A
- AAA (authentication, authorization, and accounting), 476
- AC (alternating current), 49
- AC adapters for laptops, 51–52, 51, 127, 127
- Accelerated Graphics Port (AGP) bus, 14–15, 14
- acceptable use policies, 516
- access control lists (ACLs), 297, 414, 479
- access control management
- accounting, 480, 480
- authentication, 476–478, 477
- authorization, 479–480
- databases, 367–370, 368–369
- nonrepudiation, 481
- user accounts, 215–217, 215–216
- access points, network, 413
- accounting, 480, 480
- accounting software, 293
- accounts. See user accounts
- ACLs (access control lists), 297, 414, 479
- Action Center, 194
- action plans in troubleshooting, 561–562
- activation of software, 267
- active worms, 472
- Activity Monitor tool, 184
- add-ons for browsers, 508
- Add Printer window, 111, 112
- Address Resolution Protocol (ARP), 418
- administrator passwords, 436–437, 436
- Adobe Reader, 301–302, 304
- ads, suspicious, 511–513
- ADSL (asymmetric DSL), 395
- Advanced Attributes dialog box, 524, 524, 544, 544
- Advanced Encryption Standard (AES) security algorithm, 440
- Advanced RISC Machines (ARM) architecture, 24
- Advanced Technology Extended (ATX) motherboards
- description, 6–7
- power connectors, 16, 17, 49, 49
- adware, 468, 472–473
- AES (Advanced Encryption Standard) security algorithm, 440
- AGP (Accelerated Graphics Port) bus, 14–15, 14
- airflow
- cooling systems, 52–53, 53
- CPUs, 53–54, 54
- Airplane mode, 146–148, 147–148
- all-in-one printers, 107
- ALTER TABLE command, 371
- alternating current (AC), 49
- American Standard Code for Information Interchange (ASCII), 331
- Android operating system
- Airplane mode, 148, 148
- apps, 153, 154
- batteries, 133
- Google Play app store, 149, 150
- home screen, 135–136, 136
- overview, 201–203, 202
- settings, 143, 144
- synchronization, 153, 154
- anti-malware software, 293–297, 295–296
- antispam software, 498–499
- antispyware software, 498
- antivirus software, 497–498
- APIPA (Automatic Private IP Addressing), 422–423, 423
- .app extension, 277
- App Stores, 149, 150
- Apple iTunes synchronization, 153, 153
- Apple operating system and products, 180
- batteries, 133
- FireWire standard, 87–88
- home screen, 135, 135
- load problems, 571–572
- locking and security, 138–141, 139–140
- MDP standard, 75
- Thunderbolt, 88
- versions and features, 199–201, 199
- workstation, 187–190, 191
- applications. See software applications
- Apps & Features window, 278–279
- apps for mobile devices, 148–149, 149–150, 152
- architecture, CPU, 24
- archives, 542, 544
- ARM (Advanced RISC Machines) architecture, 24
- ARP (Address Resolution Protocol), 418
- arrays in programming, 345
- ASCII (American Standard Code for Information Interchange), 331
- assembly language, 178, 328–333, 330
- associations, file, 278–279
- asymmetric DSL (ADSL), 395
- attributes in programming, 346
- ATX (Advanced Technology Extended) motherboards
- description, 6–7
- power connectors, 16, 17, 49, 49
- audio
- connectors, 66–67, 67
- ports, 22
- authentication
- authentication, authorization, and accounting (AAA), 476
- authorization, 479–480
- AutoComplete option, 509, 510
- autofill feature, 508, 509
- Automatic Private IP Addressing (APIPA), 422–423, 423
- automatic updates, 271–272, 271
- AutoPlay, 507, 507
- AUTORUN.INF file, 507
- availability concerns, 465–467
B
- Baby-AT boards, 7
- back-panel connectors, 20, 21
- backdoors, 468, 474
- backside bus (BSB), 8
- backups, 542
- databases, 378–379, 379
- frequency and scheduling, 547
- importance, 543
- locations, 546–547
- online storage, 288
- operation, 543–544, 544
- security certificates, 524–525, 525
- setting up, 548–550, 548–550
- types, 544–546, 545
- verifying and testing, 550–551
- bare-metal hypervisors, 206
- baselines, performance, 184
- Bash shell, 185
- Basic Input/Output System (BIOS)
- chips, 18–19, 18–19
- flashing, 20
- .bat extension, 277
- batteries
- BD (Blu-ray Disc), 42
- best practices for software applications, 260
- compatibility, 260–261
- drivers
- overview, 269–270, 270
- updates, 274–276, 275–276
- installation
- considerations, 260–264, 263
- process, 265–267
- licensing, 261–264, 263
- operating system
- registering and activating, 267
- uninstalling, 267–269, 268
- updating and patching, 274
- Big Data, 367
- binary notational system, 328–331
- biometric devices, 478, 482
- BIOS (Basic Input/Output System)
- chips, 18–19, 18–19
- flashing, 20
- bits and bytes conversions, 35, 329–330
- black screen, troubleshooting, 564–565
- Blank Database window, 372
- blank monitors, troubleshooting, 564
- Blu-ray Disc (BD), 42
- blue screen, troubleshooting, 564–565
- Blue Screen of Death (BSOD), 565
- Bluejacking, 145
- Bluesnarfing, 145
- Bluetooth technology
- configuring, 143–146, 144–146
- disabling, 504–505, 504–505
- overview, 408–409, 409
- pairing, 143–145, 145
- .bmp extension, 292
- Boolean data type, 342
- boot problems, troubleshooting, 564
- bots, 465
- Box service, 426–427
- branching logic, 341–342
- browsers and browsing, 304
- configuring, 304–309, 305–309
- cookies, 310–312, 311–313
- encrypting, 527
- private browsing, 317, 318
- safety, 508–509, 509
- public workstations, 514–515
- suspicious sites, 511–513, 513–514
- tips, 509–511, 510
- security, 309–317, 309–317
- BSB (backside bus), 8
- BSOD (Blue Screen of Death), 565
- bubble-jet printers, 105
- bugs, wiretapping, 459
- burners, 42
- bus
- description, 9–10
- memory speed, 30–31
- business
- data drivers, 455–456
- impact analyses, 538
- software, 289–293, 290–291
- business continuity, 537
- disaster recovery, 551–552
- exam essentials, 582
- fault tolerance, 537–538
- backups, 542–551, 544–545, 548–550
- contingency plans, 538
- replication and redundancy, 539–542, 540–541
- lab, 583
- review questions, 584–587
- summary, 581–582
- bytes and bits conversions, 35, 329–330
C
- cable
- fiber-optic, 398
- hard drive, 37–39, 37–38
- home network connections, 396–397
- internal network connections, 404–406
- reseating, 560
- cable locks, 129–130, 129–130, 467, 467
- Cable Select (CS), 39
- caches
- browsers, 310–312, 311–313
- CPU, 11, 25
- CAD (Computer-Aided Design) systems, 292
- Calculator for number system conversions, 26–27, 26, 330–331, 330
- campus licenses, 262
- capacitive touchscreens, 133
- captive portals, 439
- car control devices, 161–162
- carcinogens, 107
- Carrier Sense Multiple Access with Collision Detection (CSMA/CD), 404
- CAs (certificate authorities), 315–317, 316–317, 520
- cases
- cooling systems, 52–53, 53
- functions, 4
- laptops, 126
- Category cable, 404
- cathode ray tube (CRT) monitors, 68–69, 68
- CCMP (Counter Mode CBC-MAC Protocol), 440
- CDMA (code division multiple access), 400
- CDs (compact discs), 42
