Complete Comptia A+ Guide To Hardware & Software
Complete Comptia A+ Guide To Hardware & Software
to IT Hardware and
Software
A CompTIA A+ Core 1 (220-1001) &
CompTIA A+ Core 2 (220-1002) Textbook
EIGHTH EDITION
CHERYL A. SCHMIDT
FLORIDA STATE COLLEGE AT JACKSONVILLE
ii Complete A+ Guide to IT Hardware and Software, Eighth Edition
Art Production
Justin Ache
Katherine Martin
Marc Durrence
Amanda McIntosh
KC Frick
Vived Graphics
Photographers
Raina Durrence
George Nichols
Contents at a Glance iii
Contents at a Glance
Contents
Introduction ........................................................................................................................ xxiv
Activities ..............................................................................................................................................................67
Internet Discovery .................................................................................................................................67
Soft Skills ..............................................................................................................................................68
Critical Thinking Skills .........................................................................................................................69
Activities ............................................................................................................................................................310
Internet Discovery ...............................................................................................................................310
Soft Skills ............................................................................................................................................311
Critical Thinking Skills .......................................................................................................................311
Chapter 12: Internet Connectivity, Virtualization, and Cloud Technologies .................................... 573
Internet Connectivity Overview ........................................................................................................................574
Dial-up Overview ..............................................................................................................................................574
Serial Communication Overview ......................................................................................................................575
Configuring Traditional Serial Devices .............................................................................................................576
56 kbps Modems ...............................................................................................................................................577
Digital Modems and ISDN................................................................................................................................579
VoIP ...................................................................................................................................................................579
Cable Modems ...................................................................................................................................................581
xDSL Modems ..................................................................................................................................................584
Satellite Modems ...............................................................................................................................................586
Modem Preventive Maintenance .......................................................................................................................587
Mobile Connectivity Overview .........................................................................................................................587
Virtualization Basics..........................................................................................................................................589
Cloud Computing ..............................................................................................................................................593
Web Browsers ....................................................................................................................................................597
Basic Web Browser Issues.................................................................................................................................608
Chapter Summary ..............................................................................................................................................611
Key Terms ..........................................................................................................................................................613
Review Questions ..............................................................................................................................................614
Contents xi
Exercises ............................................................................................................................................................615
Exercise 12.1 Exploring Internet Connectivity Options .....................................................................615
Exercise 12.2 Exploring the Internet Options Window....................................................................616
Activities ............................................................................................................................................................617
Internet Discovery ...............................................................................................................................617
Soft Skills ............................................................................................................................................617
Critical Thinking Skills .......................................................................................................................618
Activities ............................................................................................................................................................767
Internet Discovery ...............................................................................................................................767
Soft Skills ............................................................................................................................................767
Critical Thinking Skills .......................................................................................................................768
Reloading Windows...........................................................................................................................................845
Windows Updates ..............................................................................................................................................846
Backing Up the Windows Registry and Data....................................................................................................848
Configuring Windows Overview .......................................................................................................................850
Configuring Windows........................................................................................................................................851
Adding Devices .................................................................................................................................................852
Installing/Removing Software ...........................................................................................................................857
Computer Management Console .......................................................................................................................861
System Tools......................................................................................................................................................862
User Account Management ...............................................................................................................................866
Managing Storage..............................................................................................................................................874
Managing Services and Applications ................................................................................................................877
Data Sources (ODBC) .......................................................................................................................................878
Print Management Console ...............................................................................................................................879
Overview of the Windows Boot Process ...........................................................................................................880
Speeding Up the Windows Boot Process ..........................................................................................................881
Troubleshooting the Windows Boot Process.....................................................................................................882
Black Screen/Video Issues ................................................................................................................................884
Recovery Console ..............................................................................................................................................884
Advanced Boot Options/Startup Settings Menu ...............................................................................................887
System Configuration Utility ............................................................................................................................889
Task Manager ....................................................................................................................................................892
Troubleshooting a Service That Does Not Start ...............................................................................................895
Slow Boot ..........................................................................................................................................................896
Troubleshooting Windows Network Settings ....................................................................................................897
Windows Reboots ..............................................................................................................................................898
Shutdown Problems ...........................................................................................................................................898
Power Options ...................................................................................................................................................899
Monitoring System Performance.......................................................................................................................900
Supporting Windows Computers Remotely ......................................................................................................905
Preventive Maintenance for Your Operating System ........................................................................................906
Chapter Summary ..............................................................................................................................................908
Key Terms ..........................................................................................................................................................909
Review Questions ..............................................................................................................................................911
Exercises ............................................................................................................................................................912
Exercise 16.1 Windows Tools .............................................................................................................912
Exercise 16.2 Task Manager Tabs.......................................................................................................913
Exercise 16.3 System Configuration Tabs ..........................................................................................914
Activities ............................................................................................................................................................914
Internet Discovery ...............................................................................................................................914
Soft Skills ............................................................................................................................................915
Index ..................................................................................................................................1153
About the Author xvii
Dedication
A Note to Instructors:
I was a teacher long before I had the title professor. Sharing what I know has always been as natural as walking to me,
but sitting still to write what I know is not as natural, so composing this text has always been one of my greatest chal-
lenges. Thank you so much for choosing this text. I thank you for sharing your knowledge and experience with your
students. Your dedication to education is what makes the student experience so valuable.
A Note to Students:
Writing a textbook is really different from teaching class. I have said for years that my students are like my children,
except that I don’t have to pay to send them through college. I am happy to claim any of you who have this text. I
wish that I could be in each classroom with you as you start your IT career. How exciting!
Another thing that I tell my students is that I am not an expert. IT support is an ever-changing field and I have been in
it since PCs started being used. You have to be excited about the never-ending changes to be good in this field. You can
never stop learning or you will not be very good any more. I offer one important piece of advice:
Consistent, high-quality service boils down to two equally important things: caring and competence.
—Chip R. Bell and Ron Zemke
I dedicate this book to you. I can help you with the competence piece, but you are going to have to work on the caring
part. Do not ever forget that there are people behind those machines that you love to repair. Taking care of people is as
important as taking care of the computers.
Acknowledgments
I am so thankful for the support of my family during the production of this book. My husband, Karl, daughters, Raina
and Karalina, and son-in-law, Marc, were such a source of inspiration and encouragement. My grandsons, Gavin,
