ISBN-13: 9781119863212 / Angielski / Twarda / 2022 / 1744 str.
ISBN-13: 9781119863212 / Angielski / Twarda / 2022 / 1744 str.
Introduction xxviiAssessment Test lxxxiiPart I 220-1101 1Chapter 1 Motherboards, Processors, and Memory 3Understanding Motherboards 7Understanding Processors 42Understanding Memory 49Understanding Cooling Systems 63Summary 71Exam Essentials 71Review Questions 73Performance-Based Question 1 77Performance-Based Question 2 78Chapter 2 Expansion Cards, Storage Devices, and Power Supplies 79Installing and Configuring Expansion Cards 81Understanding Storage Devices 89Understanding Power Supplies 118Summary 131Exam Essentials 131Review Questions 133Performance-Based Question 137Chapter 3 Peripherals, Cables, and Connectors 139Understanding Cables and Connectors 140Understanding Cables and Connectors 160Summary 184Exam Essentials 185Review Questions 186Performance-Based Question 190Chapter 4 Printers and Multifunction Devices 191Understanding Print Technologies and Imaging Processes 193Summary 262Exam Essentials 262Review Questions 264Performance-Based Question 268Chapter 5 Networking Fundamentals 269Understanding Networking Principles 271Identifying Common Network Hardware 295Summary 324Exam Essentials 324Review Questions 327Performance-Based Question 331Chapter 6 Introduction to TCP/IP 333Understanding TCP/IP 335Understanding Virtual Networks 368Virtual Local Area Networks 368Virtual Private Networks 370Summary 372Exam Essentials 372Review Questions 374Performance-Based Question 378Chapter 7 Wireless and SOHO Networks 379Understanding Wireless Networking Technologies 381Installing and Configuring SOHO Networks 402Summary 449Exam Essentials 449Review Questions 451Performance-Based Question 455Chapter 8 Network Services, Virtualization, and Cloud Computing 457Understanding Network Services 459Understanding Virtualization and Cloud Computing 487Summary 515Exam Essentials 516Review Questions 518Performance-Based Question 522Chapter 9 Laptop and Mobile Device Hardware 523Working with Laptop and Mobile Device Hardware 526Summary 584Exam Essentials 585Review Questions 586Performance-Based Question 590Chapter 10 Mobile Connectivity and Application Support 591Understanding Mobile Connectivity 593Summary 668Exam Essentials 668Review Questions 670Performance-Based Question 674Chapter 11 Troubleshooting Methodology and Resolving Core Hardware Problems 675Using the Troubleshooting Best Practice Methodology 678Troubleshooting Motherboards, CPUs, RAM, and Power Problems 690Summary 708Exam Essentials 709Review Questions 711Performance-Based Question 715Chapter 12 Hardware and Network Troubleshooting 717Troubleshooting Storage Drives and RAID Arrays 721Troubleshooting Video, Projector, and Display Issues 731Troubleshooting Common Mobile Device Issues 737Troubleshooting Printer Problems 751Troubleshooting Networking Problems 779Summary 806Exam Essentials 806Review Questions 809Performance-Based Question 813Part II 220-1102 815Chapter 13 Operating System Basics 817Understanding Operating Systems 819Understanding Applications 830Introduction to Windows 10 836Preparing for the Exam 871Summary 872Exam Essentials 872Review Questions 874Performance-BasedQuestion 878Chapter 14 Windows Configuration 879Interacting with Operating Systems 882The Windows Registry 960Disk Management 962Summary 970Exam Essentials 970Review Questions 972Performance-Based Question 976Chapter 15 Windows Administration 977Installing and Upgrading Windows 980Command-Line Tools 1013Networking in Windows 1030Summary 1050Exam Essentials 1050Review Questions 1052Performance-BasedQuestion 1056Chapter 16 Working with macOS and Linux 1057macOS and Linux 1060Applications on macOS 1061Managing Applications 1064Creating Shortcuts 1065Tools 1071System Preferences 1073Features 1082Basic Linux Commands 1087Linux and Windows 1106Summary 1108Exam Essentials 1109Review Questions 1110Performance-BasedQuestion 1114Chapter 17 Security Concepts 1115Physical Security Concepts 1121Physical Security for Staff 1128Key Fobs 1129Smartcards and RFID Badges 1129Logical Security 1132Malware 1143Mitigating Software Threats 1151Social Engineering Attacks, Threats, and Vulnerabilities 1159Common Security Threats 1163Exploits and Vulnerabilities 1170Security Best Practices 1172Data Encryption 1172Setting Strong Passwords 1173Requiring Passwords 1174Password Expiration 1175End-UserBest Practices 1176Account Management 1177Disable AutoRun 1181Destruction and Disposal Methods 1183Recycling or Repurposing Best Practices 1183Physical Destruction 1185Summary 1187Exam Essentials 1187Review Questions 1190Performance-BasedQuestion 1194Chapter 