Note to the Reader: Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations.
A
.aac extension, 220
AC (alternating current), 45, 544
AC adapters for laptops, 48–49, 48
Accelerated Graphics Port (AGP) bus, 12, 12
access
shared resources, 317–320, 318–320
web-based resources, 329
access control lists (ACLs), 210
accessibility options, 168–169, 168–169
accounts. See user accounts
ACLs (access control lists), 210
Action Center, 139
action plans in troubleshooting, 501–502
activation of software, 229–230
active worms, 394
ActiveX Filtering, 435
Activity Monitor tool, 130
ad hoc Bluetooth sharing, 312–313, 313
Add Input Language dialog, 86, 86
Address Resolution Protocol (ARP), 271
administrator accounts
description, 125
limiting, 422
SOHO router passwords, 285–286, 285
ads, suspicious, 444–447, 446–447
ADSL (asymmetric DSL), 254
Advanced Attributes dialog box, 415, 524, 524
Advanced Encryption Standard (AES) security algorithm, 289
Advanced Privacy Settings dialog box, 437
Advanced Sharing window, 317–318, 319
Advanced Technology Extended (ATX) motherboards
power connectors, 15, 15, 46, 47
adware
overview, 395
AES (Advanced Encryption Standard) security algorithm, 289
AGP (Accelerated Graphics Port) bus, 12, 12
airflow
ensuring, 565
Airplane mode for mobile devices, 363–364, 363–364
all-in-one printers, 78
Allow User To Administer This Computer option, 125
alternating current (AC), 45, 544
amps, 549
Android operating system
Google Play app store, 366, 366
screen captures, 167
anti-malware software, 205–208, 207–209
antispam software, 419
antispyware software, 419
antistatic mats, 551
antistatic wrist straps, 550
antivirus software, 417–420, 421
APIPA (Automatic Private IP Addressing), 274–275, 275
.app extension, 188
App Stores
Apple iCloud service, 326
Apple iTunes
Apple operating system, 122, 142
load problems, 512
locking and security, 346–348, 346–348
versions and features, 142–144, 142
wireless connections, 349–350, 349–351
applications. See software applications
apps for mobile devices, 364–368, 365–366, 368
architecture, CPU, 21
archives, 522
armored viruses, 392
ARP (Address Resolution Protocol), 271
aspect ratio in workstation screens, 479–480
assembly code, 120
asymmetric DSL (ADSL), 254
ATSC video standards, 480
attrib command, 524
attributes for archive bits, 524, 524
ATX (Advanced Technology Extended) motherboards
power connectors, 15, 15, 46, 47
audio
ports, 19
settings, 480
audio/video editing workstations, 471
authentication, 424
single sign-on, 426
Autofill feature for browsers, 432–433, 432–433
Automatic Private IP Addressing (APIPA), 274–275, 275
automatic updates, 234–236, 235
AUTORUN.INF file, 411
availability factor in network connections, 268
.avi extension, 219
B
Baby-AT boards, 6
exam essentials, 532
frequency and scheduling, 527
lab, 533
lessons learned, 531
online storage, 202
securing, 382
security certificates, 415–417, 416
verifying and testing, 530
bandwidth factor in network connections, 269
baselines, performance, 130
Bash shell, 131
Basic Input/Output System (BIOS)
flashing, 17
.bat extension, 188
CMOS, 18
Battery Directive, 570
BD (Blu-ray Disc), 39
best practices for software applications, 220
compatibility, 221–224, 222–224
drivers
installation
considerations, 220–227, 222–224, 226
operating system
updates, 234–239, 235, 237–238
registering and activating, 229–230
uninstalling, 230–232, 230–231
updating and patching, 239
biometric devices, 425
BIOS (Basic Input/Output System)
flashing, 17
bits and bytes conversions, 31
black screen, troubleshooting, 504–505
Blackberry operating system, 148–149, 148
blank monitors, troubleshooting, 504
Blu-ray Disc (BD), 39
blue screen, troubleshooting, 504–505
Blue Screen of Death (BSOD), 504
Bluejacking, 359
Bluesnarfing, 359
Bluetooth pairing, 359–361, 361
Bluetooth Special Interest Group (SIG), 306
Bluetooth technology
.bmp extension, 199
boot problems, troubleshooting, 503–504
Box service, 326
brightness of monitors, 556
brownouts, 546
Autofill feature, 432–433, 432–433
