Index

A

  • AAA (authentication, authorization, and accounting), 476
  • AC (alternating current), 49
  • AC adapters for laptops, 51–52, 51, 127, 127
  • Accelerated Graphics Port (AGP) bus, 14–15, 14
  • acceptable use policies, 516
  • access control lists (ACLs), 297, 414, 479
  • access control management
    • accounting, 480, 480
    • authentication, 476–478, 477
    • authorization, 479–480
    • databases, 367–370, 368–369
    • nonrepudiation, 481
    • user accounts, 215­–217, 215–216
  • access points, network, 413
  • accounting, 480, 480
  • accounting software, 293
  • accounts. See user accounts
  • ACLs (access control lists), 297, 414, 479
  • Action Center, 194
  • action plans in troubleshooting, 561–562
  • activation of software, 267
  • active worms, 472
  • Activity Monitor tool, 184
  • add-ons for browsers, 508
  • Add Printer window, 111, 112
  • Address Resolution Protocol (ARP), 418
  • administrator passwords, 436–437, 436
  • Adobe Reader, 301–302, 304
  • ads, suspicious, 511–513
  • ADSL (asymmetric DSL), 395
  • Advanced Attributes dialog box, 524, 524, 544, 544
  • Advanced Encryption Standard (AES) security algorithm, 440
  • Advanced RISC Machines (ARM) architecture, 24
  • Advanced Technology Extended (ATX) motherboards
    • description, 6–7
    • power connectors, 16, 17, 49, 49
  • adware, 468, 472–473
  • AES (Advanced Encryption Standard) security algorithm, 440
  • AGP (Accelerated Graphics Port) bus, 14–15, 14
  • airflow
    • cooling systems, 52–53, 53
    • CPUs, 53–54, 54
  • Airplane mode, 146–148, 147–148
  • all-in-one printers, 107
  • ALTER TABLE command, 371
  • alternating current (AC), 49
  • American Standard Code for Information Interchange (ASCII), 331
  • Android operating system
  • anti-malware software, 293–297, 295–296
  • antispam software, 498–499
  • antispyware software, 498
  • antivirus software, 497–498
  • APIPA (Automatic Private IP Addressing), 422–423, 423
  • .app extension, 277
  • App Stores, 149, 150
  • Apple iTunes synchronization, 153, 153
  • Apple operating system and products, 180
    • batteries, 133
    • FireWire standard, 87–88
    • home screen, 135, 135
    • load problems, 571–572
    • locking and security, 138–141, 139–140
    • MDP standard, 75
    • Thunderbolt, 88
    • versions and features, 199–201, 199
    • workstation, 187–190, 191
  • applications. See software applications
  • Apps & Features window, 278–279
  • apps for mobile devices, 148–149, 149–150, 152
  • architecture, CPU, 24
  • archives, 542, 544
  • ARM (Advanced RISC Machines) architecture, 24
  • ARP (Address Resolution Protocol), 418
  • arrays in programming, 345
  • ASCII (American Standard Code for Information Interchange), 331
  • assembly language, 178, 328–333, 330
  • associations, file, 278–279
  • asymmetric DSL (ADSL), 395
  • attributes in programming, 346
  • ATX (Advanced Technology Extended) motherboards
    • description, 6–7
    • power connectors, 16, 17, 49, 49
  • audio
    • connectors, 66–67, 67
    • ports, 22
  • authentication
  • authentication, authorization, and accounting (AAA), 476
  • authorization, 479–480
  • AutoComplete option, 509, 510
  • autofill feature, 508, 509
  • Automatic Private IP Addressing (APIPA), 422–423, 423
  • automatic updates, 271–272, 271
  • AutoPlay, 507, 507
  • AUTORUN.INF file, 507
  • availability concerns, 465–467

B

  • Baby-AT boards, 7
  • back-panel connectors, 20, 21
  • backdoors, 468, 474
  • backside bus (BSB), 8
  • backups, 542
    • databases, 378–379, 379
    • frequency and scheduling, 547
    • importance, 543
    • locations, 546–547
    • online storage, 288
    • operation, 543–544, 544
    • security certificates, 524–525, 525
    • setting up, 548–550, 548–550
    • types, 544–546, 545
    • verifying and testing, 550–551
  • bare-metal hypervisors, 206
  • baselines, performance, 184
  • Bash shell, 185
  • Basic Input/Output System (BIOS)
    • chips, 18–19, 18–19
    • flashing, 20
  • .bat extension, 277
  • batteries
  • BD (Blu-ray Disc), 42
  • best practices for software applications, 260
    • compatibility, 260–261
    • drivers
      • overview, 269–270, 270
      • updates, 274–276, 275–276
    • installation
      • considerations, 260–264, 263
      • process, 265–267
    • licensing, 261–264, 263
    • operating system
    • registering and activating, 267
    • uninstalling, 267–269, 268
    • updating and patching, 274
  • Big Data, 367
  • binary notational system, 328–331
  • biometric devices, 478, 482
  • BIOS (Basic Input/Output System)
    • chips, 18–19, 18–19
    • flashing, 20
  • bits and bytes conversions, 35, 329–330
  • black screen, troubleshooting, 564–565
  • Blank Database window, 372
  • blank monitors, troubleshooting, 564
  • Blu-ray Disc (BD), 42
  • blue screen, troubleshooting, 564–565
  • Blue Screen of Death (BSOD), 565
  • Bluejacking, 145
  • Bluesnarfing, 145
  • Bluetooth technology
    • configuring, 143–146, 144–146
    • disabling, 504–505, 504–505
    • overview, 408–409, 409
    • pairing, 143–145, 145
  • .bmp extension, 292
  • Boolean data type, 342
  • boot problems, troubleshooting, 564
  • bots, 465
  • Box service, 426–427
  • branching logic, 341–342
  • browsers and browsing, 304
    • configuring, 304–309, 305–309
    • cookies, 310–312, 311–313
    • encrypting, 527
    • private browsing, 317, 318
    • safety, 508–509, 509
      • public workstations, 514–515
      • suspicious sites, 511–513, 513–514
      • tips, 509–511, 510
    • security, 309–317, 309–317
  • BSB (backside bus), 8
  • BSOD (Blue Screen of Death), 565
  • bubble-jet printers, 105
  • bugs, wiretapping, 459
  • burners, 42
  • bus
    • description, 9–10
    • memory speed, 30–31
  • business
    • data drivers, 455–456
    • impact analyses, 538
    • software, 289–293, 290–291
  • business continuity, 537
    • disaster recovery, 551–552
    • exam essentials, 582
    • fault tolerance, 537–538
      • backups, 542–551, 544–545, 548–550
      • contingency plans, 538
      • replication and redundancy, 539–542, 540–541
    • lab, 583
    • review questions, 584–587
    • summary, 581–582
  • bytes and bits conversions, 35, 329–330

