IT Essentials Companion Guide v7

Paperback Engels 2020 9780135645376
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

IT Essentials v7 Companion Guide supports the Cisco Networking Academy IT Essentials version 7 course. The course is designed for Cisco Networking Academy students who want to pursue careers in IT and learn how computers work, how to assemble computers, and how to safely and securely troubleshoot hardware and software issues.

As CompTIA Approved Quality Content, the course also helps students prepare for the CompTIA A+ certification exams. Students must pass both exams to earn the CompTIA A+ certification.

The features of the Companion Guide are designed to help students study and succeed in this course: Chapter objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter. Key terms–Refer to the updated lists of networking vocabulary introduced, and turn to the highlighted terms in context. Course section numbering–Follow along with the course heading numbers to easily jump online to complete labs, activities, and quizzes referred to within the text. Check Your Understanding Questions and Answer Key–Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see on the online course quizzes.

Specificaties

ISBN13:9780135645376
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p style="margin:0px;">Introduction xxxiii</p> <p style="margin:0px;">Chapter 1 Introduction to Personal Computer Hardware 1</p> <p style="margin:0px;">Objectives 1</p> <p style="margin:0px;">Key Terms 1</p> <p style="margin:0px;">Introduction to Personal Computers (1.0) 4</p> <p style="margin:0px;">Personal Computers (1.1) 4</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; What Is in a Computer? (1.1.1) 4</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Electrical and ESD Safety (1.1.2) 5</p> <p style="margin:0px;">PC Components (1.2) 6</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Case and Power Supplies (1.2.1) 6</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Motherboards (1.2.2) 12</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; CPUs and Cooling Systems (1.2.3) 16</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Memory (1.2.4) 18</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Adapter Cards and Expansion Slots (1.2.5) 25</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Hard Disk Drives and SSDs (1.2.6) 28</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Optical Storage Devices (1.2.7) 32</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Ports, Cables, and Adapters (1.2.8) 34</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Input Devices (1.2.9) 42</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Output Devices (1.2.10) 50</p> <p style="margin:0px;">Computer Disassembly (1.3) 53</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; The Technician’s Toolkit (1.3.1) 53</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Computer Disassembly (1.3.2) 53</p> <p style="margin:0px;">Summary (1.4) 54</p> <p style="margin:0px;">Practice 54</p> <p style="margin:0px;">Check Your Understanding Questions 55</p> <p style="margin:0px;">Chapter 2 PC Assembly 59</p> <p style="margin:0px;">Objectives 59</p> <p style="margin:0px;">Key Terms 59</p> <p style="margin:0px;">Introduction to PC Assembly (2.0) 61</p> <p style="margin:0px;">Assemble the Computer (2.1) 61</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; General and Fire Safety (2.1.1) 61</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Open the Case and Connect the Power Supply (2.1.2) 62</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Install the Motherboard Components (2.1.3) 65</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Install Internal Drives (2.1.4) 69</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Install the Adapter Cards (2.1.5) 74</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Select Additional Storage (2.1.6) 81</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Install the Cables (2.1.7) 84</p> <p style="margin:0px;">Summary (2.2) 90</p> <p style="margin:0px;">Practice 91</p> <p style="margin:0px;">Check Your Understanding Questions 91</p> <p style="margin:0px;">Chapter 3 Advanced Computer Hardware 95</p> <p style="margin:0px;">Objectives 95</p> <p style="margin:0px;">Key Terms 95</p> <p style="margin:0px;">Introduction to Advanced Computer Hardware (3.0) 98</p> <p style="margin:0px;">Boot the Computer (3.1) 98</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; POST, BIOS, CMOS, and UEFI (3.1.1) 99</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; BIOS/UEFI Configuration (3.1.2) 104</p> <p style="margin:0px;">Electrical Power (3.2) 107</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Wattage and Voltage (3.2.1) 107</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Power Fluctuation and Protection (3.2.2) 109</p> <p style="margin:0px;">Advanced Computer Functionality (3.3) 111</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; CPU Architectures and Operation (3.3.1) 111</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; RAID (3.3.2) 117</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Ports, Connectors, and Cables (3.3.3) 119</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Monitors (3.3.4) 135</p> <p style="margin:0px;">Computer Configuration (3.4) 140</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Upgrade Computer Hardware (3.4.1) 140</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Configurations for Specialized Computers (3.4.2) 145</p> <p style="margin:0px;">Protecting the Environment (3.5) 155</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Safe Disposal of Equipment and Supplies (3.5.1) 155</p> <p style="margin:0px;">Summary (3.6) 158</p> <p style="margin:0px;">Practice 159</p> <p style="margin:0px;">Check Your Understanding Questions 159</p> <p style="margin:0px;">Chapter 4 Preventive Maintenance and Troubleshooting 163</p> <p style="margin:0px;">Objectives 163</p> <p style="margin:0px;">Key Terms 163</p> <p style="margin:0px;">Introduction (4.0) 164</p> <p style="margin:0px;">Preventive Maintenance (4.1) 164</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; PC Preventive Maintenance Overview (4.1.1) 164</p> <p style="margin:0px;">Troubleshooting Process (4.2) 167</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Troubleshooting Process Steps (4.2.1) 167</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Common Problems and Solutions for PCs (4.2.2) 176</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Apply Troubleshooting Process to Computer Components and Peripherals (4.2.3) 185</p> <p style="margin:0px;">Summary (4.3) 188</p> <p style="margin:0px;">Practice 188</p> <p style="margin:0px;">Check Your Understanding Questions 189</p> <p style="margin:0px;">Chapter 5 Networking Concepts 193</p> <p style="margin:0px;">Objectives 193</p> <p style="margin:0px;">Key Terms 193</p> <p style="margin:0px;">Introduction (5.0) 196</p> <p style="margin:0px;">Network Components and Types (5.1) 196</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Types of Networks (5.1.1) 196</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Internet Connection Types (5.1.2) 203</p> <p style="margin:0px;">Networking Protocols, Standards, and Services (5.2) 207</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Transport Layer Protocols (5.2.1) 208</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Application Port Numbers (5.2.2) 213</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Wireless Protocols (5.2.3) 217</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network Services (5.2.4) 222</p> <p style="margin:0px;">Network Devices (5.3) 232</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Basic Network Devices (5.3.1) 232</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Security Devices (5.3.2) 238</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Other Network Devices (5.3.3) 242</p> <p style="margin:0px;">Network Cables (5.4) 246</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network Tools (5.4.1) 246</p> <p style="margin:0px;">Copper Cables and Connectors (5.4.2) 251</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Fiber Cables and Connectors (5.4.3) 256</p> <p style="margin:0px;">Summary (5.5) 262</p> <p style="margin:0px;">Practice 263</p> <p style="margin:0px;">Check Your Understanding Questions 263</p> <p style="margin:0px;">Chapter 6 Applied Networking 267</p> <p style="margin:0px;">Objectives 267</p> <p style="margin:0px;">Key Terms 267</p> <p style="margin:0px;">Introduction (6.0) 269</p> <p style="margin:0px;">Device to Network Connection (6.1) 269</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network Addressing (6.1.1) 269</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Configure a NIC (6.1.2) 280</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Configure a Wired and Wireless Network (6.1.3) 286</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Firewall Settings (6.1.4) 299</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; IoT Device Configuration (6.1.5) 307</p> <p style="margin:0px;">Basic Troubleshooting Process for Networks (6.2) 309</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Applying the Troubleshooting Process to Networks (6.2.1) 310</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network Problems and Solutions (6.2.2) 313</p> <p style="margin:0px;">Summary (6.3) 319</p> <p style="margin:0px;">Practice 319</p> <p style="margin:0px;">Check Your Understanding Questions 320</p> <p style="margin:0px;">Chapter 7 Laptops and Other Mobile Devices 325</p> <p style="margin:0px;">Objectives 325</p> <p style="margin:0px;">Key Terms 325</p> <p style="margin:0px;">Introduction (7.0) 328</p> <p style="margin:0px;">Characteristics of Laptops and Other Mobile Devices (7.1) 328</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Mobile Device Overview (7.1.1) 329</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Laptop Components (7.1.2) 336</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Laptop Display Components (7.1.3) 341</p> <p style="margin:0px;">Laptop Configuration (7.2) 344</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Power Settings Configuration (7.2.1) 344</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Wireless Configuration (7.2.2) 346</p> <p style="margin:0px;">Laptop Hardware and Component Installation and Configuration (7.3) 350</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Expansion Slots (7.3.1) 351</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Replacing Laptop Components (7.3.2) 356</p> <p style="margin:0px;">Other Mobile Device Hardware Overview (7.4) 360</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Other Mobile Device Hardware (7.4.1) 360</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Specialty