Riley, Logan, and Liam, and my granddaughter, Brie, are a constant source of wonderment for me. They were a shin-
ing light at the end of some very long days. Thanks to my mother, Barbara Cansler, who taught me to love words
and my brother Jeff Cansler for just listening. Thanks to my walking buddy, Kellie, for the miles of letting me work
through knotty sections. Thanks to my colleagues, adjuncts, and students at my college who offered numerous valu-
able suggestions for improvement and testing the new material. Thanks to my colleagues Pamela Brauda and David
Singletary for just letting me rant. Finally, I want to thank my personal technical team, Justin Ache, Raina Durrence,
Marc Durrence, and Jeff Burns.
Many thanks are also due the folks at Pearson. The professionalism and support given during this edition was stel-
lar. Thank you so much, Pearson team, especially Eleanor Bru, Mary Beth Ray, Kitty Wilson, Mandie Frank, and my
favorite technical reviewer/hatchet man, Chris Crayton. A special thanks to Mary Beth Ray, my executive editor and
juggler extraordinaire. I hope all of you can see the results of your contributions. I thank the whole team so much for
your conscientious efforts.
Finally, thank you to the students who have taken the time to share their recommendations for improvement. You are
the reason I write this book each time. Please send me any ideas and comments you may have. I love hearing from you
and of your successes. I may be reached at [email protected].
Credits xix
Credits
Figure Number Attribution/Credit Line Figure Number Attribution/Credit Line
Figure 1-1 Cheryl Schmidt Figure 2-45 Gudellaphoto/Fotolia
Figure 1-5A Apple Logo, Apple Inc. Figure 2-47 Raina Durrence
Figure 1-5B Windows Logo, Microsoft Corporation Figure 2-49 Unkas Photo/Fotolia
Figure 1-5C Linux Logo, Linux Inc. Figure 2-50 Gareth Boden/Pearson Education Ltd
Figure 1-5D Courtesy of Android Inc. Figure 2-51a Raina Durrence
Figure 1-7 MaverickLEE/Shutterstock Figure 2-51b Raina Durrence
Figure 1-10 NAN728/Shutterstock Figure 2-52a MRS. NUCH SRIBUANOY/Shutterstock
Figure 1-13 Unkas Photo/Fotolia Figure 2-52b Cheryl Schmidt
Figure 1-14 Bondarau/Fotolia Figure 2-52c Ericlefrancais/Shutterstock
Figure 1-15 Norikko/Fotolia Figure 2-52d Nata-Lia/Shutterstock
Figure 1-16 Alexlmx/Fotolia Figure 2-52e Ericlefrancais/Shutterstock
Figure 1-17 Scanrail/Fotolia Figure 2-52f Tuomas Lehtinen/Shutterstock
Figure 1-18 Bondarau/Fotolia Figure 2-52g 1125089601/Shutterstock
Figure 1-20 Raina Durrence Figure 2-52i Coleman Yuen/Pearson Education Asia Ltd
Figure 1-21 Petr Malyshev/Fotolia Figure 2-52j Gudellaphoto/Fotolia
Figure 1-24a Florin oprea/Shutterstock Figure 3-1 Aleksei Lazukov/Fotolia
Figure 1-24b Andrey_Popov/Shutterstock Figure 3-2 Oleksandr Delyk/Fotolia
Figure 1-25 Mark Nazh/Shutterstock Figure 3-16 Denis Dryashkin/Fotolia
Figure 1-26 ESB Professional/Shutterstock Figure 3-17 Auran/Fotolia
Figure 1-27 Tatjana Brila/Shutterstock Figure 3-18 Graham Kidd Zenith/Fotolia
Figure 1-36a Vadymg/Fotolia Figure 3-20 Timur Anikin/Fotolia
Figure 1-36b Unkas Photo/Fotolia Figure 3-21 Markd800/Fotolia
Figure 1-36c zelimirzarkovic/Fotolia Figure 3-22 Denis Dryashkin/Fotolia
Figure 2-1 Raina Durrence Figure 3-23 Markd800/Fotolia
Figure 2-2a & c Robootb/Fotolia Figure 3-26 Unkas Photo /Fotolia
Figure 2-2b Raina Durrence Figure 3-19 Raina Durrence
Figure 2-4 Cheryl Schmidt Figure 3-28 Raina Durrence
Figure 2-5 Ctpaep/Fotolia Figure 3-29 Y. L. Photographies/Fotolia
Figure 2-7 Ericlefrancais/Shutterstock Figure 3-30 Zadorozhnyi Viktor/Shutterstock
Figure 2-8 Gudellaphoto/Fotolia Figure 3-35 BonD80/Shutterstock
Figure 2-9 Ruslan Kudrin/Fotolia Figure 3-36 Algre/Fotolia
Figure 2-10 Raina Durrence Figure 3-38 ASUS Workstation motherboard
Figure 2-13a Alexey Rotanov/Fotolia Figure 3-39 Wavebreakmedia/Shutterstock
Figure 2-13b Yurdakul/Fotolia Figure 4-1 Maxhalanski/Fotolia
Figure 2-14 Raina Durrence Figure 4-6 Bondarau/Fotolia
Figure 2-15 Raina Durrence Figure 4-8 Raina Durrence
Figure 2-16b Cheryl Schmidt Figure 4-15 Raina Durrence
Figure 2-18 Raina Durrence Figure 4-17 Cheryl Schmidt
Figure 2-19 George Nichols Figure 4-19 Cheryl Schmidt
Figure 2-21a Raina Durrence Figure 4-20 Cheryl Schmidt
Figure 2-21b Raina Durrence Figure 4-21 Cheryl Schmidt
Figure 2-22 Tuomas Lehtinen/Shutterstock Figure 4-23 Vetkit/Fotolia
Figure 2-52h Mikhail hoboton Popov/Shutterstock Figure 4-24 Slyudmila/Fotolia
Figure 2-23 Shawn Hempel/Fotolia Figure 4-26 Raina Durrence
Figure 2-26 Raina Durrence Figure 4-27 Jiaking1/Fotolia
Figure 2-27 Raina Durrence Figure 4-28 Jan Mika/Shutterstock
Figure 2-28 Raina Durrence Figure 4-29 Stokkete/Fotolia
Figure 2-30 Raina Durrence Figure 4-31 Intel Corporation
Figure 2-31 Raina Durrence Figure 5-1 Yauhenka/Fotolia
Figure 2-34 Callum Bennetts/Fotolia Figure 5-2 Raina Durrence
Figure 2-35 Cheryl Schmidt Figure 5-3 Raina Durrence
Figure 2-37 Gareth Boden/Pearson Education Ltd Figure 5-4 StockPhotosArt/Fotolia
Figure 2-39 Mau Horng/Fotolia Figure 5-5 Cheryl Schmidt
Figure 2-40 Raina Durrence Figure 5-6a Raina Durrence
Figure 2-41 Anton Samsonov/123RF Figure 5-6b Likasiri/Fotolia
Figure 2-43 Pairoj/Fotolia Figure 5-6c DGMphoto/Fotolia
Figure 2-44a Alehdats/Fotolia Figure 5-7 Gudellaphoto/Fotolia
Figure 2-44b Hoboton/Fotolia Figure 5-8 LoloStock/Fotolia
xx Complete A+ Guide to IT Hardware and Software, Eighth Edition
Multiple Figures: Microsoft Windows 8 & 10,© Microsoft Corporation; Microsoft Windows10,© Microsoft Corporation; © 2019, com-
mand Prompt, Microsoft Corporation; © 2019, Microsoft Analyzer, Microsoft Corporation; © 2019, Microsoft Internet Explorer, Micro-
soft Corporation; © 2019, Microsoft Windows File Explorer, Microsoft Corporation; © 2019, Microsoft Windows Powershell, Microsoft
Corporation; © 2019, Microsoft Windows, Microsoft Corporation; Agsandrew/Shutterstock; Apple Screenshot reprinted with permission
of Apple Inc.; Courtesy of Android; Courtesy of Apple Inc.; Courtesy of Canonical Ltd; Courtesy of Ubuntu; iOS screenshots are regis-
tered trademarks of Apple Inc.; UEFI screenshots
Cover: PopTika/Shutterstock
We Want to Hear from You! xxiii
Introduction
Complete A+ Guide to IT Hardware and Software, eighth edition, is a textbook and optional lab manual intended for
one or more courses geared toward CompTIA A+ Certification and computer repair. It covers all the material needed
for the CompTIA A+ Core 1 (220-1001) and CompTIA A+ Core 2 (220-1002) exams. The book is written so that it is
easy to read and understand, with concepts presented in building-block fashion. The book focuses on hardware, soft-
ware, mobile devices, virtualization, basic networking, and security.
Some of the best features of the book include the coverage of difficult subjects in a step-by-step manner, carefully de-
veloped graphics that illustrate concepts, photographs that demonstrate various technologies, reinforcement questions,
critical thinking skills, soft skills, and hands-on exercises at the end of each chapter. Also, this book is written by a
teacher who understands the value of a textbook from someone who has been in IT her entire career.
> Chapter 1 provides an introduction to IT and careers that need the information in this book. It identifies computer
parts. Chapter 1 does not have a specific soft skills section, as do the other chapters. Instead, it focuses on common
technician qualities that are explored in greater detail in the soft skills sections of later chapters. Finally, Chapter 1
has a great introduction to using Notepad, the Windows Snipping Tool, and Internet search techniques.
> Chapter 2 is about connecting things to the computer and port identification. Details are provided on video, USB,
and sound ports. The soft skills section is on using appropriate titles.
> Chapter 3 details components, features, and concepts related to motherboards, including processors, caches, expan-
sion slots, and chipsets. Active listening skills are the focus of the soft skills section.
> Chapter 4 deals with system configuration basics. BIOS options, UEFI BIOS, and system resources are key topics.
The soft skills section covers the importance of doing one thing at a time when replacing components.
> Chapter 5 steps through how to disassemble and reassemble a computer. Tools, ESD, EMI, and preventive mainte-
nance are discussed. Subsequent chapters also include preventive maintenance topics. Basic electronics and com-
puter power concepts are also included in this chapter. The soft skills section involves written communication.
> Chapter 6 covers memory installation, preparation, and troubleshooting. The importance of teamwork is empha-
sized as the soft skill.
> Chapter 7 deals with storage devices, including PATA, SATA SCSI, SAS, and SSDs. RAID is also covered. Phone
communication skills are covered in the soft skills section of this chapter.
> Chapter 8 covers multimedia devices, including optical drives, sound cards, cameras, scanners, and speakers. The
chapter ends with a section on having a positive, proactive attitude.
> Chapter 9 provides details on printers. A discussion of work ethics finishes the chapter.
> Chapter 10 is on mobile devices, including details on mobile device operating systems, configuration, backup, se-
curity, and troubleshooting. The soft skills section takes a brief foray into professional appearance.
> Chapter 11 covers computer design. Not only are the specialized computers and components needed within the
types of systems covered, but computer subsystem design is also included. Because design and troubleshooting are
high on the academic learning progression, the chapter also includes a review of troubleshooting, including logic,
error codes, and troubleshooting flowcharts. The soft skills section provides recommendations for dealing with irate
customers.
> Chapter 12 handles Internet connectivity, virtualization, and cloud technologies. Internet browser configuration is
covered, along with the soft skill of mentoring
> Chapter 13 introduces networking. Basic concepts, terminology, and exercises make this chapter a favorite. The
introduction to subnetting has been moved to an appendix. The focus of the soft skills section is being proactive
instead of reactive.
> Chapter 14 provides an introduction to operating systems in general and discusses basic differences between the
Windows versions and how to function in the various Windows environments. The soft skills section includes tips
on how to stay current in this fast-paced field.
> Chapter 15 is a new introduction to scripting and includes how to function from the command prompt and the basics
of scripting in Python, JavaScript, shell scripting, VBScript, batch files, and PowerShell. The soft skills section
discusses looking at a problem from the user’s perspective and being more empathetic.
> Chapter 16 covers Windows 7, 8, and 10. Details include how to install, configure, and troubleshoot the environ-
ment. Avoiding burnout is the soft skill discussed in this chapter.
> Chapter 17 discusses the basics of macOS and Linux. It provides a basic introduction to these two environments to
help a technician become familiar with the environment and a few tools. The soft skills section talks about being
humble.
> Chapter 18 describes computer, mobile device, and network security. The soft skills section is on building customer
trust.
> Chapter 19 guides the student through operational procedures such as workplace safety, recycling, disposal, a re-
view of power protection, change management, and communication skills.
xxvi Complete A+ Guide to IT Hardware and Software, Eighth Edition
Companion Website
Register this book to get access to sample videos plus additional bonus content to help you succeed with this course
and the certification exam. Check this site regularly for any updates or errata that might become available for this
book. Be sure to check the box that you would like to hear from us to receive news of updates and exclusive discounts
on related products.
To access this companion website, follow the steps below:
Table I-3 shows a summary of the exam domains addressed in each chapter. Each chapter lists the certification objectives it
covers in the chapter opener. See Appendix B on the companion website for a detailed table that identifies where you can
find all the CompTIA A+ exam objectives covered in this book.
✓ 1001-3.6 Explain the purposes ✓ 1002-4.4 Explain common ✓ 1002-4.7 Given a scenario, use
and uses of various peripheral safety procedures. proper communication tech-
types. niques and professionalism.
2 Complete A+ Guide to IT Hardware and Software
Technician Qualities
Each chapter includes a small bit of space on qualities a technician should possess or strive toward.
Spending a little brain power on improving what many call your “soft skills” will pay off in promo-
tions and divergence into other IT-related fields. Three of the most important qualities of a techni-
cian are active listening skills, a good attitude, and logic. Active listening means that you truly
listen to what a person (especially one who is having a problem) is saying. Active listening skills
involve good eye contact, nodding your head every now and then to show that you are following
the conversation, taking notes on important details, and avoiding distractions such as incoming cell
CHAPTER 1: Introduction to the World of IT 3
phone calls or text messages. Clarify customer statements by asking pertinent questions and avoid
interrupting. Allow customers to complete their sentences. Many technicians jump into a problem
1
CHAPTER
the moment they hear the first symptom described by the user. Listen to the entire problem. Ask
open-ended questions—questions that allow the user to expand on the answer rather than answer
with a single word, such as yes or no. Figure 1.2 illustrates this point.
Closed-ended questions Open-ended questions
I saw where you logged a
I saw where you logged a
printer problem today, Bob.
printer problem today, Bob.
What do you want to bet the
What happened?
problem is the toner
cartridge?
Allow the users to state the problem without leading them toward a solution.
Restate the problem to ensure understanding and ask questions for clarity
and to narrow your understanding.
,GRQ·WWDNHWKHWLPHWROLVWHQWRWKHHQWLUHSUREOHP
I blame others.
,WKLQN,FDQ
W,ZRQ
WRU,ZRQ
WHYHQWU\
0%
occur so frequently that technicians must constantly update their skills. Develop a passion for
learning the latest information and searching for information that helps you solve problems.
Avoid developing tunnel vision (that is, thinking that there is only one answer to a problem).
Step back and look at the problem so that all possible issues can be evaluated. Be logical in your
assessment and the methods used to troubleshoot and repair. This book will help you with all of
this by explaining computer terminology in easy-to-understand terms and providing analogies that
can be used when dealing with customers.