plugins, toolbars, and extensions, 430–432, 430–431
private browsing, 450–451, 451
version management, 427–430, 428–429
BSOD (Blue Screen of Death), 504
bubble-jet printers, 76
budget factor in computer selection, 468–469
build vs. buy decisions, 465–466
burners, 39
burping keyboards, 559
bus
description, 8
buyer's remorse, 475
bytes and bits conversions, 31
C
cable
crossover, 314
EMI, 566
home network connections, 255–256
internal network connections, 262–264
reseating, 500
workstations
Cable Select (CS), 34
CAD (Computer-Aided Design) systems, 218
Calculator for number system conversions, 23, 23
campus licenses, 225
carcinogens, 78
carpeting and electrostatic discharge, 550
Carrier Sense Multiple Access with Collision Detection (CSMA/CD), 262
CAs (certificate authorities), 441
cases
functions, 3
Category cable, 262
cathode ray tube (CRT) monitors
disposal, 569
energy consumption, 555
safety, 552
CCMP (Counter Mode CBC-MAC Protocol), 289
CDMA (code division multiple access), 259
CDs (compact discs), 39
cellular networking, 259–260, 260
central processing units. See CPUs (central processing units)
certificate authorities (CAs), 441
Certificate Export Wizard, 415–416
Certificate Manager utility, 415–417
certificates
Internet Explorer, 442–444, 443–444
chips, reseating, 500
Chrome browser
private browsing, 450–451, 451
Chrome operating system
screen captures, 167
Chrome Web Store, 187
Chromebooks, 141
clean uninstallations, 230
external surfaces, 558
keyboards, 559
monitors, 558
supplies
disposal, 571
list, 558
client-server networks, 307–309, 308
cloud
backups on, 527
concepts, 325
CMOS (complementary metal oxide semiconductor) chips, 18
code division multiple access (CDMA), 259
collaboration software, 202
document storage and sharing, 202–203
online workspace, 204
screen-sharing, 204
color laser printers, 78
combining hard drives, 37–39, 38
communication methods, disabling, 408–409, 408–409
communications connectors, 105–107, 106
compact discs (CDs), 39
companion viruses, 392
compatibility mode, 221, 515–516, 516
complementary metal oxide semi-conductor (CMOS) chips, 18
compressed air, 560
compression, software, 214–217, 216–217
Computer-Aided Design (CAD) systems, 218
concurrent connections factor, 269
concurrent licenses, 225
connections and connectors
external storage, 101–105, 102–105
front-panel, 19
mobile devices, 348–350, 349–351
networks, 105–106, 106, 250–251
dial-up/POTS, 252
pricing, 261
types, 251
SOHO routers, 278–280, 279–280, 286–287, 286–287
summary, 107
consumables for printers, 562–563, 562
Control Center for iPhone, 364, 364
Control of Substances, Hazardous to Health (COSHH), 571
converting numbering systems, 23, 23
cookies for browsers, 436–439, 437–439
cooling systems, 49
cooperative multitasking, 123
copy backups, 525
copying files, 161
corporate licenses, 225
Cortana feature, 139
COSHH (Control of Substances, Hazardous to Health), 571
costs in computer selection, 468–469
Counter Mode CBC-MAC Protocol (CCMP), 289
CPUs (central processing units)
laptops, 467
operating system slowdown, 513–514
crashes, application, 517
Create Shortcut dialog box, 511–512
crossover cable, 314
crosstalk, 565
CRT (cathode ray tube) monitors
disposal, 569
energy consumption, 555
safety, 552
cryptoviral extortion, 396
CS (Cable Select), 34
CSMA/CD (Carrier Sense Multiple Access with Collision Detection), 262
current, 549
customer interaction in troubleshooting, 494–496
cutting files, 161
DA15 game ports, 42
daily backups, 526
dangerous features, disabling, 408–411, 408–411
Data Error Reading/Writing Drive message, 513
data management, structure for, 129
Data Over Cable Service Internet Specification (DOCSIS), 255
DDR (double data rate) SDRAM, 27–28
default denies for firewalls, 210
default gateways for IP addresses, 273
Degauss feature, 71
Delete Browsing History dialog box, 438
deleting
files, 161
demilitarized zones (DMZs), 210
Department of Defense (DoD) model, 270, 271
desktop publishing software, 198–199, 198
device drivers