- cellular networking, 400–402, 401
- central processing units. See CPUs (central processing units)
- certificate authorities (CAs), 315–317, 316–317, 520
- certificate backups, 524–525, 525
- Certificate Manager, 524–525, 525
- char data type, 342
- chips, reseating, 560
- chipsets, 8
- Chrome browser
- Chrome operating system for workstations, 195–197, 196
- Chromebooks, 196
- Chromeboxes, 196–197
- CIA triad, 457, 457
- cipher text, 520
- CISC (complex instruction set computing) architecture, 24
- clean uninstallations, 268, 502
- Clear Browsing Data window, 311, 311
- client computers, 125
- client-side scripts, 313
- client-side virtualization, 206
- client software, 125
- cloud
- backups, 547
- Office 365, 281
- storage services, 426–427, 427–428
- CMOS (complementary metal oxide semi-conductor) chips, 20
- code division multiple access (CDMA), 400
- code organization, 343–347, 344
- collaboration software, 285
- conferencing, 286–287
- document storage and sharing, 288
- instant messaging, 287
- online workspace, 287
- command lines, 180
- commercial uses with Internet of Things, 162–165, 164
- Communication Management app, 505, 505
- communication methods, disabling, 504, 504
- communications connectors, 89–91, 90–91
- compact discs (CDs), 42
- compatibility mode, 261, 574–575, 575
- compiled languages, 333–335
- complementary metal oxide semi-conductor (CMOS) chips, 20
- complex instruction set computing (CISC) architecture, 24
- compression, software, 298–301
- Computer-Aided Design (CAD) systems, 292
- computer support. See troubleshooting
- Computer window, 233, 234
- computing devices, 122
- exam essentials, 167–168
- gaming consoles, 155–157, 156
- Internet of Things, 162–167, 164
- labs, 168
- laptops, 125–132, 127–131
- mobile. See mobile devices
- review questions, 169–172
- servers, 123–124
- summary, 167
- tablets and smartphones, 132–134
- workstations, 124–125
- concurrent licenses, 262
- concurrent users for databases, 359
- conferencing software, 286–287
- confidentially, 458
- dumpster diving, 463
- eavesdropping, 459
- phishing, 461–462
- policies, 518
- shoulder surfing, 462
- snooping, 458–459
- social engineering, 459–461
- wiretapping, 459
- connections and connectors
- audio, 66–67, 67
- back-panel, 20, 21
- communications, 89–91, 90–91
- delay, 398
- external storage, 85–88, 86–87
- front-panel, 21
- hard drives, 36–39, 37
- keyboards, 92–93, 93
- mobile devices, 141–148, 142–148
- networks, 89, 90, 91, 391
- cable, 396–397
- cellular, 400–402, 401
- dial-up/POTS, 393
- DSL, 393–396, 394
- external, 392
- fiber-optic, 398
- internal, 403–410, 409
- issues, 578–581, 579–581
- pricing, 403
- RFI, 402
- satellite, 398–399
- summary, 402
- types, 391–392
- power, 16, 17, 49, 49
- printers, 107–109, 108–109
- summary, 113–114
- video, 71–75, 71–72, 74–75
- wireless networks, 437–438, 437–438
- consoles, 180
- constants in programming, 342
- constraints, database, 363
- containers in programming, 345
- contingency plans, 538
- continuity. See business continuity
- Control Center for iPhone, 146, 147
- control codes, 331
- controllers
- converting numbering systems, 26–27, 26, 329–331, 330
- cookies for browsers, 310–312, 311–313
- cooling systems, 52
- cooperative multitasking, 181
- copy backups, 545
- copying files, 238
- copyrights, 456
- corporate licenses, 262
- Cortana feature, 194
- Counter Mode CBC-MAC Protocol (CCMP), 440
- CPUs (central processing units)
- cooling systems, 53–55, 54
- features, 22–26, 23
- gaming consoles, 156
- laptops, 126
- operating system slowdown, 573
- sockets, 10, 11
- cracking passwords, 475
- crashes, application, 576
- CREATE DATABASE command, 371
- Create Shortcut dialog box, 571
- CREATE TABLE command, 371
- cross-platform software, 255–256
- CRT (cathode ray tube) monitors, 68–69, 68
- cryptoviral extortion, 473
- CS (Cable Select), 39
- CSMA/CD (Carrier Sense Multiple Access with Collision Detection), 404
- customer interaction in troubleshooting, 553–554
- cutting files, 238
D
- DA15 game ports, 45
- daily backups, 545
- damaged hardware, 466
- data
- backups, 542–551, 544–545, 548–550
- encrypting
- data at rest, 521–527, 521–526
- data in transit, 527
- managing, 183
- redundancy, 539–540, 540
- security with Internet of Things, 165–166
- Data Error Reading/Writing Drive message, 572
- Data Over Cable Service Internet Specification (DOCSIS), 396
- data types, 341–342, 360
- database management systems (DBMSs), 360
- databases, 258, 357
- accessing, 367–370, 368–369
- backing up, 378–379, 379
- concepts and structures overview, 358–359, 358
- creating and managing, 370–373, 372–373
- exam essentials, 380–381
- extracting data, 377–378
- importing and inputting data, 374–375, 375
- lab, 381–383, 382
- manipulating data, 376–377
- non-relational, 364–367
- relational, 360–364, 361, 363
- review questions, 384–387
- summary, 380
- uses, 359–360
- DBMSs (database management systems), 360
- DC (direct current), 49
- DDoS (distributed denial of service) attacks, 465
- DDR (double data rate) SDRAM, 31
- decimal notational system, 329–331
- dedicated servers, 123–124
- default denies for firewalls, 297
- default gateways for IP addresses, 419
- definitions, antivirus, 497
- Degauss feature, 75
- delay, connection, 398
- DELETE command, 377
- deleting files, 238
- demilitarized zones (DMZs), 297, 414–415
- denial of service (DoS) attacks, 465–466
- Department of Defense (DoD) model, 416, 417
- desktop publishing software, 290–292, 291
- destruction of hardware, 466
- device drivers
- description, 176
- hardware compatibility, 577
- installing, 269–270, 270
- updating, 274–276, 275–276
- Device Manager, 274–276, 275–276
- devices
- failures, 576–580, 579–581
- hardening, 491–496, 492–496
- managing, 223–224, 224–225
- Devices And Printers window
- DHCP (Dynamic Host Configuration Protocol)
- configuring, 420–421
- wireless routers, 441, 442
- diagnostic software, 19
- dial-up network connections, 393
- dictionaries, database, 366
- differential backups, 545
- digital products security, 456
- digital subscriber line (DSL), 393–396, 394
- digital video discs (DVDs), 42, 42
- Digital Visual Interface (DVI), 72, 72
- DIMM (Dual Inline Memory Module) RAM, 11, 12, 31–33
- DIN connectors, 93
- direct access to databases, 368
- direct current (DC) power, 49
- directories. See folders
- disabling touchpads, 100–101, 100–101
- disaster recovery, 551–552
- discretionary access control, 479–480
- Disk Cleanup tool, 232–233, 232–233
- Disk Management utility, 226, 226
- disks and drives
- activity lights, 22
- characteristics, 35–36
- connecting, 36–39, 37
- controllers, 16, 16
- examining, 40–41, 40–41
- external, 82–83, 83
- file systems, 230–233, 232–233
- flash, 80–81, 81
- gaming consoles, 157
