Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

IT Essentials Companion Guide v8

Specificaties
Paperback, blz. | Engels
Pearson Education | e druk, 2023
ISBN13: 9780138166106
Rubricering
Juridisch :
Pearson Education e druk, 2023 9780138166106
Onderdeel van serie Companion Guide
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

IT Essentials v8 Companion Guide supports the Cisco Networking Academy IT Essentials Version 8 course. The course is designed for Cisco Networking Academy students who want to pursue careers in IT and learn how computers work, how to assemble computers, and how to safely and securely troubleshoot hardware and software issues.

The features of the Companion Guide are designed to help you study and succeed in this course: Chapter objectives—Review core concepts by answering the focus questions listed at the beginning of each chapter. Key terms—Refer to the updated lists of networking vocabulary introduced and turn to the highlighted terms in context. Course section numbering—Follow along with the course heading numbers to easily jump online to complete labs, activities, and quizzes referred to within the text. Check Your Understanding Questions and Answer Key—Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see on the online course quizzes.

Specificaties

ISBN13:9780138166106
Taal:Engels
Bindwijze:Paperback

Inhoudsopgave

<p>Introduction xxxiii<br> <strong>Chapter 1</strong> Introduction to Personal Computer Hardware 1<br> Objectives 1<br> Key Terms 1<br> Introduction to Personal Computers (1.0) 5<br> Personal Computer Safety (1.1) 5<br> What Is in a Computer? (1.1.1) 5<br> Electrical and ESD Safety (1.1.2) 6<br> PC Components (1.2) 7<br> Case and Power Supplies (1.2.1) 7<br> Motherboards (1.2.2) 13<br> CPUs and Cooling Systems (1.2.3) 18<br> Memory (1.2.4) 20<br> Adapter Cards and Expansion Slots (1.2.5) 27<br> Hard Disk Drives and SSDs (1.2.6) 31<br> Optical Storage Devices (1.2.7) 35<br> Ports, Cables, and Adapters (1.2.8) 37<br> Input Devices (1.2.9) 46<br> Output Devices (1.2.10) 54<br> Computer Disassembly (1.3) 58<br> The Technician's Toolkit (1.3.1) 58<br> Computer Disassembly (1.3.2) 58<br> Summary (1.4) 60<br> Practice 60<br> Check Your Understanding Questions 61<br> <strong>Chapter 2</strong> PC Assembly 65<br> Objectives 65<br> Key Terms 65<br> Introduction to PC Assembly (2.0) 67<br> Assemble the Computer (2.1) 67<br> General and Fire Safety (2.1.1) 67<br> Open the Case and Connect the Power Supply (2.1.2) 68<br> Install the Motherboard Components (2.1.3) 71<br> Install Internal Drives (2.1.4) 75<br> Install the Adapter Cards (2.1.5) 80<br> Select Additional Storage (2.1.6) 87<br> Install the Cables (2.1.7) 90<br> Summary (2.2) 95<br> Practice 96<br> Check Your Understanding Questions 96<br> <strong>Chapter 3</strong> Advanced Computer Hardware 101<br> Objectives 101<br> Key Terms 101<br> Introduction to Advanced Computer Hardware (3.0) 104<br> Boot the Computer (3.1) 104<br> POST, BIOS, CMOS, and UEFI (3.1.1) 105<br> BIOS/UEFI Configuration (3.1.2) 110<br> Electrical Power (3.2) 113<br> Wattage and Voltage (3.2.1) 113<br> Power Fluctuation and Protection (3.2.2) 115<br> Advanced Computer Functionality (3.3) 117<br> CPU Architectures and Operation (3.3.1) 117<br> RAID (3.3.2) 122<br> Ports, Connectors, and Cables (3.3.3) 125<br> Monitors (3.3.4) 142<br> Computer Configuration (3.4) 146<br> Upgrade Computer Hardware (3.4.1) 147<br> Protecting the Environment (3.5) 152<br> Safe Disposal of Equipment and Supplies (3.5.1) 153<br> Summary (3.6) 155<br> Practice 156<br> Check Your Understanding Questions 156<br> <strong>Chapter 4</strong> Preventive Maintenance and Troubleshooting 161<br> Objectives 161<br> Key