Before delving into computer topics, you should remember that a class can’t fully prepare you
for every aspect of a job. You must learn things on your own and constantly strive to update your
skills so you do not become obsolete. The IT field changes rapidly. Figure 1.4 illustrates this
concept.
1
CHAPTER
“What are the exams like?” you might ask. The exams include multiple-choice and perfor-
mance-based questions. Performance-based questions might be a drag-and-drop scenario or ask
you to do something specific on a particular device or within a particular operating system environ-
ment. Each exam is 90 minutes long and contains a maximum of 90 questions. The testing system
allows you to bookmark questions that you might want to return to at the end if you have time.
Successful candidates will have the knowledge required to do the following:
> Assemble components based on customer requirements.
> Install, configure, and maintain devices including Internet of Things (IoT) devices, personal
computers (PCs), and software for end users.
> Understand the basics of networking and security/forensics.
> Properly and safely diagnose, resolve, and document common hardware and software issues.
> Apply troubleshooting skills.
> Provide appropriate customer support.
> Understand the basics of virtualization, desktop imaging, and deployment.
More information can be found on the CompTIA website (www.comptia.org).
At the beginning of each chapter, you will see a list of the CompTIA A+ exam objectives that are
covered in that chapter. At the end of each chapter, I’ve provided some A+ certification exam tips—
tips to definitely pay attention to if you plan on taking the A+ exams. By the end of this course, you
will have learned all the topics covered on the certification exams; however, before you actually take
the exams, I recommend that you dedicate some time to review the chapters in this book thoroughly,
study the objectives, and take some practice exams. Pearson IT Certification, the publisher of this
book, develops many different certification exam prep resources that suit various study styles. See
the back of this book for more information or go to http://pearsonitcertification.com/aplus to browse
the options.
information. Just because you may not be a good typist does not mean that you will not be good
in an IT-related field.
1
CHAPTER
Searching for Information on the Internet
IT people need to use all available resources, including online resources. As noted, you need to be
capable of searching for information online. Figure 1.6 illustrates various online resources that IT
people search all the time.
Capturing Files
Sometimes, part of technical documentation is being able to capture what is on the screen.
Windows versions come with a great tool for doing just that. The Snipping Tool makes document-
ing problems easy. It is also easy to copy what you capture into other applications. No matter what
IT job you may have when you enter the workforce, documentation is a part of all IT jobs.
Types of Computers
1
The simplest place to start to learn about computer technical support is with the devices them-
CHAPTER
selves. Computer devices come in many shapes and sizes. The PC, or personal computer, comes in
desktop, tower, and all-in-one models, as well as mobile models such as laptops, smartphones, and
tablets. Figure 1.8 shows some of the computing devices technical staff are expected to support.
Tablet Phone
All-in-one Computer
Laptop
Tower Computer
Operating system
Kernel
Video BIOS
PC. The power supply distributes this DC voltage using power cables that connect to the various
internal computer parts. A fan located inside the power supply keeps the computer cool to prevent
1
CHAPTER
damage to the components.
Power supply
CD/DVD drive
Motherboard
Case
Keyboard
The motherboard is the main circuit board inside a PC and contains the most electronics. It
is normally located on the bottom of a desktop or laptop computer and mounted on the side of a
1
CHAPTER
tower computer. Other names for the motherboard include mainboard, planar, or system board.
The motherboard is the largest electronic circuit board in the computer. External devices connect
directly to the back of the motherboard or ports on the front of the computer. Figure 1.16 shows a
motherboard when it is not installed inside a computer as well as memory and an adapter, which
are covered next.
Adapter
Memory modules
TECH TIP
1
How to identify an adapter’s function
CHAPTER
Tracing the cable attached to an adapter or looking at the device connected to the adapter can
help identify an adapter’s function.
See Figure 1.19 for an illustration of a motherboard, expansion slots, memory, and an adapter
in an expansion slot.
Expansion slots
Adapter
Memory
Motherboard
1
Mouse cleaning kits are available in computer stores, but normal household supplies also work.
CHAPTER
Use the following procedures to clean an optical mouse:
> Wipe the bottom with a damp, lint-free cloth.
> Use compressed air to clean the optical sensors.
Keyboards also need periodic cleaning. Figure 1.22 shows keyboard-cleaning techniques.
Wipes Brush
1. Turn keyboard upside down 2. Clean the keyboard (several options shown)
and gently shake out debris
Keyboard/Mouse Troubleshooting
One of the easiest ways to determine whether a keyboard is working is to press the ç or ˆ key
and watch to see if the keyboard light illuminates. Sometimes an application setting may be caus-
ing what appears to be a keyboard problem. Use another application to see if the keyboard is the
problem. Keyboards can have LED lights that indicate particular functions. Table 1.3 lists the most
common ones. Note that different vendors label the lights in various ways.
ˆ Number lock (NUM Toggles the 10-key pad between digits 0 through 9 and
LOCK) various functions, such as HOME, PG UP, PG DOWN,
END, and various arrow keys.
ç Capital letters lock Toggles between all uppercase and lowercase letters.
(CAPS LOCK)
ß Scroll lock A rarely used key used to prevent scrolling and use of the
arrow keys to progress through information displayed.
TECH TIP
One key doesn’t work
If a particular key is not working properly, remove the key cap. A small, flat-tipped screwdriver
can assist with this. After removing the key cap, use compressed air around the sticky or malfunc-
tioning key.
18 Complete A+ Guide to IT Hardware and Software
If coffee or another liquid spills into a PC keyboard, all is not lost. It is sometimes possible
to clean a PC keyboard by disconnecting it, removing any batteries it might have, and soaking it
in a bathtub or a flat pan of water. Distilled or boiled water cooled to room temperature works
best. Afterward, the keyboard can be disassembled and/or scrubbed with lint-free swabs or cloths.
However, PC keyboards and mice are normally considered throw-away technology. It is cheaper
to get a new one rather than spend a lot of time trying to repair it.
Common Peripherals
Many devices connect to a computer to provide input, such as a mouse or keyboard, or output,
such as a display. Some devices can be both input and output devices, such as smart TVs, set-top
boxes (the boxes used to connect a TV to a cable or satellite system), Musical Instrument Digital
Interface- (MIDI-) enabled devices (which are electronic musical devices), touchscreens, or print-
ers. In the case of a printer, data is sent from a computer to the printer, and the printer can send
data (information), such as an out-of-ink message, back to the computer. Figure 1.23 shows some
common input and output devices.
Mouse, Keyboard, Digital Pen, Digital Tablet, Printer, Speakers, Display Devices
Finger, Signature, Pad, TouchScreen, Track Pad,
TouchPad, Trackball, Track Stick, Stylus, Barcode
Reader, Digitizer, Game Pad/Console, Joystick,
Scanner, Camera
Peripheral Description
1
Touchpad A space on a laptop below the keyboard that is used to control the cursor.
CHAPTER
Signature A digital input device that allows users to digitally sign their names, such as
pad when credit cards are used at a checkout register.
Game An input device used with games or entertainment systems.
controller
Camera/ An input device used to capture video images or motion. More information can
webcam be found in Chapter 8, “Multimedia Devices.”
Microphone An input device used to capture sound. More information can be found in
Chapter 8.
Headset An input/output device that commonly has a microphone and headphones, as
shown in Figure 1.26.
Projector An output device used to show an image on a screen or wall. The amount of
brightness the projector outputs is measured in lumens. Common projector
specifications for a business or educational environment is 2500 to 6000
lumens. Use the higher lumens projector for rooms that have windows or lights
that cannot be dimmed.
External An external hard drive, flash drive, or memory used to store data. These devices
storage are covered in detail in Chapters 6, “Memory,” and 7, “Storage Devices.”
drive
KVM A switch that enables connectivity of devices so they can be shared between
computers (see Figure 1.27). For example, one keyboard, one mouse, and one
display and two computers could connect to a keyboard, video, and mouse
(KVM) switch.
Magnetic A device that accepts cards that are inserted into the device in order to read
reader/chip data from the card or the chip on the card.
reader
NFC device/ A device that accepts cards that are tapped against the display (tap-to-pay) or
tap-to-pay held in close proximity (near field communication [NFC]) in order to read data
device from a smartphone or card.
Smart card A device that can read data from a card that has a magnetic strip such as a
reader credit card, special business card, ID card, or room access card.
Barcode QR code
1
CHAPTER
FIGURE 1.27 KVM switch
1s and 0s
Computers are digital devices. That means they understand 1s and 0s. One 1 or one 0 is known as
a bit. In actuality, a 1 is simply a voltage level. So, when we type characters into a word process-
ing application, the keyboard translates those characters into voltage levels. Figure 1.28 shows
this concept. Notice that each letter is represented by a combination of eight 1s and 0s. Each 1 is
a voltage level sent to the motherboard (and components on it). Each 0 is simply the absence of a
voltage level.
What we
see
What a
computer
sees
1
CHAPTER
FIGURE 1.30 A kilobyte
Frequencies are also important measurements in computers because people want to know how
fast their computers, processors, memory, and other parts are operating. Frequencies are shown
in similar measurements, but instead of bits (b) or bytes (B), speeds are shown in hertz (Hz). A
hertz is a measurement of cycles per second. Something that operates at approximately 1 million
cycles per second is said to operate at 1 megahertz (1 MHz). For 1 billion cycles per second, the
measurement is known as 1 gigahertz, or 1 GHz. Transfer speeds are commonly shown in bits per
second, such as gigabits per second, or Gb/s, or bytes per second, such as in megabytes per second,
CHAPTER 1: Introduction to the World of IT 25
or MB/s. Notice the capital letter B to indicate bytes as compared to the lowercase b to indicate
bits. These measurements are used in a lot of IT-related hardware and software.
1
CHAPTER
Safety Notes
Safety is covered in each chapter, especially in Chapter 5, but no book on computer repair can
begin without stating that both the technician and the computer can be harmed by poor safety
habits. Before beginning any PC service, remove jewelry. To protect yourself and the computer,
make sure to power off the computer and remove the power cord when disassembling, installing,
or removing hardware or when doing preventive maintenance (cleaning).
TECH TIP
Some things should be left alone
Never take apart an older CRT monitor or power supply unless you have been specifically trained
on these components.
Technicians can also be harmed when doing menial tasks such as lifting a computer or heavy
laser printer. Lifting is a common requirement listed in IT job advertisements or explained during
interviews. Technical jobs frequently specify a maximum lifting requirement of 40 to 50 pounds.
Use proper safety precautions, such as those shown in Figure 1.34. The type of equipment you
need and things you can do to prevent harm to the computer are covered more explicitly in Chapter
5, on power and disassembly.
Chapter Summary
> A technician needs to be able to identify important computer parts installed in a computer and
as standalone parts: case, keyboard, mouse, motherboard, monitor, power supply, hard drive,
optical drive, adapter, and memory.