- managing, 226, 226
- optical, 42–43, 42, 83
- overview, 33–35
- partitions, 229–230
- RAID, 539–540, 540
- solid-state, 39–40
- display
- gaming consoles, 157
- laptops, 126
- display devices. See also monitors
- adjustments, 75–79, 76–79
- categories, 67–70, 68
- DisplayPort technology, 73–75, 74
- distance factor for internal network connections, 405
- distributed denial of service (DDoS) attacks, 465
- distributions, Linux, 185
- divide and conquer troubleshooting approach, 558
- DL (dual-layer) optical drives, 43
- .dmg extension, 300
- DMZs (demilitarized zones), 414–415
- DNS (Domain Name System), 420–421
- .doc extension, 281
- docking stations for laptops, 128–129, 128
- document databases, 364–365
- documentation in troubleshooting, 562–563
- documents, storage and sharing, 288
- .docx extension, 281
- DoD wipes, 463
- Domain Name System (DNS), 420–421
- DoS (denial of service) attacks, 465–466
- dot pitch in CRT displays, 68
- dotted-decimal notation, 418
- double data rate (DDR) SDRAM, 31
- double-sided (DS) optical drives, 43
- DRAM (dynamic random access memory), 27–28
- drivers
- description, 176
- hardware compatibility, 577
- installing, 269–270, 270
- updating, 274–276, 275–276
- drives. See disks and drives
- DROP DATABASE command, 376
- Dropbox service, 426–427
- dropping databases and tables, 376
- drums, 107
- DS (double-sided) optical drives, 42
- dual-core processors, 25
- Dual Inline Memory Module (DIMM) RAM, 11, 12, 31–33
- dual-layer (DL) optical drives, 42
- dumps, database, 379
- dumpster diving, 463
- Dvorak keyboards, 94
- Dynamic Host Configuration Protocol (DHCP)
- configuring, 420–421
- wireless routers, 441, 442
- dynamic random access memory (DRAM), 27–28
E
- eavesdropping, 459
- Edge browsers
- Autofill, 509
- configuring, 304–309, 305–306
- cookies and cache, 311–312, 311
- pop-ups, 313–314, 314
- private browsing, 317
- site-browsing history, 480, 481
- SmartScreen, 512–513, 513
- editing files, 238
- EEPROM (electrically erasable PROM), 27
- EHR (electronic health records) package, 293
- electromagnetic interference (EMI), 405
- electronic medical records (EMR) package, 292–293
- Electronic Numerical Integrator And Computer (ENIAC), 176–177, 177
- elimination in troubleshooting, 558
- email
- embedded operating systems, 206–207
- EMI (electromagnetic interference), 405
- EMR (electronic medical records) package, 292–293
- encryption
- data at rest, 521–527, 521–526
- data in transit, 527
- files, 288
- overview, 520–521
- wireless routers, 439–440
- end-user license agreements (EULAs), 261
- ENIAC (Electronic Numerical Integrator And Computer), 176–177, 177
- environmental and safety concepts, power supplies, 49
- environments, software, 182–183
- ergonomic keyboards, 94, 94
- ergonomic mouse, 99
- error messages from operating systems, 572–573
- eSATA (external SATA) connectors, 86–87, 86–87
- Ethernet standard, 404
- EULAs (end-user license agreements), 261
- Event Viewer, 480, 480
- Excel application, 282, 282
- .exe extension, 277
- executables, 277
- exhaust fans, 52–53
- expansion slots, 13
- exploits, 468
- Extended File System (XFS), 231
- Extensible Markup Language (XML), 336
- extensions
- browser, 508
- files, 277–280, 278–279
- external device installation basics, 111
- external network connections, 392
- external SATA (eSATA) connectors, 86–87, 86–87
- external storage devices, 80
- communications connectors, 89–91, 90–91
- connectors, 85–88, 86–87
- flash drives, 80–81, 81
- hard drives, 82–83, 83
- memory cards, 81–82, 81–82
- network attached storage, 84–85, 84
- optical drives, 83
- extracting database data, 377–378
F
- facial recognition, 478
- fans, 52–54, 53
- fault tolerance. See business continuity
- features, operating system, 208, 264–265, 265
- fiber-optic cable, 398, 404–406
- Fiber-to-the-Home (FTTH) service, 398
- field-replaceable components (FRUs), 3
- fields, database, 362–364, 363
- File Allocation Table (FAT), 230–231
- file servers, 123
- file systems, 230–231
- File Transfer Protocol (FTP), 417
- files
- compressing, 298–301, 300–301
- encrypting, 288, 521–524, 521–524
- extensions, 277–280, 278–279
- managing, 229–233, 232–233
- manipulating, 238–241, 240
- names, 277
- navigating, 233–235, 234–235
- synchronizing, 288
- FileVault, 526, 526
- filters
- financial software, 293
- Finder application, 187
- fingerprint recognition, 478
- firewalls
- FireWire standards, 87–88
- firmware, 18–19, 18–19, 207
- fitness monitors, 162
- fixed wireless, 402
- flash drives, 80–81, 81
- flash memory, 27–28
- flashing BIOS, 20
- flat database files, 359
- flat screens, 69–70
- floats data type, 342
- floppy disks and drives, 35
- flowcharts, 344, 344
- Fn (Function) keys, 76–77, 76–77, 130
- folders
- encrypting, 521–524, 521–524
- managing, 229–233, 232–233
- security, 288
- shared, 427
- foreign database keys, 362–364
- form factors for motherboards, 6–7
- formatting partitions, 229–230
- forms, database, 364, 368, 369
- Fortran programming language, 178
- 4G technology, 400
- fourth extended file system (ext4), 231
- FreeBSD servers, 197
- freeware
- description, 262
- installing, 266
- frequency of backups, 547
- front-panel connectors, 21
- frontside bus (FSB), 8–9
- FRUs (field-replaceable components), 3
- FTP (File Transfer Protocol), 417
- FTTH (Fiber-to-the-Home) service, 398
- Function (Fn) keys, 76–77, 76–77, 130
- functions in programming, 345
G
- game ports, 45, 67, 67
- gaming consoles, 155–157, 156
- gateways for IP addresses, 419
- Gauss, Carl Friedrich, 75
- gesture-based interaction, 136–137
- Get External Data window, 374, 375
- .gif extension, 292
- global database permissions, 369
- Global System for Mobile Communications (GSM) standard, 400
- Google Drive service, 426–427, 427–428
- Google Play app store, 149, 150
- governance for Internet of Things, 165
- GPUs (graphics processing units), 44–45, 156
- grammar in suspicious sites, 512
- graphic design, 292
- graphical user interface (GUI), 179–181, 179
- graphics processing units (GPUs), 44–45, 156
- group licenses, 262
- GSM (Global System for Mobile Communications) standard, 400
- guest access to wireless routers, 441, 441
- guest accounts, 209, 516
- GUI (graphical user interface), 179–181, 179
- gyroscope feature, 137
- .gz extension, 300
H
- hackers, 454, 456–457
- hacking, 454–456
- hard disks and drives. See disks and drives
- hardening devices, 491–496, 492–496
- Hardware And Sound app
- hardware-based firewalls, 414
- hardware components overview, 3–4
- cooling systems, 52–55, 53–54
- CPUs, 22–26, 23
- damage to, 466
- driver compatibility, 577
- exam essentials, 56
- labs, 56–58
- memory. See memory
- modems, 47, 47
- motherboards. See motherboards
- network cards, 46–47, 46
- power supplies, 48–52, 48–51
