Appendix B
Answers to Performance-Based Questions

Chapter 1: Motherboards, Processors, and Memory

Answer to Performance-Based Question 1

Here is how to remove a DIMM and replace it with another one:

  1. Pull the tabs on either end of the DIMM away from the DIMM.
  2. Pull the loose DIMM straight out of the slot and away from the motherboard.
  3. Ensure that the locking tabs are completely opened and out of the way of the slot.
  4. Align the module's notch with the tab or tabs in the slot.
  5. Insert the new DIMM straight down into the slot.
  6. Apply firm and even pressure downward until the locking tabs automatically snap into place.
  7. Nudge the tabs inward toward the module to make sure that they are tight.

Answer to Performance-Based Question 2

The components are labeled in the following illustration.

Diagram shows the components of a motherboard which includes CPU, ATX power, Memory (DIMM), Chipset, AGP, PCIe, SATA, CMOS and RT clock battery and PCI.

Chapter 2: Storage Devices and Power Supplies

Here are the steps to remove a power supply from a computer chassis:

  1. Remove the power source from the system.
  2. Ground yourself and the computer to the same source of ground.
  3. Remove the cover from the system.
  4. Locate the power supply.
  5. Follow all wiring harnesses from the power supply to their termini, disconnecting each one.
  6. Remove any obstructions that appear as if they might hinder removal of the power supply.
  7. Locate and remove the machine screws on the outside of the case that are used to secure the power supply.
  8. Pull the power supply out of the case.

Chapter 3: Peripherals and Expansion

Based on the connectors, here are the connections to make:

  1. Plug the VGA cable into the blue, DE15 interface.
  2. Plug the USB cable into the gray, flat 4-pin interface.
  3. Plug the mouse into the green, mini-DIN-6 interface.
  4. Plug the keyboard into the purple, mini-DIN -6 interface.
  5. Plug the speaker into the green, 3.5mm TRS interface.

Chapter 4: Display Devices

Here is how to extend a display onto a second monitor and adjust their orientation with respect to each other:

  1. Right-click a blank portion of the Desktop.
  2. Click Screen Resolution.
    Screenshot shows the window that pops up on right clicking a blank portion in the desktop. Some of the major functions listed are view, sort by, refresh, paste, new, screen resolution, gadgets and personalize.
  3. Click on the picture of the monitor with the number 2 on it.
    Screenshot shows the screen resolution window with options to change the display appearance, resolution and orientation. Buttons to detect and identify the changed display are also represented.
  4. Pull down the menu labeled Multiple Displays; select Extend These Displays.
    Screenshot shows the screen resolution window where a dropdown under multiple displays title with options to duplicate, extend and remove a particular display and to show desktop only on 1 or 2.
  5. Click Keep Changes in the pop-up dialog that results.
    Screenshot shows the window that pops-up for saving the changes made in display settings. Button to keep changes and revert is represented.
  6. Click and drag the second monitor to the desired virtual position around the primary monitor.
    Screenshot shows the screen resolution window with options to change the display appearance, resolution, orientation and multiple displays. Buttons to detect and identify the changed display are also represented.
  7. Click OK to save the changes and exit, or click Cancel to exit without saving the changes.

Chapter 5: Custom Configurations

These are the steps to set up video streaming from one Windows 7 computer to another in the same house:

  1. Run Network And Sharing Center.
  2. Click the Change Advanced Sharing Settings link in the left frame.
  3. Expand the Home Or Work configuration section.
  4. Click the Choose Media Streaming Options link.
  5. Change desired Blocked buttons to Allow.
  6. Open Windows Media Player and switch to Library mode, if necessary.
  7. Ensure that streaming is enabled.
  8. On the remote system, start Windows Media Player.
  9. Expand the remote library that you just shared under Other Libraries to play music, watch videos or recorded TV, and view pictures.

Chapter 6: Network Fundamentals

Possible answers for examples of physical network topologies could include bus, ring, star, mesh, and hybrid. The simplest topology, and the one that uses the least amount of cable, is a bus. It consists of a single cable that runs to every workstation, as shown in the following illustration.

Diagram shows a simple network topology, where three computers are connected to the CPU of a single computer.

In a star topology, shown in the next illustration, each network device branches off a central device called a hub or a switch, making it easy to add a new workstation. If the hub or switch fails, the entire network fails.