Mobile Devices (7.4.2) 364</p> <p style="margin:0px;">Network Connectivity and Email (7.5) 368</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Wireless and Cellular Data Networks (7.5.1) 368</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Bluetooth (7.5.2) 374</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Configuring Email (7.5.3) 378</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Mobile Device Synchronization (7.5.4) 383</p> <p style="margin:0px;">Preventive Maintenance for Laptops and Other Mobile Devices (7.6) 388</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Scheduled Maintenance for Laptops and Other Mobile Devices (7.6.1) 388</p> <p style="margin:0px;">Basic Troubleshooting Process for Laptops and Other Mobile Devices (7.7) 391</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Applying the Troubleshooting Process to Laptops and Other Mobile Devices (7.7.1) 391</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Common Problems and Solutions for Laptops and Other Mobile Devices (7.7.2) 395</p> <p style="margin:0px;">Summary (7.8) 401</p> <p style="margin:0px;">Practice 402</p> <p style="margin:0px;">Check Your Understanding Questions 402</p> <p style="margin:0px;">Chapter 8 Printers 407</p> <p style="margin:0px;">Objectives 407</p> <p style="margin:0px;">Key Terms 407</p> <p style="margin:0px;">Introduction (8.0) 409</p> <p style="margin:0px;">Common Printer Features (8.1) 409</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Characteristics and Capabilities (8.1.1) 409</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Printer Connections (8.1.2) 413</p> <p style="margin:0px;">Printer Type Comparison (8.2) 417</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Inkjet Printers (8.2.1) 417</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Laser Printers (8.2.2) 423</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Laser Printing Process (8.2.3) 427</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Thermal Printers and Impact Printers (8.2.4) 434</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Virtual Printers (8.2.5) 437</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; 3D Printers (8.2.6) 438</p> <p style="margin:0px;">Installing and Configuring Printers (8.3) 442</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Installing and Updating a Printer (8.3.1) 442</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Configuring Options and Default Settings (8.3.2) 444</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Optimizing Printer Performance (8.3.3) 446</p> <p style="margin:0px;">Sharing Printers (8.4) 448</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Operating System Settings for Sharing Printers (8.4.1) 448</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Print Servers (8.4.2) 451</p> <p style="margin:0px;">Maintaining and Troubleshooting Printers (8.5) 454</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Printer Preventive Maintenance (8.5.1) 454</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Inkjet Printer Preventive Maintenance (8.5.2) 456</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Laser Printer Preventive Maintenance (8.5.3) 456</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Thermal Printer Preventive Maintenance (8.5.4) 457</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Impact Printer Preventive Maintenance (8.5.5) 459</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; 3D Printer Preventive Maintenance (8.5.6) 460</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Applying the Troubleshooting Process to Printers (8.5.7) 461</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Problems and Solutions (8.5.8) 464</p> <p style="margin:0px;">Summary (8.6) 468</p> <p style="margin:0px;">Practice 469</p> <p style="margin:0px;">Check Your Understanding Questions 469</p> <p style="margin:0px;">Chapter 9 Virtualization and Cloud Computing 473</p> <p style="margin:0px;">Objectives 473</p> <p style="margin:0px;">Key Terms 473</p> <p style="margin:0px;">Introduction (9.0) 474</p> <p style="margin:0px;">Virtualization (9.1) 474</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Virtualization (9.1.1) 474</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Client-Side Virtualization (9.1.2) 478</p> <p style="margin:0px;">Cloud Computing (9.2) 483</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cloud Computing Applications (9.2.1) 483</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cloud Services (9.2.2) 484</p> <p style="margin:0px;">Summary (9.3) 488</p> <p style="margin:0px;">Practice 488</p> <p style="margin:0px;">Check Your Understanding Questions 489</p> <p style="margin:0px;">Chapter 10 Windows Installation 493</p> <p style="margin:0px;">Objectives 493</p> <p style="margin:0px;">Key Terms 493</p> <p style="margin:0px;">Introduction (10.0) 495</p> <p style="margin:0px;">Modern Operating Systems (10.1) 495</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Operating System Features (10.1.1) 495</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Customer Requirements for an Operating System (10.1.2) 500</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Operating System Upgrades (10.1.3) 504</p> <p style="margin:0px;">Disk Management (10.2) 509</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Disk Management (10.2.1) 509</p> <p style="margin:0px;">Installation