description, 118
hardware compatibility, 518
Device Manager, 239–241, 240–241
devices
disabling unused and dangerous features, 408–411, 408–411
locking system, 412
permissions and encryption, 412–417, 413–414, 416
Devices And Printers window
DHCP (Dynamic Host Configuration Protocol)
diagnostic software, 16–17, 210–214, 212–213
dial-up network connections, 252
differential backups, 526
digital subscriber line (DSL), 252–255, 253
digital video discs (DVDs), 39, 39
Digital Visual Interface (DVI), 68–69, 68
DIMM (Dual Inline Memory Module)
DIN connectors, 82
direct attached storage (DAS), 309
direct current (DC) power, 45, 544
directories. See folders
disabling
SSID broadcasts, 289
unused and dangerous features, 408–411, 408–411
Disk Cleanup tool, 153–154, 153–154, 211
Disk Defragmenter tool, 211, 213
disk striping, 38
disks and drives
activity lights, 19
disposal, 570
energy consumption, 556
file systems for, 151–154, 153–154
laptops, 467
physical trauma, 567
display devices. See also monitors
laptops, 467
DisplayPort technology, 70, 70
disposal methods, 568
cleaning supplies, 571
hard drives, 570
hazardous substances, 568, 569
monitors, 569
printer ink and toner, 570
scanners, 569
distance factor for internal network
distributions, Linux, 131
DL (dual-layer) optical drives, 40
.dmg extension, 215
DNS (Domain Name System), 273–274
.doc extension, 191
documentation in troubleshooting, 502–503
documents, storage and sharing, 202–203
.docx extension, 191
domain controllers, 307
Domain Name System (DNS), 273–274
domains, 307
dot pitch in CRT displays, 63–64
dotted-decimal notation, 272
double data rate (DDR) SDRAM, 27–28
double-sided (DS) optical drives, 40
Downy solution, 551
DRAM (dynamic random access memory), 24
drivers
description, 118
hardware compatibility, 518
drives. See disks and drives
Dropbox service, 326
DS (double-sided) optical drives, 40
dual-core processors, 21
Dual Inline Memory Module (DIMM)
dual-layer (DL) optical drives, 40
dumpster diving, 383
Dynamic Host Configuration Protocol (DHCP)
dynamic random access memory (DRAM), 24
E
Ease of Access Center, 168–169, 168
editing files, 161
EEPROM (electrically erasable PROM), 24
EHR (electronic health records) package, 218
elbows in ergonomics, 543
electrically erasable PROM (EEPROM), 24
electricity, 544
electrostatic discharge, 549–552, 550
energy-efficient personal computing, 552–557, 554, 556
international power differences, 544–545, 545
maintaining power, 545–549, 546–548
electromagnetic interference (EMI)
internal network connections, 263
electromagnetic pulse (EMP), 565
electronic health records (EHR) package, 218
electronic medical records (EMR) package, 218
Electronic Numerical Integrator And Computer (ENIAC), 118–119, 119
electrostatic discharge (ESD), 549–552, 550
address safety, 452
hijacked, 454
mobile devices, 350–358, 352–358
spam, 452
EMI (electromagnetic interference)
internal network connections, 263
EMP (electromagnetic pulse), 565
EMR (electronic medical records) package, 218
Enable Parental Controls option, 125
encryption
enabling, 412–417, 413–414, 416
files, 202
energy-efficient personal computing, 552
power-conserving equipment, 555–557, 556
power-management plans, 552–555, 554
Energy Star rating system, 556, 556
ENIAC (Electronic Numerical Integrator And Computer), 118–119, 119
entertainment software, 219–220
environmental and safety concepts, 539–541
cleaning computers, 557–564, 562
disposal methods, 568–571, 569
electricity. See electricity
exam essentials, 572
lab, 573
power supplies, 46
summary, 571
environments, software, 128–129
Error-Checking feature, 211, 212
error messages from operating systems, 512–513
eSATA (external SATA) connectors, 102–104, 103–104
ESD (electrostatic discharge), 549–552, 550
Ethernet standard, 262
Excel application, 191–192, 192
exhaust fans
airflow, 565
expansion slots, 11
Extended File System (XFS), 152
extensions
external connections for mobile devices, 348–350, 349–351
external network connections, 251–252