C

  • cable
    • fiber-optic, 398
    • hard drive, 37–39, 37–38
    • home network connections, 396–397
    • internal network connections, 404–406
    • reseating, 560
  • cable locks, 129–130, 129–130, 467, 467
  • Cable Select (CS), 39
  • caches
    • browsers, 310–312, 311–313
    • CPU, 11, 25
  • CAD (Computer-Aided Design) systems, 292
  • Calculator for number system conversions, 26–27, 26, 330–331, 330
  • campus licenses, 262
  • capacitive touchscreens, 133
  • captive portals, 439
  • car control devices, 161–162
  • carcinogens, 107
  • Carrier Sense Multiple Access with Collision Detection (CSMA/CD), 404
  • CAs (certificate authorities), 315–317, 316–317, 520
  • cases
    • cooling systems, 52–53, 53
    • functions, 4
    • laptops, 126
  • Category cable, 404
  • cathode ray tube (CRT) monitors, 68–69, 68
  • CCMP (Counter Mode CBC-MAC Protocol), 440
  • CDMA (code division multiple access), 400
  • CDs (compact discs), 42
  • cellular networking, 400–402, 401
  • central processing units. See CPUs (central processing units)
  • certificate authorities (CAs), 315–317, 316–317, 520
  • certificate backups, 524–525, 525
  • Certificate Manager, 524–525, 525
  • char data type, 342
  • chips, reseating, 560
  • chipsets, 8
  • Chrome browser
  • Chrome operating system for workstations, 195–197, 196
  • Chromebooks, 196
  • Chromeboxes, 196–197
  • CIA triad, 457, 457
  • cipher text, 520
  • CISC (complex instruction set computing) architecture, 24
  • clean uninstallations, 268, 502
  • Clear Browsing Data window, 311, 311
  • client computers, 125
  • client-side scripts, 313
  • client-side virtualization, 206
  • client software, 125
  • cloud
    • backups, 547
    • Office 365, 281
    • storage services, 426–427, 427–428
  • CMOS (complementary metal oxide semi-conductor) chips, 20
  • code division multiple access (CDMA), 400
  • code organization, 343–347, 344
  • collaboration software, 285
    • conferencing, 286–287
    • document storage and sharing, 288
    • instant messaging, 287
    • online workspace, 287
  • command lines, 180
  • commercial uses with Internet of Things, 162–165, 164
  • Communication Management app, 505, 505
  • communication methods, disabling, 504, 504
  • communications connectors, 89–91, 90–91
  • compact discs (CDs), 42
  • compatibility mode, 261, 574–575, 575
  • compiled languages, 333–335
  • complementary metal oxide semi-conductor (CMOS) chips, 20
  • complex instruction set computing (CISC) architecture, 24
  • compression, software, 298–301
  • Computer-Aided Design (CAD) systems, 292
  • computer support. See troubleshooting
  • Computer window, 233, 234
  • computing devices, 122
    • exam essentials, 167–168
    • gaming consoles, 155–157, 156
    • Internet of Things, 162–167, 164
    • labs, 168
    • laptops, 125–132, 127–131
    • mobile. See mobile devices
    • review questions, 169–172
    • servers, 123–124
    • summary, 167
    • tablets and smartphones, 132–134
    • workstations, 124–125
  • concurrent licenses, 262
  • concurrent users for databases, 359
  • conferencing software, 286–287
  • confidentially, 458
    • dumpster diving, 463
    • eavesdropping, 459
    • phishing, 461–462
    • policies, 518
    • shoulder surfing, 462
    • snooping, 458–459
    • social engineering, 459–461
    • wiretapping, 459
  • connections and connectors
    • audio, 66–67, 67
    • back-panel, 20, 21
    • communications, 89–91, 90–91
    • delay, 398
    • external storage, 85–88, 86–87
    • front-panel, 21
    • hard drives, 36–39, 37
    • keyboards, 92–93, 93
    • mobile devices, 141–148, 142–148
    • networks, 89, 90, 91, 391
    • power, 16, 17, 49, 49
    • printers, 107–109, 108–109
    • summary, 113–114
    • video, 71–75, 71–72, 74–75
    • wireless networks, 437–438, 437–438
  • consoles, 180
  • constants in programming, 342
  • constraints, database, 363
  • containers in programming, 345
  • contingency plans, 538
  • continuity. See business continuity
  • Control Center for iPhone, 146, 147
  • control codes, 331
  • controllers
  • converting numbering systems, 26–27, 26, 329–331, 330
  • cookies for browsers, 310–312, 311–313
  • cooling systems, 52
  • cooperative multitasking, 181
  • copy backups, 545
  • copying files, 238
  • copyrights, 456
  • corporate licenses, 262
  • Cortana feature, 194
  • Counter Mode CBC-MAC Protocol (CCMP), 440
  • CPUs (central processing units)
    • cooling systems, 53–55, 54
    • features, 22–26, 23
    • gaming consoles, 156
    • laptops, 126
    • operating system slowdown, 573
    • sockets, 10, 11
  • cracking passwords, 475
  • crashes, application, 576
  • CREATE DATABASE command, 371
  • Create Shortcut dialog box, 571
  • CREATE TABLE command, 371
  • cross-platform software, 255–256
  • CRT (cathode ray tube) monitors, 68–69, 68
  • cryptoviral extortion, 473
  • CS (Cable Select), 39
  • CSMA/CD (Carrier Sense Multiple Access with Collision Detection), 404
  • customer interaction in troubleshooting, 553–554
  • cutting files, 238

D

  • DA15 game ports, 45
  • daily backups, 545
  • damaged hardware, 466
  • data
    • backups, 542–551, 544–545, 548–550
    • encrypting
      • data at rest, 521–527, 521–526
      • data in transit, 527
    • managing, 183
    • redundancy, 539–540, 540
    • security with Internet of Things, 165–166
  • Data Error Reading/Writing Drive message, 572
  • Data Over Cable Service Internet Specification (DOCSIS), 396
  • data types, 341–342, 360
  • database management systems (DBMSs), 360
  • databases, 258, 357
    • accessing, 367–370, 368–369
    • backing up, 378–379, 379
    • concepts and structures overview, 358–359, 358
    • creating and managing, 370–373, 372–373
    • exam essentials, 380–381
    • extracting data, 377–378
    • importing and inputting data, 374–375, 375
    • lab, 381–383, 382
    • manipulating data, 376–377
    • non-relational, 364–367
    • relational, 360–364, 361, 363
    • review questions, 384–387
    • summary, 380
    • uses, 359–360
  • DBMSs (database management systems), 360
  • DC (direct current), 49
  • DDoS (distributed denial of service) attacks, 465
  • DDR (double data rate) SDRAM, 31
  • decimal notational system, 329–331
  • dedicated servers, 123–124
  • default denies for firewalls, 297
  • default gateways for IP addresses, 419
  • definitions, antivirus, 497
  • Degauss feature, 75
  • delay, connection, 398
  • DELETE command, 377
  • deleting files, 238
  • demilitarized zones (DMZs), 297, 414–415
  • denial of service (DoS) attacks, 465–466
  • Department of Defense (DoD) model, 416, 417
  • desktop publishing software, 290–292, 291
  • destruction of hardware, 466
  • device drivers
    • description, 176
    • hardware compatibility, 577
    • installing, 269–270, 270
    • updating, 274–276, 275–276
  • Device Manager, 274–276, 275–276
  • devices
    • failures, 576–580, 579–581
    • hardening, 491–496, 492–496
    • managing, 223–224, 224–225
  • Devices And Printers window
  • DHCP (Dynamic Host Configuration Protocol)
    • configuring, 420–421
    • wireless routers, 441, 442
  • diagnostic software, 19
  • dial-up network connections, 393
  • dictionaries, database, 366
  • differential backups, 545
  • digital products security, 456
  • digital subscriber line (DSL), 393–396, 394
  • digital video discs (DVDs), 42, 42
  • Digital Visual Interface (DVI), 72, 72
  • DIMM (Dual Inline Memory Module) RAM, 11, 12, 31–33
  • DIN connectors, 93
  • direct access to databases, 368
  • direct current (DC) power, 49
  • directories. See folders
  • disabling touchpads, 100–101, 100–101
  • disaster recovery, 551–552
  • discretionary access control, 479–480
  • Disk Cleanup tool, 232–233, 232–233
  • Disk Management utility, 226, 226
  • disks and drives
    • activity lights, 22
    • characteristics, 35–36
    • connecting, 36–39, 37
    • controllers, 16, 16
    • examining, 40–41, 40–41
    • external, 82–83, 83
    • file systems, 230–233, 232–233
    • flash, 80–81, 81
    • gaming consoles, 157
    • managing, 226, 226
    • optical, 42–43, 42, 83
    • overview, 33–35
    • partitions, 229–230
    • RAID, 539–540, 540
    • solid-state, 39–40
  • display
    • gaming consoles, 157
    • laptops, 126
  • display devices. See also monitors
    • adjustments, 75–79, 76–79
    • categories, 67–70, 68
  • DisplayPort technology, 73–75, 74
  • distance factor for internal network connections, 405
  • distributed denial of service (DDoS) attacks, 465
  • distributions, Linux, 185
  • divide and conquer troubleshooting approach, 558
  • DL (dual-layer) optical drives, 43
  • .dmg extension, 300
  • DMZs (demilitarized zones), 414–415
  • DNS (Domain Name System), 420–421
  • .doc extension, 281
  • docking stations for laptops, 128–129, 128
  • document databases, 364–365
  • documentation in troubleshooting, 562–563
  • documents, storage and sharing, 288
  • .docx extension, 281
  • DoD wipes, 463
  • Domain Name System (DNS), 420–421
  • DoS (denial of service) attacks, 465–466
  • dot pitch in CRT displays, 68
  • dotted-decimal notation, 418
  • double data rate (DDR) SDRAM, 31
  • double-sided (DS) optical drives, 43
  • DRAM (dynamic random access memory), 27–28
  • drivers
    • description, 176
    • hardware compatibility, 577
    • installing, 269–270, 270
    • updating, 274–276, 275–276
  • drives. See disks and drives
  • DROP DATABASE command, 376
  • Dropbox service, 426–427
  • dropping databases and tables, 376
  • drums, 107
  • DS (double-sided) optical drives, 42
  • dual-core processors, 25
  • Dual Inline Memory Module (DIMM) RAM, 11, 12, 31–33
  • dual-layer (DL) optical drives, 42
  • dumps, database, 379
  • dumpster diving, 463
  • Dvorak keyboards, 94
  • Dynamic Host Configuration Protocol (DHCP)
    • configuring, 420–421
    • wireless routers, 441, 442
  • dynamic random access memory (DRAM), 27–28