18 Securing Operating Systems 1195Working with Windows OS Security Settings 1199Users and Groups 1199Web Browser Security 1228Securing a SOHO Network (Wireless) 1239Securing a SOHO Network (Wired) 1247Mobile Device Security 1253Summary 1263Exam Essentials 1264Review Questions 1265Performance-Based Question 1269Chapter 19 Troubleshooting Operating Systems and Security 1271Troubleshooting Common Microsoft Windows OS Problems 1275Troubleshooting Security Issues 1309Symptoms 1315Best Practices for Malware Removal 1318Troubleshooting Mobile OS Issues 1325Troubleshooting Mobile Security Issues 1335Summary 1341Exam Essentials 1342Review Questions 1343Performance-BasedQuestion 1346Chapter 20 Scripting and Remote Access 1347Scripting 1349Remote Access 1375Summary 1387Exam Essentials 1388Review Questions 1389Performance-BasedQuestion 1392Chapter 21 Safety and Environmental Concerns 1393Understanding Safety Procedures 1395Understanding Environmental Controls 1417Understanding Policies, Licensing, and Privacy 1433Summary 1446Exam Essentials 1446Review Questions 1448Performance-Based Question 1452Chapter 22 Documentation and Professionalism 1453Documentation and Support 1457Change Management Best Practices 1476Disaster Prevention and Recovery 1482Demonstrating Professionalism 1494Summary 1508Exam Essentials 1508Review Questions 1510Performance-BasedQuestion 1514Appendix A Answers to the Review Questions 1515Chapter 1: Motherboards, Processors, and Memory 1516Chapter 2: Expansion Cards, Storage Devices, andPower Supplies 1518Chapter 3: Peripherals, Cables, and Connectors 1520Chapter 4: Printers and Multifunction Devices 1521Chapter 5: Networking Fundamentals 1523Chapter 6: Introduction to TCP/IP 1525Chapter 7: Wireless and SOHO Networks 1527Chapter 8: Network Services, Virtualization, andCloud Computing 1529Chapter 9: Laptop and Mobile Device Hardware 1531Chapter 10: Mobile Connectivity and Application Support 1533Chapter 11: Troubleshooting Methodology andResolving Core Hardware Problems 1535Chapter 12: Hardware and Network Troubleshooting 1537Chapter 13: Operating System Basics 1539Chapter 14: Windows Configuration 1540Chapter 15: Windows Administration 1543Chapter 16: Working with macOS and Linux 1545Chapter 17: Security Concepts 1547Chapter 18: Securing Operating Systems 1549Chapter 19: Troubleshooting Operating Systems and Security 1551Chapter 20: Scripting and Remote Access 1554Chapter 21: Safety and Environmental Concerns 1556Chapter 22: Documentation and Professionalism 1558Appendix B Answers to Performance-BasedQuestions 1561Chapter 1: Motherboards, Processors, and Memory 1562Chapter 2: Expansion Cards, Storage Devices, andPower Supplies 1563Chapter 3: Peripherals, Cables, and Connectors 1563Chapter 4: Printers and Multifunction Devices 1564Chapter 5: Networking Fundamentals 1565Chapter 6: Introduction to TCP/IP 1566Chapter 7: Wireless and SOHO Networks 1566Chapter 8: Network Services, Virtualization, andCloud Computing 1567Chapter 9: Laptop and Mobile Device Hardware 1568Chapter 10: Mobile Connectivity and Application Support 1568Chapter 11: Troubleshooting Methodology and Resolving CoreHardware Problems 1569Chapter 12: Hardware and Network Troubleshooting 1569Chapter 13: Operating System Basics 1570Chapter 14: Windows Configuration 1570Chapter 15: Windows Administration 1571Chapter 16: Working with macOS and Linux 1575Chapter 17: Security Concepts 1577Chapter 18: Securing Operating Systems 1577Chapter 19: Troubleshooting Operating Systems and Security 1578Chapter 20: Scripting and Remote Access 1578Chapter 21: Safety and Environmental Concerns 1579Chapter 22: Documentation and Professionalism 1579Index 1581Table of ExercisesExercise 2.1 Removing an Internal Storage Device 115Exercise 2.2 Installing an Internal Storage Device 116Exercise 2.3 Removing a Power Supply 130Exercise 3.1 Changing the Refresh Rate in Windows 10 143Exercise 3.2 Changing the Settings for Multiple Monitors 148Exercise 4.1 Identifying the Parts of an Inkjet Printer 203Exercise 4.2 Installing a USB Printer in Windows 10 239Exercise 4.3 Installing a TCP/IP Printer in Windows 10 242Exercise 4.4 Determining if Bonjour Is Installed in Windows 244Exercise 4.5 Scanning a Document to Google Drive 250Exercise 4.6 Using an Inkjet Cleaning Solution 255Exercise 4.7 Installing Memory into a Laser Printer 258Exercise 5.1 Pricing Network Cables 313Exercise 7.1 The Cost of Networking 422Exercise 7.2 Installing an Internal NIC in Windows 10 422Exercise 8.1 Configuring Windows 10 to Use a Proxy Server 477Exercise 8.2 Using Google's Cloud Services 497Exercise 8.3 Enabling Hyper-V in Windows 10 503Exercise 8.4 