Diagram shows a star topology, where two computers are connected to a hub, which is again connected to a printer and a third computer.

In a physical ring, each computer connects to two other computers, joining them in a circle and creating a unidirectional path where messages move from workstation to workstation. These are very rarely implemented.

Diagram shows how four computers are connected in the form of a ring.

The mesh topology is the most complex in terms of physical design. In a mesh, each device is connected to every other device as shown in the following illustration. This provides redundancy but costs more to implement.

Diagram shows a mesh topology where all five computers are connected to each other.

A hybrid topology combines two or more other topologies into one network. An example might be a server room that has a partial mesh for redundancy but the clients are all connected to switches in a star.

Chapter 7: Introduction to TCP/IP

Here's how to use Internet Explorer to connect using FTP:

First open Internet Explorer. Then, in the address window, type the following:

ftp://jsmith:[email protected]

Chapter 8: Installing Wireless and SOHO Networks

Here are the steps to install a PCI network card for a Windows 7 desktop:

  1. Power off the PC.
  2. Remove the case and the metal or plastic blank covering the expansion slot opening.
  3. Insert the new expansion card into the open slot.
  4. Secure the expansion card with the screw provided.
  5. Put the case back on the computer and power it up.
  6. Windows Plug and Play (PnP) should recognize the NIC and install the driver automatically. It may also ask you to provide a copy of the necessary driver if it does not recognize the type of NIC that you have installed.
  7. If Windows does not start the installation routine immediately, open Control Panel in Small Icon or Large Icon view, and choose Devices And Printers and then Add A Device. Choose the NIC and continue the installation.
  8. After installing a NIC, you must hook the card to the network using the appropriate cable (if you're using wired connections). Attach a patch cable to the connector on the NIC and to a port in the wall (or connectivity device), thus connecting your PC to the rest of the network.

Chapter 9: Understanding Laptops

Here is how to replace a hard drive on the example laptop computer:

  1. Turn off the computer.
  2. Disconnect the computer and any peripherals from their power sources, and remove any installed batteries.
  3. Locate the hard drive door and remove the screw holding it in place.
  4. Lift the hard drive door until it clicks.
  5. Slide the hard drive out to remove it.
    Image described by surrounding text.
  6. Remove the two screws holding the hard drive to the hard drive door.
    Image described by surrounding text.
  7. Attach a new hard drive to the hard drive door.
  8. Slide the new hard drive back into the hard drive bay.
  9. Snap the hard drive door back into place, and insert and tighten the screw to hold the door in place.

Chapter 10: Understanding Mobile Devices

The five steps to pair a Bluetooth device are:

  1. Turn on the Bluetooth device.
    1. Enable Bluetooth.
    2. Enable pairing.
  2. Use your mobile device to locate and select the Bluetooth device.
  3. Enter the Bluetooth device's passcode.
  4. Confirm pairing on the Bluetooth device by pressing a button or a combination of buttons.
  5. Test connectivity.

Chapter 11: Installing and Configuring Printers

Here are some example steps to take to clean an inkjet printer. The process for starting the cleaning cycle on inkjet printers can vary, and some printers have both quick and deep-clean cycles. Always check your documentation for steps specific to your printer.

  1. Power on the printer, and open the top cover to expose the area containing the print cartridges.
  2. Initiate a self-cleaning cycle.
  3. When the print head moves from its resting place, pull the AC power plug.
  4. Locate the sponge pads on which to apply the cleaning solution.
  5. Using the supplied syringe, apply the cleaning solution to the sponge pads until they are saturated.
  6. Plug the printer back into the wall outlet and turn it on. The print heads will park themselves.
  7. Turn the printer off. Let the solution sit for at least three hours.
  8. Power the printer back on, and run three printer cleaning cycles. Print a nozzle check pattern (or a test page) after each cleaning cycle to monitor the cleaning progress.

Chapter 12: Hardware and Network Troubleshooting

Here is how to stop and restart the print spooler in Windows 7:

  1. Open Computer Management, and navigate to Services by right-clicking the Computer icon and choosing Manage. If necessary, click the arrow next to Services And Applications to expand the list.
  2. Find the Print Spooler service.
  3. Stop the spooler service. There are several ways that you can do this:
    • Right-clicking on the service and choosing Stop
    • Clicking the Stop square above the list of services
    • Using the More Actions menu on the right
  4. Restart the spooler by right-clicking on the service and choosing Start or by clicking the Start arrow above the list of services.
  5. Close Computer Management.