E

  • eavesdropping, 459
  • Edge browsers
    • Autofill, 509
    • configuring, 304–309, 305–306
    • cookies and cache, 311–312, 311
    • pop-ups, 313–314, 314
    • private browsing, 317
    • site-browsing history, 480, 481
    • SmartScreen, 512–513, 513
  • editing files, 238
  • EEPROM (electrically erasable PROM), 27
  • EHR (electronic health records) package, 293
  • electromagnetic interference (EMI), 405
  • electronic medical records (EMR) package, 292–293
  • Electronic Numerical Integrator And Computer (ENIAC), 176–177, 177
  • elimination in troubleshooting, 558
  • email
  • embedded operating systems, 206–207
  • EMI (electromagnetic interference), 405
  • EMR (electronic medical records) package, 292–293
  • encryption
    • data at rest, 521–527, 521–526
    • data in transit, 527
    • files, 288
    • overview, 520–521
    • wireless routers, 439–440
  • end-user license agreements (EULAs), 261
  • ENIAC (Electronic Numerical Integrator And Computer), 176–177, 177
  • environmental and safety concepts, power supplies, 49
  • environments, software, 182–183
  • ergonomic keyboards, 94, 94
  • ergonomic mouse, 99
  • error messages from operating systems, 572–573
  • eSATA (external SATA) connectors, 86–87, 86–87
  • Ethernet standard, 404
  • EULAs (end-user license agreements), 261
  • Event Viewer, 480, 480
  • Excel application, 282, 282
  • .exe extension, 277
  • executables, 277
  • exhaust fans, 52–53
  • expansion slots, 13
  • exploits, 468
  • Extended File System (XFS), 231
  • Extensible Markup Language (XML), 336
  • extensions
    • browser, 508
    • files, 277–280, 278–279
  • external device installation basics, 111
  • external network connections, 392
  • external SATA (eSATA) connectors, 86–87, 86–87
  • external storage devices, 80
    • communications connectors, 89–91, 90–91
    • connectors, 85–88, 86–87
    • flash drives, 80–81, 81
    • hard drives, 82–83, 83
    • memory cards, 81–82, 81–82
    • network attached storage, 84–85, 84
    • optical drives, 83
  • extracting database data, 377–378

F

  • facial recognition, 478
  • fans, 52–54, 53
  • fault tolerance. See business continuity
  • features, operating system, 208, 264–265, 265
  • fiber-optic cable, 398, 404–406
  • Fiber-to-the-Home (FTTH) service, 398
  • field-replaceable components (FRUs), 3
  • fields, database, 362–364, 363
  • File Allocation Table (FAT), 230–231
  • file servers, 123
  • file systems, 230–231
  • File Transfer Protocol (FTP), 417
  • files
    • compressing, 298–301, 300–301
    • encrypting, 288, 521–524, 521–524
    • extensions, 277–280, 278–279
    • managing, 229–233, 232–233
    • manipulating, 238–241, 240
    • names, 277
    • navigating, 233–235, 234–235
    • synchronizing, 288
  • FileVault, 526, 526
  • filters
  • financial software, 293
  • Finder application, 187
  • fingerprint recognition, 478
  • firewalls
  • FireWire standards, 87–88
  • firmware, 18–19, 18–19, 207
  • fitness monitors, 162
  • fixed wireless, 402
  • flash drives, 80–81, 81
  • flash memory, 27–28
  • flashing BIOS, 20
  • flat database files, 359
  • flat screens, 69–70
  • floats data type, 342
  • floppy disks and drives, 35
  • flowcharts, 344, 344
  • Fn (Function) keys, 76–77, 76–77, 130
  • folders
    • encrypting, 521–524, 521–524
    • managing, 229–233, 232–233
    • security, 288
    • shared, 427
  • foreign database keys, 362–364
  • form factors for motherboards, 6–7
  • formatting partitions, 229–230
  • forms, database, 364, 368, 369
  • Fortran programming language, 178
  • 4G technology, 400
  • fourth extended file system (ext4), 231
  • FreeBSD servers, 197
  • freeware
    • description, 262
    • installing, 266
  • frequency of backups, 547
  • front-panel connectors, 21
  • frontside bus (FSB), 8–9
  • FRUs (field-replaceable components), 3
  • FTP (File Transfer Protocol), 417
  • FTTH (Fiber-to-the-Home) service, 398
  • Function (Fn) keys, 76–77, 76–77, 130
  • functions in programming, 345

G

  • game ports, 45, 67, 67
  • gaming consoles, 155–157, 156
  • gateways for IP addresses, 419
  • Gauss, Carl Friedrich, 75
  • gesture-based interaction, 136–137
  • Get External Data window, 374, 375
  • .gif extension, 292
  • global database permissions, 369
  • Global System for Mobile Communications (GSM) standard, 400
  • Google Drive service, 426–427, 427–428
  • Google Play app store, 149, 150
  • governance for Internet of Things, 165
  • GPUs (graphics processing units), 44–45, 156
  • grammar in suspicious sites, 512
  • graphic design, 292
  • graphical user interface (GUI), 179–181, 179
  • graphics processing units (GPUs), 44–45, 156
  • group licenses, 262
  • GSM (Global System for Mobile Communications) standard, 400
  • guest access to wireless routers, 441, 441
  • guest accounts, 209, 516
  • GUI (graphical user interface), 179–181, 179
  • gyroscope feature, 137
  • .gz extension, 300

H

  • hackers, 454, 456–457
  • hacking, 454–456
  • hard disks and drives. See disks and drives
  • hardening devices, 491–496, 492–496
  • Hardware And Sound app
  • hardware-based firewalls, 414
  • hardware components overview, 3–4
    • cooling systems, 52–55, 53–54
    • CPUs, 22–26, 23
    • damage to, 466
    • driver compatibility, 577
    • exam essentials, 56
    • labs, 56–58
    • memory. See memory
    • modems, 47, 47
    • motherboards. See motherboards
    • network cards, 46–47, 46
    • power supplies, 48–52, 48–51
    • review questions, 59–62
    • security concerns, 466–467
    • sound cards, 45, 45
    • storage devices. See storage
    • summary, 55–56
    • troubleshooting, 556–557
    • video cards, 43–45, 44
  • HDMI (High-Definition Multimedia Interface), 73, 74
  • HDSL (high bit-rate DSL), 395
  • heads, read/write, 34
  • health monitors, 162
  • heat sinks, 10, 52–54, 54
  • heating, control devices for, 160, 160
  • hexadecimal notational system, 329–331
  • Hierarchical File System (HFS), 231
  • high bit-rate DSL (HDSL), 395
  • High-Definition Multimedia Interface (HDMI), 73, 74
  • home entertainment systems, 159–161
  • host-based firewalls, 261, 414
  • hosts in IP addresses, 418–419
  • hot sites, 539
  • hotspots, 401–402, 401
  • household uses of Internet of Things, 159–161, 160
  • HTML (Hypertext Markup Language), 336
  • HTTP (Hypertext Transfer Protocol), 417
  • HTTPS (Hypertext Transfer Protocol Secure), 417
  • hypervisors in virtual operating systems, 205–206, 206