> A technician needs to know the purposes of common peripherals used in industry: printer,
ADF/flatbed scanner, barcode/QR scanner, VR headset, touchpad, signature pad, game con-
troller, camera/webcam, microphone, speakers, headset, projector, external storage device,
KVM, magnetic/reader, chip reader, NFC/tap-to-pay device, and smart card reader.
> Mice, keyboards, and touchscreens are important input devices. Mice and keyboards can be
wired or wireless.
> Safety is important when working on a computer. Power it down and remove the power cord
before working inside it.
> Use proper lifting techniques when servicing equipment.
A+
CERTIFICATION ✓ Get a good night’s rest the night before the exam.
EXAM TIPS ✓ Ensure that you are knowledgeable about and proficient with all of the terms and technologies
listed in the official CompTIA A+ exam objectives. Some students study for a particular exam
by going through the objectives one by one and reviewing the material as they go through.
✓ Ensure that you can identify the basic parts of a computer and explain the purpose of
each one. Ensure that you know the following parts: hard drive, DVD drive, power supply,
motherboard, and RAM.
✓ Know the purpose of common peripherals used in the industry: printer, ADF/flatbed scanner,
barcode/QR scanner, monitor, VR headset, optical drive, mouse, keyboard, touchpad,
signature pad, game controller, camera/webcam, microphone, speakers, headset, projector,
external storage device, KVM, magnetic/reader, chip reader, NFC/tap-to-pay device, and
smart card reader.
✓ Know the following safety procedures: disconnect power, remove jewelry, lifting techniques,
and weight limitations.
✓ Review the “Soft Skills” section at the end of the chapter. Make sure you know what open-
ended questions are.
Key Terms
adapter 14 gigabyte 22 operating system 9
ADF 18 hard drive 11 optical drive 11
barcode scanner 18 hardware 9 PC 9
BIOS 10 headset 19 power supply 10
bit 21 keyboard 16 printer 18
brightness 19 kilobyte 22 projector 19
byte 21 KVM switch 19 QR scanner 18
camera 19 lumens 19 RAM 13
chip reader 19 magnetic reader 19 signature pad 19
device driver 9 megabyte 22 smart card reader 19
DVD drive 11 memory 13 software 9
expansion slot 14 microphone 19 tap-to-pay device 19
external storage device 19 monitor 10 terabyte 22
firmware 10 motherboard 13 touchpad 19
flatbed scanner 18 mouse 16 VR headset 18
game controller 19 NFC device 19 webcam 19
CHAPTER 1: Introduction to the World of IT 27
Review Questions
1
CHAPTER
1. Match each part to the appropriate description.
____ motherboard a. Converts AC to DC
____ RAM b. Holds the most data
____ DVD drive c. Has the most electronics
____ hard drive d. Fits in an expansion slot
____ adapter e. Contents disappear when power is off
____ power supply f. Holds a disc
14. List one procedure you would do to help an erratic optical mouse.
_________________________________________________________________________________
_________________________________________________________________________________
15. Match the capacity to the description.
____ bit a. 8 bits
____ kilobyte b. a 1 or a 0
____ megabyte c. approximately 1,000 bytes
____ byte d. approximately 1 million bytes
____ gigabyte e. approximately 1 trillion bytes
____ terabyte f. approximately 1 billion bytes
Exercises
1
CHAPTER
Exercise 1.1 Identifying Tower Computer Parts
Objective: To identify various computer parts correctly
Procedure: Identify each computer part in Figure 1.35.
1. __________________
2. _____________
9. __________ 3. _____________
8. __________
7. __________
1 2 3 4
5 6 7 8
9 10
Activities
Questions:
1. What is the name of the computer for which you found technical information?
1
CHAPTER
_________________________________________________________________________________
2. How much RAM comes with the computer?
_________________________________________________________________________________
3. Which URL did you use to find this information?
_________________________________________________________________________________
4. Which search term(s) would you use for the following scenario? An HP Windows 10 computer has
a Samsung ML-2160 laser printer attached. This printer supports both wired and wireless printing.
The computer that is wired to the printer can print just fine, but no wireless devices in the house can
access or even see the printer.
_________________________________________________________________________________
_________________________________________________________________________________
5. Which search term(s) would you use in a search engine to help a friend who has accidentally deleted
a file on a Windows 7 computer?
_________________________________________________________________________________
6. Which search terms would you use to find a video that shows you how to add an application to a
Windows 8.1 desktop?
_________________________________________________________________________________
INDEX
lock screen, 435 maintenance, 676
mutual authentication for multiple services, 457 omnidirectional antennas, 661
notification areas, 432 passwords, 1022
Recovery Mode, 461, 505 PoE injectors, 657
security, 500-503 PoE switches, 657
smart cameras, 421-423 repeaters, 656
sound settings, 490 security, 676, 1022-1024
synchronization, 457 SSIDs, 655
system bars, 432 storage, 676
antennas wireless AP, 675-677, 1017, 1023-1024
attenuation, 661 APFS (Apple File System), macOS support, 934
directional antennas, 660 API (Application Programming Interfaces), 329
gain, 662 API Mode (Zigbee devices), 679
1156 APIPA (Automatic Private IP Addressing), end-user device configuration
APIPA (Automatic Private IP Addressing), end-user device authenticator apps, 500, 966
configuration, 667 automatically loading programs from startup,
APK (Application Packages), 442 stopping, 883
App History tab (Task Manager), 893 buying, OS and, 724
apparent power, 184 cell tower analyzers, 465
appearance/grooming (technicians, communication skills), closing, 442
516-517, 1067 cloud-based apps, 594
Apple computers, motherboards, 104 compatibility, troubleshooting, 731
Apple Configurator free app, 464 critical apps, backups, 998
Apple ID (macOS), 923 deleting, 442
Apple iOS, 423, 729 email apps, cloud computing, 594
Apple Digital AV adapters, 444 file types, defined, 731
App Store, 442 fitness apps, 455
apps, 439-442 folders, creating, 442
backups, 461-462 force stopping, 442
Bluetooth, 446 gaming apps, 439
factory resets, 501 geotracking apps, 439-441
hard resets, 505 Google Play, 442
iCloud backups, 461 GPS apps, 439
interacting with (gestures), 434-435 high resource utilization, 505
iTunes backups, 462 installing, 442, 506
Lightning ports, 443 iTunes, 442
location tracking, 501 launching, 858
lock screen, 435 licensing, 973
notification areas, 432 light switches (smart), controlling, 681
resetting devices, 461 live tiles (Windows desktop), 734
restoring devices, 461 loading, troubleshooting, 507
security, 500-503 locator apps, 439-441
smart cameras, 421-423 log errors, 506
sound settings, 490 managing, 878
synchronization, 458-459 Microsoft Store, 442
system bar, 432 moving app icons, 442
Apple Macintosh OS. See macOS organizing, 442
Application layer piracy, 973, 1026
OSI model, 644 process IDs, listing, 801
TCP/IP model, 645, 697 QR codes, 442
application logs repairing, 859
Event Viewer, 864-865 rogue antivirus apps, 1003
reviewing (troubleshooting), 543 SDK, 442
Apply button (Windows dialog boxes), 744 side loading, 442
App Store (macOS), 929 side-by-side apps (Windows), 832
Apple IDs, 923 synchronizing, 594, 859
system updates, 924 system requirements, 858
apps, 439 troubleshooting, 505-507, 859, 864, 893
Amazon Marketplace, 442 uninstalling, 442
antivirus apps (rogue), 1003 virtual apps, cloud computing, 594
APK, 442 WiFi analyzers, 464
Apple Configurator free app, 464 Windows 7 taskbar, pinning apps to, 739
app scanners, 464 Windows apps, disabling, 891
App Store, 442
automatically loading programs from startup, stopping 1157
INDEX
Apple iOS settings, 490 SSO, network security, 980
audio beeps (POST codes), 546-547 TACACS, 966
computer design, 540 TPM, 963, 971
digitized sound, 327 two-factor authentication, physical security, 966
headphones, 334 WEP authentication, 946
headsets, 19, 330 Authenticator apps, mobile devices, 500
laptops, troubleshooting, 490 authorization, 963, 981
microphones, 19, 329, 540 Auto-Detect feature (BIOS), 271
laptop displays, 493, 498 auto-switching power supplies, 184
unauthorized activation, 502 automatic disk checking, 785
mobile devices, troubleshooting, 513 Automatic Update, 846-848
motherboard speakers, 324 automatically loading programs from startup, stopping,
muting, 329 883
1158 automating
automating macOS
installations, 842-843 disk backup requirements, 925
tasks via scripts, 803 Time Machine, 924-925
automobiles, mobile device synchronization, 456 mobile devices
AutoPlay function, disabling, 1001 Android devices, 459-460
AutoRun function, disabling, 1001 Apple iOS devices, 461-462
auxiliary fans remote backups, 455
installing, 189-190 Windows devices, 462
power consumption, 195 OneDrive, 462
Available Physical Memory field (Task Manager Per- photos, Android devices, 460
formance tab), 231-232 remote backups, mobile devices, 455
restore points, 849
B testing, 998
back side buses, 76 Ubuntu, 943
Back to My Mac (iCloud), 923 video, Android devices, 460
backbone (networks), 694 wbadmin command, 802
backdoor attacks, network security, 979 Windows devices
backlights, laptop displays, 492 backing up before Windows OS installations, 840
backout plans (change management cycle), 1065 OneDrive, 462
backup operators, 981 Windows registry, 759, 848
backups, 542-543, 760-761 xcopy command, 802
Android Backup Service, 460 backward compatibility, 731
Android devices, 459-460 badges (security), 962
Apple iOS devices bags (antistatic), 164, 1049
iCloud, 461 bandwidth
iTunes, 462 buses, comparisons, 97
Backup and Restore utility (Windows 7), 849 cable modems, 584