- review questions, 59–62
- security concerns, 466–467
- sound cards, 45, 45
- storage devices. See storage
- summary, 55–56
- troubleshooting, 556–557
- video cards, 43–45, 44
- HDMI (High-Definition Multimedia Interface), 73, 74
- HDSL (high bit-rate DSL), 395
- heads, read/write, 34
- health monitors, 162
- heat sinks, 10, 52–54, 54
- heating, control devices for, 160, 160
- hexadecimal notational system, 329–331
- Hierarchical File System (HFS), 231
- high bit-rate DSL (HDSL), 395
- High-Definition Multimedia Interface (HDMI), 73, 74
- home entertainment systems, 159–161
- host-based firewalls, 261, 414
- hosts in IP addresses, 418–419
- hot sites, 539
- hotspots, 401–402, 401
- household uses of Internet of Things, 159–161, 160
- HTML (Hypertext Markup Language), 336
- HTTP (Hypertext Transfer Protocol), 417
- HTTPS (Hypertext Transfer Protocol Secure), 417
- hypervisors in virtual operating systems, 205–206, 206
I
- iCloud service, 426
- ICMP (Internet Control Message Protocol), 418
- IDE (Integrated Drive Electronics) drives, 16, 16, 36–37, 37
- IEEE 1394 standard, 88
- IM (instant messaging) software, 287
- image files, 292
- impact analyses, 538
- impersonation, 464–465
- importing database data, 374–375, 375
- Impress application, 283
- Incognito feature, 317, 318
- information alteration, 465
- information gathering in troubleshooting, 555–557
- Infrared Data Association (IrDA), 410–411
- Infrared technology, 410–411, 410
- infrastructure in Internet of Things, 164–165
- ink cartridges, 105, 106
- inkjet printers, 105–106, 106
- inoculating against viruses, 294
- InPrivate browsing, 317, 318
- input and input devices, 92
- database data, 374–375, 375
- failures, 577
- keyboards, 92–97, 94–97
- mobile devices, 133
- pointing devices, 97–104, 98–102, 104
- INSERT command, 376
- instant messaging (IM) software, 287
- Institute of Electrical and Electronics Engineers (IEEE), 88
- instruction sets, 25
- intake fans, 52–53
- integer data type, 342
- Integrated Drive Electronics (IDE) drives, 16, 16, 36–37, 37
- integrity, 463–465
- intellectual property, 456
- internal device installation basics, 110–111
- internal network connections, 403–404
- International Organization for Standardization (ISO), 302
- Internet. See also networks
- browsing safely, 508–515, 509–510, 513–514
- connections, 392–402, 394, 401
- TCP/IP. See Transmission Control Protocol/Internet Protocol (TCP/IP) suite
- Internet Control Message Protocol (ICMP), 418
- Internet Explorer, 317, 318
- Internet of Things (IoT), 158
- commercial uses, 162–165, 164
- consumer uses, 159–162, 160
- history, 158–159
- infrastructure, 164–165
- issues, 165–167
- Internet Protocol (IP), 416
- Internet service providers (ISPs), 392
- interpreted languages, 335
- iOS operating system
- Airplane mode, 146, 147
- apps, 148–149
- cellular options, 152, 152
- home screen, 135, 135
- locking and security, 138–141, 139–140
- updates, 493, 493
- versions and features, 199–201, 199
- IoT. See Internet of Things (IoT)
- IP (Internet Protocol), 416
- IP addresses, 418–419
- APIPA, 422–423, 423
- DHCP and DNS, 420–421
- public vs. private, 423–424
- IP-based printers, 111–112
- ipconfig tool
- IP configuration, 422, 423
- TCP/IP connectivity, 579–580, 579
- iPhone, 199–200
- IPv6, 418
- IrDA (Infrared Data Association), 410–411
- ISO (International Organization for Standardization), 302
- .iso extension, 300
- ISPs (Internet service providers), 392
- iTunes
- ITX motherboards, 6–7
J
- .jar extension, 300
- Jobs, Steve, 189
- journaling, 231
- joysticks, 101
- .jpg extension, 292
- jumpers, 39
K
- K-slots (Kensington security slots), 129, 467, 467
- kernels, 180
- key/value databases, 366–367
- keyboards, 92
- configuring, 94–97, 94–97
- connecting, 92–93, 93
- laptops, 130–131, 131
- keyloggers, 468, 472
- Keynote application, 283
- keys
- kill switches, 467
- killing processes, 219
- kinetics, 137
L
- L1 (Level 1) cache, 25
- L2 (Level 2) cache, 25
- L3 (Level 3) cache, 25
- land grid array (LGA) sockets, 10, 11, 23
- landscape orientation for mobile devices, 137, 138
- LANs (local area networks), 415
- laptops
- architecture, 126
- cable locks, 467
- hardware, 126–130, 127–131
- interfaces, 130–132, 131
- overview, 125
- power supplies, 51, 51
- video toggles, 76–77, 77
- laser printers, 107
- latency, connection, 398–399
- LCD (liquid crystal display) monitors, 69–70
- least privilege authorization, 479
- LED (light-emitting diode) monitors, 70
- legitimate software, 502–503
- Level 1 (L1) cache, 25
- Level 2 (L2) cache, 25
- Level 3 (L3) cache, 25
- LGA (land grid array) sockets, 10, 11, 23
- licenses
- light-emitting diode (LED) monitors, 69
- lights in front panel, 22
- line of sight wireless, 398–399
- links, suspicious, 511–513
- Linux operating system, 180
- liquid cooling systems, 54–55
- liquid crystal display (LCD) monitors, 69–70
- LOAD DATA INFILE command, 374
- load problems
- macOS, 571–572
- Windows, 565–572, 567–570
- local area networks (LANs), 415
- local backups, 546
- Lock Screen window, 495, 495
- locks
- hardware, 467
- laptops, 129–130, 129–130, 467, 467
- mobile devices, 138–141, 139–140
- lockup, operating system, 573
- logical schema in databases, 361–362, 361
- Long-Term Evolution networks, 400
- looping in programming, 343
- Lubuntu version, 186, 186
M
- MAC (Media Access Control) addresses, 413
- Mac operating systems
- macros, database, 364
- Magnavox Odyssey gaming console, 155
- maintained servers, 288
- maintenance and review schedules, 538
- malware, 468. See also viruses
- anti-malware, 293–297, 295–296
- diagnosing and fixing infections, 499–500
- man-in-the-middle attacks, 464
- mandatory access control, 479
- manual database access, 367, 368
- manufacturing devices, 163
- markup languages, 336–338, 337
- master drives, 39
- MD5 (Message Digest Version 5), 497
- MDP (mini DisplayPort) standard, 75
- Media Access Control (MAC) addresses, 413
- medical devices, 163
- medical software, 292–293
- memory
- assessing, 29–30, 29–30
- bus speeds, 30–31
- gaming consoles, 157
- laptops, 126
- managing, 227–229, 227–229
- mobile devices, 133
- operating system slowdown, 573
- overview, 27–28
- physical characteristics, 31–33, 32
- slots for, 11, 12
- virtual, 28
- memory cards, 81–82, 81–82
- Message Digest Version 5 (MD5), 497
- metadata
- databases, 364
- file systems for, 230
- viewing, 236, 236–237
- methods in programming, 347
- micro ATX motherboards, 7
- MicroDIMM memory, 31
- MiFi hotspots, 401–402, 401
- MIME (Multipurpose Internet Mail Extensions), 279–280
- mini-DIN 6 connectors, 93
- mini DisplayPort (MDP) standard, 75
- mini-ITX motherboards, 7
- Minimum System Requirements section, 260
- mirroring disks, 539, 540
- mobile devices