I

  • iCloud service, 426
  • ICMP (Internet Control Message Protocol), 418
  • IDE (Integrated Drive Electronics) drives, 16, 16, 36–37, 37
  • IEEE 1394 standard, 88
  • IM (instant messaging) software, 287
  • image files, 292
  • impact analyses, 538
  • impersonation, 464–465
  • importing database data, 374–375, 375
  • Impress application, 283
  • Incognito feature, 317, 318
  • information alteration, 465
  • information gathering in troubleshooting, 555–557
  • Infrared Data Association (IrDA), 410–411
  • Infrared technology, 410–411, 410
  • infrastructure in Internet of Things, 164–165
  • ink cartridges, 105, 106
  • inkjet printers, 105–106, 106
  • inoculating against viruses, 294
  • InPrivate browsing, 317, 318
  • input and input devices, 92
    • database data, 374–375, 375
    • failures, 577
    • keyboards, 92–97, 94–97
    • mobile devices, 133
    • pointing devices, 97–104, 98–102, 104
  • INSERT command, 376
  • instant messaging (IM) software, 287
  • Institute of Electrical and Electronics Engineers (IEEE), 88
  • instruction sets, 25
  • intake fans, 52–53
  • integer data type, 342
  • Integrated Drive Electronics (IDE) drives, 16, 16, 36–37, 37
  • integrity, 463–465
  • intellectual property, 456
  • internal device installation basics, 110–111
  • internal network connections, 403–404
  • International Organization for Standardization (ISO), 302
  • Internet. See also networks
    • browsing safely, 508–515, 509–510, 513–514
    • connections, 392–402, 394, 401
    • TCP/IP. See Transmission Control Protocol/Internet Protocol (TCP/IP) suite
  • Internet Control Message Protocol (ICMP), 418
  • Internet Explorer, 317, 318
  • Internet of Things (IoT), 158
    • commercial uses, 162–165, 164
    • consumer uses, 159–162, 160
    • history, 158–159
    • infrastructure, 164–165
    • issues, 165–167
  • Internet Protocol (IP), 416
  • Internet service providers (ISPs), 392
  • interpreted languages, 335
  • iOS operating system
    • Airplane mode, 146, 147
    • apps, 148–149
    • cellular options, 152, 152
    • home screen, 135, 135
    • locking and security, 138–141, 139–140
    • updates, 493, 493
    • versions and features, 199–201, 199
  • IoT. See Internet of Things (IoT)
  • IP (Internet Protocol), 416
  • IP addresses, 418–419
    • APIPA, 422–423, 423
    • DHCP and DNS, 420–421
    • public vs. private, 423–424
  • IP-based printers, 111–112
  • ipconfig tool
    • IP configuration, 422, 423
    • TCP/IP connectivity, 579–580, 579
  • iPhone, 199–200
    • Airplane mode, 147
    • synchronization, 153, 153
  • IPv6, 418
  • IrDA (Infrared Data Association), 410–411
  • ISO (International Organization for Standardization), 302
  • .iso extension, 300
  • ISPs (Internet service providers), 392
  • iTunes
  • ITX motherboards, 6–7

J

  • .jar extension, 300
  • Jobs, Steve, 189
  • journaling, 231
  • joysticks, 101
  • .jpg extension, 292
  • jumpers, 39

K

  • K-slots (Kensington security slots), 129, 467, 467
  • kernels, 180
  • key/value databases, 366–367
  • keyboards, 92
    • configuring, 94–97, 94–97
    • connecting, 92–93, 93
    • laptops, 130–131, 131
  • keyloggers, 468, 472
  • Keynote application, 283
  • keys
  • kill switches, 467
  • killing processes, 219
  • kinetics, 137

L

  • L1 (Level 1) cache, 25
  • L2 (Level 2) cache, 25
  • L3 (Level 3) cache, 25
  • land grid array (LGA) sockets, 10, 11, 23
  • landscape orientation for mobile devices, 137, 138
  • LANs (local area networks), 415
  • laptops
    • architecture, 126
    • cable locks, 467
    • hardware, 126–130, 127–131
    • interfaces, 130–132, 131
    • overview, 125
    • power supplies, 51, 51
    • video toggles, 76–77, 77
  • laser printers, 107
  • latency, connection, 398–399
  • LCD (liquid crystal display) monitors, 69–70
  • least privilege authorization, 479
  • LED (light-emitting diode) monitors, 70
  • legitimate software, 502–503
  • Level 1 (L1) cache, 25
  • Level 2 (L2) cache, 25
  • Level 3 (L3) cache, 25
  • LGA (land grid array) sockets, 10, 11, 23
  • licenses
    • accepting, 429, 429
    • application failures from, 576
    • software, 261–264, 263
  • light-emitting diode (LED) monitors, 69
  • lights in front panel, 22
  • line of sight wireless, 398–399
  • links, suspicious, 511–513
  • Linux operating system, 180
  • liquid cooling systems, 54–55
  • liquid crystal display (LCD) monitors, 69–70
  • LOAD DATA INFILE command, 374
  • load problems
    • macOS, 571–572
    • Windows, 565–572, 567–570
  • local area networks (LANs), 415
  • local backups, 546
  • Lock Screen window, 495, 495
  • locks
    • hardware, 467
    • laptops, 129–130, 129–130, 467, 467
    • mobile devices, 138–141, 139–140
  • lockup, operating system, 573
  • logical schema in databases, 361–362, 361
  • Long-Term Evolution networks, 400
  • looping in programming, 343
  • Lubuntu version, 186, 186

