|
1251 | (3) |
|
|
1254 | (32) |
|
|
1254 | (8) |
|
Malware Signs and Symptoms |
|
|
1262 | (1) |
|
Malware Prevention and Recovery |
|
|
1263 | (9) |
|
|
1272 | (8) |
|
|
1280 | (1) |
|
Authentication and Encryption |
|
|
1281 | (4) |
|
|
1285 | (1) |
|
|
1286 | (3) |
|
|
1286 | (2) |
|
|
1288 | (1) |
Appendix A Mapping to the CompTIA A+ Objectives |
|
1289 | (42) |
|
|
1289 | (20) |
|
|
1309 | (22) |
Appendix B About the CD-ROM |
|
1331 | (4) |
|
Playing the Mike Meyers Introduction Video |
|
|
1331 | (1) |
|
|
1331 | (1) |
|
Total Tester Exam Software |
|
|
1331 | (1) |
|
|
1332 | (1) |
|
|
1332 | (1) |
|
|
1332 | (1) |
|
|
1332 | (1) |
|
|
1333 | (1) |
|
|
1333 | (2) |
|
Total Seminars Technical Support |
|
|
1333 | (1) |
|
McGraw-Hill Education Content Support |
|
|
1333 | (2) |
Glossary |
|
1335 | (84) |
Index |
|
1419 | |