- apps, 148–149, 149–150, 152
- encryption, 527
- interfaces, 135–136, 135–136
- locking and securing, 138–141, 139–140
- network connections, 141–148, 142–148
- screen orientation, 137–138, 137–138
- synchronization options, 152–153, 153–154
- tablets and smartphones, 132–134
- touchscreens, 136–137
- unexpected charges, 151–152, 152
- wipes, 494
- working with, 134–135
- mobile hotspots, 401–402, 401
- mobile-ITX motherboards, 7
- mobile operating systems
- modems
- modular components, 3
- modules for database, 364
- monitoring system health, 183–184, 184
- monitors
- adjustments, 75–79, 76–79
- blank, 564
- CRT, 68–69, 68
- flat screens, 69–70
- Moore's law, 24–25
- motherboards
- back-panel connectors, 20, 21
- BIOS chips, 18–19, 18–19
- chipsets, 8
- CMOS batteries, 20
- components, 4–6, 5
- CPU sockets, 10, 11
- description acronyms, 22
- disk controllers, 16, 16–17
- expansion slots, 13–16, 14–15
- firmware, 18–19, 18–19
- form factors, 6–7
- front-panel connectors, 21
- laptops, 126
- memory slots and external cache, 11, 12
- power connectors, 16, 17
- mouse
- Mouse Properties window, 100, 100, 103, 104
- moving files, 238
- MS-DOS operating system, 180
- MSCONFIG file, 569–572, 569–571
- .msi extension, 277
- multicore architecture, 25
- multifactor authentication, 476, 477
- MultiFinder application, 187
- multifunctional printers, 107
- multiple concurrent database users, 359
- multiple monitor settings, 77–79, 77–79
- Multipurpose Internet Mail Extensions (MIME), 279–280
- multitasking, 181
- multithreading, 181
N
- Nadella, Satya, 191
- naked DSL, 396
- names for files, 238, 277
- nano-ITX motherboards, 7
- NAS (network attached storage), 84–85, 84, 425–426, 425
- NAT (Network Address Translation)
- natural keyboards, 94, 94
- near field communication (NFC), 504
- neo-ITX motherboards, 7
- netbooks, 196
- Network Address Translation (NAT)
- network attached storage (NAS), 84–85, 84, 425–426, 425
- network-based firewalls, 261, 414
- network cards, 46–47, 46
- network connections for mobile devices, 141–148, 142–148
- network IDs in IP addresses, 418–419
- network interface cards (NICs), 46–47, 46, 125
- networks, 391
- backups, 547
- connections. See connections and connectors
- devices, 411–415, 412–414
- exam essentials, 445–446
- lab, 446
- printers, 109
- protocols, 415–421, 417, 423
- redundancy, 540
- review questions, 447–450
- routers. See routers
- small office, 444
- storage, 424–427, 425, 427–428
- summary, 445
- threats, 496–500, 500
- viruses, 472
- wireless. See wireless network configurations
- new files, 238
- New Technology File System (NTFS), 231
- NFC (near field communication), 504
- NICs (network interface cards), 46–47, 46, 125
- Nintendo Entertainment System, 155
- non-relational databases, 364–367
- non-structured database data, 364
- nondedicated servers, 124
- nonrepudiation, 481
- normal backups, 545–546
- Northbridge chipsets, 8, 9
- Norton Internet Security, 295, 296
- notational systems, 329–331, 330
- notebook computers. See laptops
- NTFS (New Technology File System), description, 231
- numbering systems, converting between, 26–27, 26, 329–331, 330
O
- object-oriented programming (OOP), 347
- objects
- database permissions for, 369
- in programming, 346–347
- octets, 418–419
- Odyssey gaming console, 155
- OEM (original equipment manufacturer) sites, 502–503
- Office 365, 281
- 1ClickSync, 153, 154
- one-time passwords, 476
- OneDrive service, 426
- online workspace, 287
- OOP (object-oriented programming), 347
- open portals, 439
- open source software, 178–179, 262
- opening files, 238
- openssl libraries, 526
- operating systems, 175
- basic functions, 180–181
- data management structure, 183
- embedded, 206–207
- error messages, 572–573
- exam essentials, 241–242
- feature installation and uninstallation, 264–265, 265
- fundamentals, 175–176, 176
- history, 176–182, 179
- lab, 242–246, 243–246
- managing, 207–208
- access control, 215–217, 215–216
- application management, 217, 217
- devices, 223–224, 224–225
- disk space, 226, 226
- file manipulation, 238–241, 240
- file structure navigation, 233–235, 234–235
- folder and file structures, 229–233, 232–233
- memory, 227–229, 227–229
- metadata, 236, 236–237
- processes, 218–221, 219–221
- service, 222, 222–223
- user accounts, 208–215, 209–214
- mobile
- review questions, 247–250
- security threats, 468–469
- server, 197–198
- slowdown and lockup, 573
- software environments, 182–183
- summary, 241
- system health monitoring, 183–184, 184
- types, 185
- updating and patching, 270–276, 271, 273
- user and hardware coordination, 182
- virtual, 204–206, 205–206
- workstation
- optical drives, 42–43, 42, 83
- orientation in mobile devices, 137–138, 137–138
- original equipment manufacturer (OEM) sites, 502–503
- OS X operating system, 187–190, 191
P
- packaging, CPU, 23
- packets, 421
- page files, 28, 227
- page layout software, 290–292, 291
- pairing, Bluetooth, 143–145, 145
- Parallel ATA (PATA) drives, 16, 36–39, 37–38
- parallel buses, 10
- parallel connections for printers, 108, 109
- partitions, 230
- passive worms, 472
- passwords
- changing, 519–520
- cracking, 475
- effective, 518–519
- one-time, 476
- system, 492–496, 492–496
- user accounts, 212, 212, 214, 214, 518–520
- wireless networks, 435–437, 436
- pasting files, 238
- PAT (Port Address Translation), 424
- PATA (Parallel ATA) drives, 16, 36–39, 37–38
- patching
- patents, 456
- payloads in worms, 472
- PCBs (printed circuit boards), 4
- PCI (Peripheral Component Interconnect) bus type, 13–14, 14
- PCI Express (PCIe) expansion slots, 15–16, 15
- PDF (Portable Document Format) application, 301–304, 303
- PDF creator application, 302
- Performance Monitor, 183–184, 184
- Performance Options dialog box, 29–30, 30
- Peripheral Component Interconnect (PCI) bus type, 13–14, 14
- peripherals, 65
- audio connectors, 66–67, 67
- display adjustments, 75–79, 76–79
- display devices, 67–70, 68
- exam essentials, 115
- external storage devices. See external storage devices
- input devices, 92
- failures, 577
- keyboards, 92–97, 94–97
- pointing devices, 97–104, 98–102, 104
- installation basics, 109–113
- labs, 116
- printers, 105–109, 106, 108–109
- review questions, 117–120
- summary, 114–115
- video connectors, 71–75, 71–72, 74–75
- permissions
- databases, 369–370
- user accounts, 209
- persistence of database data, 360
- personal finance software, 293
- PGA (pin-grid array) sockets, 10, 11, 23
- phablets, 134
- phishing, 461–462, 511
- physical schema for databases, 361–362
- pico-ITX motherboards, 7
- piconets, 409
- pin-grid array (PGA) sockets, 10, 11, 23
- PIN screen, 143, 144
- pinch gesture, 137
- ping tool, 399, 579–581, 579–581
- PingID security tokens, 477, 477