M

  • MAC (Media Access Control) addresses, 413
  • Mac operating systems
  • macros, database, 364
  • Magnavox Odyssey gaming console, 155
  • maintained servers, 288
  • maintenance and review schedules, 538
  • malware, 468. See also viruses
    • anti-malware, 293–297, 295–296
    • diagnosing and fixing infections, 499–500
  • man-in-the-middle attacks, 464
  • mandatory access control, 479
  • manual database access, 367, 368
  • manufacturing devices, 163
  • markup languages, 336–338, 337
  • master drives, 39
  • MD5 (Message Digest Version 5), 497
  • MDP (mini DisplayPort) standard, 75
  • Media Access Control (MAC) addresses, 413
  • medical devices, 163
  • medical software, 292–293
  • memory
    • assessing, 29–30, 29–30
    • bus speeds, 30–31
    • gaming consoles, 157
    • laptops, 126
    • managing, 227–229, 227–229
    • mobile devices, 133
    • operating system slowdown, 573
    • overview, 27–28
    • physical characteristics, 31–33, 32
    • slots for, 11, 12
    • virtual, 28
  • memory cards, 81–82, 81–82
  • Message Digest Version 5 (MD5), 497
  • metadata
    • databases, 364
    • file systems for, 230
    • viewing, 236, 236–237
  • methods in programming, 347
  • micro ATX motherboards, 7
  • MicroDIMM memory, 31
  • MiFi hotspots, 401–402, 401
  • MIME (Multipurpose Internet Mail Extensions), 279–280
  • mini-DIN 6 connectors, 93
  • mini DisplayPort (MDP) standard, 75
  • mini-ITX motherboards, 7
  • Minimum System Requirements section, 260
  • mirroring disks, 539, 540
  • mobile devices
    • apps, 148–149, 149–150, 152
    • encryption, 527
    • interfaces, 135–136, 135–136
    • locking and securing, 138–141, 139–140
    • network connections, 141–148, 142–148
    • screen orientation, 137–138, 137–138
    • synchronization options, 152–153, 153–154
    • tablets and smartphones, 132–134
    • touchscreens, 136–137
    • unexpected charges, 151–152, 152
    • wipes, 494
    • working with, 134–135
  • mobile hotspots, 401–402, 401
  • mobile-ITX motherboards, 7
  • mobile operating systems
  • modems
  • modular components, 3
  • modules for database, 364
  • monitoring system health, 183–184, 184
  • monitors
    • adjustments, 75–79, 76–79
    • blank, 564
    • CRT, 68–69, 68
    • flat screens, 69–70
  • Moore's law, 24–25
  • motherboards
    • back-panel connectors, 20, 21
    • BIOS chips, 18–19, 18–19
    • chipsets, 8
    • CMOS batteries, 20
    • components, 4–6, 5
    • CPU sockets, 10, 11
    • description acronyms, 22
    • disk controllers, 16, 16–17
    • expansion slots, 13–16, 14–15
    • firmware, 18–19, 18–19
    • form factors, 6–7
    • front-panel connectors, 21
    • laptops, 126
    • memory slots and external cache, 11, 12
    • power connectors, 16, 17
  • mouse
  • Mouse Properties window, 100, 100, 103, 104
  • moving files, 238
  • MS-DOS operating system, 180
  • MSCONFIG file, 569–572, 569–571
  • .msi extension, 277
  • multicore architecture, 25
  • multifactor authentication, 476, 477
  • MultiFinder application, 187
  • multifunctional printers, 107
  • multiple concurrent database users, 359
  • multiple monitor settings, 77–79, 77–79
  • Multipurpose Internet Mail Extensions (MIME), 279–280
  • multitasking, 181
  • multithreading, 181

N

  • Nadella, Satya, 191
  • naked DSL, 396
  • names for files, 238, 277
  • nano-ITX motherboards, 7
  • NAS (network attached storage), 84–85, 84, 425–426, 425
  • NAT (Network Address Translation)
    • IP addresses, 424
    • wireless routers, 442, 443
  • natural keyboards, 94, 94
  • near field communication (NFC), 504
  • neo-ITX motherboards, 7
  • netbooks, 196
  • Network Address Translation (NAT)
    • IP addresses, 424
    • wireless routers, 442, 443
  • network attached storage (NAS), 84–85, 84, 425–426, 425
  • network-based firewalls, 261, 414
  • network cards, 46–47, 46
  • network connections for mobile devices, 141–148, 142–148
  • network IDs in IP addresses, 418–419
  • network interface cards (NICs), 46–47, 46, 125
  • networks, 391
    • backups, 547
    • connections. See connections and connectors
    • devices, 411–415, 412–414
    • exam essentials, 445–446
    • lab, 446
    • printers, 109
    • protocols, 415–421, 417, 423
    • redundancy, 540
    • review questions, 447–450
    • routers. See routers
    • small office, 444
    • storage, 424–427, 425, 427–428
    • summary, 445
    • threats, 496–500, 500
    • viruses, 472
    • wireless. See wireless network configurations
  • new files, 238
  • New Technology File System (NTFS), 231
  • NFC (near field communication), 504
  • NICs (network interface cards), 46–47, 46, 125
  • Nintendo Entertainment System, 155
  • non-relational databases, 364–367
  • non-structured database data, 364
  • nondedicated servers, 124
  • nonrepudiation, 481
  • normal backups, 545–546
  • Northbridge chipsets, 8, 9
  • Norton Internet Security, 295, 296
  • notational systems, 329–331, 330
  • notebook computers. See laptops
  • NTFS (New Technology File System), description, 231
  • numbering systems, converting between, 26–27, 26, 329–331, 330

O

  • object-oriented programming (OOP), 347
  • objects
    • database permissions for, 369
    • in programming, 346–347
  • octets, 418–419
  • Odyssey gaming console, 155
  • OEM (original equipment manufacturer) sites, 502–503
  • Office 365, 281
  • 1ClickSync, 153, 154
  • one-time passwords, 476
  • OneDrive service, 426
  • online workspace, 287
  • OOP (object-oriented programming), 347
  • open portals, 439
  • open source software, 178–179, 262
  • opening files, 238
  • openssl libraries, 526
  • operating systems, 175
    • basic functions, 180–181
    • data management structure, 183
    • embedded, 206–207
    • error messages, 572–573
    • exam essentials, 241–242
    • feature installation and uninstallation, 264–265, 265
    • fundamentals, 175–176, 176
    • history, 176–182, 179
    • lab, 242–246, 243–246
    • managing, 207–208
      • access control, 215–217, 215–216
      • application management, 217, 217
      • devices, 223–224, 224–225
      • disk space, 226, 226
      • file manipulation, 238–241, 240
      • file structure navigation, 233–235, 234–235
      • folder and file structures, 229–233, 232–233
      • memory, 227–229, 227–229
      • metadata, 236, 236–237
      • processes, 218–221, 219–221
      • service, 222, 222–223
      • user accounts, 208–215, 209–214
  • mobile
  • review questions, 247–250
  • security threats, 468–469
  • server, 197–198
  • slowdown and lockup, 573
  • software environments, 182–183
  • summary, 241
  • system health monitoring, 183–184, 184
  • types, 185
  • updating and patching, 270–276, 271, 273
  • user and hardware coordination, 182
  • virtual, 204–206, 205–206
  • workstation
  • optical drives, 42–43, 42, 83
  • orientation in mobile devices, 137–138, 137–138
  • original equipment manufacturer (OEM) sites, 502–503
  • OS X operating system, 187–190, 191