Terms 161<br> Introduction (4.0) 162<br> Preventive Maintenance (4.1) 162<br> PC Preventive Maintenance Overview (4.1.1) 162<br> Troubleshooting Process (4.2) 165<br> Troubleshooting Process Steps (4.2.1) 165<br> Common Problems and Solutions for PCs (4.2.2) 174<br> Apply Troubleshooting Process to Computer Components and Peripherals (4.2.3) 182<br> Summary (4.3) 186<br> Practice 186<br> Check Your Understanding Questions 186<br> <strong>Chapter 5</strong> Networking Concepts 191<br> Objectives 191<br> Key Terms 191<br> Introduction (5.0) 194<br> Network Components and Types (5.1) 194<br> Types of Networks (5.1.1) 194<br> Internet Connection Types (5.1.2) 202<br> Networking Protocols, Standards, and Services (5.2) 208<br> Transport Layer Protocols (5.2.1) 208<br> Application Port Numbers (5.2.2) 213<br> Wireless Protocols (5.2.3) 217<br> Network Services (5.2.4) 222<br> Network Devices (5.3) 233<br> Basic Network Devices (5.3.1) 233<br> Security Devices (5.3.2) 239<br> Other Network Devices (5.3.3) 244<br> Network Cables (5.4) 248<br> Network Tools (5.4.1) 248<br> Copper Cables and Connectors (5.4.2) 253<br> Fiber Cables and Connectors (5.4.3) 259<br> Summary (5.5) 265<br> Practice 266<br> Check Your Understanding Questions 266<br> <strong>Chapter 6</strong> Applied Networking 271<br> Objectives 271<br> Key Terms 271<br> Introduction (6.0) 273<br> Device to Network Connection (6.1) 273<br> Network Addressing (6.1.1) 273<br> Configure a NIC (6.1.2) 290<br> Configure a Wired and Wireless Network (6.1.3) 296<br> Firewall Settings (6.1.4) 309<br> IoT Device Configuration (6.1.5) 317<br> The Basic Networking Troubleshooting Process (6.2) 319<br> Applying the Troubleshooting Process to Networking (6.2.1) 319<br> Network Problems and Solutions (6.2.2) 323<br> Summary (6.3) 328<br> Practice 328<br> Packet Tracer Activities 329<br> Check Your Understanding Questions 329<br> <strong>Chapter 7</strong> Laptops and Other Mobile Devices 333<br> Objectives 333<br> Key Terms 333<br> Introduction (7.0) 336<br> Characteristics of Laptops and Other Mobile Devices (7.1) 336<br> Mobile Device Overview (7.1.1) 337<br> Laptop Components (7.1.2) 344<br> Laptop Display Components (7.1.3) 349<br> Laptop Configuration (7.2) 353<br> Power Settings Configuration (7.2.1) 353<br> Wireless Configuration (7.2.2) 355<br> Laptop Hardware and Component Installation and Configuration (7.3) 359<br> Expansion Slots (7.3.1) 359<br> Replacing Laptop Components (7.3.2) 365<br> Other Mobile Device Hardware Overview (7.4) 369<br> Other Mobile Device Hardware (7.4.1) 369<br> Specialty Mobile Devices (7.4.2) 373<br> Network Connectivity and Email (7.5) 377<br> Wireless and Cellular Data Networks (7.5.1) 377<br> Bluetooth (7.5.2) 383<br> Configuring Email (7.5.3) 387<br> Mobile Device Synchronization (7.5.4) 392<br> Preventive Maintenance for Laptops and Other Mobile Devices (7.6) 397<br> Scheduled Maintenance for Laptops and Other Mobile Devices (7.6.1) 397<br> Basic Troubleshooting Process for Laptops and Other Mobile Devices (7.7) 400<br> Applying the Troubleshooting Process to Laptops and Other Mobile Devices (7.7.1) 400<br> Common Problems and Solutions for Laptops and Other Mobile Devices (7.7.2) 404<br> Summary (7.8) 410<br> Practice 411<br> Check Your Understanding Questions 411<br> <strong>Chapter 8</strong> Printers 415<br> Objectives 415<br> Key Terms 415<br> Introduction (8.0) 417<br> Common Printer Features (8.1) 417<br> Characteristics and Capabilities (8.1.1) 417<br> Printer Connections (8.1.2) 421<br> Printer Type Comparison (8.2) 425<br> Inkjet Printers (8.2.1) 425<br> Laser Printers (8.2.2) 431<br> Laser Printing Process (8.2.3) 435<br> Thermal Printers and Impact Printers (8.2.4) 