external resources for troubleshooting, 498
external SATA (eSATA) connectors, 102–104, 103–104
external storage devices, 95
communications connectors, 105–107, 106
mobile media players, 100
network attached storage, 99–100, 99
optical drives, 98
external surfaces, cleaning, 558
facial recognition, 425
fans
airflow, 565
features
operating system, 227–228, 228
unused and dangerous, 408–411, 408–411
feet in ergonomics, 543
fiber-optic cable, 256–257, 262–264
Fiber-to-the-Home (FTTH) service, 256
field-replaceable components (FRUs), 2
File Allocation Table (FAT), 151
File Transfer Protocol (FTP), 271, 332
File Transfer Protocol Secure (FTPS), 333
files
encryption, 202
locking, 305
manipulating, 160–163, 163–164
names, 188
sharing, 315–324, 316, 318–321, 323–324
synchronizing, 202
filters
ActiveX, 435
financial software, 218
Finder application, 133
fingerprint recognition, 425
firewalls
for device hardening, 420, 421
ports, 221
first-party cookies, 436
.flac extension, 220
flash memory, 24
flashing BIOS, 17
floppy disks and drives, 31
.flv extension, 219
folders
security, 203
shared, 311
form factors for motherboards, 5–6
formatting partitions, 150–151
forms in databases, 193
Fortran programming language, 120
4G technology, 259
fourth extended file system (ext4), 152
freeware, 187
description, 225
installing, 229
frequency of backups, 527
front-panel connectors, 19
FRUs (field-replaceable components), 2
FTP (File Transfer Protocol), 271, 332
FTPS (File Transfer Protocol Secure), 333
FTTH (Fiber-to-the-Home) service, 256
G
gateways for IP addresses, 273
Gauss, Carl Friedrich, 71
gesture-based interaction, 344–345
.gif extension, 199
Global System for Mobile Communications (GSM) standard, 259
Google Drive service, 326, 327
Google Play app store, 366, 366
GPUs (graphics processing units), 41–42
grammar errors in suspicious sites, 445
graphic design
programs, 218
workstations, 471
graphical user interface (GUI), 121–123, 121
graphics processing units (GPUs), 41–42
grounding and electrostatic discharge, 550
GSM (Global System for Mobile
Communications) standard, 259
guest access to wireless routers, 290–291, 291
GUI (graphical user interface), 121–123, 121
gyroscope feature, 345
.gz extension, 215
H
hackers, 376
hard disks and drives. See disks and drives
disabling unused and dangerous features, 408–411, 408–411
locking system, 412
permissions and encryption, 412–417, 413–414, 416
Hardware And Sound app
mouse, 93
hardware components overview, 1–2
damage to, 379
driver compatibility, 518
exam essentials, 53
memory. See memory
motherboards. See motherboards
storage devices. See storage
summary, 52
hazardous substances, 568, 569
HDMI (High-Definition Multimedia Interface), 69–70, 69, 472
HDSL (high bit-rate DSL), 254
heads, read/write, 31
Hierarchical File System (HFS), 152
high bit-rate DSL (HDSL), 254
High-Definition Multimedia Interface (HDMI), 69–70, 69, 472
hijacked email, 454
home computer categories, 469–474, 473–474
home theater PC (HTPC) systems, 471–472
homegroups, sharing in, 322–324, 323–324
HP Hardware Diagnostic Tools screen, 213, 213
HTPC (home theater PC) systems, 471–472
HTTP (Hypertext Transfer Protocol), 271, 329–330
HTTPS (Hypertext Transfer Protocol Secure), 329–331, 331, 441
humidity and electrostatic discharge, 550, 565
I
IaaS (Infrastructure as a Service), 325
iCloud service, 326
ICMP (Internet Control Message Protocol), 271
IDE (Integrated Drive Electronics) drives, 14, 14, 32, 32–33
IEEE 1394 standard, 102
IM (instant messaging) software, 204–205
image files, 199
IMAP (Internet Message Access Protocol), 352
Impress application, 197
Incognito feature, 450–451, 451
incremental backups, 526
information gathering in troubleshooting, 496–497
Infrared Data Association (IrDA), 266–267
Infrared technology, 266–268, 267
Infrastructure as a Service (IaaS), 325
ink disposal, 570
inkjet printers
inoculating against viruses, 206
InPrivate browsing, 450–451, 451
input devices, 81
failures, 518
pointing devices, 87–94, 88–92, 94