and Boot Sequence (10.3) 515</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Basic Windows Installation (10.3.1) 515</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Custom Installation Options (10.3.2) 517</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Windows Boot Sequence (10.3.3) 524</p> <p style="margin:0px;">Summary (10.4) 528</p> <p style="margin:0px;">Practice 528</p> <p style="margin:0px;">Labs 528</p> <p style="margin:0px;">Check Your Understanding Questions 529</p> <p style="margin:0px;">Chapter 11 Windows Configuration 533</p> <p style="margin:0px;">Objectives 533</p> <p style="margin:0px;">Key Terms 534</p> <p style="margin:0px;">Introduction (11.0) 538</p> <p style="margin:0px;">Windows Desktop and File Explorer (11.1) 538</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Comparing Windows Versions (11.1.1) 539</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; The Windows Desktop (11.1.2) 542</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Windows Task Manager (11.1.3) 554</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Windows File Explorer (11.1.4) 556</p> <p style="margin:0px;">Configure Windows with Control Panels (11.2) 567</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Control Panel Utilities (11.2.1) 567</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; User and Account Control Panel Items (11.2.2) 575</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network and Internet Control Panels (11.2.3) 579</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Display Settings and Control Panel (11.2.4) 588</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Power and System Control Panels (11.2.5) 591</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Hardware and Sound Control Panels (11.2.6) 600</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Clock, Region, and Language (11.2.7) 604</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Programs and Features Control Panels (11.2.8) 608</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Other Control Panels (11.2.9) 610</p> <p style="margin:0px;">System Administration (11.3) 614</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Administrative Tools (11.3.1) 614</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; System Utilities (11.3.2) 624</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Disk Management (11.3.3) 631</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Application Installation and Configuration (11.3.4) 639</p> <p style="margin:0px;">Command-Line Tools (11.4) 644</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Using Windows CLI (11.4.1) 644</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; File System CLI Commands (11.4.2) 650</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Disk CLI Commands (11.4.3) 666</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Task and System CLI Commands (11.4.4) 670</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Other Useful CLI Commands (11.4.5) 675</p> <p style="margin:0px;">Windows Networking (11.5) 680</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network Sharing and Mapping Drives (11.5.1) 680</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Sharing Local Resources with Others (11.5.2) 685</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Configure a Wired Network Connection (11.5.3) 688</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Configure a Wireless Network Interface in Windows (11.5.4) 695</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Remote Access Protocols (11.5.5) 697</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Remote Desktop and Assistance (11.5.6) 699</p> <p style="margin:0px;">Common Preventive Maintenance Techniques for Operating Systems (11.6) 700</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; OS Preventive Maintenance Plan (11.6.1) 700</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Backup and Restore (11.6.2) 704</p> <p style="margin:0px;">Basic Troubleshooting Process for Windows Operating Systems (11.7) 707</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Applying Troubleshooting Process to Windows Operating Systems (11.7.1) 707</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Common Problems and Solutions for Windows Operating Systems (11.7.2) 711</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Advanced Troubleshooting for Windows Operating Systems (11.7.3) 716</p> <p style="margin:0px;">Summary (11.8) 720</p> <p style="margin:0px;">Practice 721</p> <p style="margin:0px;">Check Your Understanding Questions 722</p> <p style="margin:0px;">Chapter 12 Mobile, Linux, and macOS Operating Systems 727</p> <p style="margin:0px;">Objectives 727</p> <p style="margin:0px;">Key Terms 727</p> <p style="margin:0px;">Introduction (12.0) 729</p> <p style="margin:0px;">Mobile Operating Systems (12.1) 729</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Android vs. iOS (12.1.1) 729</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Android Touch Interface (12.1.2) 734</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; iOS Touch Interface (12.1.3) 737</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Common Mobile Device Features (12.1.4) 741</p> <p style="margin:0px;">Methods for Securing Mobile Devices (12.2) 755</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Screen Locks and Biometric Authentication (12.2.1) 755</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Cloud-Enabled Services for Mobile Devices (12.2.2) 758</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Software Security (12.2.3) 763</p> <p style="margin:0px;">Linux and macOS Operating Systems (12.3) 767</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Linux and macOS Tools and Features (12.3.1) 767</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Linux and macOS Best Practices (12.3.2) 778</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Basic CLI Commands (12.3.3) 783</p> <p style="margin:0px;">Basic Troubleshooting Process for Mobile, Linux, and macOS Operating Systems (12.4) 793</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Applying the Troubleshooting Process to Mobile, Linux, and macOS Operating Systems (12.4.1) 794</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Common Problems and Solutions for Other Operating Systems (12.4.2) 798</p> <p style="margin:0px;">Summary (12.5) 805</p> <p style="margin:0px;">Practice 805</p> <p style="margin:0px;">Check Your Understanding Questions 806</p> <p style="margin:0px;">Chapter 13 Security 811</p> <p style="margin:0px;">Objectives 811</p> <p style="margin:0px;">Key Terms 811</p> <p style="margin:0px;">Introduction (13.0) 814</p> <p style="margin:0px;">13.1 Security Threats (13.1) 814</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Malware (13.1.1) 814</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Preventing Malware (13.1.2) 820</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Network Attacks (13.1.3) 825</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Social Engineering Attacks (13.1.4) 830</p> <p style="margin:0px;">Security Procedures (13.2) 834</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Security Policy (13.2.1) 834</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Protecting Physical Equipment (13.2.2) 835</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Protecting Data (13.2.3) 841</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Data Destruction (13.2.4) 847</p> <p style="margin:0px;">Securing Windows Workstations (13.3) 849</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Securing a Workstation (13.3.1) 849</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Windows Local Security Policy (13.3.2) 855</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Managing Users and Groups (13.3.3) 860</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Windows Firewall (13.3.4) 869</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Web Security (13.3.5) 876</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Security Maintenance (13.3.6) 882</p> <p style="margin:0px;">Wireless Security (13.4) 885</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Configure Wireless Security (13.4.1) 886</p> <p style="margin:0px;">Basic Troubleshooting Process for Security (13.5) 900</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Applying the Troubleshooting Process to Security (13.5.1) 900</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Common Problems and Solutions for Security (13.5.2) 904</p> <p style="margin:0px;">Summary (13.6) 906</p> <p style="margin:0px;">Practice 907</p> <p style="margin:0px;">Check Your Understanding Questions 908</p> <p style="margin:0px;">Chapter 14 The IT Professional 913</p> <p style="margin:0px;">Objectives 913</p> <p style="margin:0px;">Key Terms 913</p> <p style="margin:0px;">Introduction (14.0) 915</p> <p style="margin:0px;">Communication Skills and the IT Professional (14.1) 915</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Communication Skills, Troubleshooting, and Professional Behavior (14.1.1) 915</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Working with a Customer (14.1.2) 917</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Professional Behavior (14.1.3) 919</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; The Customer Call (14.1.4) 922</p> <p style="margin:0px;">Operational Procedures (14.2) 925</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Documentation (14.2.1) 925</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Change Management (14.2.2) 928</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Disaster Prevention and Recovery (14.2.3) 931</p> <p style="margin:0px;">Ethical and Legal Considerations (14.3) 934</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Ethical and Legal Considerations in the IT Profession (14.3.1) 935</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Legal Procedures Overview (14.3.2) 940</p> <p style="margin:0px;">Call Center Technicians (14.4) 944</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Call Centers, Level One and Level Two Technicians (14.4.1) 944</p> <p style="margin:0px;">&nbsp;&nbsp;&nbsp; Basic Scripting and the IT Professional (14.4.2) 949</p> <p style="margin:0px;">Summary (14.5) 958</p> <p style="margin:0px;">Practice 959</p> <p style="margin:0px;">Check Your Understanding Questions 959</p> <p style="margin:0px;">Appendix A Answers to “Check Your Understanding” Questions 965</p> <p style="margin:0px;">Glossary 985</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;">&nbsp;</p> <p style="margin:0px;"></p> <p style="margin:0px;">9780135645376&nbsp;&nbsp; TOC&nbsp;&nbsp; 1/30-2020&nbsp;</p>

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        IT Essentials Companion Guide v7