Attention! Your ePaper is waiting for publication!
By publishing your document, the content will be optimally indexed by Google via AI and sorted into the right category for over 500 million ePaper readers on YUMPU.
This will ensure high visibility and many readers!
Your ePaper is now published and live on YUMPU!
You can find your publication here:
Share your interactive ePaper on all platforms and on your website with our embed function
CompTIA A+ Certification All-in-One Exam Guide
- No tags were found...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
causing the card to fail. Grab a can of electronic contact cleaning solution and
use it instead. Electronic contact cleaning solution is designed for exactly this
purpose, cleans contacts nicely, and doesn’t leave any residue. You can find
electronic contact cleaning solution at any electronics store or online, of
course.
A fully inserted expansion card sits flush against the back of the PC case
—assuming the motherboard is mounted properly, of course—with no gap
between the mounting bracket on the card and the screw hole on the case. If
the card is properly seated, no contacts are exposed above the slot. Figure 6-
28 shows a properly seated (meaning fitted snugly in the slot) expansion card.
causing the card to fail. Grab a can of electronic contact cleaning solution anduse it instead. Electronic contact cleaning solution is designed for exactly thispurpose, cleans contacts nicely, and doesn’t leave any residue. You can findelectronic contact cleaning solution at any electronics store or online, ofcourse.A fully inserted expansion card sits flush against the back of the PC case—assuming the motherboard is mounted properly, of course—with no gapbetween the mounting bracket on the card and the screw hole on the case. Ifthe card is properly seated, no contacts are exposed above the slot. Figure 6-28 shows a properly seated (meaning fitted snugly in the slot) expansion card.
No information found
- Page 4 and 5:
ABOUT THE AUTHORMichael Meyers is t
- Page 8 and 9:
Copyright © 2019 by McGraw-Hill Ed
- Page 10 and 11:
To my grandson, William Siegmund Ke
- Page 12 and 13:
Chapter 21 The InternetChapter 22 V
- Page 14 and 15:
The Computing ProcessThe Computing
- Page 16 and 17:
Chapter ReviewQuestionsAnswersChapt
- Page 18 and 19:
Supplying DCInstalling and Maintain
- Page 20 and 21:
Maintaining and Troubleshooting Har
- Page 22 and 23:
Chapter 12 Windows Under the Hood10
- Page 24 and 25:
AnswersChapter 15 Working with the
- Page 26 and 27:
Application ProblemsApplication Ins
- Page 28 and 29:
Chapter 19 Local Area Networking100
- Page 30 and 31:
Internet Application Protocols10021
- Page 32 and 33:
Hardware/Device ReplacementTroubles
- Page 34 and 35:
ScannersCopy and Fax ComponentsAuto
- Page 36 and 37:
Implementing Change (Scenario)Disas
- Page 38 and 39:
Looking forward to many more.To Dud
- Page 40 and 41:
with every day? Seriously, count th
- Page 42 and 43:
by the Computing Technology Industr
- Page 44 and 45:
CompTIA offers several tracks to pu
- Page 46 and 47:
Network Associate (CCNA), plus nume
- Page 48 and 49:
Try This! Recommending an OSImagine
- Page 50 and 51:
asked how to set up and maintain vi
- Page 52 and 53:
Finding a Testing CenterPearson VUE
- Page 54 and 55:
their Web site and schedule the exa
- Page 56 and 57:
information they must know for the
- Page 58 and 59:
• Installing, running, and closin
- Page 60 and 61:
Safety and ProfessionalismCHAPTER 1
- Page 62 and 63:
Figure 1-1 Casual FordI have a ques
- Page 64 and 65:
you an idea of what we are trying t
- Page 66 and 67:
Figure 1-3 Don’t do this!It’s f
- Page 68 and 69:
rarely felt that technicians I’ve
- Page 70 and 71:
down, or do anything else necessary
- Page 72 and 73:
Figure 1-4 Never accuse!Follow up w
- Page 74 and 75:
this book!Beyond basic manners, nev
- Page 76 and 77:
Be Prepared!Effective communication
- Page 78 and 79:
prevalent in dry, cool environments
- Page 80 and 81:
Although having an antistatic wrist
- Page 82 and 83:
speakers in particular, are suscept
- Page 84 and 85:
Figure 1-10 Author’s go-to iFixit
- Page 86 and 87:
Figure 1-12 What a strange, bad tri
- Page 88 and 89:
Troubleshooting MethodologyAn effec
- Page 90 and 91:
cover backup options in detail in C
- Page 92 and 93:
fundamental understanding of the co
- Page 94 and 95:
Figure 1-16 Ford the Tech asks for
- Page 96 and 97:
malware is installed so a computer
- Page 98 and 99:
and check the records to find other
- Page 100 and 101:
C. Document any particularly import
- Page 102 and 103:
CHAPTER 2The Visible ComputerIn thi
- Page 104 and 105:
calculations. The most common types
- Page 106 and 107:
Figure 2-4 A point of sale computer
- Page 108 and 109:
Figure 2-5 The Microsoft Windows 10
- Page 110 and 111:
Figure 2-7 Monument Valley II game
- Page 112 and 113:
(CPU), usually a single, thin wafer
- Page 114 and 115:
what makes a good computer technici
- Page 116 and 117:
Figure 2-11 PC with common peripher
- Page 118 and 119:
Figure 2-13 Inside the system unitF
- Page 120 and 121:
Figure 2-16 Tablet computerWe could
- Page 122 and 123:
• The OS enables users to determi
- Page 124 and 125:
Other visible items are as follows:
- Page 126 and 127:
such as Windows Phone, to create a
- Page 128 and 129:
Figure 2-21 Windows 8 Start screen
- Page 130 and 131:
Figure 2-23 Apps sorted by nameWind
- Page 132 and 133:
Figure 2-25 Charms accessed by curs
- Page 134 and 135:
interface with an active applicatio
- Page 136 and 137:
WINDOWS LOGO KEY + LEFT ARROW or RI
- Page 138 and 139:
Figure 2-30 Mission Control button
- Page 140 and 141:
Figure 2-33 Ubuntu Linux desktop en
- Page 142 and 143:
Figure 2-35 File ExplorerThe defaul
- Page 144 and 145:
Figure 2-36 File Explorer viewing M
- Page 146 and 147:
Figure 2-38 Mike’s Home directory
- Page 148 and 149:
NOTE The Control Panel enables you
- Page 150 and 151:
Figure 2-41 Windows 7 System Tools
- Page 152 and 153:
Command Line The Windows command-li
- Page 154 and 155:
from the big three in Windows 7. Th
- Page 157 and 158:
Figure 2-47 Search charm with Contr
- Page 159 and 160:
Command Line The command-line inter
- Page 161 and 162:
line (cmd.exe) by typing cmd or com
- Page 163 and 164:
macOSmacOS has two key launch point
- Page 165 and 166:
Figure 2-55 Accessing All SettingsF
- Page 167 and 168:
A. CharmsB. DesktopC. Mission Contr
- Page 169 and 170:
9. C. Terminal is the equivalent of
- Page 171 and 172:
EXAM TIP CompTIA only uses the term
- Page 173 and 174:
Imagine that we install a set of 16
- Page 175 and 176:
Figure 3-5 Here “1” means on,
- Page 177 and 178:
Figure 3-7 CPU codebookIn this code
- Page 179 and 180:
wire (most diagrams label the clock
- Page 181 and 182:
Figure 3-11 Clock speed printed on
- Page 183 and 184:
directly to the CPU’s clock wire,
- Page 185 and 186:
decimal number 5 written in binary.
