<p>Introduction xxxiii<br> <strong>Chapter 1</strong> Introduction to Personal Computer Hardware 1<br> Objectives 1<br> Key Terms 1<br> Introduction to Personal Computers (1.0) 5<br> Personal Computer Safety (1.1) 5<br> What Is in a Computer? (1.1.1) 5<br> Electrical and ESD Safety (1.1.2) 6<br> PC Components (1.2) 7<br> Case and Power Supplies (1.2.1) 7<br> Motherboards (1.2.2) 13<br> CPUs and Cooling Systems (1.2.3) 18<br> Memory (1.2.4) 20<br> Adapter Cards and Expansion Slots (1.2.5) 27<br> Hard Disk Drives and SSDs (1.2.6) 31<br> Optical Storage Devices (1.2.7) 35<br> Ports, Cables, and Adapters (1.2.8) 37<br> Input Devices (1.2.9) 46<br> Output Devices (1.2.10) 54<br> Computer Disassembly (1.3) 58<br> The Technician's Toolkit (1.3.1) 58<br> Computer Disassembly (1.3.2) 58<br> Summary (1.4) 60<br> Practice 60<br> Check Your Understanding Questions 61<br> <strong>Chapter 2</strong> PC Assembly 65<br> Objectives 65<br> Key Terms 65<br> Introduction to PC Assembly (2.0) 67<br> Assemble the Computer (2.1) 67<br> General and Fire Safety (2.1.1) 67<br> Open the Case and Connect the Power Supply (2.1.2) 68<br> Install the Motherboard Components (2.1.3) 71<br> Install Internal Drives (2.1.4) 75<br> Install the Adapter Cards (2.1.5) 80<br> Select Additional Storage (2.1.6) 87<br> Install the Cables (2.1.7) 90<br> Summary (2.2) 95<br> Practice 96<br> Check Your Understanding Questions 96<br> <strong>Chapter 3</strong> Advanced Computer Hardware 101<br> Objectives 101<br> Key Terms 101<br> Introduction to Advanced Computer Hardware (3.0) 104<br> Boot the Computer (3.1) 104<br> POST, BIOS, CMOS, and UEFI (3.1.1) 105<br> BIOS/UEFI Configuration (3.1.2) 110<br> Electrical Power (3.2) 113<br> Wattage and Voltage (3.2.1) 113<br> Power Fluctuation and Protection (3.2.2) 115<br> Advanced Computer Functionality (3.3) 117<br> CPU Architectures and Operation (3.3.1) 117<br> RAID (3.3.2) 122<br> Ports, Connectors, and Cables (3.3.3) 125<br> Monitors (3.3.4) 142<br> Computer Configuration (3.4) 146<br> Upgrade Computer Hardware (3.4.1) 147<br> Protecting the Environment (3.5) 152<br> Safe Disposal of Equipment and Supplies (3.5.1) 153<br> Summary (3.6) 155<br> Practice 156<br> Check Your Understanding Questions 156<br> <strong>Chapter 4</strong> Preventive Maintenance and Troubleshooting 161<br> Objectives 161<br> Key Terms 161<br> Introduction (4.0) 162<br> Preventive Maintenance (4.1) 162<br> PC Preventive Maintenance Overview (4.1.1) 162<br> Troubleshooting Process (4.2) 165<br> Troubleshooting Process Steps (4.2.1) 165<br> Common Problems and Solutions for PCs (4.2.2) 174<br> Apply Troubleshooting Process to Computer Components and Peripherals (4.2.3) 182<br> Summary (4.3) 186<br> Practice 186<br> Check Your Understanding Questions 186<br> <strong>Chapter 5</strong> Networking Concepts 191<br> Objectives 191<br> Key Terms 191<br> Introduction (5.0) 194<br> Network Components and Types (5.1) 194<br> Types of Networks (5.1.1) 194<br> Internet Connection Types (5.1.2) 202<br> Networking Protocols, Standards, and Services (5.2) 208<br> Transport Layer Protocols (5.2.1) 208<br> Application Port Numbers (5.2.2) 213<br> Wireless Protocols (5.2.3) 217<br> Network Services (5.2.4) 222<br> Network Devices (5.3) 233<br> Basic Network Devices (5.3.1) 233<br> Security Devices (5.3.2) 239<br> Other Network Devices (5.3.3) 