instant messaging (IM) software, 204–205
Institute of Electrical and Electronics Engineers (IEEE), 102
Integrated Drive Electronics (IDE) drives, 14, 14, 32, 32–33
internal network connections, 261
International Organization for Standardization (ISO), 194
international power differences, 544–545, 545
Internet. See also networks
best practices. See Internet security best practices
connections, 251–261, 253, 260
SOHO routers. See SOHO routers
TCP/IP. See Transmission Control Protocol/Internet Protocol (TCP/IP) suite
Internet Control Message Protocol (ICMP), 271
Internet Explorer
certificates, 442–444, 443–444
private browsing, 450–451, 451
Internet Message Access Protocol (IMAP), 352
Internet Protocol (IP), 270
Internet security best practices, 427
browsers
Autofill feature, 432–433, 432–433
plugins, toolbars, and extensions, 430–432, 430–431
private browsing, 450–451, 451
secure websites, 440–444, 441–444
suspicious material, 444–447, 446–447
Internet service providers (ISPs), 252
iOS operating system
locking and security, 346–348, 346–348
screen captures, 167
versions and features, 142–144, 142
wireless connections, 349–350, 349–351
IP (Internet Protocol), 270
ipconfig tool
MAC addresses, 289
TCP/IP connectivity, 520–521, 520
iPhone, 143
IPv6, 272
IrDA (Infrared Data Association), 266–267
.iso extension, 215
ISO (International Organization for Standardization), 194
ISPs (Internet service providers), 252
iTunes
certificates, 441
J
.jar extension, 215
Jobs, Steve, 134
joysticks, 91
.jpg extension, 199
jumpers, 34
K
K-slots (Kensington security slots), 380
kernels, 122
keyboards, 81
cleaning, 559
in ergonomics, 544
keyloggers, 395
Keynote application, 197
kill switches, 380
kinetics, 345
L
L1 (Level 1) cache, 22
L2 (Level 2) cache, 22
L3 (Level 3) cache, 22
land grid array (LGA) sockets, 9, 9, 20
landscape orientation for mobile devices, 345, 346
LANs (local area networks), 304–307, 304
laptops
batteries for, 557
gaming, 471
prices, 469
laser printers, 77–78, 562–563
LCD (liquid crystal display) monitors, 65
disposal, 569
energy consumption, 555
LED (light-emitting diode) monitors, 65
legacy browsers, 427
Level 1 (L1) cache, 22
Level 2 (L2) cache, 22
Level 3 (L3) cache, 22
LGA (land grid array) sockets, 9, 9, 20
application failures from, 517
light-emitting diode (LED) monitors, 65
lights in front panel, 19
line of sight wireless, 257–258
links, suspicious, 444–447, 446–447
Linux operating system, 122
screen captures, 167
liquid crystal display (LCD) monitors, 65
disposal, 569
energy consumption, 555
liquids, damage from, 560, 566
load problems
Mac OS, 512
local area networks (LANs), 304–307, 304
local network sharing, 303
MANs, 306
PANs, 306
peer-to-peer and client-server, 307–309, 307–308
summary, 333
types, 312
file and print sharing, 315–324, 316, 318–321, 323–324
peer-to-peer sharing, 312–315, 313
localization settings, 477, 478
locking
files, 305
mobile devices, 346–348, 346–348
system, 412
lockup, operating system, 513–514
LoJack service, 380
Long-Term Evolution networks, 259
VirtualBox version, 171–175, 172–175
M
.m4a extension, 220
Mac computers
laptop prices, 469
malware, 388
MAC (Media Access Control) address filtering, 289–290, 290
Mac operating systems
load problems, 512
macros
for databases, 193
viruses in, 392
magnets, damage from, 567
Magnifier, 169
maintenance software, 210–214, 212–213
malware. See also viruses
anti-malware, 205–208, 207–209
diagnosing and fixing infections, 419–420
MANs (metropolitan area networks), 304, 306
manufacturer safety guidelines, 541
mapping network drives, 310, 310
master drives, 34
material safety data sheets (MSDSs), 571
mats, antistatic, 551
MD5 (Message Digest Version 5), 418
MDP (mini display port) standard, 70
Media Access Control (MAC) address filtering, 289–290, 290
media streaming, 473–474, 473–474
medical software, 218
memory
electrostatic discharge, 549–552
laptops, 467
operating system slowdown, 513–514
overview, 24
physical characteristics, 28–29, 28
virtual, 25
Message Digest Version 5 (MD5), 418