P

  • packaging, CPU, 23
  • packets, 421
  • page files, 28, 227
  • page layout software, 290–292, 291
  • pairing, Bluetooth, 143–145, 145
  • Parallel ATA (PATA) drives, 16, 36–39, 37–38
  • parallel buses, 10
  • parallel connections for printers, 108, 109
  • partitions, 230
  • passive worms, 472
  • passwords
  • pasting files, 238
  • PAT (Port Address Translation), 424
  • PATA (Parallel ATA) drives, 16, 36–39, 37–38
  • patching
  • patents, 456
  • payloads in worms, 472
  • PCBs (printed circuit boards), 4
  • PCI (Peripheral Component Interconnect) bus type, 13–14, 14
  • PCI Express (PCIe) expansion slots, 15–16, 15
  • PDF (Portable Document Format) application, 301–304, 303
  • PDF creator application, 302
  • Performance Monitor, 183–184, 184
  • Performance Options dialog box, 29–30, 30
  • Peripheral Component Interconnect (PCI) bus type, 13–14, 14
  • peripherals, 65
    • audio connectors, 66–67, 67
    • display adjustments, 75–79, 76–79
    • display devices, 67–70, 68
    • exam essentials, 115
    • external storage devices. See external storage devices
    • input devices, 92
      • failures, 577
      • keyboards, 92–97, 94–97
      • pointing devices, 97–104, 98–102, 104
    • installation basics, 109–113
    • labs, 116
    • printers, 105–109, 106, 108–109
    • review questions, 117–120
    • summary, 114–115
    • video connectors, 71–75, 71–72, 74–75
  • permissions
    • databases, 369–370
    • user accounts, 209
  • persistence of database data, 360
  • personal finance software, 293
  • PGA (pin-grid array) sockets, 10, 11, 23
  • phablets, 134
  • phishing, 461–462, 511
  • physical schema for databases, 361–362
  • pico-ITX motherboards, 7
  • piconets, 409
  • pin-grid array (PGA) sockets, 10, 11, 23
  • PIN screen, 143, 144
  • pinch gesture, 137
  • ping tool, 399, 579–581, 579–581
  • PingID security tokens, 477, 477
  • PKI (public key infrastructure), 520
  • plain old telephone service (POTS), 393
  • plain text, 315
  • plans in troubleshooting, 561–562
  • plasma monitors, 70
  • platforms, software, 255–256
  • platters, 34
  • PlayStation system, 156–157
  • plug-and-play devices, 110–111
  • plugins for browsers, 508
  • .PNG extension, 292
  • point sticks, 131–132
  • point-to-multipoint connections, 399
  • point-to-point infrared, 410
  • Pointer Options tab, 103, 104
  • pointing devices, 96–97
    • configuring, 103, 104
    • connecting, 103
    • joysticks, 101
    • laptops, 131–132
    • mouse, 98–99, 98
    • stylus pens, 101–102
    • touchpads, 99–101, 99–101
    • trackballs, 102, 102
  • policies
    • backups, 542
    • confidentially, 458
  • Pong game, 155, 156
  • pop-up windows, 313–314, 314–315
  • Port Address Translation (PAT), 424
  • Portable Document Format (PDF) application, 301–304, 303
  • portals, open, 439
  • portrait orientation in mobile devices, 137, 137
  • ports
    • audio, 22
    • gaming consoles, 157
    • keyboards, 93, 93
    • laptops, 128–129
    • printers, 108, 108–109
  • POST (power-on self-test), 19, 564
  • POTS (plain old telephone service), 393
  • power adapters for laptops, 127, 127
  • power buttons, 21
  • power lights, 22
  • power-on self-test (POST), 19, 564
  • power supplies and systems
    • connectors, 16, 17
    • overview, 48–52, 48–51
    • problems, 564
    • redundancy, 540–542, 541
  • PowerPoint application, 283, 283
  • .ppt extension, 283
  • .pptx extension, 283
  • pre-operating system computer age, 176–180, 177
  • preemptive multitasking, 181
  • presentation software, 282–283, 283
  • preventive systems, 538
  • pricing Internet connections, 403
  • primary database keys, 362–364, 363
  • print servers, 123
  • printed circuit boards (PCBs), 4
  • printers, 105
    • connecting, 107–109, 108–109
    • IP-based, 111–112
    • technologies, 105–107, 106
    • web-based, 113, 113
  • Printers & Scanners app, 111
  • privacy
    • expectations, 517–518
    • Internet of Things issues, 165–166
  • private browsing, 317, 318
  • private IP addresses, 423–424
  • private keys in PKI, 520
  • Private Properties dialog box, 523, 523
  • private side firewalls, 297
  • privileges
    • databases, 369
    • user accounts, 209
  • problem identification in troubleshooting, 553–555
  • process management, 218–221, 219–221
  • processors. See CPUs (central processing units)
  • product keys, 263, 263
  • productivity software, 280
  • Program Manager, 192, 192
  • programmatic access to databases, 368
  • programming languages, 327–328
  • programming logic, 341–343
  • programs. See software applications
  • Programs And Features screen, 217, 217, 502
  • prohibition icons, 572
  • project management software, 289, 290
  • projectors, 69
  • properties
    • files, 236, 236–237
    • in programming, 346
  • Properties dialog box for hard disks, 40, 41
  • protocol analyzers, 458
  • protocols for networks, 415–421, 417, 423
  • proxies, browser, 308–309, 309
  • PS/2 ports, 93, 93
  • pseudocode, 345
  • public IP addresses, 423–424
  • public key infrastructure (PKI), 520
  • public side firewalls, 297
  • public workstations, 514–515
  • Publisher, 290–292, 291

Q

  • QoS (Quality of Service) for routers, 442
  • quad-core processors, 25
  • quarantining files, 296, 498
  • queries for databases, 364
  • query languages, 339–340
  • QWERTY keyboards, 92

R

  • radio frequency (RF) broadband Internet, 402
  • radio-frequency identification (RFID) tags, 158
  • RADSL (rate-adaptive DSL), 395
  • RAID (Redundant Array of Independent Disks), 426, 539–540, 540
  • RAM. See memory
  • ransomware, 468, 473
  • .rar extension, 299
  • RAS (Remote Access Service), 393
  • rate-adaptive DSL (RADSL), 395
  • RDBMSs (relational database management systems), 360
  • read-only memory (ROM), 27
  • rebooting in troubleshooting, 561
  • receipts for nonrepudiation, 482
  • records, database, 360, 362
  • recovery environment, 571
  • recovery plans, 538
  • reduced instruction set computing (RISC) architecture, 24
  • Redundant Array of Independent Disks (RAID), 426, 539–540, 540
  • registering software, 267
  • Registry
    • load problems, 565
    • uninstalling applications, 269
  • relational database management systems (RDBMSs), 360
  • relational databases, 360–364, 361, 363
  • Remote Access Service (RAS), 393
  • removing
    • applications, 267–269, 268
    • malware, 296–297
    • unwanted and unnecessary software, 501, 502
  • renaming files, 238
  • repairing applications, 268
  • replay attacks, 464
  • replication and redundancy, 539
  • reports, database, 364
  • reseating chips and cables, 560
  • reset buttons, 21
  • resistive touchscreens, 133
  • resolution
    • CRT displays, 68–69
    • monitor settings, 78, 78
  • resources for troubleshooting, 557
  • restarting computer in troubleshooting, 561
  • restore points, 566, 568, 568
  • retina scanning, 478
  • reverse engineering of code, 328
  • RF (radio frequency) broadband Internet, 402
  • RFID (radio-frequency identification) tags, 158
  • RISC (reduced instruction set computing) architecture, 24
  • RJ-11 connectors, 47, 47, 89, 90, 91
  • RJ-45 connectors, 89, 90, 91
  • Roku devices, 159, 160
  • role-based access control, 480
  • roles, database, 370
  • ROM (read-only memory), 27
  • rootkits, 468, 474
  • routers
    • configuring, 429–431, 430–431
    • network, 413–414, 413–414
    • wireless
      • security, 438–440
      • services, 440–444, 441–443
  • RSA security tokens, 477, 477
  • .rtf extension, 281
  • rule-based access control, 480
  • Runtime Error Has Occurred message, 572