- PKI (public key infrastructure), 520
- plain old telephone service (POTS), 393
- plain text, 315
- plans in troubleshooting, 561–562
- plasma monitors, 70
- platforms, software, 255–256
- platters, 34
- PlayStation system, 156–157
- plug-and-play devices, 110–111
- plugins for browsers, 508
- .PNG extension, 292
- point sticks, 131–132
- point-to-multipoint connections, 399
- point-to-point infrared, 410
- Pointer Options tab, 103, 104
- pointing devices, 96–97
- configuring, 103, 104
- connecting, 103
- joysticks, 101
- laptops, 131–132
- mouse, 98–99, 98
- stylus pens, 101–102
- touchpads, 99–101, 99–101
- trackballs, 102, 102
- policies
- backups, 542
- confidentially, 458
- Pong game, 155, 156
- pop-up windows, 313–314, 314–315
- Port Address Translation (PAT), 424
- Portable Document Format (PDF) application, 301–304, 303
- portals, open, 439
- portrait orientation in mobile devices, 137, 137
- ports
- audio, 22
- gaming consoles, 157
- keyboards, 93, 93
- laptops, 128–129
- printers, 108, 108–109
- POST (power-on self-test), 19, 564
- POTS (plain old telephone service), 393
- power adapters for laptops, 127, 127
- power buttons, 21
- power lights, 22
- power-on self-test (POST), 19, 564
- power supplies and systems
- connectors, 16, 17
- overview, 48–52, 48–51
- problems, 564
- redundancy, 540–542, 541
- PowerPoint application, 283, 283
- .ppt extension, 283
- .pptx extension, 283
- pre-operating system computer age, 176–180, 177
- preemptive multitasking, 181
- presentation software, 282–283, 283
- preventive systems, 538
- pricing Internet connections, 403
- primary database keys, 362–364, 363
- print servers, 123
- printed circuit boards (PCBs), 4
- printers, 105
- connecting, 107–109, 108–109
- IP-based, 111–112
- technologies, 105–107, 106
- web-based, 113, 113
- Printers & Scanners app, 111
- privacy
- expectations, 517–518
- Internet of Things issues, 165–166
- private browsing, 317, 318
- private IP addresses, 423–424
- private keys in PKI, 520
- Private Properties dialog box, 523, 523
- private side firewalls, 297
- privileges
- databases, 369
- user accounts, 209
- problem identification in troubleshooting, 553–555
- process management, 218–221, 219–221
- processors. See CPUs (central processing units)
- product keys, 263, 263
- productivity software, 280
- Program Manager, 192, 192
- programmatic access to databases, 368
- programming languages, 327–328
- assembly, 328–333, 330
- compiled, 333–335
- interpreted, 335
- markup, 336–338, 337
- query, 339–340
- scripted, 339
- scripting, 338–339, 339
- programming logic, 341–343
- programs. See software applications
- Programs And Features screen, 217, 217, 502
- prohibition icons, 572
- project management software, 289, 290
- projectors, 69
- properties
- files, 236, 236–237
- in programming, 346
- Properties dialog box for hard disks, 40, 41
- protocol analyzers, 458
- protocols for networks, 415–421, 417, 423
- proxies, browser, 308–309, 309
- PS/2 ports, 93, 93
- pseudocode, 345
- public IP addresses, 423–424
- public key infrastructure (PKI), 520
- public side firewalls, 297
- public workstations, 514–515
- Publisher, 290–292, 291
Q
- QoS (Quality of Service) for routers, 442
- quad-core processors, 25
- quarantining files, 296, 498
- queries for databases, 364
- query languages, 339–340
- QWERTY keyboards, 92
R
- radio frequency (RF) broadband Internet, 402
- radio-frequency identification (RFID) tags, 158
- RADSL (rate-adaptive DSL), 395
- RAID (Redundant Array of Independent Disks), 426, 539–540, 540
- RAM. See memory
- ransomware, 468, 473
- .rar extension, 299
- RAS (Remote Access Service), 393
- rate-adaptive DSL (RADSL), 395
- RDBMSs (relational database management systems), 360
- read-only memory (ROM), 27
- rebooting in troubleshooting, 561
- receipts for nonrepudiation, 482
- records, database, 360, 362
- recovery environment, 571
- recovery plans, 538
- reduced instruction set computing (RISC) architecture, 24
- Redundant Array of Independent Disks (RAID), 426, 539–540, 540
- registering software, 267
- Registry
- load problems, 565
- uninstalling applications, 269
- relational database management systems (RDBMSs), 360
- relational databases, 360–364, 361, 363
- Remote Access Service (RAS), 393
- removing
- applications, 267–269, 268
- malware, 296–297
- unwanted and unnecessary software, 501, 502
- renaming files, 238
- repairing applications, 268
- replay attacks, 464
- replication and redundancy, 539
- reports, database, 364
- reseating chips and cables, 560
- reset buttons, 21
- resistive touchscreens, 133
- resolution
- CRT displays, 68–69
- monitor settings, 78, 78
- resources for troubleshooting, 557
- restarting computer in troubleshooting, 561
- restore points, 566, 568, 568
- retina scanning, 478
- reverse engineering of code, 328
- RF (radio frequency) broadband Internet, 402
- RFID (radio-frequency identification) tags, 158
- RISC (reduced instruction set computing) architecture, 24
- RJ-11 connectors, 47, 47, 89, 90, 91
- RJ-45 connectors, 89, 90, 91
- Roku devices, 159, 160
- role-based access control, 480
- roles, database, 370
- ROM (read-only memory), 27
- rootkits, 468, 474
- routers
- configuring, 429–431, 430–431
- network, 413–414, 413–414
- wireless
- security, 438–440
- services, 440–444, 441–443
- RSA security tokens, 477, 477
- .rtf extension, 281
- rule-based access control, 480
- Runtime Error Has Occurred message, 572
S
- Safe Mode, 565–566
- Safe Mode with Networking, 500
- saidar tool, 184
- SARC (Symantec AntiVirus Research Center), 294
- SATA (Serial ATA) drives, 16, 17
- connections, 36–37, 37–38
- external, 86–87, 86–87
- Satellite Internet, 398–399
- Save Form Entries switch, 510, 510
- saving files, 238
- scalability of databases, 359
- .scexe extension, 277
- schedules
- backups, 547
- maintenance and review, 538
- malware scans, 297
- tasks, 219–221, 220–221
- schema for databases, 361–362, 361
- scientific software, 292–293
- screen orientation in mobile devices, 137–138, 137–138
- Screen Saver Settings dialog box, 496–497, 496–497
- scripted languages, 339
- scripting languages, 338–339, 339
- scripts, browser, 313
- SCSI (small computer system interface), 37
- SDR (single data rate) SDRAM, 31
- SDSL (symmetric DSL), 395
- Secure Sockets Layer (SSL), 315
- secure websites, visiting, 315–317, 316–317
- security
- best practices. See security best practices
- Bluetooth, 145
- browsers, 309–317, 309–317
- control devices, 161
- databases, 360
- file systems for, 231
- files, 236, 237
- firewalls, 297–298, 298
- folders, 288
- Internet of Things, 165–166
- mobile devices, 138–141, 139–140
- network connections, 405, 408, 411
- threats. See security threats
- wireless networks, 434–436, 435
- wireless routers, 438–440