metadata
file systems for, 151
metropolitan area networks (MANs), 304, 306
MicroDIMM memory, 28
Microsoft OneDrive service, 326
mini display port (MDP) standard, 70
mini-ITX motherboards, 6
Minimum System Requirements section, 221
mirroring disks, 38
Airplane mode, 363–364, 363–364
exam essentials, 369
external connections, 348–350, 349–350
locking and securing, 346–348, 346–348
screen orientation, 345–346, 345–346
synchronization options, 361–362, 362–363
unexpected charges, 367–368, 368
usability options, 343–344, 343–344
mobile-ITX motherboards, 6
mobile media players, 100
mobile operating systems
mobility factor in network connections, 268
modems
cable, 255
modular components, 2
modules for databases, 193
monitoring system health, 129–130, 130
monitors
blank, 504
cleaning, 558
disposal, 569
in ergonomics, 543
monochrome laser printers, 78
Moore's law, 21
motherboards
CMOS batteries, 18
front-panel connectors, 19
memory slots and external cache, 9–11, 10
mouse
in ergonomics, 544
Mouse Properties window, 89, 90, 93, 94
moving files, 161
.mp3 extension, 220
.mp4 extension, 219
.mpg extension, 219
MS-DOS operating system, 122
MSCONFIG file, 509–512, 509–511
MSDSs (material safety data sheets), 571
.msi extension, 188
multicore architecture, 21
multifactor authentication, 424–425, 425
MultiFinder application, 133
multifunctional printers, 78
multipartite viruses, 392, 392
multiple monitor settings, 73–75, 73–75
multitasking, 123
multithreading, 123
multiuser software, 225
mutations in viruses, 393
N
Nadella, Satya, 136
naked DSL, 255
names
nano-ITX motherboards, 6
Napster network, 314
NAS (network attached storage), 99–100, 99, 309–310
NAT (Network Address Translation)
IP addresses, 276
near field communication (NFC), disabling, 409
neo-ITX motherboards, 6
netbooks, 141
Network Address Translation (NAT)
IP addresses, 276
Network And Sharing Center
Internet connections, 482–483, 482
media streaming, 473–474, 473–474
network attached storage (NAS), 99–100, 99, 309–310
network IDs in IP addresses, 272–273
network interface cards (NICs), 43, 43
backups on, 527
connections. See connections and connectors
lab, 296
printers, 80
security best practices, 426–427
sharing. See local network sharing; web-based sharing
small office, 294
SOHO routers. See SOHO routers
storage. See storage
summary, 295
viruses in, 394
workstation connections, 482–483, 482
New Outbound Rule Wizard dialog box, 223–224, 223–224
New Technology File System (NTFS)
description, 151
permissions, 412–417, 413–414, 416
NFC (near field communication), disabling, 409
NICs (network interface cards), 43, 43
normal backups, 525
Norton Internet Security, 207, 208
NTFS (New Technology File System)
description, 151
permissions, 412–417, 413–414, 416
numbering systems, converting between, 23, 23
O
OneDrive service, 326
online workspace, 204
open source software, 120–121, 187, 225
opening files, 161
openssl libraries, 417
in computer selection, 468
data management structure, 129
description, 117
feature installation and uninstallation, 227–228, 228
mobile
accessibility options, 168–169, 168–169
file manipulation, 160–163, 163–164
file structures, 154–158, 155–157
folder and file structures, 150–154, 153–154
software environments, 128–129
summary, 170
system health monitoring, 129–130, 130
updating and patching, 234–239, 235, 237–238
user accounts, 124–128, 125–128
user and hardware coordination, 123–124
workstation
Windows, 136–142, 137–139, 141
orientation in mobile devices, 345–346, 345–346
OS X operating system, 133–136, 136
P
P2P (peer-to-peer) sharing, 312–315, 313
PaaS (Platform as a Service), 325
packaging, CPU, 20
page files, 25
PANs (personal area networks), 304, 306
paper for thermal printers, 78
Parallel ATA (PATA) drives, 14, 32–34, 32–33
parallel buses, 8
parallel connections for printers, 79–80, 80
passive worms, 394
passwords
changing, 424
SOHO routers, 281–282, 285–286, 285
user accounts, 128, 128, 422–424
pasting files, 161
PAT (Port Address Translation), 276