Installing VirtualBox and Lubuntu on Windows 10 508Exercise 9.1 Removing Speakers from a Laptop 536Exercise 9.2 Removing the Display Assembly 544Exercise 9.3 Removing the Display Panel 546Exercise 9.4 Removing the Motherboard from a Laptop 549Exercise 9.5 Replacing Laptop Memory 553Exercise 9.6 Removing an M.2 SSD from a Laptop 557Exercise 9.7 Removing a Laptop Keyboard 560Exercise 9.8 Disabling a Touchpad in Windows 10 563Exercise 9.9 Removing an Internal Laptop Battery 568Exercise 9.10 Removing the System Fan 572Exercise 9.11 Removing the CPU Heat Sink 573Exercise 9.12 Removing the Wireless NIC 574Exercise 9.13 Removing the CMOS Battery 575Exercise 9.14 Flashing the System BIOS 576Exercise 10.1 Connecting an iPhone to a Wi-FiNetwork 609Exercise 10.2 Connecting an Android Phone to a Wi-FiNetwork 611Exercise 10.3 Disabling Cellular Use for Data Networking on an iPhone 614Exercise 10.4 Disabling Cellular Use for Data Networking in Android OS 616xxvi Table of ExercisesExercise 10.5 Setting Up a VPN in Android 619Exercise 10.6 Pairing an Android Device with a Windows Laptop 623Exercise 10.7 Pairing an iPhone with a Vehicle's Sound System 632Exercise 10.8 Configuring Location Services in iOS 638Exercise 10.9 Email Account Configuration on an iPhone 645Exercise 10.10 Email Account Configuration in Android 648Exercise 10.11 Enabling ActiveSync in iOS 658Exercise 11.1 Troubleshooting Practice 707Exercise 12.1 Using a S.M.A.R.T Software Utility in Windows 729Exercise 12.2 Stopping and Restarting the Print Spooler in Windows 10 775Exercise 12.3 Renewing an IP Address in Windows 10 787Exercise 12.4 Renewing an IP Address from the Command Line 789Exercise 12.5 Using the net share Command in Windows 795Exercise 13.1 Changing a Screen Saver in Windows 854Exercise 13.2 Auto-Hiding the Taskbar 856Exercise 13.3 Starting a Program from the Run Window 859Exercise 14.1 Working with Task Manager 887Exercise 14.2 Working with Performance Monitor 896Exercise 14.3 Changing the Time Zone 908Exercise 14.4 Showing Hidden Files and Folders 913Exercise 15.1 Command-LineDirectory Management 1015Exercise 15.2 Running chkdsk within Windows 1025Exercise 15.3 Running chkdsk at the Command Line 1026Exercise 16.1 Installing Applications on macOS 1063Exercise 16.2 Uninstalling Applications on macOS 1065Exercise 16.3 Working with Files 1103Exercise 17.1 Testing Your Antimalware 1153Exercise 17.2 Testing Social Engineering 1160Exercise 18.1 Examining a Security Token 1207Exercise 18.2 Examining File Permissions 1214Exercise 18.3 Working with File Hashes 1230Exercise 18.4 Setting the Passcode Lock on an iPhone 1255Exercise 18.5 Setting the Passcode Lock on an Android Phone 1255Exercise 19.1 Reviewing Reliability Monitor 1288Exercise 19.2 Manually Creating a Restore Point in Windows 1304Exercise 20.1 Creating and Running a Windows Batch Script 1356Exercise 20.2 Creating Your First PowerShell Script 1360Exercise 21.1 Finding Trip Hazards 1413Exercise 21.2 Finding MSDSs 1425Exercise 22.1 Understanding Punctuality 1501Exercise 22.2 Surprise Someone 1505
ABOUT THE AUTHORSQUENTIN DOCTER, A+, started in the IT industry as a tech support agent for Packard Bell in 1994. Since then he has worked in tech support, network administration, consulting, training, web development, and project management. During his career, he has achieved certifications from CompTIA, Microsoft, Cisco, Novell, and Sun Microsystems. He is the author of several books, including Sybex's CompTIA IT Fundamentals+ Study Guide.JON BUHAGIAR, A+, Network+, is an information technology professional with two decades of experience in higher education. During the past 19 years he has been responsible for Network Operations at Pittsburgh Technical College and lead several projects, such as virtualization (server and desktop), VoIP, Office 365, and many other projects supporting the quality of education at the college. He has achieved several certifications from Cisco, CompTIA, and Microsoft and taught many of the certification paths. He is the author of several books, including Sybex's CompTIA Network+ Review Guide.Wiley has partnered up with Practice Labs, the IT Competency Hub, to give IT learners discounted access to their live, virtual Practice Labs. Connect to real devices using actual hardware and software straight from a web browser. Practice labs allow you to cement your theoretical studies with practical, hands-on experience. Master your IT skills and gain virtual world experience to increase your employability. Each purchase provides 6 months' unlimited access. Ready to practice your IT skills?
1997-2025 DolnySlask.com Agencja Internetowa