batteries, 1054-1059 DSL modems, 585
cloud storage, 998-999 networks, 694
critical applications, 998 barcode scanners, 18, 335-336, 346, 1093
data backups, 998-999 barcodes, inventory management, 1063
Android devices, 460 basebands, 437, 694
centralized data storage, 1000 baseline reports, 901
offsite data storage, 1000 basic disk partitions, 838
differential, 999 basic disks (Windows Disk Management), 280
directories, 802 basic input/output system. See BIOS
File History, 849 basic storage (Windows Disk Management), 280
file-level backups, 999 BAT (batch) file extension, 747, 804
files, 460, 802 batch files, 804
folders, Android devices, 460 batteries. See also power supplies, batteries
full, 999 backups, 1054-1059
Google Drive, 460 cleaning, 178
hard drives, 998-999 CMOS, 123
iCloud, 461 digital cameras, 342
image-level backups, 999 disposal of/recycling, 1046-1048
incremental backups, 999 fuel cells, 473
iTunes, 462 laptops, 471-474
Linux, 943 life of, 511
local storage, 998 Li-ion batteries, 473, 504, 1047-1048
lithium regulations, 504
blue-violet laser technology, Blu-ray drives 1159
INDEX
drive encryption, 121 Bluetooth setting (macOS, System Preferences), 928
error messages (POST codes), 547-548 cell phone headsets, 652
exit options, 122 input devices, 60
flash, 118 installing, 446
flashing the BIOS, 124-125 laptop cards, replacing, 487
functions, 116 local printer connections, 388
hard drive configuration, 271 mobile devices, troubleshooting, 514-515
hardware configuration, 132 networks, 651-652
Hardware Monitor, 121 printers, networking, 397-398
iGPU, 121 USB-to-Bluetooth dongles, 446
interface configuration, 121 blue-violet laser technology, Blu-ray drives, 314, 317
intrusion detection/notification, 121
LoJack, 121
1160 Blu-ray Discs (BD)
INDEX
fiber networks, 583 PATA IDE, 265
hardware requirements, 584 plenum cables, 56
NIC connectivity, 581 power cables, removing, 168
ports, 582 projectors, 340
speeds, 584 PVC cables, 56
troubleshooting, 691 reassembling, 176
upstream transmissions, 584 ribbon cables, 170
USB connectivity, 582 SAS cables, 264
cable strippers, 631, 638 SATA cables, 260, 263, 267
cable testers, 633, 638 SCSI cables, 264
cable TV and cable modems, 581 serial cables, 53
STP cables, 55
straight-through, 629
1162 cables
INDEX
charms (Windows desktop), 734-735, 832 clearing commands, 786
charts/flowcharts, troubleshooting, 555-558 CLI (Command Line Interfaces), 724-725
checkboxes (Windows), 744 Linux
checking disks, 784-785 copying data, 948-950
checkpoints (virtualization), 590 finding files, 951
children missing GRUB/LILO, 952
exploitation, incident reports, 1026 network configuration, 945-946
parental controls, 1013 obtaining software, 947-948
chip readers, 19 shutting down systems, 944-945
chipsets viewing processes, 947
defined, 100 client-side DHCP (Dynamic Host Configuration Protocol),
manufacturers, 100 667
motherboard design, 536 client-side DNS (Domain Name Service), 669
1164 clients (thick/thin)
INDEX
netdom command, 795 diskpart command, 788
netstat command, 795-796 dism command, 788
notepad command, 796 dxdiag command, 788
nslookup command, 796 enable command, 789
operation requires elevation messages, 803 exit command, 789, 1106
overview of, 771 expand command, 789, 1106
permissions and, 996 explorer command, 789
ping command, 796-797 format command, 790
rd command, 777, 797 gpresult command, 790, 1110
regedit command, 797 gpupdate command, 790-791
regsvr32 command, 797 help command, 791
ren command, 798 help information, displaying, 782
robocopy command, 778, 798 hop command, 726
1166 commands
INDEX
BIOS, 119-122, 271, 1144 storage devices, 265-267
BIOS/UEFI, 271 system configuration information, viewing, 800
booting options, 120 System Configuration utility (msconfig command),
cellular configurations, WWAN, 677 889
CMOS memory, 123-126 Safe Boot, 890-891
digitizers, 348 Services tab, 891
Disable Execute Bit, 121 Startup tab, 891
DNS, 1005-1007 Tools tab, 892
drive encryption, 121 system resources, defined, 126
email, mobile devices, 453-455 TPM, 121, 1144
end-user device configuration Ubuntu networks, 945-946
addressing, 665-669 UEFI, 119-122, 271
overview of, 664 USB options, 120
1168 configuring
INDEX
utilities, 754 directories, 778-779, 802
Windows 8 utilities, 754 files, 752-754, 786, 798, 802
control panel assembly (laser printers), 370 from directories, 778-779
controllers (game), 19, 347-348 to CD/DVD, 317
convergence, 580 folders, 752-754
convert command, 837 Core i3 Intel processors, 84
converters Core i5 Intel processors, 83
power converters, 186-187 Core i7 Intel processors, 83
USB A-to-USB B converters, 47 Core i7/i5 vPro processors, 84
USB-to-Ethernet converters, 47 Core i9 processors, 83
converting partitions, 274 Core m3 processors, 84
Core X processors, 83
1170 corporate OS (Operating Systems)
corporate OS (Operating Systems), 731 CSMA/CD (Carrier Sense Multiple Access/Collision De-
BitLocker encryption, 732 tection), Ethernet networks, 640
BranchCache, 733 cultural sensitivity, 1070
domains, 732 current (electricity), 182-184
EFS, 733 current (technician skills), staying, 762
Media Center, 732 customer service, 1066
security conflict management, 1073-1075
BitLocker encryption, 732 irate customers, handling, 559-560
EFS, 733 trust, building, 1028
workgroups, 732 Custom mode (virtual NIC), 673
corporate Windows deployments customizing
activation clocks, 842 update notifications, 848
licensing, 843 Windows desktop, 735
tools, 842 cutters (diagonal), 166
Cortana virtual assistant (Windows), 742, 832 cylinders (hard drives), 256
counters, 903
cp command (macOS), 934-936 D
cps (Characters Per Second) ratings, 361 D-Link access point, 1150
CPU (Central Processing Units). See also processors D-shell connectors, 34
CPU THRM Throttling power setting (ACPI), 193 DaaS (Desktop as a Service), 594
CPU Warning Temperatures power setting (ACPI), Dash (Ubuntu), 940-941
193 data
heating, 103 backups, 998-1000
sockets, 85-86 Android devices, 460
speeds, 77 centralized data storage, 1000
throttling, 77, 90, 193 offsite data storage, 1000
crashes DEP, 1002-1003
apps, troubleshooting, 893 leaks, mobile devices, 501-502
proprietary crash screens, 297, 548 migration, 835
creased paper (printer issues), 404 regulated data, end-user security, 974-975
Credential Manager, 866-867 security, DEP, 1002-1003
adding credential to Windows, 868 storage, AD, 986
editing credentials, 870 transfers, 664, 835
removing credentials from Windows, 869 transmission limits, mobile devices, 503
credentials data bits, 577
certificate-based credentials, 867 Data Link layer (OSI model), 644
Credential Manager, 866-869 data packets, verifying paths, 801
deleting, 869 Data Sources (ODBC), 878-879
generic credentials, 867 data types (Windows scripting, variables), 810
stored credentials, security, 867 Date & Time setting (macOS, System Preferences), 929
user accounts, 866 date/time settings, Windows, 841
web credentials, 867 DB-9 ports. See serial devices, serial ports
credit card readers, 428, 431 DBR (DOS Boot Record), 280
crimpers, 631-633, 638, 1099 DC (Direct Current), 180, 189
critical applications, backups, 998 DC jacks, replacing, 489
critical recovery documents, 1000 dd command (Linux), 944, 948-950
crossover cables, 629-631 DDoS (Distributed Denial of Service) attacks, 979
CRT (Cathode Ray Tube) monitors, 36, 1046 DDR (Double Data Rate), 215
Crucial website, 224 DDR2 (Double Data Rate 2), 215
desktops 1171
INDEX
deploying tiles, 734-736
cloud services, 595-596 wallpaper schemes, 736
corporate Windows deployments, 842-843 Windows 7
image deployments, Windows, 833 notification area, 740
design pinning apps to taskbar, 739
computer design shutting down, 739
audio subsystems, 540 Start button, 738-739
audio/video editing workstations, 530, 538 taskbar, 737
Bloom’s Taxonomy, 528 Windows 8
cables, 537-538 search function, 740
CAD design workstations, 529, 538 Start screen, 740-741
CAM design workstations, 529, 538 tiles, 741
cases, 538
1172 desktops
INDEX
AutoRun function, 1001 mounting, 270, 875, 933
drivers, 787 RAW volumes, 281
guest accounts, 982 shrink partitions, 875
interfering software, Windows OS installations, 841 simple volumes, 281
services, 787, 895 spanned volume, 281
unused ports, 962, 969 splitting partitions, 875
Windows applications, 891 status states, 297-298
disappearing files, troubleshooting, 1004 storage, 874-876
disassembly striped volumes, 281
adapters, 167, 173 system volumes, 281
all-in-one computers, 176 Windows Disk Management, 273, 280-281, 838
cables, 168-172 disk mirroring, 284
case removal, 168 disk striping, 283-284
1174 Disk Utility (macOS)
INDEX
arrays, 282 laser printers, 370
buffers, storage device design considerations, 540 dust/air filter masks (safety equipment), 1044
drive letters, 745, 875 dust/debris, UPS/SPS battery backups, 1057
drive not recognized errors, 293 DVD (Digital Video Disc), 314-316
DVD drives, 11 burning, 317
encryption, configuring, 121 CDs & DVDs setting (macOS, System Preferences),
external storage drives, 19 928
hard drives, 11, 262, 284-285, 294-295, 540 cleaning, 323, 327
ODD, 540 decoders, 322
optical drives, 11 handling, 322
PATA, 265-266 Linux bootups, 939
partitions (volumes), 837-838 region codes, 317-318
1176 DVD drives
INDEX
default gateways, 668-669 EoP (Ethernet over Power), 641
DHCP, 666-667 EPEAT rating system, computer design, 535
DNS, 669 EPS (Encapsulated Postscript File) extension, 747
statically configuring IP addresses, 666 equality operators (==), 814
overview of, 664 erasable-bond paper and printers, 375
end-user education (security) erase lamps (laser printers), 368-370
AUP, 973 erasing hard drives, 933, 1001
domains, 980 error checking tools, 290, 877
licensing software/apps, 973 error codes (printers), 402
regulated data, 974-975 error messages
security threats POST error messages, 123, 547-548
access attacks, 979 reviewing (troubleshooting), 543
backdoor attacks, 979 troubleshooting, 543-548
1178 eSATA (External SATA)
INDEX
BIOS setting, 120 CDFS, 273