244<br> Network Cables (5.4) 248<br> Network Tools (5.4.1) 248<br> Copper Cables and Connectors (5.4.2) 253<br> Fiber Cables and Connectors (5.4.3) 259<br> Summary (5.5) 265<br> Practice 266<br> Check Your Understanding Questions 266<br> <strong>Chapter 6</strong> Applied Networking 271<br> Objectives 271<br> Key Terms 271<br> Introduction (6.0) 273<br> Device to Network Connection (6.1) 273<br> Network Addressing (6.1.1) 273<br> Configure a NIC (6.1.2) 290<br> Configure a Wired and Wireless Network (6.1.3) 296<br> Firewall Settings (6.1.4) 309<br> IoT Device Configuration (6.1.5) 317<br> The Basic Networking Troubleshooting Process (6.2) 319<br> Applying the Troubleshooting Process to Networking (6.2.1) 319<br> Network Problems and Solutions (6.2.2) 323<br> Summary (6.3) 328<br> Practice 328<br> Packet Tracer Activities 329<br> Check Your Understanding Questions 329<br> <strong>Chapter 7</strong> Laptops and Other Mobile Devices 333<br> Objectives 333<br> Key Terms 333<br> Introduction (7.0) 336<br> Characteristics of Laptops and Other Mobile Devices (7.1) 336<br> Mobile Device Overview (7.1.1) 337<br> Laptop Components (7.1.2) 344<br> Laptop Display Components (7.1.3) 349<br> Laptop Configuration (7.2) 353<br> Power Settings Configuration (7.2.1) 353<br> Wireless Configuration (7.2.2) 355<br> Laptop Hardware and Component Installation and Configuration (7.3) 359<br> Expansion Slots (7.3.1) 359<br> Replacing Laptop Components (7.3.2) 365<br> Other Mobile Device Hardware Overview (7.4) 369<br> Other Mobile Device Hardware (7.4.1) 369<br> Specialty Mobile Devices (7.4.2) 373<br> Network Connectivity and Email (7.5) 377<br> Wireless and Cellular Data Networks (7.5.1) 377<br> Bluetooth (7.5.2) 383<br> Configuring Email (7.5.3) 387<br> Mobile Device Synchronization (7.5.4) 392<br> Preventive Maintenance for Laptops and Other Mobile Devices (7.6) 397<br> Scheduled Maintenance for Laptops and Other Mobile Devices (7.6.1) 397<br> Basic Troubleshooting Process for Laptops and Other Mobile Devices (7.7) 400<br> Applying the Troubleshooting Process to Laptops and Other Mobile Devices (7.7.1) 400<br> Common Problems and Solutions for Laptops and Other Mobile Devices (7.7.2) 404<br> Summary (7.8) 410<br> Practice 411<br> Check Your Understanding Questions 411<br> <strong>Chapter 8</strong> Printers 415<br> Objectives 415<br> Key Terms 415<br> Introduction (8.0) 417<br> Common Printer Features (8.1) 417<br> Characteristics and Capabilities (8.1.1) 417<br> Printer Connections (8.1.2) 421<br> Printer Type Comparison (8.2) 425<br> Inkjet Printers (8.2.1) 425<br> Laser Printers (8.2.2) 431<br> Laser Printing Process (8.2.3) 435<br> Thermal Printers and Impact Printers (8.2.4) 442<br> Virtual Printers (8.2.5) 444<br> 3D Printers (8.2.6) 446<br> Installing and Configuring Printers (8.3) 450<br> Installing and Updating a Printer (8.3.1) 450<br> Configuring Options and Default Settings (8.3.2) 452<br> Optimizing Printer Performance (8.3.3) 454<br> Sharing Printers (8.4) 456<br> Operating System Settings for Sharing Printers (8.4.1) 456<br> Print Servers (8.4.2) 459<br> Maintaining and Troubleshooting Printers (8.5) 462<br> Printer Preventive Maintenance (8.5.1) 462<br> Inkjet Printer Preventive Maintenance (8.5.2) 464<br> Laser Printer Preventive Maintenance (8.5.3) 464<br> Thermal Printer Preventive Maintenance (8.5.4) 