S

  • Safe Mode, 565–566
  • Safe Mode with Networking, 500
  • saidar tool, 184
  • SARC (Symantec AntiVirus Research Center), 294
  • SATA (Serial ATA) drives, 16, 17
    • connections, 36–37, 37–38
    • external, 86–87, 86–87
  • Satellite Internet, 398–399
  • Save Form Entries switch, 510, 510
  • saving files, 238
  • scalability of databases, 359
  • .scexe extension, 277
  • schedules
    • backups, 547
    • maintenance and review, 538
    • malware scans, 297
    • tasks, 219–221, 220–221
  • schema for databases, 361–362, 361
  • scientific software, 292–293
  • screen orientation in mobile devices, 137–138, 137–138
  • Screen Saver Settings dialog box, 496–497, 496–497
  • scripted languages, 339
  • scripting languages, 338–339, 339
  • scripts, browser, 313
  • SCSI (small computer system interface), 37
  • SDR (single data rate) SDRAM, 31
  • SDSL (symmetric DSL), 395
  • Secure Sockets Layer (SSL), 315
  • secure websites, visiting, 315–317, 316–317
  • security
    • best practices. See security best practices
    • Bluetooth, 145
    • browsers, 309–317, 309–317
    • control devices, 161
    • databases, 360
    • file systems for, 231
    • files, 236, 237
    • firewalls, 297–298, 298
    • folders, 288
    • Internet of Things, 165–166
    • mobile devices, 138–141, 139–140
    • network connections, 405, 408, 411
    • threats. See security threats
    • wireless networks, 434–436, 435
    • wireless routers, 438–440
  • Security & Privacy window, 526, 526
  • Security and Maintenance screen, 500, 500
  • security best practices, 491
    • data encryption, 520–527, 522–526
    • device hardening, 491–496, 492–496
    • exam essentials, 528–529
    • Internet safe browsing, 508–515, 509–510, 513–514
    • lab, 529
    • network threats, 496–500, 500
    • review questions, 530–533
    • summary, 527–528
    • user accounts, 515–520
  • security threats, 454
    • access control, 476–482, 477, 481
    • availability, 465–467
    • confidentially, 458–463
    • exam essentials, 483–484
    • hacking, 454–456
    • hardware, 466–467
    • integrity, 463–465
    • lab, 484
    • overview, 457
    • review questions, 485–488
    • software-based. See software-based security threats
    • summary, 482–483
  • SELECT command, 377–378
  • Select Users Or Groups dialog box, 522, 522
  • self-driving trucks, 163
  • semi-structured data, databases, 364
  • Serial ATA (SATA) drives, 16, 17
    • connections, 36–37, 37–38
    • external, 86–87, 86–87
  • serial buses, 10
  • serial connections for printers, 107–108, 108
  • servers
    • database permissions, 369
    • maintained, 288
    • operating systems, 197–198
    • overview, 123–124
    • proxy, 308, 309
    • vs. workstations, 125
  • service outages, 465
  • service packs, 469
  • Service Set Identifiers (SSIDs)
    • Wi-Fi connections, 141
    • wireless networks, 435
  • serviceability of mobile devices, 132–133
  • services
    • disabling, 505–506, 505–506
    • managing, 222, 222–223
    • server, 197
  • 7-Zip program, 299–301, 300–301
  • .7z extension, 300
  • SFF (small form factor) boards, 6
  • shared folders, 427, 428
  • shareware
    • description, 262
    • installing, 266
  • sharing documents, 288
  • shells
  • shortcuts, 239–241, 240, 571
  • shoulder surfing, 462
  • signatures
    • anti-malware programs, 472
    • for nonrepudiation, 482
    • virus, 497
  • single data rate (SDR) SDRAM, 31
  • single-factor authentication, 476
  • single-platform software, 255–256
  • single sided (SS) optical drives, 42
  • single user software, 262
  • site licenses, 262
  • 64-bit CPUs, 24
  • 64-bit operating system, 181
  • slave drives, 39
  • slowdown, operating system, 573
  • small computer system interface (SCSI), 37
  • small form factor (SFF) boards, 6
  • small office network configuration, 444
  • Small Outline DIMM (SODIMM) memory, 11, 12, 31–33
  • smart cards, 476–477
  • smart TVs, 159
  • smartphones, 132–134
    • removing unwanted and unnecessary software, 502
    • theft, 467
  • SmartScreen, 512–513, 513
  • sniffers, 458
  • snooping, 458–459
  • social engineering, 459–461
  • social side of troubleshooting, 555
  • sockets, CPU, 10, 11
  • SODIMM (Small Outline DIMM) memory, 11, 12, 31–33
  • software
    • legitimate, 502–503, 503
    • unwanted and unnecessary, 501, 502
  • software applications, 254
    • antivirus, 497–498
    • best practices. See best practices for software applications
    • browsers. See browsers and browsing
    • business, 289–293, 290–291
    • collaboration, 285–288
    • compression, 298–301, 300–301
    • concepts, 255
    • description, 176
    • environments, 182–183
    • exam essentials, 319–320
    • failures, 574–575, 575
    • file extensions, 277–280, 278–279
    • lab, 320
    • managing, 217, 217
    • PDF, 301–304, 303
    • platforms, 255–256
    • productivity. See productivity software
    • review questions, 321–324
    • software firewalls, 297–298, 298
    • summary, 318–319
    • in troubleshooting, 556
    • utility, 293–297, 295–296
  • software-based firewalls, 414
  • software-based security threats, 468
    • adware, 472–473
    • backdoors, 474
    • operating systems, 468–469
    • password cracking, 475
    • ransomware, 473
    • rootkits, 474
    • spam, 474–475
    • spyware, 473
    • Trojan horses, 472
    • viruses, 469–472, 471
    • worms, 472
  • software development
    • code organization, 343–347, 344
    • exam essentials, 348–349
    • lab, 349
    • languages. See programming languages
    • programming logic, 341–343
    • review questions, 350–353
    • summary, 347–348
  • solid-state drives (SSDs), 39–40
  • sound cards, 45, 45, 66
  • source code
    • compiled languages, 333
    • operating systems, 180
  • Southbridge chipsets, 8, 9
  • spam
    • antispam software, 498–499
    • overview, 474–475
  • spambots, 474
  • speakers, 66–67
  • spear phishing, 462
  • speed
    • bus, 30–31
    • CPU, 24–25
    • databases, 360
    • hard drive spin rates, 36
    • USB, 73
  • spelling in suspicious sites, 512
  • spin rates of hard drives, 36
  • spoofing, 511
  • spreadsheet software, 281–282, 282
  • Spybot Search - Destroy tool, 498
  • spyware, 294, 468
    • antispyware software, 498
    • overview, 473
  • SQL (Structured Query Language), 366
  • SRAM (static random access memory), 27–28
  • SS (single sided) optical drives, 42
  • SSDs (solid-state drives), 39–40
  • SSIDs (Service Set Identifiers)
    • Wi-Fi connections, 141
    • wireless networks, 435
  • SSL (Secure Sockets Layer), 315
  • SSO (single sign-on), 478
  • standardization of operating systems, 178–179
  • standards for Internet of Things, 165
  • Star workstations, 179–180, 179
  • starting services, 505–506, 505–506
  • static IP addressing, 420
  • static random access memory (SRAM), 27–28
  • STOP errors, 564–565
  • stopping services, 505–506, 505–506
  • storage
    • device overview. See disks and drives
    • documents, 288
    • Internet of Things, 166–167
    • networks, 424–427, 425, 427–428
  • string data type, 342
  • striping, disk, 539
  • strong passwords, 518–519
  • Structured Query Language (SQL), 366
  • stylus pens, 101–102
  • subnet masks for IP addresses, 419
  • support. See troubleshooting
  • suspicious sites, 511–513, 513–514
  • swap files, 28, 227
  • swipe gesture, 137
  • switches
    • network, 412, 413
    • power supplies, 50–51
  • Symantec AntiVirus Research Center (SARC), 294
  • symmetric DSL (SDSL), 395
  • synchronization
    • files, 288
    • mobile devices, 152–153, 153–154
  • system-based documentation in troubleshooting, 563
  • System Configuration utility, 569–572, 569–571
  • system health, monitoring, 183–184, 184
  • system image backups, 546
  • System Is Low On Virtual Memory message, 572
  • System Monitor tool, 184
  • system passwords, 492–496, 492–496
  • System Properties dialog box, 29–30, 567–569, 567
  • System Protection window, 567–568, 567
  • System Restore feature, 566–569, 567–568
  • System screen, 227, 227
  • System Software, 187
  • System32 folder, 565
  • SysWOW64 folder, 565