- Page 187 and 188:
Figure 3-14 RAM as a spreadsheet•
- Page 189 and 190:
Figure 3-16 Extending the EDBWait a
- Page 191 and 192:
Figure 3-18 Address busBy turning t
- Page 193 and 194:
Well, yes, I am, but not out of mal
- Page 195 and 196:
00000000000000001000Hey, wouldn’t
- Page 197 and 198:
portable computers. Most of Intel
- Page 199 and 200:
companies use code names to keep tr
- Page 201 and 202:
Desktop Versus MobileMobile devices
- Page 203 and 204:
All modern CPUs run at some multipl
- Page 205 and 206:
64-Bit ProcessingOver successive ge
- Page 207 and 208:
Parallel ExecutionModern CPUs can p
- Page 209 and 210:
part, the arithmetic logic unit (AL
- Page 211 and 212:
many times.Pipelining CPUs work fan
- Page 213 and 214:
Figure 3-28 CPU-Z displaying the ca
- Page 215 and 216:
Figure 3-30 Windows Task Manager wi
- Page 217 and 218:
Figure 3-31 CPU-Z showing the cache
- Page 219 and 220:
discrete microprocessor that differ
- Page 221 and 222:
Everybody calls the NX bit technolo
- Page 223 and 224:
EXAM TIP The CompTIA A+ 1001 object
- Page 225 and 226:
based motherboards, the sockets hav
- Page 227 and 228:
Figure 3-36 Underside and top of a
- Page 229 and 230:
Figure 3-38 Fully opened socketAlig
- Page 231 and 232:
Figure 3-39 Intel stock heat-sink a
- Page 233 and 234:
Figure 3-41 Liquid-cooled CPUSevera
- Page 235 and 236:
Figure 3-42 CPU fan power standout
- Page 237 and 238:
Figure 3-44 AMD stock heat-sink and
- Page 239 and 240:
NOTE Chapter 5, “Firmware,” goe
- Page 241 and 242:
Figure 3-47 CMOS-clear jumperTo cle
- Page 243 and 244:
result in a system running slowly o
- Page 245 and 246:
C. The external data bus provides a
- Page 247 and 248:
Answers1. B. The CPU uses registers
- Page 249 and 250:
Figure 4-1 Mass storage holds progr
- Page 251 and 252:
computers—not just PCs—since th
- Page 253 and 254:
So if some of the commands are more
- Page 255 and 256:
Figure 4-7 A 72-pin SIMMModern CPUs
- Page 257 and 258:
Development of newer, wider, and fa
- Page 259 and 260:
RDRAMWhen Intel was developing the
- Page 261 and 262:
Figure 4-13 172-pin DDR SDRAM micro
- Page 263 and 264:
Figure 4-14 A motherboard showing f
- Page 265 and 266:
Figure 4-16 DDR2 DIMM on top of a D
- Page 267 and 268:
that can reduce the air conditionin
- Page 269 and 270:
Figure 4-17 Double-sided DDR SDRAML
- Page 271 and 272:
notice when such a rare event happe
- Page 273 and 274:
Working with RAMWhenever people com
- Page 275 and 276:
Let’s assume you have a PC with 4
- Page 277 and 278:
Figure 4-23 Program B being unloade
- Page 279 and 280:
Figure 4-26 Program C is swapped to
- Page 281 and 282:
sealed. Today many desktop and lapt
- Page 283 and 284:
Figure 4-30 Dedicating a flash driv
- Page 285 and 286:
NOTE The freeware CPU-Z program tel
- Page 287 and 288:
Your motherboard should detect and
- Page 289 and 290:
hard to handle. Wide acceptance of
- Page 291 and 292:
memory issues but not necessarily s
- Page 293 and 294:
cause an error. Still, you can find
- Page 295 and 296:
D. Fetch interval5. How does an NMI
- Page 297 and 298:
for the proper slots.)7. A. You can
- Page 299 and 300:
We Need to TalkFor a keyboard or a
- Page 301 and 302:
Figure 5-4 Ancient 430VX chipset sh
- Page 303 and 304:
Figure 5-6 Everything connectingIt
- Page 305 and 306:
Figure 5-8 Electronic view of the k
- Page 307 and 308:
erased every time you turned off th
- Page 309 and 310:
Figure 5-11 Function of the flash R
- Page 311 and 312:
needs a place to store all its sett
- Page 313 and 314:
Figure 5-14 Gigabyte system setup u
- Page 315 and 316:
Figure 5-15 ASUS UEFI system setup
- Page 317 and 318:
CPUs, hard drives and optical drive
- Page 319 and 320:
Figure 5-20 Boot tabThe Tool tab (s
- Page 321 and 322:
Figure 5-22 Information tabThe Conf
- Page 323 and 324:
default in BIOS, so if your virtual
- Page 325 and 326:
computing. We’ll hit the subject
- Page 327 and 328:
EXAM TIP BIOS security-related opti
- Page 329 and 330:
drive controller—basically just a
- Page 331 and 332:
almost any device for your computer
- Page 333 and 334: codes before and during the video t
- Page 335 and 336: Figure 5-31 POST card in actionPOST
- Page 337 and 338: devices so you can run utilities to
- Page 339 and 340: Figure 5-34 Options for resetting C
- Page 341 and 342: Figure 5-36 Changing shunt location
- Page 343 and 344: booting are slim—but you’ll sti
- Page 345 and 346: NOTE A failed BIOS/UEFI update—wh
- Page 347 and 348: needs BIOS.C. All hardware built in
- Page 349 and 350: 4. B. Most likely the device has an
- Page 351 and 352: Figure 6-1 Traces visible beneath t
- Page 353 and 354: EXAM TIP CompTIA A+ 1001 exam objec
- Page 355 and 356: NOTE In case your curiosity has run
- Page 357 and 358: Figure 6-5 Keyboard connector on th
- Page 359 and 360: Figure 6-7 ATX portsThe ATX form fa
- Page 361 and 362: Figure 6-9 A microATX motherboardEX
- Page 363 and 364: Figure 6-10 Mini-ITXOne of the grea
- Page 365 and 366: vary in features, performance, and
- Page 367 and 368: Figure 6-13 Driver disc for ASUS mo
- Page 369 and 370: building a custom rig is selecting
- Page 371 and 372: case, another example (like USB) of
- Page 373 and 374: Figure 6-18 Expansion slots connect
- Page 375 and 376: architecture (see Figure 6-22) in t
- Page 377 and 378: PCI ExpressPCI Express (PCIe) is st
- Page 379 and 380: Figure 6-25 PCIe ×1 slot (top)NOTE
- Page 381 and 382: Optimally, a card should always be
- Page 383: Figure 6-27 Always secure all cards
- Page 387 and 388: Figure 6-29 Part of a Readme file s
- Page 389 and 390: Figure 6-31 Unsigned driver warning
- Page 391 and 392: Figure 6-33 Driver rollback feature
- Page 393 and 394: NOTE Many PC enthusiasts try to squ
- Page 395 and 396: Figure 6-36 An “!” in Device Ma
- Page 397 and 398: replacement and shows you some of t
- Page 399 and 400: of the more popular brands are ASUS
- Page 401 and 402: are too small for a regular ATX mot
- Page 403 and 404: motherboards can be a wiggling, twi
- Page 405 and 406: Figure 6-42 Sample of case wiresNOT
- Page 407 and 408: If you get no power at all, check t
- Page 409 and 410: • Faulty component• Buggy devic
- Page 411 and 412: you would most likely be better off
- Page 413 and 414: C. The system resources have been a
- Page 415 and 416: 3. C. The Mini-PCI format conserved
- Page 417 and 418: Figure 7-1 Power supply about to be
- Page 419 and 420: Figure 7-2 Electrical voltage as wa
- Page 421 and 422: Figure 7-4 Diagrams showing DC and
- Page 423 and 424: Although the higher voltage differs
- Page 425 and 426: Figure 7-7 Author’s ancient but r
- Page 427 and 428: aren’t as accurate as a multimete
- Page 429 and 430: the power cuts out completely, it
- Page 431 and 432: NOTE Surge suppression isn’t just
- Page 433 and 434: NOTE There are two main types of UP
- Page 435 and 436:
Table 7-1 Typical UPS Devices1001Su
- Page 437 and 438:
come with standard connectors for t
- Page 439 and 440:
walk through the following steps on
- Page 441 and 442:
Figure 7-19 Molex splitterATXThe or
- Page 443 and 444:
unofficially but commonly called th
- Page 445 and 446:
multi-rail PSU you buy today can ha
- Page 447 and 448:
can split into two 4-pin sets, one
- Page 449 and 450:
into DC current, is like a person s
- Page 451 and 452:
the power supply provides enough wa
- Page 453 and 454:
First, running a power supply at le
- Page 455 and 456:
Figure 7-29 Removing power supply f
- Page 457 and 458:
Figure 7-31 Shorting the soft on/of
- Page 459 and 460:
Figure 7-33 3-wire fan sensor conne
- Page 461 and 462:
cool.In the typical layout of case
- Page 463 and 464:
NZXT. Just check the decibel rating
- Page 465 and 466:
NOTE When shopping for fans, rememb
- Page 467 and 468:
what do you do if you don’t have
- Page 469 and 470:
Power supplies break in computers m
- Page 471 and 472:
Figure 7-41 Modular-cable power sup
- Page 473 and 474:
B. DC has polarity. The red lead sh
- Page 475 and 476:
Mass Storage TechnologiesCHAPTER 8I
- Page 477 and 478:
Figure 8-1 An enclosed HDD (top) an
- Page 479 and 480:
can lower the temperature of your d
- Page 481 and 482:
Solid-State DrivesBooting up a comp
- Page 483 and 484:
EXAM TIP Although you can still buy
- Page 485 and 486:
A lot of factors determine which co
- Page 487 and 488:
NOTE Check out www.snia.org for a g
- Page 489 and 490:
NOTE The last ATA/ATAPI standard th
- Page 491 and 492:
PATA ribbon cable as an IDE cable.
- Page 493 and 494:
overhead greatly enhances the speed
- Page 495 and 496:
External SATA used shielded cable i
- Page 497 and 498:
NVMeAHCI was designed for spinning
- Page 499 and 500:
enable you to continue working thro
- Page 501 and 502:
Figure 8-19 Disk stripingThe one an
- Page 503 and 504:
NOTE RAID 5 sounds great on paper a
- Page 505 and 506:
Hardware is used when you need spee
- Page 507 and 508:
Most traditional RAID setups in the
- Page 509 and 510:
you during CompTIA A+ 1001 exam pre
- Page 511 and 512:
Figure 8-25 Master/slave jumpers on
- Page 513 and 514:
Cabling SATA DrivesInstalling SATA
- Page 515 and 516:
Figure 8-28 mSATA SSD secured on mo
- Page 517 and 518:
determine how drives are listed—a
- Page 519 and 520:
operating system on each hard drive
- Page 521 and 522:
B. 12 inchesC. 18 inchesD. 1 meter7
- Page 523 and 524:
Implementing Mass StorageCHAPTER 9I
- Page 525 and 526:
Figure 9-1 Sectors on an HDDSolid-s
- Page 527 and 528:
Figure 9-4 Partitions on an SSDYou
- Page 529 and 530:
record use this table to determine
- Page 531 and 532:
partition table called active that
- Page 533 and 534:
Figure 9-9 An extended partition co
- Page 535 and 536:
and you want to make half of it E:
- Page 537 and 538:
NOTE Okay, if GPT stands for GUID p
- Page 539 and 540:
Figure 9-12 Windows 10 Disk Managem
- Page 541 and 542:
Figure 9-13 Note that the context m
- Page 543 and 544:
Formatting, the process of making a
- Page 545 and 546:
Figure 9-16 32-bit FATNOTE Hexadeci
- Page 547 and 548:
cluster’s status area in the FAT.
