Introduction |
|
xix | |
Assessment Test |
|
xxvii | |
Chapter 1 Core hardware Components |
|
1 | (58) |
|
Introducing Internal Components |
|
|
2 | (1) |
|
Exploring Motherboards, Processors, and Memory |
|
|
3 | (26) |
|
|
3 | (17) |
|
|
20 | (4) |
|
|
24 | (5) |
|
Exploring Storage and Expansion Devices |
|
|
29 | (15) |
|
|
30 | (9) |
|
|
39 | (1) |
|
|
40 | (2) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
Exploring Power and Cooling |
|
|
44 | (8) |
|
|
45 | (4) |
|
|
49 | (3) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (2) |
|
|
55 | (4) |
Chapter 2 Peripherals and Connectors |
|
59 | (56) |
|
Audio, Video, and Printers |
|
|
61 | (20) |
|
|
61 | (2) |
|
Display Devices and Connectors |
|
|
63 | (12) |
|
|
75 | (6) |
|
|
81 | (14) |
|
|
81 | (6) |
|
|
87 | (8) |
|
External Storage and Other Connectors |
|
|
95 | (13) |
|
|
95 | (10) |
|
Communications Connectors |
|
|
105 | (2) |
|
Reviewing Connector Types |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (5) |
Chapter 3 Operating Systems |
|
115 | (66) |
|
Operating System Fundamentals |
|
|
117 | (32) |
|
A Brief History of Operating Systems |
|
|
118 | (4) |
|
Basic Functions of Operating Systems |
|
|
122 | (8) |
|
Types of Operating Systems |
|
|
130 | (19) |
|
Navigating an Operating System |
|
|
149 | (21) |
|
Managing Folder and File Structures |
|
|
150 | (14) |
|
Additional Operating System Features |
|
|
164 | (6) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (5) |
|
|
176 | (5) |
Chapter 4 Software Applications |
|
181 | (68) |
|
Common Software Applications and File Types |
|
|
185 | (35) |
|
|
185 | (5) |
|
|
190 | (12) |
|
|
202 | (3) |
|
|
205 | (12) |
|
|
217 | (3) |
|
Software Management Best Practices |
|
|
220 | (22) |
|
Considerations for Installing Software |
|
|
220 | (7) |
|
Installing and Uninstalling Software |
|
|
227 | (7) |
|
Updating and Patching Software |
|
|
234 | (8) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
244 | (5) |
Chapter 5 Networking Technologies and Wireless Routers |
|
249 | (52) |
|
Connection Types and Features |
|
|
250 | (19) |
|
Choosing a Connection Type |
|
|
251 | (1) |
|
Choosing External Network Connections |
|
|
251 | (10) |
|
Choosing Internal Network Connections |
|
|
261 | (7) |
|
Comparing and Contrasting Data Connections |
|
|
268 | (1) |
|
Network Connectivity Essentials |
|
|
269 | (8) |
|
Networking Protocol Basics |
|
|
269 | (1) |
|
|
270 | (7) |
|
|
277 | (18) |
|
|
277 | (10) |
|
|
287 | (3) |
|
Additional Wireless Router Services |
|
|
290 | (5) |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
296 | (1) |
|
Part 1: Setting Up Your Wireless Router |
|
|
296 | (1) |
|
Part 2: Testing Your Neighbors |
|
|
296 | (1) |
|
|
297 | (4) |
Chapter 6 Network Sharing and Storage |
|
301 | (40) |
|
|
303 | (21) |
|
|
303 | (6) |
|
|
309 | (3) |
|
|
312 | (12) |
|
Web-Based Sharing and Access |
|
|
324 | (9) |
|
|
325 | (4) |
|
Accessing Web-Based Resources |
|
|
329 | (4) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (2) |
|
|
336 | (5) |
Chapter 7 Mobile Devices |
|
341 | (34) |
|
|
342 | (26) |
|
Wireless Usability Options |
|
|
343 | (5) |
|
Configuring External Connections |
|
|
348 | (16) |
|
|
364 | (4) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (2) |
|
|
371 | (4) |
Chapter 8 Security Threats |
|
375 | (30) |
|
|
376 | (2) |
|
Understanding Security Threats |
|
|
378 | (20) |
|
Physical Security Threats |
|
|
379 | (4) |
|
|
383 | (4) |
|
Software-Based Security Threats |
|
|
387 | (11) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
400 | (5) |
Chapter 9 Security Best Practices |
|
405 | (58) |
|
Computer and Network Security Best Practices |
|
|
407 | (20) |
|
|
407 | (14) |
|
|
421 | (6) |
|
Internet Security Best Practices |
|
|
427 | (28) |
|
Web Browsing Preparation and Maintenance |
|
|
427 | (12) |
|
|
439 | (13) |
|
|
452 | (3) |
|
|
455 | (1) |
|
|
455 | (1) |
|
|
456 | (2) |
|
|
458 | (5) |
Chapter 10 Buying and Configuring a Workstation |
|
463 | (28) |
|
Buying and Configuring a Workstation |
|
|
464 | (20) |
|
Selecting the Right Computer |
|
|
464 | (5) |
|
Categories of Home and SOHO Computers |
|
|
469 | (6) |
|
|
475 | (9) |
|
|
484 | (1) |
|
|
485 | (1) |
|
|
485 | (1) |
|
|
486 | (5) |
Chapter 11 Computer Support and Backups |
|
491 | (48) |
|
Basic Computer Support Concepts |
|
|
492 | (30) |
|
Understanding Troubleshooting Theory |
|
|
493 | (10) |
|
|
503 | (19) |
|
|
522 | (9) |
|
Understanding the Importance of Backups |
|
|
523 | (1) |
|
Understanding How Backups Work |
|
|
524 | (1) |
|
Understanding Backup Options |
|
|
524 | (6) |
|
Verifying and Testing Backups |
|
|
530 | (1) |
|
|
531 | (1) |
|
|
532 | (1) |
|
|
533 | (1) |
|
|
534 | (5) |
Chapter 12 Environmental and Safety Concepts |
|
539 | (40) |
|
Safe Interactions with Computers |
|
|
541 | (30) |
|
|
542 | (2) |
|
Understanding Power and Electricity |
|
|
544 | (13) |
|
Practicing Good Device Care and Placement |
|
|
557 | (11) |
|
Using Proper Disposal Methods |
|
|
568 | (3) |
|
|
571 | (1) |
|
|
572 | (1) |
|
|
573 | (1) |
|
|
574 | (5) |
Appendixes |
|
579 | (28) |
|
Appendix A Answers to Written Labs |
|
|
581 | (8) |
|
Appendix B Answers to Review Questions |
|
|
589 | (18) |
Index |
|
607 | |