465<br> Impact Printer Preventive Maintenance (8.5.5) 467<br> 3D Printer Preventive Maintenance (8.5.6) 468<br> Applying the Troubleshooting Process to Printers (8.5.7) 469<br> Problems and Solutions (8.5.8) 472<br> Summary (8.6) 476<br> Practice 477<br> Check Your Understanding Questions 477<br> <strong>Chapter 9</strong> Virtualization and Cloud Computing 481<br> Objectives 481<br> Key Terms 481<br> Introduction (9.0) 482<br> Virtualization (9.1) 482<br> Virtualization (9.1.1) 482<br> Client-Side Virtualization (9.1.2) 486<br> Cloud Computing (9.2) 491<br> Cloud Computing Applications (9.2.1) 491<br> Cloud Services (9.2.2) 492<br> Summary (9.3) 497<br> Practice 497<br> Check Your Understanding Questions 498<br> <strong>Chapter 10</strong> Windows Installation 503<br> Objectives 503<br> Key Terms 503<br> Introduction (10.0) 505<br> Modern Operating Systems (10.1) 505<br> Operating System Features (10.1.1) 505<br> Customer Requirements for an Operating System (10.1.2) 510<br> Operating System Upgrades (10.1.3) 514<br> Disk Management (10.2) 518<br> Disk Management (10.2.1) 518<br> Install Windows (10.3) 524<br> Basic Windows Installation (10.3.1) 524<br> Custom Installation Options (10.3.2) 526<br> Windows Boot Sequence (10.3.3) 533<br> Summary (10.4) 537<br> Practice 537<br> Check Your Understanding Questions 538<br> <strong>Chapter 11</strong> Windows Configuration 541<br> Objectives 541<br> Key Terms 542<br> Introduction (11.0) 547<br> Windows Desktop and File Explorer (11.1) 547<br> Comparing Windows Versions (11.1.1) 548<br> The Windows Desktop (11.1.2) 550<br> Windows Task Manager (11.1.3) 555<br> Windows File Explorer (11.1.4) 558<br> Configure Windows with Control Panels (11.2) 567<br> Control Panel Utilities (11.2.1) 568<br> User and Account Control Panel Items (11.2.2) 576<br> Network and Internet Control Panels (11.2.3) 580<br> Display Settings and Control Panel (11.2.4) 590<br> Power and System Control Panels (11.2.5) 593<br> Hardware and Sound Control Panels (11.2.6) 600<br> Clock, Region, and Language (11.2.7) 604<br> Programs and Features Control Panels (11.2.8) 609<br> Other Control Panels (11.2.9) 611<br> System Administration (11.3) 615<br> Administrative Tools (11.3.1) 615<br> System Utilities (11.3.2) 624<br> Disk Management (11.3.3) 632<br> Application Installation and Configuration (11.3.4) 640<br> Command-Line Tools (11.4) 649<br> Using Windows CLI (11.4.1) 649<br> File System CLI Commands (11.4.2) 655<br> Disk CLI Commands (11.4.3) 670<br> Task and System CLI Commands (11.4.4) 674<br> Other Useful CLI Commands (11.4.5) 679<br> Windows Networking (11.5) 683<br> Network Sharing and Mapping Drives (11.5.1) 683<br> Sharing Local Resources with Others (11.5.2) 688<br> Configure a Wired Network Connection (11.5.3) 691<br> Configure a Wireless Network Interface in Windows (11.5.4) 698<br> Remote Access Protocols (11.5.5) 699<br> Remote Desktop and Assistance (11.5.6) 701<br> Common Preventive Maintenance Techniques for Operating Systems (11.6) 702<br> OS Preventive Maintenance Plan (11.6.1) 702<br> Backup and Restore (11.6.2) 706<br> Basic Troubleshooting Process for Windows Operating Systems (11.7) 709<br> Applying Troubleshooting Process to Windows Operating Systems (11.7.1) 709<br> Common Problems and Solutions for Windows Operating Systems (11.7.2) 713<br> Advanced Troubleshooting