Chapter 13: Operating System Basics

Given the information that you need to collect, the easiest method is to use the System applet in Control Panel

  1. Click Start.
  2. Select Control Panel.
  3. Choose System.
    Screenshot shows the window of system in control panel, where the details of the operating system, processor, memory, system type et cetera are listed.
  4. Write down the information for every item except the information related to the paging file.
  5. Click Advanced System Settings. The System Properties dialog box appears.
    Screenshot shows the system properties with the advanced tab highlighted where the details of performance, user profiles and start-up and recovery are displayed.
  6. Click the Settings button beneath Performance, and choose the Advanced tab.
    Screenshot shows the performance options with the advanced tab highlighted where the details of processor scheduling and virtual memory are displayed.
  7. Write down the paging file information.
  8. Click OK to exit the Performance Options dialog box.
  9. Click OK to exit System Properties.
  10. Close the System applet.

Chapter 14: Operating System Administration

To check to see what background processes are running, and the resources they are using, open Task Manager. Do this by pressing Ctrl+Alt+Del and selecting Start Task Manager. You can also press Ctrl+Shift+Esc.

Once in Task Manager, click the Processes tab. It will also be helpful to check the Show Processes From All Users box if it is not already checked. Click the CPU column header to sort by CPU usage. If a process is taking up a considerable amount of CPU time, you can highlight it and click End Process to shut it down. You can also sort by memory used and shut down processes that look to be using excessive amounts of memory. Note that shutting down critical processes may cause Windows to lock up or otherwise not work properly, so be careful what you choose to terminate. Note as well that right-clicking on one of the processes offers the End Process Tree option—a useful option when the process being killed is associated with others.

Chapter 15: Working with Windows 8/8.1

To write a PowerShell script to find other scripts in a user profile directory and all of its subdirectories, you need the environment variable $home. While there are a number of ways of writing this script, one possibility from Technet is as follows:

Get-ChildItem -Path $home* -Include *.ps1 -Recurse

Chapter 16: Working with Windows 7

To configure the TCP/IP values given in Windows 7:

  1. Choose Start ➢ Control Panel ➢ Network And Sharing Center.
    Screenshot shows the window of network and sharing center in control panel, where the options for viewing active networks and changing the network settings are shown.
  2. Click Change Adapter Settings. A screen similar to the one in the next screen shot will appear.
    Screenshot shows the window of network connections in control panel, where the details of the local area connection along with its icon is represented.
  3. Right-click the connection icon and choose Properties.
    Screenshot shows the window displaying the properties of a local area connection, where the details of the connection and the items required to establish the connection are listed.
  4. Click Internet Protocol Version 4 (TCP/IPv4), and then click the Properties button.
    Screenshot shows the general tab in the internet protocol version 4 properties window where the radio buttons for automatically obtaining IP address and DNS server address are selected.
  5. On the General tab, make certain that the Obtain An IP Address Automatically radio button is selected.
  6. Click the Alternate Configuration tab.
    Screenshot shows the general tab in the internet protocol version 4 properties window where the radio buttons for manually obtaining IP address and DNS server address are selected.
  7. Click the User Configured radio button.
  8. Enter the three values given for the IP address, the subnet mask, and the default gateway.
  9. Click OK to close the dialog box. Click Close to exit the Local Area Connection Properties dialog box. Click the close icon in the upper-right corner of the Network Connections window.

Chapter 17: Working with Windows Vista

Here are the steps needed to run the Windows Memory Diagnostics tool:

  1. Choose Start ➢ Control Panel ➢ Administrative Tools.
  2. Choose Memory Diagnostics Tool.
    Screenshot shows the window of administrative tools coming under control panel, which include tools like computer management, data sources, desktop.ini, event viewer, iSCSI initiator et cetera.
  3. Click Restart Now And Check For Problems.
    Screenshot shows the windows memory diagnostics tool, where options to check the problems by restarting the system or to check problems on the very next system start.
  4. Upon reboot, the test will take several minutes and the display screen will show which pass number is being run and the overall status of the test (percent complete).