- Page 549 and 550:
Figure 9-19 End of file reachedAfte
- Page 551 and 552:
Assuming these files are all in the
- Page 553 and 554:
that once held mom.txt. As Windows
- Page 555 and 556:
SSDs, once data was written into a
- Page 557 and 558:
CompressionNTFS enables you to comp
- Page 559 and 560:
Table 9-3 NTFS Cluster SizesBy defa
- Page 561 and 562:
only read NTFS.File Systems in Linu
- Page 563 and 564:
Figure 9-26 Windows 10 bootable med
- Page 565 and 566:
Figure 9-28 Where do you want to in
- Page 567 and 568:
Figure 9-30 New partition with Syst
- Page 569 and 570:
NOTE Windows offers a command-line
- Page 571 and 572:
Figure 9-33 Initializing a driveDis
- Page 573 and 574:
Specify a volume size and click Nex
- Page 575 and 576:
You have a few more tasks to comple
- Page 577 and 578:
partitions no longer exist; dynamic
- Page 579 and 580:
disk and choose New Simple Volume t
- Page 581 and 582:
Figure 9-41 Selecting the Extend Vo
- Page 583 and 584:
basic disk without losing all the d
- Page 585 and 586:
Figure 9-44 Two striped drives (Win
- Page 587 and 588:
Figure 9-46 Selecting drives for th
- Page 589 and 590:
Figure 9-48 Adding photos to the mo
- Page 591 and 592:
2. Make a stripe set.3. Make them i
- Page 593 and 594:
installation. Windows simply prompt
- Page 595 and 596:
Figure 9-53 Ready to create the sto
- Page 597 and 598:
laid out as a two-way mirror. Rathe
- Page 599 and 600:
They go through all the drive’s f
- Page 601 and 602:
Figure 9-55 Disk Utility optionsNow
- Page 603 and 604:
NOTE If you manage a system with a
- Page 605 and 606:
Figure 9-58 Disk CleanupDisk Cleanu
- Page 607 and 608:
can create the invalid media error.
- Page 609 and 610:
You may also see Windows error mess
- Page 611 and 612:
No Boot Device PresentIf it’s a s
- Page 613 and 614:
RAID Not Found The CompTIA A+ 220-1
- Page 615 and 616:
The only problem with Partition Com
- Page 617 and 618:
Chapter ReviewQuestions1. Which is
- Page 619 and 620:
A. Simple spaceB. Two-way mirror sp
- Page 621 and 622:
Whenever you’re dealing with a de
- Page 623 and 624:
certain number of USB ports, there
- Page 625 and 626:
of 10 Gbps!EXAM TIP The USB Impleme
- Page 627 and 628:
A/mini USB B, and micro USB A/micro
- Page 629 and 630:
The keyed USB Standard-A connector
- Page 631 and 632:
Figure 10-10 USB hubFigure 10-11 Mo
- Page 633 and 634:
Figure 10-12 Power Management tabSI
- Page 635 and 636:
chains can extend up to 3 meters. W
- Page 637 and 638:
about an add-on Thunderbolt card? A
- Page 639 and 640:
the repeat rate (how quickly the ch
- Page 641 and 642:
electrical components, you might be
- Page 643 and 644:
Figure 10-20 Mouse Settings and Con
- Page 645 and 646:
Figure 10-22 Laptop with built-in f
- Page 647 and 648:
software that comes with the scanne
- Page 649 and 650:
Barcode/QR ScannersBarcode scanners
- Page 651 and 652:
data centers where multiple servers
- Page 653 and 654:
the KVM switch, you won’t get the
- Page 655 and 656:
Figure 10-32 Game controller proper
- Page 657 and 658:
Figure 10-33 A type of digitizer kn
- Page 659 and 660:
example, you use a signature pad.EX
- Page 661 and 662:
Figure 10-36 USB connection port on
- Page 663 and 664:
sound waves in electronic format th
- Page 665 and 666:
as the WAV format in the PC world.
- Page 667 and 668:
Another popular speaker addition is
- Page 669 and 670:
NOTE Both HDMI and DisplayPort are
- Page 671 and 672:
Figure 10-44 Headsets are great for
- Page 673 and 674:
compressed, the file is placed into
- Page 675 and 676:
Figure 10-47 Thumb drivesThe smalle
- Page 677 and 678:
Figure 10-49 SD, miniSD, and microS
- Page 679 and 680:
Figure 10-50 xD-Picture CardEXAM TI
- Page 681 and 682:
Going beyond those big three househ
- Page 683 and 684:
Figure 10-52 A CD-R disc, with its
- Page 685 and 686:
Figure 10-54 Optical drive in Windo
- Page 687 and 688:
Table 10-3 DVD Versions/CapacitiesD
- Page 689 and 690:
picture quality on your HDTV, you s
- Page 691 and 692:
Figure 10-59 Label on optical drive
- Page 693 and 694:
A. Five speakers plus a subwooferB.
- Page 695 and 696:
CHAPTER 11Building a PCIn this chap
- Page 697 and 698:
EXAM TIP Expect a question or two o
- Page 699 and 700:
Figure 11-1 A typical thick clientT
- Page 701 and 702:
Figure 11-2 Ubuntu desktop hardware
- Page 703 and 704:
• Stores only basic applications;
- Page 705 and 706:
Figure 11-5 Author’s gaming rig,
- Page 707 and 708:
components in an industrial setting
- Page 709 and 710:
Video editing workstations, like CA
- Page 711 and 712:
Figure 11-6 Sharing a printer in Wi
- Page 713 and 714:
Figure 11-8 Media streaming options
- Page 715 and 716:
minimum (and thus the need to get t
- Page 717 and 718:
Figure 11-10 Windows 10 Welcome scr
- Page 719 and 720:
NOTE Microsoft has shifted with the
- Page 721 and 722:
the personal settings (such as font
- Page 723 and 724:
Figure 11-13 End result of multiboo
- Page 725 and 726:
Figure 11-14 Remote network install
- Page 727 and 728:
USB packaging. Ah, but there is a d
- Page 729 and 730:
Figure 11-17 Windows regional setti
- Page 731 and 732:
Figure 11-19 The Windows product ke
- Page 733 and 734:
Figure 11-21 The Windows EULAOn the
- Page 735 and 736:
Figure 11-23 The partitioning scree
- Page 737 and 738:
administrator. The computer needs t
- Page 739 and 740:
Figure 11-26 Choosing privacy setti
- Page 741 and 742:
The phrase “network installation
- Page 743 and 744:
Figure 11-29 Network bootDepending
- Page 745 and 746:
Every Windows installation depends
- Page 747 and 748:
Post-Installation TasksYou might th
- Page 749 and 750:
Migrating and Retiring SystemsSeaso
- Page 751 and 752:
even if it’s simply e-mail messag
- Page 753 and 754:
Figure 11-31 Piriform’s CCleaner
- Page 755 and 756:
Beyond A+Privacy Concerns with Wind
- Page 757 and 758:
C. RAMD. Large monitor5. What tool
- Page 759 and 760:
Windows Under the HoodCHAPTER 12In
- Page 761 and 762:
Try opening one of these root keys
- Page 763 and 764:
Talkin’ RegistryWhen describing a
- Page 765 and 766:
HKLM\SOFTWARE\Microsoft\Windows\Cur
- Page 767 and 768:
Current Windows versions support bo
- Page 769 and 770:
are called applications.There’s a
- Page 771 and 772:
the naughty application and click E
- Page 773 and 774:
PID (Process Identifier) checkbox t
- Page 775 and 776:
Figure 12-9 Processes from all user
- Page 777 and 778:
to find out what it’s doing on yo
- Page 779 and 780:
Imagine you need to render out some
- Page 781 and 782:
Figure 12-13 Services associated wi
- Page 783 and 784:
services directly (see Figure 12-15
- Page 785 and 786:
Figure 12-17 Service Properties dia
- Page 787 and 788:
Figure 12-18 Task Manager Performan
- Page 789 and 790:
ever need—and as a tech you need
- Page 791 and 792:
Figure 12-21 Processes tab in detai
- Page 793 and 794:
usage trend. Note how Firefox’s p
- Page 795 and 796:
Figure 12-24 Performance tab in Win
- Page 797 and 798:
Figure 12-26 Startup tab in Windows
- Page 799 and 800:
a cosmetic update; the same columns
- Page 801 and 802:
The Task Manager should always be t
- Page 803 and 804:
Figure 12-31 Initial Performance Mo
- Page 805 and 806:
Performance Monitor shows data in g
- Page 807 and 808:
find out more about the Component S
- Page 809 and 810:
you to create and manage entries ca
- Page 811 and 812:
A. BIOS does not use bootmgr.B. UEF
- Page 813 and 814:
CHAPTER 13Users, Groups, and Permis
- Page 815 and 816:
NOTE This chapter uses Windows as a
- Page 817 and 818:
“Do you use your pet’s name?”