442<br> Virtual Printers (8.2.5) 444<br> 3D Printers (8.2.6) 446<br> Installing and Configuring Printers (8.3) 450<br> Installing and Updating a Printer (8.3.1) 450<br> Configuring Options and Default Settings (8.3.2) 452<br> Optimizing Printer Performance (8.3.3) 454<br> Sharing Printers (8.4) 456<br> Operating System Settings for Sharing Printers (8.4.1) 456<br> Print Servers (8.4.2) 459<br> Maintaining and Troubleshooting Printers (8.5) 462<br> Printer Preventive Maintenance (8.5.1) 462<br> Inkjet Printer Preventive Maintenance (8.5.2) 464<br> Laser Printer Preventive Maintenance (8.5.3) 464<br> Thermal Printer Preventive Maintenance (8.5.4) 465<br> Impact Printer Preventive Maintenance (8.5.5) 467<br> 3D Printer Preventive Maintenance (8.5.6) 468<br> Applying the Troubleshooting Process to Printers (8.5.7) 469<br> Problems and Solutions (8.5.8) 472<br> Summary (8.6) 476<br> Practice 477<br> Check Your Understanding Questions 477<br> <strong>Chapter 9</strong> Virtualization and Cloud Computing 481<br> Objectives 481<br> Key Terms 481<br> Introduction (9.0) 482<br> Virtualization (9.1) 482<br> Virtualization (9.1.1) 482<br> Client-Side Virtualization (9.1.2) 486<br> Cloud Computing (9.2) 491<br> Cloud Computing Applications (9.2.1) 491<br> Cloud Services (9.2.2) 492<br> Summary (9.3) 497<br> Practice 497<br> Check Your Understanding Questions 498<br> <strong>Chapter 10</strong> Windows Installation 503<br> Objectives 503<br> Key Terms 503<br> Introduction (10.0) 505<br> Modern Operating Systems (10.1) 505<br> Operating System Features (10.1.1) 505<br> Customer Requirements for an Operating System (10.1.2) 510<br> Operating System Upgrades (10.1.3) 514<br> Disk Management (10.2) 518<br> Disk Management (10.2.1) 518<br> Install Windows (10.3) 524<br> Basic Windows Installation (10.3.1) 524<br> Custom Installation Options (10.3.2) 526<br> Windows Boot Sequence (10.3.3) 533<br> Summary (10.4) 537<br> Practice 537<br> Check Your Understanding Questions 538<br> <strong>Chapter 11</strong> Windows Configuration 541<br> Objectives 541<br> Key Terms 542<br> Introduction (11.0) 547<br> Windows Desktop and File Explorer (11.1) 547<br> Comparing Windows Versions (11.1.1) 548<br> The Windows Desktop (11.1.2) 550<br> Windows Task Manager (11.1.3) 555<br> Windows File Explorer (11.1.4) 558<br> Configure Windows with Control Panels (11.2) 567<br> Control Panel Utilities (11.2.1) 568<br> User and Account Control Panel Items (11.2.2) 576<br> Network and Internet Control Panels (11.2.3) 580<br> Display Settings and Control Panel (11.2.4) 590<br> Power and System Control Panels (11.2.5) 593<br> Hardware and Sound Control Panels (11.2.6) 600<br> Clock, Region, and Language (11.2.7) 604<br> Programs and Features Control Panels (11.2.8) 609<br> Other Control Panels (11.2.9) 611<br> System Administration (11.3) 615<br> Administrative Tools (11.3.1) 615<br> System Utilities (11.3.2) 624<br> Disk Management (11.3.3) 632<br> Application Installation and Configuration (11.3.4) 640<br> Command-Line Tools (11.4) 649<br> Using Windows CLI (11.4.1) 649<br> File System CLI Commands (11.4.2) 655<br> Disk CLI Commands (11.4.3) 670<br> Task and System CLI Commands (11.4.4) 674<br> Other Useful CLI Commands (11.4.5) 679<br> Windows Networking (11.5) 683<br> Network Sharing and Mapping Drives (11.5.1) 683<br> Sharing Local Resources with Others (11.5.2) 688<br> Configure a Wired Network Connection (11.5.3) 691<br> Configure a Wireless Network Interface in Windows (11.5.4) 698<br> Remote Access Protocols (11.5.5) 699<br> Remote Desktop and Assistance (11.5.6) 701<br> Common Preventive Maintenance Techniques for Operating Systems (11.6) 702<br> OS Preventive Maintenance Plan (11.6.1) 702<br> Backup and