installing, 91-92, 189-190 defined, 273
power consumption, 195 exFAT, 273
power supplies, 189 ext3, 274
processors, 92 ext4, 274
troubleshooting, 197-199 FAT, 273
Fast Ethernet, 695 FAT16, 275
FAT (File Allocation Tables), 279 FAT32, 273-275
FAT file systems, 273 HFS, 274
FAT16 file systems, 838 HFS+, 934
FAT16 partitions, 275 Linux, 941-942
FAT32 file systems, 273, 839 NFS, 274
NTFS, 273-278
1180 file systems
INDEX
flashing the BIOS/UEFI, 124-125 hard drives, 253
flashlights, 166 motherboards, 101-102, 186, 536-537
flatbed scanners, 18, 335-337 power supplies, 185-186
flick gestures, 435 formatting
flickering displays, troubleshooting, 145, 510 disks, 790
floating-point numbers (Windows scripting, variables), 810 files, 355
flow control, serial ports, 577 full formats, 279
flowcharts (troubleshooting), 555-558 hard drives, 272, 279-280, 790, 838, 1001
FM2 sockets, 86 passwords, 972
FM2+ sockets, 86 quick formats, 279
folders text files, 8
app organization, 442 forward compatibility, 731
attributes, 752 forwarded events logs (Event Viewer), 865
1182 forwarding ports
INDEX
GSM (Global System Mobile), 695 head crashes, 255
guards (security), 962 hibernation mode, 280
Guest groups, 981 high-level formatting, 272, 279-280
guest users, 981-982 HPA, 278
GUI (Graphical User Interfaces), 724-726 hybrid drives, 483
launchers and, 441 IDE, 262-264
macOS, 919-922 imaging, 842
Unity (Ubuntu), 940-941 installing, 293-298
gyroscopes, gaming apps, 439 interfaces, 258-264
internal fixed disks, 880
internal hard drives
laptops, 484
partitions, 880
1184 hard drives
IDE (Integrated Drive Electronics), 259-261 incident reports, 1025-1026, 1040-1041, 1062-1063
cables, 260 incineration (document security), proof of, 965
configuring, 121 incorrect color patterns, troubleshooting, 144
connectors, 171 incremental backups, 999
eSATA, 264 indexing files/folders, 751
PATA, 261-262, 265-266 indicator lights
SATA, 261-263 POST, 116
identifying problems (logical troubleshooting), 543 printers, 402
IDS (Intrusion Detection Systems), 1016 industrial computers, 534
IEEE 802.11 wireless standards, 447-448 INF (Information) file extension, 747
ifconfig command, 686, 945-946 infconfig command (Linux), 944
iGPU (integrated GPU), 82, 121 information technology (IT)
illustration/drawing pads. See digitizers certifications, 5-6
image deployments, Windows, 833 skills, 6-8
image management software, 674 Infrared (IR) wireless input devices, 60
images infrastructure mode
distorted images, troubleshooting, 144 wireless networks, 654
print to image option (virtual printing), 378 wireless printers, 398
system images, 760-761 inherited permissions, 995
imaging INI (Initialization) file extension, 747
backups, 999 Initialize Disk option (disk management), 298
corporate Windows deployments, 842 initializing
dism command, 788 disk management, 875
MDT, 842 variables (Windows scripting), 810
re-arming activation clocks, 842-843 ink cartridges, 363-365, 387
reimaging hard drives, 842 CIS, 379
SIM, 842 inkjet printers, 366
Sysprep, 842 laser printers, 409
WDS, 842 recycling, 379
imaging drums (laser printers), 370 refilling, 379-380
IMAP (Internet Message Access Protocol), 453, 697 replacing, 384
IMEI (International Mobile Equipment Identity), 435-436 toner, 370-371, 380
impact printers troubleshooting, 409
advantages, 363 Ink setting (macOS, System Preferences), 928
bidirectional printing, 363 inkjet printers, 376
defined, 361 alternatives, 366
feeders/trays, 375 belts, 365
maintenance, 381 carriages, 365
overheating, 363 color printing, 365-366
paper, 363 defined, 361
print heads, 361-363 disadvantages, 366
printheads, 361 duplexing assemblies, 365
print ribbons, 361 ink cartridges, 363-365
print wires, 361 maintenance, 381-383
re-inking, 380 modes, 365
troubleshooting, 407-408 optimized DPI, 366
impersonation (social engineering attacks), 978 paper trays/feeders, 365
IMSI (International Mobile Subscriber Identity), 436 power supplies, 365
In Use field (Task Manager Performance tab), 232 print heads, 363-364, 382
in-place upgrades, Windows, 833-846 refilling cartridges, 379
installing 1187
INDEX
displays, 855 USB ports (extra), 48
troubleshooting installations, 855-857 video adapters, 143
digital assistants, 683 voice-enabled smart speakers, 683
digitizers, 348 Windows, 832. See also preinstalling, Windows
door locks (smart), 683 backups before Windows OS installations, 840
drivers, 132-133 clean installations, 833-834
eSATA device drivers, 853
brackets, 138 disabling interfering software, 841
cards, 138 image deployments, 833
drives, 269-270 overview of, 841-842
fans, 91-92, 189-190 phases of, 841
fingerprint readers, 346-347 planning drive space, 837
game controllers, 347 refresh option, 833
1188 installing
INDEX
multiple-device port assignments, 127 PS/2 ports, 58
ISDN (Integrated Services Digital Network), 579, 706 special function keys, 480-481
isotropic antennas, 661 sticking keys, 508
ISP (Internet Service Providers), 586 troubleshooting, 17-18, 507-508
IT documentation Keychain Access (macOS), 932
incident reports, 1062-1063 keyloggers, 976
inventory management documentation, 1063 keys
knowledge bases/articles, 1062 electronic key cards, 961
network topology diagrams, 1060 KMS, licensing, 843
policies, 1063-1064 keywords, scripting languages, 809
iTunes kids
Apple iOS device synchronization, 459 exploitation, incident reports, 1026
apps, 442 parental control, 1013
backups, 462
1190 kill command (macOS)
INDEX
Bluetooth, 487, 514-515 fuser cleaning pads/fuser wands, 385
DC jacks, 489 fusing rollers, 370, 386
displays, 494-499, 509-510 ghost images, troubleshooting, 409
GPS, 514 high voltage power supplies, 370
hard drives, 483-485 imaging drums, 370
headphones, 513 imaging process, 368-369
inverters, 499 ink cartridges, 384
keyboards, 478 main motors, 370
memory, 482 maintenance, 383-386
microphones, 498 memory upgrades, 380
motherboards, 476 noises, 369
networks, 513 overheating, 385
optical drives, 486 ozone gas, 385
1192 laser printers
INDEX
physical laptop locks, 499 Windows, 733
screen locks, 500, 972, 983 LoJack
screen savers/locks, 972 BIOS/UEFI security, 971
server locks, 963 configuring, 121
swipe locks, mobile devices, 500 long touch gestures, 435
USB locks, 963 loopback plugs, 550, 638
log entries, reviewing (troubleshooting), 543 loops (Windows scripting), 813, 817
logging events (auditing), 988 for loops, 819-820
logging servers, 693 while loops, 818-819
logical drives, 276-277 lost clusters, locating, 290
logical operators (Windows scripting), 817 lost mode, mobile devices, 500
logical partitions, 838 loud noises, troubleshooting, 197
low memory errors (printer issues), 404
1194 low RF signals, wireless networks
INDEX
time, 1072 DDR3, 215-218
throttling, 90 DDR3L, 215
updates, 997-998 DDR4, 215
users, 981-984. See also AD DDR4L, 215
UTM systems, 1016 DIMM, 213-218, 221-228
mantraps (physical security), 963-964 DIP chips, 213
manually deleting files, 1005 double-sided, 217
manuals, macOS, 938 DRAM, 212-215
MAPI (Messaging Application Programming Interface), dual-channel, 220-223
454 dual-voltage, 217, 482
mapping DVD-ROM discs, 315
from command prompts, 703 ECC, 217-218
hard drives, 688 features of, 216-217
1196 memory
FFBDIMM, 217 RAM, 13, 142, 212-213, 222, 234, 289, 424
flash memory, 235-236, 257-258, 424 adding to hard drives, 235
CF, 343 hibernation mode, 280
MMC, 343 Hyper-V client, 592
SSD, 483-485 OS limitations, 727
heat spreaders, 215 Virtual PC, 592
installing, 227-228, 234 refreshing, 213
buying memory, 224-226 registered, 217
overview of, 226 removing, 227-228
planning installations, 214-226 requirements, 213, 219
researching memory, 224-226 researching, 224-226
types of memory to install, 220-223 ROM, 212, 315
laptops, 481-482 safety, 227
limitations of, 219 sample advertisements, 224-225
managing, 234-235 SDRAM, 215
memory addresses, 127, 131 shared system, 142
memory card readers, 344 SIMM, 213
memory cards, 424 single-sided, 217
Memory Diagnostics tool (Windows), 234 smart card readers, 424, 487
memory optimal error message, 547 SODIMM, 213, 481-482
Memory size decrease error message, 547 software instructions, fetching, 213
Memory Sticks, 343 SPD, 217
Memory test fail message, 547 speed, 224-225
module types, 214-218 SRAM, 213, 228-229
monitoring Windows, 231-233 storage cards, 424
motherboards thermal sensors, 217
chip support, 215 triple-channel, 223
design, 536 troubleshooting, 228, 234-235, 901-902
maximums, 220 types of, 13-15, 220-223
multicore processor access, 80 unbuffered, 217
non-ECC, 217 upgrading, 218, 228, 235
non-parity, 217-218 video, 141-142
NVMe, 260 virtual memory, 229-230, 288-289, 901-902
OS requirements, 218-220 wear leveling, 257
pages, 229, 289 Windows Memory Diagnostics, 885
parity, 217 write amplification, 257
performance, 224-225, 228, 235 XMP, 217
physical packaging, 213 mentoring skills, 611
planning installations menu bar (macOS GUI), 920
buying memory, 224-226 meter rules (electricity), 181
determining how much memory to install, 218-223 metered services, cloud computing, 597
memory features, 216-217 MetroE (MetroEthernet), network connections, 706
memory module types, 214-218 Metro UI, 832
OS requirements, 218-220 mice
overview of, 226 cleaning, 17
researching memory, 224-226 KVM switches, 19
POST error codes, 228 optical mice, 16
printers, 380, 404 ports, 34-35
quadruple-channel, 223 PS/2 ports, 58
troubleshooting, 17-18
mobile devices 1197
INDEX
mmc command, 792 notification areas, 432
MMC (Microsoft Management Console), 861 optical drives, replacing, 486
opening, 798 OS, 423, 432-435, 439-441, 729
starting, 792 phablets, 421-422. See also smartphones; tablets
MMC (multimedia cards), 343 ports, 443
MMS (Multimedia Message Service), 451 power supplies, troubleshooting, 511-513
mobile connectivity. See also connectivity protective covers, 428-430
cellular, 588 screens
mobile hotspots, 587 calibration, 440
tethering, 588 protective covers, 428-430
WiMAX security
line-of-sight networks, 588 antimalware, 464, 499
WiBro, 589 antivirus software, 499