- Page 819 and 820:
Figure 13-2 Password hint on the Wi
- Page 821 and 822:
• Users Members of the Users grou
- Page 823 and 824:
Figure 13-4 Creating a new user acc
- Page 825 and 826:
Figure 13-6 Adding JimT to the Admi
- Page 827 and 828:
Managing Users in Windows 7Windows
- Page 830 and 831:
Figure 13-10 Settings charmFigure 1
- Page 832 and 833:
Figure 13-13 Manage other accountsO
- Page 834 and 835:
Figure 13-15 Shiny new accountManag
- Page 836 and 837:
Figure 13-17 Family & other peopleT
- Page 838 and 839:
initial release—your mileage may
- Page 840 and 841:
Figure 13-19 The Security tab enabl
- Page 842 and 843:
• If an administrator wants to ac
- Page 844 and 845:
Figure 13-22 Inherited permissionsI
- Page 846 and 847:
or moved, and whether the data is c
- Page 848 and 849:
permissions. Let’s take a short j
- Page 850 and 851:
To change the group, use the follow
- Page 852 and 853:
libraries for Documents, Music, Pic
- Page 854 and 855:
groups NTFS permissions to specific
- Page 856 and 857:
Wizard, discussed shortly. It’s a
- Page 858 and 859:
Figure 13-31 Network access dialog
- Page 860 and 861:
Administrative SharesA close look a
- Page 862 and 863:
Figure 13-33 Click the Advanced but
- Page 864 and 865:
your password, you’re locked out
- Page 866 and 867:
Go applies encryption and password
- Page 868 and 869:
Look at the Maximum password age se
- Page 870 and 871:
Figure 13-39 UAC equivalent on a Ma
- Page 872 and 873:
Figure 13-41 Power Users group—al
- Page 874 and 875:
Figure 13-42 Prompting for an admin
- Page 876 and 877:
shown in Figure 13-46. When you sel
- Page 878 and 879:
Figure 13-47 Darkened UACEXAM TIP T
- Page 880 and 881:
C. User Account CommandD. User Acco
- Page 882 and 883:
user account based on a global Micr
- Page 884 and 885:
users do well, and it’s our job a
- Page 886 and 887:
Figure 14-1 Windows 7 with Service
- Page 888 and 889:
Figure 14-2 Windows Update in Windo
- Page 890 and 891:
Figure 14-4 Windows Update section
- Page 892 and 893:
You can review installed updates by
- Page 894 and 895:
Here is a rundown of key points you
- Page 896 and 897:
Figure 14-10 Software Updater in Ub
- Page 898 and 899:
Figure 14-11 Accessing remote compu
- Page 900 and 901:
drives (HDDs) and solid-state drive
- Page 902 and 903:
Figure 14-14 Optimize Drives in Win
- Page 904 and 905:
Figure 14-15 Ubuntu installation op
- Page 906 and 907:
Figure 14-17 Optimize Drives schedu
- Page 908 and 909:
Figure 14-18 File History schedulin
- Page 910 and 911:
Figure 14-19 Windows 7 System Confi
- Page 912 and 913:
Figure 14-20 Startup tab in Task Ma
- Page 914 and 915:
Startup Applications Preferences in
- Page 916 and 917:
Figure 14-23 System InformationNote
- Page 918 and 919:
Manager in the list; click the Add
- Page 920 and 921:
Optimizing Operating SystemsMainten
- Page 922 and 923:
Figure 14-28 Autorun.inf file open
- Page 924 and 925:
Figure 14-30 Accepting software ter
- Page 926 and 927:
Figure 14-32 Affinity Designer offe
- Page 928 and 929:
Removing SoftwareEach installed pro
- Page 930 and 931:
You may then see a message telling
- Page 932 and 933:
installed Notepad, network support,
- Page 934 and 935:
Figure 14-39 App Store showing an a
- Page 936:
to make your own adjustments.
- Page 939 and 940:
Figure 14-42 Advanced tab of Perfor
- Page 941 and 942:
Figure 14-43 Backup options in Wind
- Page 943 and 944:
Figure 14-45 Backup showing a list
- Page 945 and 946:
Figure 14-47 Backup in progress . .
- Page 947 and 948:
Time Machine in macOSmacOS provides
- Page 949 and 950:
dialog box shown in Figure 14-51. N
- Page 951 and 952:
including every time you install ne
- Page 953 and 954:
NOTE Windows 7 Restore Settings opt
- Page 955 and 956:
B. Run the Driver Rollback tool to
- Page 957 and 958:
CHAPTER 15Working with the Command-
- Page 959 and 960:
You type a command and press enter
- Page 961 and 962:
Figure 15-1 Starting the command pr
- Page 963 and 964:
will always run with administrative
- Page 965 and 966:
password, the prompt will change (u
- Page 967 and 968:
thisfile.txtThe “8.3” format do
- Page 969 and 970:
NOTE Every operating system has som
- Page 971 and 972:
NOTE It helps to visualize a direct
- Page 973 and 974:
Mastering Fundamental CommandsIt’
- Page 975 and 976:
The default prompts in Linux don’
- Page 977 and 978:
Figure 15-8 Typing dir /? in Window
- Page 979 and 980:
Errors Are Good!Consider errors in
- Page 981 and 982:
EXAM TIP Look for the .. option or
- Page 983 and 984:
practice to create the directory:C:
- Page 985 and 986:
works in Windows.So, with that in m
- Page 987 and 988:
the mkdir, cd, and rm commands.Runn
- Page 989 and 990:
macOS and Linux executable programs
- Page 991 and 992:
NOTE Downloading and running comman
- Page 993 and 994:
work with all command-line commands
- Page 995 and 996:
SIM Check out the four “Wildcard
- Page 997 and 998:
Being able to copy and move files i
- Page 999 and 1000:
Pruning and Grafting Folder TreesTh
- Page 1001 and 1002:
EXAM TIP Know xcopy and robocopy fo
- Page 1003 and 1004:
switches.The format command, you ma
- Page 1005 and 1006:
sfcThe Windows sfc (System File Che
- Page 1007 and 1008:
number of ways to access previously
- Page 1009 and 1010:
Just in case you want to know what
- Page 1011 and 1012:
mike@server:~$ sudo ifconfig wlan0
- Page 1013 and 1014:
• RSS: Total physical memory in k
- Page 1015 and 1016:
TIP For some reason, the Red Hat Pa
- Page 1017 and 1018:
Figure 15-17 vi openThe vi editor u
- Page 1019 and 1020:
Granted, it’s important to know h
- Page 1021 and 1022:
shutdown <options> <time>By far the
- Page 1023 and 1024:
Scripting is a kind of programming;
- Page 1025 and 1026:
A way to think of a string is as a
- Page 1027 and 1028:
2. The if statement checks to see i
- Page 1029 and 1030:
Environment VariablesAny system you
- Page 1031 and 1032:
1. Which of the following is an ill
- Page 1033 and 1034:
Answers1. C. Any of these character
- Page 1035 and 1036:
used with macOS, hardware flaws are
- Page 1037 and 1038:
Figure 16-2 Scary errorFailure to B
- Page 1039 and 1040:
NOTE Although here I discuss only h
- Page 1041 and 1042:
Figure 16-4 Making a recovery drive
- Page 1043 and 1044:
The look and feel of Windows RE dif
- Page 1045 and 1046:
Figure 16-8 WinRE Troubleshoot scre
- Page 1047 and 1048:
EXAM TIP Make sure you know how to
- Page 1049 and 1050:
This opens a text file called srttr
- Page 1051 and 1052:
System Restore System Restore does
- Page 1053 and 1054:
Figure 16-14 Selecting a system ima
- Page 1055 and 1056:
Figure 16-16 Confirming your settin
- Page 1057 and 1058:
EXAM TIP You can access the Windows
- Page 1059 and 1060:
This tool includes two other option
- Page 1061 and 1062:
With that attitude in mind, let’s
- Page 1063 and 1064:
winload.exe.The bcdedit command sup
- Page 1065 and 1066:
You can list volumes (or partitions
- Page 1067 and 1068:
Failure to Boot: LinuxLinux offers
- Page 1069 and 1070:
Figure 16-24 shows a Windows Stop e
- Page 1071 and 1072:
into the same discussion as BSoDs a
- Page 1073 and 1074:
Figure 16-26 Safe ModeOnce in Safe
- Page 1075 and 1076:
after you log on. From here you can
- Page 1077 and 1078:
Boot Options menu stops the compute
- Page 1079 and 1080:
Click the ProfileList arrow on the
- Page 1081 and 1082:
created account and access all the
- Page 1083 and 1084:
Figure 16-32 Warning Events openWin
- Page 1085 and 1086:
Figure 16-34 Log Properties dialog
- Page 1087 and 1088:
ServicesWindows loads many services
- Page 1089 and 1090:
see all processes and services curr
- Page 1091 and 1092:
offers four categories of help—Pr
- Page 1093 and 1094:
Figure 16-40 Windows Update trouble
- Page 1095 and 1096:
Figure 16-42 Change Security and Ma
- Page 1097 and 1098:
offline for a while, the BIOS time
- Page 1099 and 1100:
application should try to install i
- Page 1101 and 1102:
(right-click the executable file an
- Page 1103 and 1104:
programs assume the screen to be at
- Page 1105 and 1106:
Figure 16-48 Searching for updates
- Page 1107 and 1108:
driver problems, not just applicati
- Page 1109 and 1110:
NOTE For some unknown reason, Micro
- Page 1111 and 1112:
recovery of corrupted data files ca
- Page 1113 and 1114:
9. Which of the following commands
- Page 1115 and 1116:
CHAPTER 17Display TechnologiesIn th
- Page 1117 and 1118:
LCD MonitorsAlmost every computing
- Page 1119 and 1120:
of glass. When you place this liqui
- Page 1121 and 1122:
If you expose the liquid crystal to
- Page 1123 and 1124:
Figure 17-8 Single character for st
- Page 1125 and 1126:
technologies could provide.Figure 1