Restore (11.6.2) 706<br> Basic Troubleshooting Process for Windows Operating Systems (11.7) 709<br> Applying Troubleshooting Process to Windows Operating Systems (11.7.1) 709<br> Common Problems and Solutions for Windows Operating Systems (11.7.2) 713<br> Advanced Troubleshooting for Windows Operating Systems (11.7.3) 718<br> Summary (11.8) 723<br> Practice 724<br> Check Your Understanding Questions 726<br> <strong>Chapter 12</strong> Mobile, Linux, and macOS Operating Systems 731<br> Objectives 731<br> Key Terms 731<br> Introduction (12.0) 733<br> Mobile Operating Systems (12.1) 733<br> Android vs. iOS (12.1.1) 733<br> Mobile Touch Interface (12.1.2) 739<br> Common Mobile Device Features (12.1.3) 746<br> Methods for Securing Mobile Devices (12.2) 762<br> Passcode Locks (12.2.1) 763<br> Cloud-Enabled Services for Mobile Devices (12.2.2) 766<br> Software Security (12.2.3) 771<br> Linux and macOS Operating Systems (12.3) 775<br> Linux and macOS Tools and Features (12.3.1) 775<br> Linux and macOS Best Practices (12.3.2) 790<br> Basic CLI Commands (12.3.3) 795<br> Basic Troubleshooting Process for Mobile, Linux, and macOS Operating Systems (12.4) 806<br> Applying the Troubleshooting Process to Mobile, Linux, and macOS Operating Systems (12.4.1) 806<br> Common Problems and Solutions for Other Operating Systems (12.4.2) 810<br> Summary (12.5) 818<br> Practice 818<br> Check Your Understanding Questions 819<br> <strong>Chapter 13</strong> Security 823<br> Objectives 823<br> Key Terms 823<br> Introduction (13.0) 826<br> 13.1 Security Threats (13.1) 826<br> Malware (13.1.1) 827<br> Preventing Malware (13.1.2) 832<br> Network Attacks (13.1.3) 837<br> Social Engineering Attacks (13.1.4) 842<br> Security Procedures (13.2) 846<br> Security Policy (13.2.1) 846<br> Protecting Physical Equipment (13.2.2) 847<br> Protecting Data (13.2.3) 854<br> Data Destruction (13.2.4) 860<br> Securing Windows Workstations (13.3) 862<br> Securing a Workstation (13.3.1) 862<br> Windows Local Security Policy (13.3.2) 868<br> Managing Users and Groups (13.3.3) 873<br> Windows Firewall (13.3.4) 881<br> Web Security (13.3.5) 889<br> Security Maintenance (13.3.6) 898<br> Wireless Security (13.4) 901<br> Configure Wireless Security (13.4.1) 901<br> Basic Troubleshooting Process for Security (13.5) 916<br> Applying the Troubleshooting Process to Security (13.5.1) 916<br> Common Problems and Solutions for Security (13.5.2) 920<br> Summary (13.6) 923<br> Practice 924<br> Packet Tracer Activity 925<br> Check Your Understanding Questions 925<br> <strong>Chapter 14</strong> The IT Professional 929<br> Objectives 929<br> Key Terms 929<br> Introduction (14.0) 932<br> Communication Skills and the IT Professional (14.1) 932<br> Communication Skills, Troubleshooting, and Professional Behavior (14.1.1) 932<br> Working with a Customer (14.1.2) 934<br> Professional Behavior (14.1.3) 936<br> The Customer Call (14.1.4) 939<br> Operational Procedures (14.2) 941<br> Documentation (14.2.1) 942<br> Change Management (14.2.2) 948<br> Disaster Prevention and Recovery (14.2.3) 951<br> Ethical and Legal Considerations (14.3) 955<br> Ethical and Legal Considerations in the IT Profession (14.3.1) 955<br> Legal Procedures Overview (14.3.2) 960<br> Call Center Technicians (14.4) 964<br> Call Centers, Level One and Level Two Technicians (14.4.1) 964<br> Basic Scripting and the IT Professional (14.4.2) 969<br> Summary (14.5) 978<br> Practice 979<br> Check Your Understanding Questions 979<br> <strong>Appendix A</strong> Answers to “Check Your Understanding” Questions 985<br> Glossary 1007<br> <br> <br> 9780138166106 TOC 6/14/2023<br> </p>

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        IT Essentials Companion Guide v8