Chapter 18: Working with Mac OS and Linux

The listing you see when typing these commands will differ based on such factors as the system, the directory, your permissions, and the files/subdirectories present, but in all cases, there will be entries present with the –a option that do not appear in the display without it. Among those listings that now appear are a single period (representing the present directory) and a double period (representing the parent directory).

If there are any files or directories starting with a period, they will now appear where they did not before. The easiest way to “hide” a file or directory in Linux is to start the name of it with a period, and thus it will not show up in a listing unless the –a option is used.

Chapter 19: Security

Here is how to block pop-ups but allow them from one specific website:

  1. Click Start ➢ Control Panel ➢ Internet Options.
    Screenshot of a window shows internet properties page where the general tab is selected. The home page url, details of browsing history, search, tabs and appearance are displayed.
  2. Click the Privacy tab.
    Screenshot of a window shows internet properties page where the privacy tab is selected. Settings, location, pop-up blocker and InPrivate are the main headers displayed in the window.
  3. Click the Turn On Pop-Up Blocker check box, and then click the Settings button.
    Screenshot of a window shows pop-up blocker settings. Exceptions, address of website to allow, allowed sites and notifications and blocking level are the main headers displayed in the window.
  4. Type in the address www.sybex.com and click Add.
  5. Click Close to exit the Pop-Up Blocker Settings dialog. Click OK to exit Internet Properties.

Chapter 20: Network Services, Cloud Computing, and Virtualization

Using Lubuntu will probably feel very similar using Windows. The interfaces have quite a few similarities in terms of navigation. Here are some hints on where you can find the utilities you need to complete the steps in the Chapter 20 performance-based question:

  1. Creating a user account. You can do this by clicking the launcher (it looks like a button with a bird on it), about where you would expect the Start button to be in Windows, and then choosing System Tools ➢ Users And Groups. Click the Add button to create a new user.
  2. Managing storage space. Open the launcher, and choose Preferences ➢ Disk Utility. This one won't work exactly like the one in Windows because it's on a virtual hard drive.
  3. Manipulating files. Open the launcher, and choose Accessories ➢ File Manager, or you can choose File Manager using the icon to the right of the launcher. Once File Manager opens, you can right-click files to perform your tasks,
  4. Creating a shortcut. Right-click the desktop, and choose Create New ➢ Shortcut.
  5. Configuring accessibility options. As of now, Lubuntu does not offer the types of accessibility options Windows offers. The developer is committed to accessibility, but it has not yet developed these capabilities. For more information, see

    https://wiki.ubuntu.com/Lubuntu/Developers/Accessibility

    Maybe you can help!

Chapter 21: Mobile Operating Systems and Connectivity

Here are the steps to connect an iPhone to a Wi-Fi network:

  1. Tap the Settings app on the Home screen.
  2. Select Wi-Fi from the Settings menu.
  3. Swipe the Wi-Fi switch to the right to turn it on if it is off. You can also tap switches to toggle them to the opposite state.
  4. In the Choose A Network list, tap the name of the wireless network that you want to join.
  5. Enter the password or key for the wireless network, if you are asked for one, and then tap the Join button. If it connects, the network name will appear under the Wi-Fi switch with a check mark next to it.

Chapter 22: Troubleshooting Theory, OSs, and Security

There are seven best practice steps associated with malware removal. Some of these steps, such as educating the end user, apply with almost every troubleshooting venture. In order, the seven steps are as follows:

  1. Identify malware symptoms.
  2. Quarantine infected system.
  3. Disable system restore (in Windows).
  4. Remediate infected systems:
    1. Update antimalware software.
    2. Scan and removal techniques (safe mode, pre-installation environment).
  5. Schedule scans and run updates.
  6. Enable system restore and create restore point (in Windows).
  7. Educate end user.

Chapter 23: Understanding Operational Procedures

Here are some steps to take to look for trip hazards and eliminate them:

  1. Walk around the server room, and count how many cables are lying on the floor.
  2. Walk around the client areas, and see how many cables are lying on the floor or are exposed underneath cubicles.
  3. Devise a plan to secure the cables and prevent them from being hazards. For example, purchase and install floor guards, use cable ties, or install conduit as necessary to secure all loose cables.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.103.219