- Page 1127 and 1128:
NOTE Samsung offers a proprietary v
- Page 1129 and 1130:
• Brightness• Viewing angle•
- Page 1131 and 1132:
monitor looks kind of grainy, becau
- Page 1133 and 1134:
game.Refresh Rate The refresh rate
- Page 1135 and 1136:
project) it onto a screen or some o
- Page 1137 and 1138:
The proprietary Digital Light Proce
- Page 1139 and 1140:
cost more than metal halide ones, b
- Page 1141 and 1142:
• VGA• DVI• HDMI• DisplayPo
- Page 1143 and 1144:
Figure 17-24 HDMI port on a monitor
- Page 1145 and 1146:
Figure 17-27 HDBaseT port on a proj
- Page 1147 and 1148:
AdjustmentsMost adjustments to the
- Page 1149 and 1150:
Figure 17-32 Dual-monitor stand tha
- Page 1151 and 1152:
Figure 17-34 Typical video cardMoth
- Page 1153 and 1154:
Figure 17-36 PCIe video card connec
- Page 1155 and 1156:
Your choice of graphics processor i
- Page 1157 and 1158:
The majority of video cards, especi
- Page 1159 and 1160:
Figure 17-39 Video card connectors:
- Page 1161 and 1162:
Many high-end video cards come as d
- Page 1163 and 1164:
can drag and drop them to change th
- Page 1165 and 1166:
Figure 17-44 Color Management apple
- Page 1167 and 1168:
Figure 17-46 Monitor in portrait mo
- Page 1169 and 1170:
Figure 17-48 Advanced display setti
- Page 1171 and 1172:
Figure 17-50 Display applet in Wind
- Page 1173 and 1174:
enables you to synchronize multiple
- Page 1175 and 1176:
Figure 17-54 System Preferences in
- Page 1177 and 1178:
Figure 17-56 Changing the wallpaper
- Page 1179 and 1180:
course.Figure 17-58 Windows looking
- Page 1181 and 1182:
Figure 17-59 Wolfenstein 3DWolfenst
- Page 1183 and 1184:
monsters trying to spray you with e
- Page 1185 and 1186:
the game, provide some type of inte
- Page 1187 and 1188:
DirectX 12.Figure 17-64 The DirectX
- Page 1189 and 1190:
there first before you try deleting
- Page 1191 and 1192:
Excessive heat inside the case, eve
- Page 1193 and 1194:
burn-in, so it’s a good idea to p
- Page 1195 and 1196:
NOTE Video cards can handle multipl
- Page 1197 and 1198:
Additional Display TopicsDisplay te
- Page 1199 and 1200:
the vibrant sunlit clouds and deep
- Page 1201 and 1202:
gaming. eGPUs enable you to edit 4K
- Page 1203 and 1204:
D. OpenGL8. Which two kinds of back
- Page 1205 and 1206:
CHAPTER 18Essentials of NetworkingI
- Page 1207 and 1208:
to provide access to Web sites. Two
- Page 1209 and 1210:
Figure 18-4 Sharing a printer in Wi
- Page 1211 and 1212:
A NIC also breaks files into smalle
- Page 1213 and 1214:
1011 = B1100 = C1101 = D1110 = E111
- Page 1215 and 1216:
Here’s a method in Windows. At th
- Page 1217 and 1218:
Figure 18-8 Ethernet star busThe ce
- Page 1219 and 1220:
Cheap and centralized, Ethernet’s
- Page 1221 and 1222:
company, for you youngsters) years
- Page 1223 and 1224:
Like all wires, the wires in UTP ar
- Page 1225 and 1226:
Light can be sent down a fiber opti
- Page 1227 and 1228:
Coax cables are rated using an RG n
- Page 1229 and 1230:
two most common interpretations are
- Page 1231 and 1232:
A bridge is a device that connects
- Page 1233 and 1234:
Third, this type of setup limits yo
- Page 1235 and 1236:
most networks, this cable is a Cat
- Page 1237 and 1238:
Figure 18-22 A short equipment rack
- Page 1239 and 1240:
capabilities. There are even rack-m
- Page 1241 and 1242:
Figure 18-27 Punching down a 110 bl
- Page 1243 and 1244:
cabling. Most manufacturers proudly
- Page 1245 and 1246:
Figure 18-31 Crimper with built-in
- Page 1247 and 1248:
Figure 18-33 Inserting the individu
- Page 1249 and 1250:
Figure 18-35 Properly crimped cable
- Page 1251 and 1252:
Figure 18-37 Typical testerThe Work
- Page 1253 and 1254:
Figure 18-39 Punching down a modula
- Page 1255 and 1256:
1. How many bits are in a MAC addre
- Page 1257 and 1258:
Answers1. C. MAC addresses are 48-b
- Page 1259 and 1260:
NOTE This chapter only covers local
- Page 1261 and 1262:
. . .11111111 = 255Subnet MaskPart
- Page 1263 and 1264:
values (192.168.4), those make up t
- Page 1265 and 1266:
Figure 19-3 Default gatewayDomain N
- Page 1267 and 1268:
was added to the original seven to
- Page 1269 and 1270:
Control Protocol (DHCP). If you hav
- Page 1271 and 1272:
good reason to use UDP: it’s smok
- Page 1273 and 1274:
Click Change adapter settings on th
- Page 1275 and 1276:
ipconfig/ifconfig Windows offers th
- Page 1277 and 1278:
gateway, DNS servers, and WINS serv
- Page 1279 and 1280:
than others? Part of the blame coul
- Page 1281 and 1282:
subnet mask is entered automaticall
- Page 1283 and 1284:
IPv6 uses a colon as a separator, i
- Page 1285 and 1286:
NOTE The unspecified address (all z
- Page 1287 and 1288:
from their routers.Global Unicast A
- Page 1289 and 1290:
IPv6 and also has a global address,
- Page 1291 and 1292:
device is giving you problems (Figu
- Page 1293 and 1294:
Figure 19-20 Multispeed lightsA pro
- Page 1295 and 1296:
Figure 19-21 Wake-on-LAN settings o
- Page 1297 and 1298:
NOTE Your BIOS might also have sett
- Page 1299 and 1300:
single physical network into two or
- Page 1301 and 1302:
By default, all computers on the ne
- Page 1303 and 1304:
NOTE Linux distros require a lot mo
- Page 1305 and 1306:
watch a typical folder share take p
- Page 1307 and 1308:
Figure 19-28 Sharing tab for Music
- Page 1309 and 1310:
Figure 19-30 Permissions for the ab
- Page 1311 and 1312:
Figure 19-31 Computers A and BA per
- Page 1313 and 1314:
Figure 19-33 WorkgroupFigure 19-34
- Page 1315 and 1316:
Figure 19-35 Windows ServerEXAM TIP
- Page 1317 and 1318:
Figure 19-37 Active Directory netwo
- Page 1319 and 1320:
Figure 19-39 Joining a domainRemovi
- Page 1321 and 1322:
dialog box. Figure 19-42 show the d
- Page 1323 and 1324:
Figure 19-43 Reset Password dialog
- Page 1325 and 1326:
though, because it’s a new home f
- Page 1327 and 1328:
EXAM TIP HomeGroup works in Windows
- Page 1329 and 1330:
Figure 19-47 Create a Homegroup dia
- Page 1331 and 1332:
Figure 19-49 Homegroup configuredLe
- Page 1333 and 1334:
libraries to see the shared folders
- Page 1335 and 1336:
Sharing PrintersSharing printers in
- Page 1337 and 1338:
or “intermittent connectivity.”
- Page 1339 and 1340:
Look for errors that point to physi
- Page 1341 and 1342:
The vast majority of network discon
- Page 1343 and 1344:
Figure 19-57 Fox and HoundEXAMEXAM
- Page 1345 and 1346:
password.• The folder or printer
- Page 1347 and 1348:
You can also query a remote machine
- Page 1349 and 1350:
3. Which of the following is the co
- Page 1351 and 1352:
cached names.6. C. The lights shoul
- Page 1353 and 1354:
Association (IrDA) protocol. Finall
- Page 1355 and 1356:
Figure 20-3 External USB wireless N
- Page 1357 and 1358:
mobile devices like smartphones and
- Page 1359 and 1360:
Figure 20-6 Bluetooth keyboard and
- Page 1361 and 1362:
Figure 20-7 Wireless configuration
- Page 1363 and 1364:
Infrastructure ModeWireless network
- Page 1365 and 1366:
and data encryption. But before any
- Page 1367 and 1368:
creating a type of “accepted user
- Page 1369 and 1370:
AES wireless encryption types.WPA3
- Page 1371 and 1372:
network signals very effectively. O
- Page 1373 and 1374:
networks. Each of these versions of
- Page 1375 and 1376:
Many 802.11n WAPs employ transmit b
- Page 1377 and 1378:
Try This! 802.11ac Products802.11ac
- Page 1379 and 1380:
Bluetooth) is designed to create sm
- Page 1381 and 1382:
network-aware smartphone, tablet, o
- Page 1383 and 1384:
using DHCP) and ensuring that the F
- Page 1385 and 1386:
Figure 20-14 Linksys WAP setup scre
- Page 1387 and 1388:
Figure 20-16 Basic properties panel
- Page 1389 and 1390:
Figure 20-17 Encryption screen on c
- Page 1391 and 1392:
EXAM TIP TACACS dates back to 1984,
- Page 1393 and 1394:
Figure 20-20 Linksys router sportin
- Page 1395 and 1396:
Figure 20-22 WAP with replacement a
- Page 1397 and 1398:
use a Wi-Fi or wireless locator. Th
- Page 1399 and 1400:
while others must be set to pairing
- Page 1401 and 1402:
manufacturers developed add-on cell
- Page 1403 and 1404:
hardware, software, connectivity, o
- Page 1405 and 1406:
work. Wireless clients use a multi-
- Page 1407 and 1408:
give an error message indicating
- Page 1409 and 1410:
B. 4 MbpsC. 11 MbpsD. 54 Mbps8. Blu
- Page 1411 and 1412:
CHAPTER 21The InternetIn this chapt
- Page 1413 and 1414:
Commonwealth University in Richmond
- Page 1415 and 1416:
on the Internet.Because you spent a
- Page 1417 and 1418:
from Chapter 19, the router to whic
- Page 1419 and 1420:
Figure 21-6 Analog signals used by
- Page 1421 and 1422:
Figure 21-8 An internal modemContem
- Page 1423 and 1424:
Select Connect to the Internet and
- Page 1425 and 1426:
connects much faster than modems, e
- Page 1427 and 1428:
Figure 21-13 DSL connectionNOTE The
- Page 1429 and 1430:
verse), which generally offers down
- Page 1431 and 1432:
house. To support higher bandwidths
- Page 1433 and 1434:
Figure 21-17 Real-world LTE speed t
- Page 1435 and 1436:
Figure 21-18 TetheringThe fifth-gen
- Page 1437 and 1438:
2. Connect a network of computers t
- Page 1439 and 1440:
Figure 21-20 Router asking for user
- Page 1441 and 1442:
connect to other UPnP devices. This
- Page 1443 and 1444:
NOTE While these methods are genera
- Page 1445 and 1446:
the objectives but I’ve added for
- Page 1447 and 1448:
and VoIP [SIP]). Table 21-2 does th
- Page 1449 and 1450:
Figure 21-26 Mozilla Firefox showin
- Page 1451 and 1452:
Figure 21-27 Internet Options apple
- Page 1453 and 1454:
Figure 21-29 The Advanced tab in In
- Page 1455 and 1456:
quickly talk about uses for proxy s
- Page 1457 and 1458:
Figure 21-30 Mozilla Firefox Option
- Page 1459 and 1460:
To set up and access e-mail, you ha
- Page 1461 and 1462:
Figure 21-32 Web-based e-mailEXAM T
- Page 1463 and 1464:
Figure 21-34 Accessing an FTP site
- Page 1465 and 1466:
preventing any eavesdroppers from r
- Page 1467 and 1468:
Figure 21-37 Arris VoIP telephony m
- Page 1469 and 1470:
Figure 21-38 TightVNC in actionNOTE
- Page 1471 and 1472:
NOTE The name of the Remote Desktop
- Page 1473 and 1474:
EXAM TIP Windows is also capable of
- Page 1475 and 1476:
Figure 21-42 Typical tunnelNOTE An
- Page 1477 and 1478:
Figure 21-44 RRAS in actionOn the W
- Page 1479 and 1480:
Your client takes on an IP address
- Page 1481 and 1482:
Before, the options for obtaining d
- Page 1483 and 1484:
dialects is Common Internet File Sy
- Page 1485 and 1486:
Figure 21-49 Controlling my Honeywe
- Page 1487 and 1488:
The big four (Amazon, Apple, Google
- Page 1489 and 1490:
Internet troubleshooting, and we’
- Page 1491 and 1492:
Figure 21-53 Diagnosing a network p
- Page 1493 and 1494:
Figure 21-54 Router’s WAN IP addr
- Page 1495 and 1496:
netstat, which shows all the connec
- Page 1497 and 1498:
with another human can be challengi
- Page 1499 and 1500:
A. 22B. 110C. 42D. 2563. What advan
- Page 1501 and 1502:
5. A, B. You can use either Interne
- Page 1503 and 1504:
So now Mario has two dedicated comp
- Page 1505 and 1506:
These management advantages turn ou
- Page 1507 and 1508:
systems manifest. Figure 22-3 shows
- Page 1509 and 1510:
Figure 22-5 Hypervisor on a generic
- Page 1511 and 1512:
Another very popular hypervisor is
- Page 1513 and 1514:
portion of its power to individual
- Page 1515 and 1516:
Every Intel-based CPU since the lat
- Page 1517 and 1518:
Figure 22-12 Single VM file taking
- Page 1519 and 1520:
Bridged Networking When most people
- Page 1521 and 1522:
network. I have a number of VMs tha
- Page 1523 and 1524:
Figure 22-16 Oracle VM VirtualBox M
- Page 1525 and 1526:
Figure 22-18 Selecting the amount o
- Page 1527 and 1528:
and as the figure shows, I’ve poi
- Page 1529 and 1530:
handle every input and output that
- Page 1531 and 1532:
hypervisor that’s powerful enough
- Page 1533 and 1534:
single system and provide storage s
- Page 1535 and 1536:
resources, he increases his options
- Page 1537 and 1538:
Figure 22-27 Amazon Web Services Ma
- Page 1539 and 1540:
Figure 22-29 Creating an instance o
- Page 1541 and 1542:
Platform as a ServiceWeb applicatio
- Page 1543 and 1544:
charge for access. Other Web applic
- Page 1545 and 1546:
Private CloudIf a business wants so
- Page 1547 and 1548:
Why We CloudCloud computing is the
- Page 1549 and 1550:
With Office 365, Microsoft changed
- Page 1551 and 1552:
A. CheckpointB. SaveC. SnapshotD. Z
- Page 1553 and 1554:
to be confused with a true backup.4
- Page 1555 and 1556:
Portable Computing DevicesAll porta
- Page 1557 and 1558:
Figure 23-2 Older full-size laptop
- Page 1559 and 1560:
Figure 23-4 Microsoft Surface Pro 6
- Page 1561 and 1562:
nearest the user, or behind the key
- Page 1563 and 1564:
EXAM TIP In the past it was common
- Page 1565 and 1566:
in bright light. Using such a lapto
- Page 1567 and 1568:
Figure 23-8 Standard audio portsYou
- Page 1569 and 1570:
choices!You can control what the ex
- Page 1571 and 1572:
802.11, Bluetooth, and wired Ethern
- Page 1573 and 1574:
Figure 23-14 Ethernet port on lapto
- Page 1575 and 1576:
Table 23-1 ExpressCard SpeedsStorag
- Page 1577 and 1578:
HDMI, USB Type-A (2, 3, 3.1), RJ-45
- Page 1579 and 1580:
polymer shape rather than an organi
- Page 1581 and 1582:
NOTE Low-power mode names can diffe
- Page 1583 and 1584:
Figure 23-20 CMOS with ACPI setup o
- Page 1585 and 1586:
Figure 23-23 Windows 10 hibernation
- Page 1587 and 1588:
files on my laptop before I leave,
- Page 1589 and 1590:
appropriate screen cleaner (not a g
- Page 1591 and 1592:
sure to remove any optical disks fr
- Page 1593 and 1594:
Figure 23-28 Cable lockAn alternati
- Page 1595 and 1596:
Figure 23-29 Bare-minimum laptop re
- Page 1597 and 1598:
Once you’ve found the appropriate
- Page 1599 and 1600:
is to add more RAM. Luckily, most l
- Page 1601 and 1602:
Figure 23-33 Removing a RAM panelFi
- Page 1603 and 1604:
than 8 TB of data! Unfortunately, m
- Page 1605 and 1606:
underside of the computer—and rel
- Page 1607 and 1608:
but replacing them generally falls
- Page 1609 and 1610:
compatible with the portable. Just
- Page 1611 and 1612:
touchscreen display offers even mor
- Page 1613 and 1614:
Once you have the portable stripped
- Page 1615 and 1616:
• A swollen battery will probably
- Page 1617 and 1618:
CCFL technology.) The clue here is
- Page 1619 and 1620:
location services are enabled both
- Page 1621 and 1622:
device, it may be tempting to hold
- Page 1623 and 1624:
A. CRTB. LCDC. OLEDD. Plasma7. Stev
- Page 1625 and 1626:
CHAPTER 24Understanding Mobile Devi
- Page 1627 and 1628:
are best understood as devices purp
- Page 1629 and 1630:
smartphones do so much more than si
- Page 1631 and 1632:
components they are named after, we
- Page 1633 and 1634:
NOTE Wearable devices aren’t desi
- Page 1635 and 1636:
Figure 24-8 Typical cam chat setupA
- Page 1637 and 1638:
Figure 24-10 IKEA AR app on the loo
- Page 1639 and 1640:
(see Figure 24-11).Figure 24-11 Aut
- Page 1641 and 1642:
Figure 24-12 Waze in actionAnother
- Page 1643 and 1644:
bicycle. You can also buy hand-held
- Page 1645 and 1646:
room for abuse of power.1002Mobile
- Page 1647 and 1648:
company philosophy and goals. A com
- Page 1649 and 1650:
Figure 24-15 iOS 12iOS apps are alm
- Page 1651 and 1652:
NOTE Android-based devices may be m
- Page 1653 and 1654:
Figure 24-17 Option to enable Wi-Fi
- Page 1655 and 1656:
Figure 24-18 Xcode running an app w
- Page 1657 and 1658:
Additionally, smartphone manufactur
- Page 1659 and 1660:
PRL, PRI, and Baseband Updates As m
- Page 1661 and 1662:
block that device from accessing th
- Page 1663 and 1664:
EXAM TIP Remember the differences b
- Page 1665 and 1666:
portal.Configuring a Mobile DeviceM
- Page 1667 and 1668:
even though they dominate the U.S.
- Page 1669 and 1670:
Android Expansion OptionsDevices th
- Page 1671 and 1672:
Figure 24-30 shows a diminutive App
- Page 1673 and 1674:
Figure 24-31 App StoreTo add an app
- Page 1675 and 1676:
steps (see Figure 24-33) and a vali
- Page 1677 and 1678:
Network ConnectivityMobile devices
- Page 1679 and 1680:
(or Networks) option to see availab
- Page 1681 and 1682:
your device can do more than one ty
- Page 1683 and 1684:
Figure 24-37 Default e-mail types o
- Page 1685 and 1686:
Figure 24-39 Setting up a secure IM
- Page 1687 and 1688:
SynchronizationFrom the first day m
- Page 1689 and 1690:
these functions include the ability
- Page 1691 and 1692:
a device won’t sync even after ge
- Page 1693 and 1694:
Lightning ConnectorWith the iPhone
- Page 1695 and 1696:
EXAM TIP You will likely see micro-
- Page 1697 and 1698:
EXAM TIP Most mobile devices have B
- Page 1699 and 1700:
InfraredNow largely replaced by oth
- Page 1701 and 1702:
range of features. Some of the most
- Page 1703 and 1704:
B. SDKC. Virtual assistantD. Digiti
- Page 1705 and 1706:
B. User name and passwordC. User na
- Page 1707 and 1708:
CHAPTER 25Care and Feeding of Mobil
- Page 1709 and 1710:
NOTE Most of these tools either are
- Page 1711 and 1712:
Figure 25-1 Force stop in AndroidSo
- Page 1713 and 1714:
Take extra care not to confuse a ha
- Page 1715 and 1716:
Figure 25-2 Cleaning a smartphonePe
- Page 1717 and 1718:
TIP For a good dose of tech-oriente
- Page 1719 and 1720:
well they explain the device’s te
- Page 1721 and 1722:
Know how long a given user’s devi
- Page 1723 and 1724:
on when you receive a notification.