wireless broadband, 588
1198 mobile devices
INDEX
monitors, 10 eSATA ports, 51, 59
aspect ratios, 541 expansion slots, 14-15, 93-98, 469-470
black/blank screens, troubleshooting, 884 form factors, 101-102, 186, 536-537
cables, 37 green (environmental) concerns, 101
cleaning, 178 grounding problems, 162-165
computer design, 541-542 I/O shields, 174
conferencing features, 541 integrated ports, 57-58
contrast ratios, 541 ITX, 101
CRT monitors, disposal of/recycling, 1046 laptops, repairing, 476
disposal rules, 148 LED, 549
energy-efficiency, 196 locating, 13
external monitors, troubleshooting, 509 mATX, 101
laptops, 467 memory, 536
1200 motherboards
INDEX
Windows installations, 833 associated protocols/port numbers, 696-697
requirements, 625 components of, 645
resources, troubleshooting, 685 layers of, 645, 697
security message formatting, 645
access attacks, 979 thick clients, 673-675
AD, 732, 983-986 thin clients, 673-675
authentication, 981 topologies
authorization, 981 defined, 625
backdoor attacks, 979 diagrams, 1060
botnets, 979 Ethernet star topologies, 626-627
brute force attacks, 979 troubleshooting
DDoS attacks, 979 cable modems, 691
dictionary attacks, 979 connectivity, 684-685, 689-690
1204 networks
INDEX
DEP, 728, 1002-1003 Computer Management Console, 861-862
destroying hard drives, 1002 configuring, 850-851, 889-892
disabling AutoPlay/AutoRun functions, 1001 context menus, 745
EFS, 1001 Control Panel, 754-757, 850
full device encryption, 1000-1001 copy command, 786
OS vulnerabilities, 730 copying files/folders, 752-754
overwriting hard drives, 1001 corporate deployments, 842-843
patch management, 997-998 Credential Manager, 866-870
restores, 998-1000 data migration, 835
update management, 997-998 Data Sources (ODBC), 878-879
wiping hard drives, 1001 data transfers, 835
service packs, 758 default folders, 748
defrag command, 786
1208 OS (Operating Systems)
INDEX
Task Scheduler, 862
telnet command, 801 P
textboxes, 744
P2P (Peer-to-Peer), RDP, 1015
tiles, 734-736
PaaS (Platform as a Service), 594
tracert command, 801
packaging memory, 213
troubleshooting, 857, 864, 884-886, 895-904
packets (data), verifying paths, 801
troubleshooting audio devices, 854
PAE (Physical Address Extension), 230
troubleshooting device installing, 855-857
Paged Kernel Memory field (Task Manager Performance
troubleshooting installations, 843-845
tab), 231
type command, 802
Paged Pool field (Task Manager Performance tab), 233
UAC, 832
pages (memory), 229, 289
updates, 843, 846-848
paging files, 229
upgrades, 833-836, 841-846
1210 PAN (Personal Area Networks)
INDEX
projectors, 19 permissions
scanners, 18 administrative shares, 991
signature pads, 19 command prompt and, 996
smart card readers, 19 directory permissions, 969
tap-to-pay devices, 19 effective permissions, 995-996
touchpads, 19 file attributes, 996
types of, 9 file permissions, 989, 1004
VR headsets, 18 hidden shares, 991-992
PCI (Payment Card Information), 975 inherited permissions, 995
PCI (Peripheral Component Interconnect) libraries, 993
bus speeds, 76 local shares, 991
expansion slots, 94 NTFS permissions, 989, 994-996
PCI slots, 96-97 Public folders, 992
1212 permissions
INDEX
replicators, 468 POST cards, hardware diagnostics, 548
RJ-11, 51 POTS (Plain Old Telephone Service), network con-
RJ-45, 51 nections, 706
RS-232 ports. See serial devices, serial ports power cables, removing, 168
S/PDIF, 59 Power on by Ring, Resume by Ring, or Wakeup power
S-Video, 59 setting (ACPI), 193
SATA, enabling, 268 Power on Function power setting (ACPI), 193
security, 969 power ratings (speakers), 331
serial, 53, 59, 575-577 power supplies, 10, 184
speaker ports, 324 +1 V, 198
Thunderbolt ports, 49-50, 59 +5 V, 198
triggering, 677, 1011 AC/DC, 180
troubleshooting, 550 ACPI, 121, 191-193
1214 power supplies
INDEX
dye sublimation, 366 troubleshooting, 407
error codes, 402 print logs, troubleshooting, 407
faded print, 404 Print Management console, 879-880
failed print jobs, troubleshooting, 407 print servers, 398-399, 693
feeds/trays, 402 print spoolers, Windows environments, 392-393
firmware, 404 print to file option (virtual printing), 378
garbled characters, 403 print to image option (virtual printing), 378
hard drive caching, 401 print to PDF option (virtual printing), 378
impact printers, 361-363, 375, 380-381, 407-408 print to XPS option (virtual printing), 378
indicator lights, 402 print wires (impact printers), 361
ink cartridges, 379-380, 384, 387 Printers & Scanners setting (macOS, System Pref-
inkjet printers, 361-366, 376, 379-383, 408 erences), 928
installing, 386-389, 393, 403 queues, 390, 407
1216 printers
INDEX
Remote Assistance, 905 memory removal/installation, 482
Remote Desktop (mstsc command), 905 microphones, 498
Remote Settings link, 905 motherboards, 476
Windows installations, 833 optical drives, 486
remote servers, BranchCache, 733 processors, 477
remote wipes, 500 smart card readers, 487
removable drives, 285 sound, 490
removable media files, deleting, 737 touchpads, 479
removable/rotating screens (laptops), 493 touchscreens, 496
removing video cards, 491
adapters, 167, 173, 180 webcams, 498
cables, 168-172 WiFi cards, 487
cases, 168
1220 repairing
INDEX
environmental enclosures, 1057 files, 748
ESD, 162-165 scanner units (laser printers), 370
fire safety, 1041 scanners
goggles/glasses, 178, 1043 ADF, 18, 335
laser printers, 367 barcode scanners, 18, 335-336, 346
LCD, 492 biometric scanners, 967
lifting, 25 bit depth, 337
memory, 227 cleaning, 338
personal safety, 1044 defined, 335
power, 25, 183 file formats, 337
refilling ink cartridges, 380 film, 335
RFI, 165 fingerprint scanners, 967
static electricity, 271 flatbed scanners, 18, 335-337
1222 scanners
INDEX
file types, 804 sfc command, 799
format command, 790 shell scripts, 804
gpresult command, 790 shutdown command, 800
gpupdate command, 790-791 syntax, 770
help command, 791 systeminfo command, 800
input, 808 taskkill command, 800
interpreted programs, defined, 803 tasklist command, 801
ipconfig command, 791 tasks, automating, 803
languages, 804 telnet command, 801
compiled languages, 808 text files, 803-805
keywords, 809 tracert command, 801
syntax, 807 type command, 802
listsvc command, 789
1224 scripting (Windows)
INDEX
EFS, 733 UTM systems, 1016
email, 961, 969, 1007 whitelists, 1009
emergency procedures, 961 Windows Defender, 1004
encryption IPS, 1016
AES, 651 Kerberos protocol, 971
BitLocker, 732 key fobs, 962
defined, 963 Keychain Access (macOS), 932
EFS, 733 keyloggers, 976
TKIP, 670 laptops, 499-503
WEP, 670, 1019-1020 libraries, 993
wireless NIC, 670 Linux, logical security, 970
WPA, 670
1226 security
OS libraries, 993
account recovery, 1000 local shares, 991
backups, 998-1000 NTFS permissions, 989, 994-996
BitLocker encryption, 1000 Public folders, 992
corporate OS, 732-733 restrict user permissions, 988
DEP, 1002-1003 share permissions, 988-991
destroying hard drives, 1002 phishing, 978, 1026
disabling AutoPlay/AutoRun functions, 1001 physical security
EFS, 1001 authentication, 961, 966-968
full device encryption, 1000-1001 badge readers, 962
overwriting hard drives, 1001 biometrics, 963, 966-968
patch management, 997-998 cable locks, 963
restores, 998-1000 document security, 965
update management, 997-998 door locks, 962
vulnerabilities, 730 electronic key cards, 961
wiping hard drives, 1001 entry control rosters, 963
overview, 960 guards, 962
parental controls, 929, 1013 hardware tokens, 962-964
passwords key fobs, 962
Administrator accounts, 982 mantraps, 963-964
AP, 676, 1022 policies, 960
BIOS, 970-971 privacy screens, 963
cached passwords, 456 RFID, 962
complexity, 971 server locks, 963
expiration dates, 972 smart cards, 962-963
failed attempts, 972 TPM, 963, 971
formatting, 972 tracking modules, 963
HomeGroups, 972 USB locks, 963
Kerberos protocol, 971 policies, 960-961, 973, 1064
logical security, 968 ports, 962, 969
passwd command (Linux), 944-945 principle of least privilege, 991
policies, 960, 1064 printer data privacy, 401
power-on, 971 privacy filters, 963
rainbow table attacks, 979 proof of incineration, 965
reminders, 971 proxy servers, 1008-1009
reusing, 972 Public folders, 992
synchronization, 456 RADIUS, 966
INDEX
UEFI, 970-971 rainbow table attacks, 979
wireless AP, 676 ransomware, 976-977
wireless routers, 676 reconnaissance attacks, 980
workgroups, 623 remote access policies, 961
PAT, 1014 remote desktops, 1015
permissions replay attacks, 980
administrative shares, 991 RFID, 962
command prompt and, 996 rootkits, 608, 976
effective permissions, 995-996 screen locks, 983
file attributes, 996 screen savers/locks, 972
file permissions, 989 Security & Privacy setting (macOS, System Pref-
hidden shares, 991-992 erences), 928
inherited permissions, 995 security patterns, mobile devices, 500
1228 security
Security tab (Internet Explorer 11, Internet Options WPA, 670, 1020
window), 598, 601 WPA2, 670, 1020
sensitive printed material and printers, 360 WPA2 with AES, 671
server locks, 963 WPS, 1021-1022
shoulder surfing, 963-965, 972, 978 zero day attacks, 980
single-factor authentication, physical security, 966 zombie attacks, 980
smart cards, 962-963 selection structures. See decision structures
smartphones, 500-503 selections (Windows scripting), 808
Smurf attacks, 980 self-grounding, 164, 1049
social engineering attacks, 972, 978 self-powered hubs, 46
software tokens, 966 sensitive printed material and printers, 360
spear phishing, 978 separation pads (laser printers), 370
spoofing attacks, 980 sequences (Windows scripting), 808
spyware, 975, 1026 serial AT attachment. See SATA
SSO, 980 serial devices
tablets, 500-503 asynchronous transmissions, 576
TACACS, 966 configuring, 576,-577
tailgating, 978 serial cables, 53
TCP/IP hijacking, 980 serial hard drive interfaces, 259
timeouts, 983 serial ports, 53, 59, 575-577
TKIP, 670 USB-to-serial converters, 575
tokens, 962-964 servers
TPM, 963, 971 AD, 732, 983-988
tracking modules, 963 authentication servers, 693, 972
trapdoor attacks, 979 cloud computing, 593-597, 733