T

  • tables, database
  • tablets
    • overview, 132–134
    • removing unwanted and unnecessary software, 502
  • tags in markup languages, 336
  • tap gesture, 137
  • .tar extension, 299
  • Task Manager
  • Task Schedule, 219–221, 220–221
  • tax preparation software, 293
  • TCP/IP. See Transmission Control Protocol/Internet Protocol (TCP/IP) suite
  • telephone connectors, 91, 91
  • telepresence, 286
  • Temporal Key Integrity Protocol (TKIP), 441
  • teraflops, 157
  • testing backups, 550–551
  • theft of hardware, 466–467
  • theories in troubleshooting, 557–558
  • thermostats, smart, 160, 160
  • third extended file system (ext3), 231
  • 32-bit CPUs, 24
  • 32-bit operating systems, 181
  • Thunderbolt technology, 75, 75, 88
  • .tiff extension, 292
  • TKIP (Temporal Key Integrity Protocol), 441
  • TLS (Transport Layer Security), 315
  • tokens, security, 476–477, 477
  • toll collections systems, 163–164, 164
  • toner
    • description, 106–107
    • safety, 107
  • toolbars for browsers, 508
  • Torvalds, Linus, 180, 185
  • Touch ID & Passcode window, 494, 494
  • touchpads, 99–101, 99–101, 131
  • touchscreens, 70
  • tracert command, 421–422, 422, 580, 581
  • trackballs, 102, 102, 131
  • trademarks, 456
  • traffic signals, 163
  • training, 538
  • Transmission Control Protocol (TCP), 416
  • Transmission Control Protocol/Internet Protocol (TCP/IP) suite, 416–417, 417
    • connectivity issues, 578–581, 579–581
    • IP addresses, 418–419
      • APIPA, 422–423, 423
      • DHCP and DNS, 420–421
      • public vs. private, 423–424
  • Transport Layer Security (TLS), 315
  • transportation devices, 163–164
  • Trend Micro tools, 500
  • triple A access control, 476
  • Trojan horses, 468, 472
  • troubleshooting, 552
    • concepts, 552–553
    • exam essentials, 582
    • examples
      • application failures, 574–575, 575
      • blank monitors, 564
      • blue screen, 564–565
      • boot problems, 564
      • device failures, 576–580, 579–581
      • macOS load problems, 571–572
      • operating system error messages, 572–573
      • operating system slowdown and lockup, 573
      • overview, 563
      • Windows load problems, 565–572, 567–570
    • lab, 583
    • resources for, 557
    • review questions, 584–587
    • social side, 555
    • steps, 553
      • action plans, 561–562
      • documentation, 562–563
      • implementation, 562
      • problem identification, 553–555
      • solution testing, 558–561
      • theory formation, 557–558
      • verifying functionality, 562
    • summary, 581–582
  • Twain, Mark, 201
  • .txt extension, 281
  • Type 1 hypervisors, 205–206, 205–206
  • Type 2 hypervisors, 205–206, 205–206

U

  • UAC (User Account Control), 215–217, 215–216
  • UDP (User Datagram Protocol), 417
  • unauthorized information alteration, 465
  • unclean uninstallations, 269
  • unexpected charges for mobile devices, 151–152, 152
  • Unicode, 331
  • uniform resource locators (URLs), 420
  • uninstalling software, 267–269, 268, 501, 502
  • uninterruptible power supplies (UPSs), 466, 540–542, 541
  • Universal Serial Bus. See USB (Universal Serial Bus)
  • Unix operating system, 178
  • unshielded twisted pair (UTP) wire, 404–405
  • unwanted and unnecessary software, removing, 501, 502
  • UPDATE command, 376–377
  • updates
    • anti-malware, 295
    • applications, 274
    • devices, 492–496, 492–496
    • drivers, 274–276, 275–276
    • operating systems, 270–276, 271, 273
  • upgrading vs. updating, 270–271
  • UPSs (uninterruptible power supplies), 466, 540–542, 541
  • URLs (uniform resource locators), 420
  • USB (Universal Serial Bus)
    • connectors, 72–73
    • external storage, 85–88
    • introduction, 10
    • keyboards, 92–93, 93
    • pointing devices, 103
    • ports, 22
    • printers, 109
  • User Account Control (UAC), 215–217, 215–216
  • user accounts
    • expectation management, 516–518
    • managing, 208–211, 209–210
    • passwords, 518–520
    • types, 515–516
  • User Datagram Protocol (UDP), 417
  • user error in troubleshooting, 560–561
  • user interfaces, databases, 368
  • utility software, 293–297, 295–296
  • UTP (unshielded twisted pair) wire, 404–405

V

  • variables in programming, 342–343
  • VDC (volts DC), 49
  • VDSL (very high bit-rate DSL), 395
  • vectors in programming, 345
  • verifying
    • backups, 550–551
    • functionality in troubleshooting, 562
  • versions of operating systems, 180
  • very high bit-rate DSL (VDSL), 395
  • VESA (Video Electronics Standards Association), 75
  • VGA (Video Graphics Array), 71–72, 71
  • video
    • connectors, 71–75, 71–72, 74–75
    • for nonrepudiation, 481
  • video cards
    • gaming consoles, 157
    • overview, 43–45, 44
  • Video Electronics Standards Association (VESA), 75
  • Video Graphics Array (VGA), 71–72, 71
  • virtual machines (VMs), 205
  • virtual memory
    • description, 28
    • hypervisors, 205–206, 206
    • managing, 227–229, 227–229
  • Virtual Memory dialog box, 30
  • virtual memory managers (VMMs), 205–206, 206
  • virtual operating systems, 204–205
  • virtual private networks (VPNs), 527
  • viruses, 294, 468, 471
    • antivirus software, 497–498
    • application failures, 576
    • Mac systems, 469
    • operation, 470–471, 471
    • overview, 469–470
    • symptoms, 470
  • visual diagramming software, 284, 284
  • VMMs (virtual memory managers), 205–206, 206
  • VMs (virtual machines), 205
  • Voice over Internet Protocol (VoIP), 287
  • voltages in power supplies, 50–51
  • volts DC (VDC), 49
  • VPNs (virtual private networks), 527
  • vulnerabilities, 468

W

  • walk-up infrared, 410
  • WANs (wide area networks), 415
  • watts of power supplies, 49
  • weak passwords, 518–519
  • web-based printers, 113, 113
  • web browsers. See browsers and browsing
  • web servers, 124
  • webcams, 70
  • weight of gaming consoles, 157
  • WEP (Wired Equivalency Protocol), 440
  • whaling, 462
  • Wi-Fi connections for mobile devices, 141–143, 142–143
  • Wi-Fi Protected Access (WPA), 440
  • Wi-Fi Protected Access 2 (WPA2), 440
  • Wi-Fi screen, 141, 142
  • wide area networks (WANs), 415
  • Wii system, 156
  • WIMP interface, 180
  • Windows Defender, 298, 299, 498, 500
  • Windows Explorer, 193, 233–235
  • Windows Firewall, 500
  • Windows Has Recovered From A Serious Error message, 572
  • Windows operating systems
    • drive status, 40–41, 40–41
    • load problems, 565
      • recovery environment, 571
      • Safe Mode, 565–566
      • System Configuration, 569–572, 569–571
      • System Restore, 566–569, 567–568
    • server, 198
    • shortcuts, 239–241, 240
    • usage, 195
    • user accounts, 209, 209, 211–215, 211–214
    • versions, 192–195, 192–194
    • workstation, 191–197, 192–194, 196
  • Windows phone operating system, 203–204, 204
  • Windows Recovery Environment (Windows RE), 500, 571
  • Windows Registry, 217
  • Windows Update, 271–274, 271, 273, 492, 492
  • WinZip program, 299
  • wipes for mobile devices, 494
  • Wired Equivalency Protocol (WEP), 440
  • wired internal network connections, 404–406
  • wireless access points, 413
  • wireless devices. See mobile devices
  • wireless LANs (WLANs), 407–409, 409
  • wireless mouse, 98, 98
  • wireless network configurations, 428
    • administrator passwords, 436–437, 436
    • basic, 431–434, 432–434
    • connections, 437–438, 437–438
    • license agreements, 429, 429
    • routers, 429–431, 430–431
    • security, 434–436, 435
  • Wireless Network Connection window, 437, 437
  • wireless personal area networks (WPANs), 408
  • wireless routers
  • wiretaps, 405, 459
  • WLANs (wireless LANs), 407–409, 409
  • Word application, 280–281, 280
  • word processing software, 280–281, 280
  • workstations
    • operating systems
    • overview, 124–125
    • public, 514–515
  • worms, 468, 472
  • WPA (Wi-Fi Protected Access), 440
  • WPA2 (Wi-Fi Protected Access 2), 440
  • WPANs (wireless personal area networks), 408

X

  • Xbox system, 156–157
  • XFS (Extended File System), 231
  • XML (Extensible Markup Language), 336

Z

  • .zip extension, 299
  • zipping files, 299
  • Zoho management software, 289, 290
  • zombies, 465
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.140.185.147