- Page 1725 and 1726:
chargers or batteries, especially i
- Page 1727 and 1728:
you to either remove an offending a
- Page 1729 and 1730:
NOTE In addition to signal issues,
- Page 1731 and 1732:
even when you know you’re blocks
- Page 1733 and 1734:
System LockoutSystem lockout occurs
- Page 1735 and 1736:
Companies at the other end of the s
- Page 1737 and 1738:
You should also develop profiles th
- Page 1739 and 1740:
Combating MalwareMalware on mobile
- Page 1741 and 1742:
Figure 25-10 Passcode option in Set
- Page 1743 and 1744:
Figure 25-11 Locating a device in i
- Page 1745 and 1746:
devices. Log in and follow the same
- Page 1747 and 1748:
multifactor authentication. Only on
- Page 1749 and 1750:
authentication methods. Access to a
- Page 1751 and 1752:
Figure 25-15 An Android firewall ap
- Page 1753 and 1754:
device manager), or similar softwar
- Page 1755 and 1756:
target.Figure 25-17 My Android-base
- Page 1757 and 1758:
Figure 25-18 Combined anti-malware
- Page 1759 and 1760:
mobile device problems.Unexpected R
- Page 1761 and 1762:
Earlier, we looked at dropped and w
- Page 1763 and 1764:
is reported missing. Once you know
- Page 1765 and 1766:
Figure 25-19 Four Android apps prom
- Page 1767 and 1768:
Figure 25-20 Apps with permission t
- Page 1769 and 1770:
D. Factor authentication6. Jailbrea
- Page 1771 and 1772:
CHAPTER 26Printers and Multifunctio
- Page 1773 and 1774:
and scanner of some sort—with the
- Page 1775 and 1776:
Figure 26-3 Inside a dot-matrix pri
- Page 1777 and 1778:
boil the ink; this creates a tiny a
- Page 1779 and 1780:
the color flow.The two key features
- Page 1781 and 1782:
Figure 26-8 The dye-sublimation pri
- Page 1783 and 1784:
a color laser printer, but most las
- Page 1785 and 1786:
Figure 26-11 Laser printer’s tone
- Page 1787 and 1788:
charged drum. To prevent the paper
- Page 1789 and 1790:
Flashing is a lot like upgrading th
- Page 1791 and 1792:
the stylized replacement game piece
- Page 1793 and 1794:
EXAM TIP The CompTIA A+ 1001 exam o
- Page 1795 and 1796:
HP Printer Command Language (PCL) H
- Page 1797 and 1798:
Figure 26-16 Scanner open with phot
- Page 1799 and 1800:
Figure 26-18 Acquiring an image in
- Page 1801 and 1802:
downside: images scanned at 48 bits
- Page 1803 and 1804:
or you’ll get a light that’s st
- Page 1805 and 1806:
the printer to a single computer an
- Page 1807 and 1808:
ProcessingWhen you click the Print
- Page 1809 and 1810:
Figure 26-24 RET fills in gaps with
- Page 1811 and 1812:
Figure 26-26 Writing the image and
- Page 1813 and 1814:
CleaningThe printing process ends w
- Page 1815 and 1816:
by the sheer number of options to c
- Page 1817 and 1818:
Figure 26-30 Printers & scanners in
- Page 1819 and 1820:
to finish the installation. The Win
- Page 1821 and 1822:
NOTE Remember printer sharing from
- Page 1823 and 1824:
Beth’s computer and Carol’s com
- Page 1825 and 1826:
that with these printer drivers, I
- Page 1827 and 1828:
laying out booklets.• The orienta
- Page 1829 and 1830:
calibration, but the 1001 objective
- Page 1831 and 1832:
restricting the features each user
- Page 1833 and 1834:
If the printer does have connectivi
- Page 1835 and 1836:
administrator privileges to continu
- Page 1837 and 1838:
Misaligned or garbage printouts (Co
- Page 1839 and 1840:
EXAM TIP MSDSs contain important in
- Page 1841 and 1842:
Compared to other printer styles, t
- Page 1843 and 1844:
routine. Some printers will even do
- Page 1845 and 1846:
those details, you need to review s
- Page 1847 and 1848:
roller (the Teflon-coated one with
- Page 1849 and 1850:
“developer starvation.” If you
- Page 1851 and 1852:
easy to replace.Paper Not Feeding I
- Page 1853 and 1854:
D. Electroconductive plates2. With
- Page 1855 and 1856:
proper process.4. B. Printwires phy
- Page 1857 and 1858:
malware.1002Analyzing ThreatsThreat
- Page 1859 and 1860:
NOTE Social engineering attacks are
- Page 1861 and 1862:
Data DestructionOften an extension
- Page 1863 and 1864:
physically!NOTE Physical security f
- Page 1865 and 1866:
computers reside, you need to monit
- Page 1867 and 1868:
room temperature, which is somewher
- Page 1869 and 1870:
arranging and layering many pieces
- Page 1871 and 1872:
logon screen on resume—can help a
- Page 1873 and 1874:
EXAM TIP The 1002 exam will quiz yo
- Page 1875 and 1876:
as shown in Figure 27-8.Figure 27-8
- Page 1877 and 1878:
Figure 27-11 Microsoft keyboard wit
- Page 1879 and 1880:
Figure 27-13 Unlocking an iPhone vi
- Page 1881 and 1882:
Watch out for default user accounts
- Page 1883 and 1884:
Internet, redirect home folders, ru
- Page 1885 and 1886:
system left from a migrated user, f
- Page 1887 and 1888:
personal license, or multiple users
- Page 1889 and 1890:
auditing within Windows so that the
- Page 1891 and 1892:
Incident Reporting Once you’ve ga
- Page 1893 and 1894:
custody.Network SecurityNetworks ar
- Page 1895 and 1896:
Knowing what form the malware takes
- Page 1897 and 1898:
EXAM TIP Know the various types of
- Page 1899 and 1900:
applies to other attacks. You can b
- Page 1901 and 1902:
threats that greet modern Web users
- Page 1903 and 1904:
Figure 27-20 Windows 10 Virus & thr
- Page 1905 and 1906:
mail from specific people—good to
- Page 1907 and 1908:
EXAM TIP The 1002 exam objectives l
- Page 1909 and 1910:
possible, add an appliance that run
- Page 1911 and 1912:
SIM Check out the excellent Challen
- Page 1913 and 1914:
Figure 27-24 A Windows 10 virus shi
- Page 1915 and 1916:
back up safely into service. The 10
- Page 1917 and 1918:
many online anti-malware sites you
- Page 1919 and 1920:
they should not install and use on
- Page 1921 and 1922:
Figure 27-27 Default Web interfaceA
- Page 1923 and 1924:
Figure 27-29 Port forwardingPort fo
- Page 1925 and 1926:
Figure 27-31 DMZ set up on a SOHO r
- Page 1927 and 1928:
Windows Defender Firewall on or off
- Page 1929 and 1930:
firewall settings for each network
- Page 1931 and 1932:
concept and expands it to include c
- Page 1933 and 1934:
just a single user sitting in front
- Page 1935 and 1936:
Figure 27-37 A secure Web siteTIP M
- Page 1937 and 1938:
Figure 27-38 Trusted authoritiesIf
- Page 1939 and 1940:
secure WPA2, and configure clients
- Page 1941 and 1942:
D. User Settings8. John dressed up
- Page 1943 and 1944:
CHAPTER 28Operational ProceduresIn
- Page 1945 and 1946:
Figure 28-1 Typical network topolog
- Page 1947 and 1948:
Company PoliciesOrganizations adopt
- Page 1949 and 1950:
on the other hand, uses a battery o
- Page 1951 and 1952:
you’ll almost certainly need to d
- Page 1953 and 1954:
systems, lists of new users created
- Page 1955 and 1956:
them.Another big question is how mu
- Page 1957 and 1958:
party backup software and off-site
- Page 1959 and 1960:
Figure 28-7 Backing up the accounti
- Page 1961 and 1962:
Figure 28-8 Macrium Reflect - Free
- Page 1963 and 1964:
Backup tools worth your time and mo
- Page 1965 and 1966:
Chapter ReviewQuestions1. Henry get
- Page 1967 and 1968:
D. Risk analysis8. Which device pro
- Page 1969:
Mapping to the CompTIA A+Objectives
- Page 2022 and 2023:
APPENDIX BAbout the Online ContentT
- Page 2024 and 2025:
Duration of License Access to your
- Page 2026 and 2027:
review the questions with answers a
- Page 2028 and 2029:
GLOSSARY10BaseT Ethernet cabling sy
- Page 2030 and 2031:
with a theoretical maximum throughp
- Page 2032 and 2033:
Administrative Tools Group of Contr
- Page 2034 and 2035:
anti-aliasing In computer imaging,
- Page 2036 and 2037:
augmented reality (AR) Using some f
- Page 2038 and 2039:
and even the network itself. This p
- Page 2040 and 2041:
baud One analog cycle on a telephon
- Page 2042 and 2043:
for how to actually load (bootstrap
- Page 2044 and 2045:
defects.bus Series of wires connect
- Page 2046 and 2047:
cd Command-line utility for changin
- Page 2048 and 2049:
change management A well-defined pr
- Page 2050 and 2051:
client-side virtualization Using a
- Page 2052 and 2053:
an 8-bit alpha channel for transpar
- Page 2054 and 2055:
Management.computing process Four p
- Page 2056 and 2057:
cron Tool used by many Linux distri
- Page 2058 and 2059:
DDR2 SDRAM.DDR3L Low-voltage versio
- Page 2060 and 2061:
dictionary attack Type of brute for
- Page 2062 and 2063:
available system memory. When syste
- Page 2064 and 2065:
account database and a common secur
- Page 2066 and 2067:
dumpster diving To go through someo
- Page 2068 and 2069:
(ESD), lightning, nuclear detonatio
- Page 2070 and 2071:
drives.escalate Process used when p
- Page 2072 and 2073:
extension See file extension.extern
- Page 2074 and 2075:
file system Scheme that directs how
- Page 2076 and 2077:
each version of Windows. See also d
- Page 2078 and 2079:
gearbox Separate units or packages,
- Page 2080 and 2081:
GUI (graphical user interface) Inte
- Page 2082 and 2083:
hex (hexadecimal) Base-16 numbering
- Page 2084 and 2085:
network file transfers in the WWW e
- Page 2086 and 2087:
IEEE 802.11 Wireless Ethernet stand
- Page 2088 and 2089:
text or images on a piece of paper
- Page 2090 and 2091:
a common layer over dissimilar netw
- Page 2092 and 2093:
authentication devices, are commonl
- Page 2094 and 2095:
and often slower than the L1 cache,
- Page 2096 and 2097:
logon screen First screen of the Wi
- Page 2098 and 2099:
your wishes. Includes adware, spywa
- Page 2100 and 2101:
memory addressing Taking memory add
- Page 2102 and 2103:
At a miniscule 6.7 by 6.7 inches, M
- Page 2104 and 2105:
mouse Input device that enables use
- Page 2106 and 2107:
addresses. The system running the N
- Page 2108 and 2109:
frame type, to the cabling and conn
- Page 2110 and 2111:
NX bit Technology that enables the
- Page 2112 and 2113:
emergency, or network equipment fai
- Page 2114 and 2115:
flash drive with which users can re
- Page 2116 and 2117:
Performance Tab in Task Manager tha
- Page 2118 and 2119:
PKI (public key infrastructure) Aut
- Page 2120 and 2121:
anywhere in 3-D space.POST (power-o
- Page 2122 and 2123:
primary charge roller.primary parti
- Page 2124 and 2125:
Programs and Features Windows Contr
- Page 2126 and 2127:
such as tracking inventory, identif
- Page 2128 and 2129:
Recycle Bin Location to which files
- Page 2130 and 2131:
settings—and presents a fresh ins
- Page 2132 and 2133:
rm Linux command for deleting files
- Page 2134 and 2135:
SATA (serial ATA) Serialized versio
- Page 2136 and 2137:
properly signed software. This incl
- Page 2138 and 2139:
line interpreter.shoulder surfing L
- Page 2140 and 2141:
S/MIME (Secure/Multipurpose Interne
- Page 2142 and 2143:
Spinning Pinwheel of Death (SpoD) A
- Page 2144 and 2145:
static charge eliminator Laser prin
- Page 2146 and 2147:
SVGA mode if the video driver is co
- Page 2148 and 2149:
recent working configuration when s
- Page 2150 and 2151:
telephone scams Social engineering
- Page 2152 and 2153:
tiers Levels of Internet providers,
- Page 2154 and 2155:
transfer rate Rate of data transfer
- Page 2156 and 2157:
Ultrabook Thin, powerful laptop pow
- Page 2158 and 2159:
User Datagram Protocol (UDP) Connec
- Page 2160 and 2161:
Y, and Z position in a 3-D world.VE
- Page 2162 and 2163:
system or data. A virus can’t sel
- Page 2164 and 2165:
Wi-Fi Protected Setup (WPS) A stand
- Page 2166 and 2167:
work area In a basic structured cab
- Page 2168 and 2169:
INDEXPlease note that index links p
- Page 2170 and 2171:
using multimeter to test outlets fo
- Page 2172 and 2173:
installing network printer, 1214-12
- Page 2174 and 2175:
AMD (Advanced Micro Devices)CPU dev
- Page 2176 and 2177:
update options in macOS, 582-583app
- Page 2178 and 2179:
assertive communication, 6-7asset t
- Page 2180 and 2181:
auto-switching power supplies, 253,
- Page 2182 and 2183:
adding/replacing RAM on portable co
- Page 2184 and 2185:
blank pages, troubleshooting laser
- Page 2186 and 2187:
BSoD (Blue Screen of Death)bad RAM
- Page 2188 and 2189:
carriage, inkjet printer, 1184carri
- Page 2190 and 2191:
Character Map, Windows 7 System Too
- Page 2192 and 2193:
pruning and grafting folder trees,
- Page 2194 and 2195:
coaxial cablingEthernet with, 814-8
- Page 2196 and 2197:
hazardous materials, 1247licensing,
- Page 2198 and 2199:
parts, 32-34stages of, 35-36conditi
- Page 2200 and 2201:
Thunderbolt, 400-401troubleshooting
- Page 2202 and 2203:
external data bus (EDB), 88installa
- Page 2204 and 2205:
troubleshooting hard drives, 381-38
- Page 2206 and 2207:
Bring Your Own BIOS and, 192-193bui
- Page 2208 and 2209:
double-sided, 147ECC DRAM, 149-150i
- Page 2210 and 2211:
disk thrashing, 155Disk Utility, ma
- Page 2212 and 2213:
DMM (digital multimeter), 254-255DN
- Page 2214 and 2215:
video RAM vs., 764-765drive bay fan
- Page 2216 and 2217:
dynamic range, 794dynamic storage p
- Page 2218 and 2219:
encrypting file system (EFS), 560-5
- Page 2220 and 2221:
unshielded twisted pair (UTP) cabli
- Page 2222 and 2223:
ExpressCards, 34mm and 54mm, 1048-1
- Page 2224 and 2225:
overview of, 337-339fax components,
- Page 2226 and 2227:
overview of, 1283providing unified
- Page 2228 and 2229:
foreign drive, Disk Management, 355
- Page 2230 and 2231:
GG (giga), in computing, 94G-Sync,
- Page 2232 and 2233:
unauthorized location tracking in m
- Page 2234 and 2235:
Hard Drive Initialization Wizard, D
- Page 2236 and 2237:
hash tables, passwords, 1269hazardo
- Page 2238 and 2239:
HKEY_LOCAL_MACHINE root key, Regist
- Page 2240 and 2241:
iOS device integration for e-mail,
- Page 2242 and 2243:
1109in-place upgrade, as upgrade in
- Page 2244 and 2245:
configuring IP addressing, 858conne
- Page 2246 and 2247:
tiers, 936-938troubleshooting, 989-
- Page 2248 and 2249:
home automation lighting, 985-986ho
- Page 2250 and 2251:
Jjailbreak, as unauthorized root ac
- Page 2252 and 2253:
converting into tablets as converti
- Page 2254 and 2255:
LCD (liquid crystal display) monito
- Page 2256 and 2257:
file systems, 349GParted partition
- Page 2258 and 2259:
physical access control via, 1248-1
- Page 2260 and 2261:
tech launch points, 70-73Time Machi
- Page 2262 and 2263:
man-in-the-middle (MITM) attack, ma
- Page 2264 and 2265:
recording IMEI, ICCID, and IMSI num
- Page 2266 and 2267:
Mini-ITX (mITX) form factor, 211-21
- Page 2268 and 2269:
speaker sound, 1152-1153swollen bat
- Page 2270 and 2271:
as computing hardware, 38defined, 7
- Page 2272 and 2273:
MP4 video format, 425mSATA form fac
- Page 2274 and 2275:
net command, viewing network quickl
- Page 2276 and 2277:
overview of, 799review Q & A, 830-8
- Page 2278 and 2279:
objects, in Performance Monitor, 51
- Page 2280 and 2281:
summary, 1315-1316optical discs, tr
- Page 2282 and 2283:
failure to boot. See boot failurefa
- Page 2284 and 2285:
parabolic dish-type antennas, 923Pa
- Page 2286 and 2287:
valid password reset disk when usin
- Page 2288 and 2289:
PDAs (personal digital assistants),
- Page 2290 and 2291:
Personalization Applet, Windows 8.1
- Page 2292 and 2293:
portable battery recharger, 1148por
- Page 2294 and 2295:
post-installation tasks, 477-481Pos
- Page 2296 and 2297:
display settings in macOS, 776-779P
- Page 2298 and 2299:
print spooler, 1209, 1222-1224setup
- Page 2300 and 2301:
running in Windows from command lin
- Page 2302 and 2303:
radio frequency identification (RFI
- Page 2304 and 2305:
Task Manager Performance tab and, 5
- Page 2306 and 2307:
recovering deleted files, 343-344Re
- Page 2308 and 2309:
repeat delay/rate, keyboard configu
- Page 2310 and 2311:
modems, 941telephones, 810RJ-45 con
- Page 2312 and 2313:
SS/MIME (Secure/Multipurpose Intern
- Page 2314 and 2315:
hybrid laptops/tablets, 1038trouble
- Page 2316 and 2317:
security guards, controlling mantra
- Page 2318 and 2319:
homegroups, 877-883network organiza
- Page 2320 and 2321:
SLC (single-level cell) memory, SSD
- Page 2322 and 2323:
socket typesCPU installation, 116-1
- Page 2324 and 2325:
creating dynamic disks, 361, 363-36
- Page 2326 and 2327:
spywaredetection/removal software,
- Page 2328 and 2329:
Windows 8/8.1, 45-49Windows 10, 52S
- Page 2330 and 2331:
power protection with, 1308protecti
- Page 2332 and 2333:
System Protection, Volume Copy Shad
- Page 2334 and 2335:
troubleshooting autoloading program
- Page 2336 and 2337:
Bluetooth pairing process, 926cable
- Page 2338 and 2339:
Tier 1 Internet providers, 936, 938
- Page 2340 and 2341:
transfer corona/roller, laser print
- Page 2342 and 2343:
strange sizes, 1224thermal printers
- Page 2344 and 2345:
problems with, 726-727software, 604
- Page 2346 and 2347:
Windows installation using, 455-457
- Page 2348 and 2349:
for every user account, 528-529FTP
- Page 2350 and 2351:
vertical sync (V-sync), 795vertices
- Page 2352 and 2353:
optimizing with Performance Options
- Page 2354 and 2355:
voice commands, portable computers,
- Page 2356 and 2357:
calculating power needs, 274CPUs co
- Page 2358 and 2359:
choosing edition to install, 465-46
- Page 2360 and 2361:
managing users, 541-544Optimize Dri
- Page 2362 and 2363:
NTFS, 345-348Windows Hardware Certi
- Page 2364 and 2365:
components, 895-899IEEE 802.11 stan
- Page 2366:
Yahoo e-mail, 1125YouTube, laptop r
Inappropriate
Loading...
Inappropriate
You have already flagged this document.
Thank you, for helping us keep this platform clean.
The editors will have a look at it as soon as possible.
Mail this publication
Loading...
Embed
Loading...
Delete template?
Are you sure you want to delete your template?
DOWNLOAD ePAPER
This ePaper is currently not available for download.
You can find similar magazines on this topic below under ‘Recommendations’.