- Security & Privacy window, 526, 526
- Security and Maintenance screen, 500, 500
- security best practices, 491
- data encryption, 520–527, 522–526
- device hardening, 491–496, 492–496
- exam essentials, 528–529
- Internet safe browsing, 508–515, 509–510, 513–514
- lab, 529
- network threats, 496–500, 500
- review questions, 530–533
- summary, 527–528
- user accounts, 515–520
- security threats, 454
- access control, 476–482, 477, 481
- availability, 465–467
- confidentially, 458–463
- exam essentials, 483–484
- hacking, 454–456
- hardware, 466–467
- integrity, 463–465
- lab, 484
- overview, 457
- review questions, 485–488
- software-based. See software-based security threats
- summary, 482–483
- SELECT command, 377–378
- Select Users Or Groups dialog box, 522, 522
- self-driving trucks, 163
- semi-structured data, databases, 364
- Serial ATA (SATA) drives, 16, 17
- connections, 36–37, 37–38
- external, 86–87, 86–87
- serial buses, 10
- serial connections for printers, 107–108, 108
- servers
- database permissions, 369
- maintained, 288
- operating systems, 197–198
- overview, 123–124
- proxy, 308, 309
- vs. workstations, 125
- service outages, 465
- service packs, 469
- Service Set Identifiers (SSIDs)
- Wi-Fi connections, 141
- wireless networks, 435
- serviceability of mobile devices, 132–133
- services
- disabling, 505–506, 505–506
- managing, 222, 222–223
- server, 197
- 7-Zip program, 299–301, 300–301
- .7z extension, 300
- SFF (small form factor) boards, 6
- shared folders, 427, 428
- shareware
- description, 262
- installing, 266
- sharing documents, 288
- shells
- shortcuts, 239–241, 240, 571
- shoulder surfing, 462
- signatures
- anti-malware programs, 472
- for nonrepudiation, 482
- virus, 497
- single data rate (SDR) SDRAM, 31
- single-factor authentication, 476
- single-platform software, 255–256
- single sided (SS) optical drives, 42
- single user software, 262
- site licenses, 262
- 64-bit CPUs, 24
- 64-bit operating system, 181
- slave drives, 39
- slowdown, operating system, 573
- small computer system interface (SCSI), 37
- small form factor (SFF) boards, 6
- small office network configuration, 444
- Small Outline DIMM (SODIMM) memory, 11, 12, 31–33
- smart cards, 476–477
- smart TVs, 159
- smartphones, 132–134
- removing unwanted and unnecessary software, 502
- theft, 467
- SmartScreen, 512–513, 513
- sniffers, 458
- snooping, 458–459
- social engineering, 459–461
- social side of troubleshooting, 555
- sockets, CPU, 10, 11
- SODIMM (Small Outline DIMM) memory, 11, 12, 31–33
- software
- software applications, 254
- antivirus, 497–498
- best practices. See best practices for software applications
- browsers. See browsers and browsing
- business, 289–293, 290–291
- collaboration, 285–288
- compression, 298–301, 300–301
- concepts, 255
- description, 176
- environments, 182–183
- exam essentials, 319–320
- failures, 574–575, 575
- file extensions, 277–280, 278–279
- lab, 320
- managing, 217, 217
- PDF, 301–304, 303
- platforms, 255–256
- productivity. See productivity software
- review questions, 321–324
- software firewalls, 297–298, 298
- summary, 318–319
- in troubleshooting, 556
- utility, 293–297, 295–296
- software-based firewalls, 414
- software-based security threats, 468
- adware, 472–473
- backdoors, 474
- operating systems, 468–469
- password cracking, 475
- ransomware, 473
- rootkits, 474
- spam, 474–475
- spyware, 473
- Trojan horses, 472
- viruses, 469–472, 471
- worms, 472
- software development
- code organization, 343–347, 344
- exam essentials, 348–349
- lab, 349
- languages. See programming languages
- programming logic, 341–343
- review questions, 350–353
- summary, 347–348
- solid-state drives (SSDs), 39–40
- sound cards, 45, 45, 66
- source code
- compiled languages, 333
- operating systems, 180
- Southbridge chipsets, 8, 9
- spam
- antispam software, 498–499
- overview, 474–475
- spambots, 474
- speakers, 66–67
- spear phishing, 462
- speed
- bus, 30–31
- CPU, 24–25
- databases, 360
- hard drive spin rates, 36
- USB, 73
- spelling in suspicious sites, 512
- spin rates of hard drives, 36
- spoofing, 511
- spreadsheet software, 281–282, 282
- Spybot Search - Destroy tool, 498
- spyware, 294, 468
- antispyware software, 498
- overview, 473
- SQL (Structured Query Language), 366
- SRAM (static random access memory), 27–28
- SS (single sided) optical drives, 42
- SSDs (solid-state drives), 39–40
- SSIDs (Service Set Identifiers)
- Wi-Fi connections, 141
- wireless networks, 435
- SSL (Secure Sockets Layer), 315
- SSO (single sign-on), 478
- standardization of operating systems, 178–179
- standards for Internet of Things, 165
- Star workstations, 179–180, 179
- starting services, 505–506, 505–506
- static IP addressing, 420
- static random access memory (SRAM), 27–28
- STOP errors, 564–565
- stopping services, 505–506, 505–506
- storage
- device overview. See disks and drives
- documents, 288
- Internet of Things, 166–167
- networks, 424–427, 425, 427–428
- string data type, 342
- striping, disk, 539
- strong passwords, 518–519
- Structured Query Language (SQL), 366
- stylus pens, 101–102
- subnet masks for IP addresses, 419
- support. See troubleshooting
- suspicious sites, 511–513, 513–514
- swap files, 28, 227
- swipe gesture, 137
- switches
- Symantec AntiVirus Research Center (SARC), 294
- symmetric DSL (SDSL), 395
- synchronization
- files, 288
- mobile devices, 152–153, 153–154
- system-based documentation in troubleshooting, 563
- System Configuration utility, 569–572, 569–571
- system health, monitoring, 183–184, 184
- system image backups, 546
- System Is Low On Virtual Memory message, 572
- System Monitor tool, 184
- system passwords, 492–496, 492–496
- System Properties dialog box, 29–30, 567–569, 567
- System Protection window, 567–568, 567
- System Restore feature, 566–569, 567–568
- System screen, 227, 227
- System Software, 187
- System32 folder, 565
- SysWOW64 folder, 565
T
- tables, database
- tablets
- overview, 132–134
- removing unwanted and unnecessary software, 502
- tags in markup languages, 336
- tap gesture, 137
- .tar extension, 299
- Task Manager
- Task Schedule, 219–221, 220–221
- tax preparation software, 293
- TCP/IP. See Transmission Control Protocol/Internet Protocol (TCP/IP) suite
- telephone connectors, 91, 91
- telepresence, 286
- Temporal Key Integrity Protocol (TKIP), 441
- teraflops, 157
- testing backups, 550–551
- theft of hardware, 466–467
- theories in troubleshooting, 557–558
- thermostats, smart, 160, 160
- third extended file system (ext3), 231
- 32-bit CPUs, 24
- 32-bit operating systems, 181
- Thunderbolt technology, 75, 75, 88
- .tiff extension, 292
- TKIP (Temporal Key Integrity Protocol), 441
- TLS (Transport Layer Security), 315
- tokens, security, 476–477, 477