for Windows Operating Systems (11.7.3) 718<br> Summary (11.8) 723<br> Practice 724<br> Check Your Understanding Questions 726<br> <strong>Chapter 12</strong> Mobile, Linux, and macOS Operating Systems 731<br> Objectives 731<br> Key Terms 731<br> Introduction (12.0) 733<br> Mobile Operating Systems (12.1) 733<br> Android vs. iOS (12.1.1) 733<br> Mobile Touch Interface (12.1.2) 739<br> Common Mobile Device Features (12.1.3) 746<br> Methods for Securing Mobile Devices (12.2) 762<br> Passcode Locks (12.2.1) 763<br> Cloud-Enabled Services for Mobile Devices (12.2.2) 766<br> Software Security (12.2.3) 771<br> Linux and macOS Operating Systems (12.3) 775<br> Linux and macOS Tools and Features (12.3.1) 775<br> Linux and macOS Best Practices (12.3.2) 790<br> Basic CLI Commands (12.3.3) 795<br> Basic Troubleshooting Process for Mobile, Linux, and macOS Operating Systems (12.4) 806<br> Applying the Troubleshooting Process to Mobile, Linux, and macOS Operating Systems (12.4.1) 806<br> Common Problems and Solutions for Other Operating Systems (12.4.2) 810<br> Summary (12.5) 818<br> Practice 818<br> Check Your Understanding Questions 819<br> <strong>Chapter 13</strong> Security 823<br> Objectives 823<br> Key Terms 823<br> Introduction (13.0) 826<br> 13.1 Security Threats (13.1) 826<br> Malware (13.1.1) 827<br> Preventing Malware (13.1.2) 832<br> Network Attacks (13.1.3) 837<br> Social Engineering Attacks (13.1.4) 842<br> Security Procedures (13.2) 846<br> Security Policy (13.2.1) 846<br> Protecting Physical Equipment (13.2.2) 847<br> Protecting Data (13.2.3) 854<br> Data Destruction (13.2.4) 860<br> Securing Windows Workstations (13.3) 862<br> Securing a Workstation (13.3.1) 862<br> Windows Local Security Policy (13.3.2) 868<br> Managing Users and Groups (13.3.3) 873<br> Windows Firewall (13.3.4) 881<br> Web Security (13.3.5) 889<br> Security Maintenance (13.3.6) 898<br> Wireless Security (13.4) 901<br> Configure Wireless Security (13.4.1) 901<br> Basic Troubleshooting Process for Security (13.5) 916<br> Applying the Troubleshooting Process to Security (13.5.1) 916<br> Common Problems and Solutions for Security (13.5.2) 920<br> Summary (13.6) 923<br> Practice 924<br> Packet Tracer Activity 925<br> Check Your Understanding Questions 925<br> <strong>Chapter 14</strong> The IT Professional 929<br> Objectives 929<br> Key Terms 929<br> Introduction (14.0) 932<br> Communication Skills and the IT Professional (14.1) 932<br> Communication Skills, Troubleshooting, and Professional Behavior (14.1.1) 932<br> Working with a Customer (14.1.2) 934<br> Professional Behavior (14.1.3) 936<br> The Customer Call (14.1.4) 939<br> Operational Procedures (14.2) 941<br> Documentation (14.2.1) 942<br> Change Management (14.2.2) 948<br> Disaster Prevention and Recovery (14.2.3) 951<br> Ethical and Legal Considerations (14.3) 955<br> Ethical and Legal Considerations in the IT Profession (14.3.1) 955<br> Legal Procedures Overview (14.3.2) 960<br> Call Center Technicians (14.4) 964<br> Call Centers, Level One and Level Two Technicians (14.4.1) 964<br> Basic Scripting and the IT Professional (14.4.2) 969<br> Summary (14.5) 978<br> Practice 979<br> Check Your Understanding Questions 979<br> <strong>Appendix A</strong> Answers to “Check Your Understanding” Questions 985<br> Glossary 1007<br> <br> <br> 9780138166106 TOC 6/14/2023<br> </p>