Trojans, 976 DHCP servers, 666-667, 693
trusted/untrusted sources, 970 DMZ, 1010
two-factor authentication, physical security, 966 DNS servers, 669, 687, 693
UEFI, 970-971 end-point management servers, 693, 1016
UPnP, 1010 file servers, 693
USB locks, 963 locks, 963
users, 981-983 logging servers, 693
educating about security, 972-980 mail servers, 693
ID, 972 networks, 621-622, 692-693
UTM systems, 1016 NOS, 621
virtualization, 592-593 print servers, 693
viruses, 975-978, 1026 proxy servers, 693, 1008-1009
VPN remote servers, BranchCache, 733
configuring, 1014-1015 syslog servers, 693
logical security, 969 web servers, 693
vulnerability scanners, 980 service packs, 551, 758, 846
WEP, 670, 946, 1019 service releases (software), 551
whitelists, 1009 services
WiFi analyzers, 464 disabling, 787, 895
Windows Firewall, 1010-1013 enabling, 789
Windows installations, 840 fails to start errors, troubleshooting, 895
wireless AP, 1017 listsvc command, 789
wireless networks, 1017-1025 managing, 878
workgroups, 980-982 network services, troubleshooting, 688
worms, 976 process IDs, 801
SIIA (Software and Information Industry Association) 1229
INDEX
I/O addresses, 127, 130-131 shutdown command, 800, 944
IRQ, 127, 130 shutting down
memory addresses, 127, 131 computers, 800
PCI interrupts, 127-128 troubleshooting, 103, 898, 899
PCIe interrupts, 127-128 unexpected shutdowns, 103, 898-899
TPM, 121, 1144 Windows 7, 739
USB, 120 side loading apps, 442
video, 120 side-by-side apps (Windows), 832
virtualization, 121 signal strength (antennas), wireless networks, 662
virus protection, 120 signature pads, 19
sfc command, 799 SIIA (Software and Information Industry Association),
sfc / scannow command, 296 1026
SFC (System File Checker), 296, 845-846
1230 SIM (System Image Manager), corporate Windows deployments
SIM (System Image Manager), corporate Windows de- smart devices, 677
ployments, 842 digital assistants, 683
SIM cards, 436 door locks, 683
SIMM (Single In-line Memory Modules), 213 earrings, 426
simple volumes (Windows Disk Management), 281 light switches, 681
single IDE setting, 265 shoes, 426
single link DVI connectors, 36 thermostats, 680-681
single-alternative decision structures, 814 voice-enabled smart speakers, 683
single-core processors, 80 watches, 426
single-factor authentication, physical security, 966 Z-wave, 678-680
single-mode fiber cables, 56-57 Zigbee, 678-679
single-sided memory, 217 SmartMedia, 343
site surveys, wireless networks, 662 smartphones, 420, 438. See also phablets
slave devices, 265 apps, 439-442
SLC (Single-Level Memory Cells), 257 baseband updates, 437
sleep mode disposal of/recycling, 1046
going into, 193 headsets, 652
mobile devices, 435 IMEI numbers, 435-436
troubleshooting, 193, 199 IMSI, 436
Zigbee devices, 679 notification areas, 432
sleep-and-charge USB ports, 46 PRI, 437
sleep/suspend mode (ACPI), 192 PRL, 437
slots radio firmware updates, 437
expansion slots, 14-15, 93 security, 500-503
AGP, 95 SIM cards, 436
bus bandwith comparisons, 97 troubleshooting, 505-515
covers and EMI/RFI, 165 SMB (Server Message Blocks), 697
laptops, 469-470 SMC (System Management Controller) resets, 505
M.2 expansion cards, 470 smoke, troubleshooting, 147, 198, 550
NVMe cards, 470 SMS (Short Message Service), 451
PCI, 94 SMTP (Simple Mail Transfer Protocol), 453, 697
PCIe, 96-99 Smurf attacks, 980
types, 94 snapshots, virtualization, 590
M.2 slots, 121 SNMP (Simple Network Management Protocol), 697
PCI slots, 94-97 social engineering attacks, 972, 978
PCIe slots, 94-99 sockets, 85-86
Slots Used field (Task Manager Performance tab), 233 SODIMM (Small-Outline DIMM), 213, 481-482
USS, laptop security, 499 soft resets, mobile devices, 504
slow performance, troubleshooting, 297 Soft-off power setting (ACPI), 193
boots, 896 software
profile loads, 896-897 antimalware, 968
systems, 894 firewalls and, 1009
transfer speeds (networks), 687 mobile devices, 499
web browsers, 610 antivirus software, 840, 968, 978
SLP (Service Location Protocol), 697 firewalls and, 1009
S.M.A.R.T. (Self-Monitoring, Analysis and Reporting mobile devices, 499
Technology) errors, 296 reinitializing, 843
smart cameras, 421-423. See also webcams automatically loading programs from startup,
smart card readers, 19, 348-349, 424, 487 stopping, 883
smart cards, security, 962-963 AutoPlay function, disabling, 1001
Speed field (Task Manager Performance tab) 1231
INDEX
obtaining software with CLI, 947-948 shielding, 331
Ubuntu Software Center, 942 Sound setting (macOS, System Preferences), 928
updates, end-of-life concerns, 730 troubleshooting, 332-333, 490, 513
versions, end-of-life concerns, 730 USB speakers, 331
Windows installations, 857-860 voice-enabled smart speakers, 683
solid ink printers, 366 spear phishing, 978
solid state drives. See SSD special characters, file/folder names, 746
Sony/Phillips Digital interface. See S/PDIF special function keys (keyboards), laptops, 480-481
sound special thermal paper, 371
2.0 audio subsystems, computer design, 540 speech recognition devices (biometrics), 967
2.1 audio subsystems, computer design, 540 Speed field (Task Manager Performance tab), 233
Android settings, 490
Apple Digital AV adapters, 444
1232 speeds
INDEX
encryption, 1001 Apple iOS devices, 458-459
shared subfolders, 996 apps
subnet masks cloud computing, 594
broadcast address, 1087 fitness apps, 455
CIDR, 650 software apps, 859
IPv4 addresses, 649-650 cached passwords, 456
network number, 1086-1087 contacts, 457
prefix notation, 1086 mobile devices, 455
purpose, 1085 Android devices, 457
stopping point, showing, 1087 Apple iOS devices, 458-459
viewing, 1085 cars, 456
subtrees, Windows registry, 758-759 clouds, 456
sudo command (macOS), 935-936
1234 synchronization
INDEX
test pages (printers), 390 timeouts (security), 983
testing TKIP (Temporal Key Integrity Protocol), 670, 1020
backups, 998 tokens (security), 962-966
installations, 321 tone generators, 639
ports, 550 toner, 387
remote network device connectivity, 796-797 defined, 370
theory of probable cause (troubleshooting), 551-553 disposal of/recycling, 1048-1049
wall outlets, 199 laser printers, 370-371
tethering, 449, 588 refilling, 380
text files, 8 spilled toner, 1048
scripts as, 803-805 spills, 371
viewing, 792, 802 troubleshooting, 409, 1048
text messages, SMS, 451 toner probes, 639
1236 toner vacuums
INDEX
webcams, 498 net use command, 688
WiFi cards, 487 net user command, 688
laser printers, 385 net view command, 688
LCD, 145 netdom add command, 688
logical steps netdom command, 688
documentation, 554 netdom join command, 688
establishing theory of probable cause, 544-551 netdom remove command, 688
identifying problems, 543 netdom renamecomputer command, 688
implementing preventive measures, 554 netdom reset command, 688
plans of action, 554 netdom resetpwd command, 688
testing theories to determine cause, 551-553 netdom verify command, 688
verifying full system functionality, 554 NIC, 686, 689-690
ping command, 684-686
1238 troubleshooting
INDEX
unknown status state (disk management), 298
Panel, 940
unlocking
Software Updater tool, 942
AD accounts, 986
Ubuntu Software Center, 942
mobile devices, 435
Unity GUI, 940-941
unmanaged switches, 626
user forums, 951
unmounting eSATA drives, 270
website, 939, 951
unplugging USB devices, 46
UDP (User Datagram Protocol), 695
unreadable status state (disk management), 298
UDSL (Uni-DSL), 585
untrusted/trusted sources, logical security, 970
UEFI (Unified Extensible Firmware Interface), 116-118
unused ports, disabling, 962, 969
ACPI settings, 192-193
Up Time field (Task Manager Performance tab), 232
AMI BIOS/UEFI chips, audio beeps (POST codes),
546 up to date (technician skills), staying, 762
updatedb command (Linux), 951
1240 updates
INDEX
groups, 980-984 verifying
guest, 981-982 full system functionality (troubleshooting), 554
ID, security, 972 hardware with Device Manager, 148
managing, 981-983. See also AD paths, 801
OS interaction, 724 Windows installations, 843
power users, 982 Windows versions, 757
privacy, 974-975 versions of Windows, 757, 908
privileges vertical lines (printing issues), troubleshooting, 409
commands, 803 VESA (Video Electronics Standards Association), 38
principle of least privilege, 991 VGA (Video Graphics Arrays)
profiles, defined, 758 cables, 37
remote desktop users, 982 DVI-to-VGA adapters, 41
restrict user permissions, 988 ports, 36-39, 58
1242 VGA mode, troubleshooting
INDEX
wscript command, 802 filenames, 745-746
xcopy command, 778, 802 indexing, 751
compatibility mode, 836 libraries, 746
Component Services, 862 moving, 752-754
Computer Management Console, 861-862 paths, 748-749
configuring removable media files, deleting, 737
device drivers, 851 saving, 748
overview of, 850 searches, 751
System Configuration utility (msconfig command), structure, 772
889-892 file systems, 279, 838-839
context menus, 745 folders
attributes, 752
compressing, 752
1246 Windows
INDEX
dism command, 788 sfc command, 799
dxdiag command, 788 shell scripts, 804
enable command, 789 shutdown command, 800
exit command, 789 strings, 810
expand command, 789 syntax, 770
explorer command, 789 systeminfo command, 800
file types, 804 taskkill command, 800
format command, 790 tasklist command, 801
gpresult command, 790 telnet command, 801
gpupdate command, 790-791 text files, 803-805
help command, 791 tracert command, 801
input, 808 type command, 802
interpreted programs, 803 variables, 805-812
1248 Windows
INDEX
multi-monitor taskbars, 832 wireless connectivity
older software, running, 233 broadband connectivity, 588
OS, versions of, 728-729 mobile devices
Performance tab (Task Manager), 232-233 Airplane Mode, 448
Reset This PC tool, 882 Bluetooth, 444-448
services, 895 cellular networks, 448, 451
sound GPS, 448
sound cards, 328-329 hotspot/tethering, 449
troubleshooting, 333 IEEE 802.11 wireless standards, 447-448
Task Manager, 232-233 IR, 451
touchscreens, calibrating, 498 NFC, 450
Windows Update, 848 RFID tags, 449
Windows 10 Mobile OS, 423 security, 499
1250 wireless connectivity
INDEX