- toll collections systems, 163–164, 164
- toner
- description, 106–107
- safety, 107
- toolbars for browsers, 508
- Torvalds, Linus, 180, 185
- Touch ID & Passcode window, 494, 494
- touchpads, 99–101, 99–101, 131
- touchscreens, 70
- tracert command, 421–422, 422, 580, 581
- trackballs, 102, 102, 131
- trademarks, 456
- traffic signals, 163
- training, 538
- Transmission Control Protocol (TCP), 416
- Transmission Control Protocol/Internet Protocol (TCP/IP) suite, 416–417, 417
- connectivity issues, 578–581, 579–581
- IP addresses, 418–419
- APIPA, 422–423, 423
- DHCP and DNS, 420–421
- public vs. private, 423–424
- Transport Layer Security (TLS), 315
- transportation devices, 163–164
- Trend Micro tools, 500
- triple A access control, 476
- Trojan horses, 468, 472
- troubleshooting, 552
- concepts, 552–553
- exam essentials, 582
- examples
- application failures, 574–575, 575
- blank monitors, 564
- blue screen, 564–565
- boot problems, 564
- device failures, 576–580, 579–581
- macOS load problems, 571–572
- operating system error messages, 572–573
- operating system slowdown and lockup, 573
- overview, 563
- Windows load problems, 565–572, 567–570
- lab, 583
- resources for, 557
- review questions, 584–587
- social side, 555
- steps, 553
- action plans, 561–562
- documentation, 562–563
- implementation, 562
- problem identification, 553–555
- solution testing, 558–561
- theory formation, 557–558
- verifying functionality, 562
- summary, 581–582
- Twain, Mark, 201
- .txt extension, 281
- Type 1 hypervisors, 205–206, 205–206
- Type 2 hypervisors, 205–206, 205–206
U
- UAC (User Account Control), 215–217, 215–216
- UDP (User Datagram Protocol), 417
- unauthorized information alteration, 465
- unclean uninstallations, 269
- unexpected charges for mobile devices, 151–152, 152
- Unicode, 331
- uniform resource locators (URLs), 420
- uninstalling software, 267–269, 268, 501, 502
- uninterruptible power supplies (UPSs), 466, 540–542, 541
- Universal Serial Bus. See USB (Universal Serial Bus)
- Unix operating system, 178
- unshielded twisted pair (UTP) wire, 404–405
- unwanted and unnecessary software, removing, 501, 502
- UPDATE command, 376–377
- updates
- anti-malware, 295
- applications, 274
- devices, 492–496, 492–496
- drivers, 274–276, 275–276
- operating systems, 270–276, 271, 273
- upgrading vs. updating, 270–271
- UPSs (uninterruptible power supplies), 466, 540–542, 541
- URLs (uniform resource locators), 420
- USB (Universal Serial Bus)
- connectors, 72–73
- external storage, 85–88
- introduction, 10
- keyboards, 92–93, 93
- pointing devices, 103
- ports, 22
- printers, 109
- User Account Control (UAC), 215–217, 215–216
- user accounts
- expectation management, 516–518
- managing, 208–211, 209–210
- passwords, 518–520
- types, 515–516
- User Datagram Protocol (UDP), 417
- user error in troubleshooting, 560–561
- user interfaces, databases, 368
- utility software, 293–297, 295–296
- UTP (unshielded twisted pair) wire, 404–405
V
- variables in programming, 342–343
- VDC (volts DC), 49
- VDSL (very high bit-rate DSL), 395
- vectors in programming, 345
- verifying
- backups, 550–551
- functionality in troubleshooting, 562
- versions of operating systems, 180
- very high bit-rate DSL (VDSL), 395
- VESA (Video Electronics Standards Association), 75
- VGA (Video Graphics Array), 71–72, 71
- video
- connectors, 71–75, 71–72, 74–75
- for nonrepudiation, 481
- video cards
- gaming consoles, 157
- overview, 43–45, 44
- Video Electronics Standards Association (VESA), 75
- Video Graphics Array (VGA), 71–72, 71
- virtual machines (VMs), 205
- virtual memory
- description, 28
- hypervisors, 205–206, 206
- managing, 227–229, 227–229
- Virtual Memory dialog box, 30
- virtual memory managers (VMMs), 205–206, 206
- virtual operating systems, 204–205
- virtual private networks (VPNs), 527
- viruses, 294, 468, 471
- antivirus software, 497–498
- application failures, 576
- Mac systems, 469
- operation, 470–471, 471
- overview, 469–470
- symptoms, 470
- visual diagramming software, 284, 284
- VMMs (virtual memory managers), 205–206, 206
- VMs (virtual machines), 205
- Voice over Internet Protocol (VoIP), 287
- voltages in power supplies, 50–51
- volts DC (VDC), 49
- VPNs (virtual private networks), 527
- vulnerabilities, 468
W
- walk-up infrared, 410
- WANs (wide area networks), 415
- watts of power supplies, 49
- weak passwords, 518–519
- web-based printers, 113, 113
- web browsers. See browsers and browsing
- web servers, 124
- webcams, 70
- weight of gaming consoles, 157
- WEP (Wired Equivalency Protocol), 440
- whaling, 462
- Wi-Fi connections for mobile devices, 141–143, 142–143
- Wi-Fi Protected Access (WPA), 440
- Wi-Fi Protected Access 2 (WPA2), 440
- Wi-Fi screen, 141, 142
- wide area networks (WANs), 415
- Wii system, 156
- WIMP interface, 180
- Windows Defender, 298, 299, 498, 500
- Windows Explorer, 193, 233–235
- Windows Firewall, 500
- Windows Has Recovered From A Serious Error message, 572
- Windows operating systems
- drive status, 40–41, 40–41
- load problems, 565
- recovery environment, 571
- Safe Mode, 565–566
- System Configuration, 569–572, 569–571
- System Restore, 566–569, 567–568
- server, 198
- shortcuts, 239–241, 240
- usage, 195
- user accounts, 209, 209, 211–215, 211–214
- versions, 192–195, 192–194
- workstation, 191–197, 192–194, 196
- Windows phone operating system, 203–204, 204
- Windows Recovery Environment (Windows RE), 500, 571
- Windows Registry, 217
- Windows Update, 271–274, 271, 273, 492, 492
- WinZip program, 299
- wipes for mobile devices, 494
- Wired Equivalency Protocol (WEP), 440
- wired internal network connections, 404–406
- wireless access points, 413
- wireless devices. See mobile devices
- wireless LANs (WLANs), 407–409, 409
- wireless mouse, 98, 98
- wireless network configurations, 428
- administrator passwords, 436–437, 436
- basic, 431–434, 432–434
- connections, 437–438, 437–438
- license agreements, 429, 429
- routers, 429–431, 430–431
- security, 434–436, 435
- Wireless Network Connection window, 437, 437
- wireless personal area networks (WPANs), 408
- wireless routers
- security, 438–440
- services
- wiretaps, 405, 459
- WLANs (wireless LANs), 407–409, 409
- Word application, 280–281, 280
- word processing software, 280–281, 280
- workstations
- operating systems
- overview, 124–125
- public, 514–515
- worms, 468, 472
- WPA (Wi-Fi Protected Access), 440
- WPA2 (Wi-Fi Protected Access 2), 440
- WPANs (wireless personal area networks), 408
X
- Xbox system, 156–157
- XFS (Extended File System), 231
- XML (Extensible Markup Language), 336
Z
- .zip extension, 299
- zipping files, 299
- Zoho management software, 289, 290
- zombies, 465
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.