PATA (Parallel ATA) drives, 14, 32–34, 32–33
patching
applications, 239
operating systems, 234–239, 235, 237–238
payloads in worms, 394
PC-Doctor program, 213
PC-to-PC direct links, 313–314
PCBs (printed circuit boards), 3
PCI Express (PCIe) expansion slots, 13–14, 13
PCI (Peripheral Component Interconnect) bus type, 11, 12
PDAs (personal digital assistants), 200
PDF creator application, 195
PDF (Portable Document Format) application, 194–196, 195–196
peer-to-peer networks, 307–309, 307
peer-to-peer (P2P) sharing, 312–315, 313
people-based security threats, 383–387
Per Site Privacy Actions dialog box, 437
Performance Monitor, 129–130, 130
Performance Options dialog box, 25–26, 26
Peripheral Component Interconnect (PCI) bus type, 11, 12
display adjustments, 71–75, 72–75
exam essentials, 108
external storage devices. See external storage devices
input devices, 81
failures, 518
pointing devices, 87–94, 88–92, 94
labs, 109
summary, 108
video connectors, 66–70, 67–71
workstations, 481
permissions
setting, 412–417, 413–414, 416
shared resources, 317
Permissions For Private dialog box, 413
persistent cookies, 436
personal area networks (PANs), 304, 306
personal digital assistants (PDAs), 200
personal finance software, 218
personal information manager (PIM) software, 199–200, 200
personally identifiable information (PII), 440
PGA (pin-grid array) sockets, 9, 9, 20
phage viruses, 393
physical security threats, 379–383, 380, 382
pico-ITX motherboards, 6
PII (personally identifiable information), 440
PIM (personal information manager) software, 199–200, 200
pin-grid array (PGA) sockets, 9, 9, 20
pinch gesture, 345
ping tool, 257, 519–522, 520–521
plain old telephone service (POTS), 252
plain text, 440
plans in troubleshooting, 501–502
plastic bags, antistatic, 551
Platform as a Service (PaaS), 325
as computer selection factor, 465–468
platters, 30
plugins for browsers, 430–432, 430–431
.png extension, 199
point-to-multipoint connections, 257
point-to-point infrared, 266
Pointer Options tab, 94
pointing devices, 87
connecting, 93
joysticks, 91
Pop-Up Blocker Settings dialog box, 448, 448
pop-up windows
removing, 232
POP3 (Post Office Protocol 3), 351
Port Address Translation (PAT), 276
Portable Document Format (PDF) application, 194–196, 195–196
portrait orientation in mobile devices, 345, 345
ports
audio, 19
firewalls, 221
Post Office Protocol 3 (POP3), 351
POST (power-on self-test), 16–17, 504
POTS (plain old telephone service), 252
power buttons, 19
power-conserving equipment, 555–557, 556
power lights, 19
power-management plans, 552–555, 554
power-on self-test (POST), 16–17, 504
Power Options dialog box, 555
power problems, 504
power supplies and systems. See also electricity
international power differences, 544–545, 545
powering on workstations, 476–477, 477
PowerPoint application, 197, 197
.ppt extension, 197
.pptx extension, 197
pre-operating system computer age, 118–120, 119
preemptive multitasking, 123
presentation software, 197, 197
pricing Internet connections, 261
printed circuit boards (PCBs), 3
ink disposal, 570
Privacy Alert dialog box, 438
privacy screens, 386
private browsing, 450–451, 451
private clouds, 325
Private Properties dialog box, 414–415, 414
private side firewalls, 210
problem identification in troubleshooting, 493–497
processors. See CPUs (central processing units)
productivity software, 190
desktop publishing, 198–199, 198
personal information managers, 199–200, 200
programs. See software applications
prohibition icons, 512
Properties dialog box for hard disks, 36, 36–37
properties for files, 158–160, 158–160
protocols for networks, 269–276, 271, 275
public clouds, 325
public side firewalls, 210
public workstation security issues, 433–434
Q
quad-core processors, 21
queries for databases, 193
questionable web sites, 440
QWERTY keyboards, 81
R
RADSL (rate-adaptive DSL), 254
RAID (Redundant Array of Independent Disks), 38–39, 38
RAM. See
memory ransomware, 396
.rar extension, 215
RAS (Remote Access Service), 252
rate-adaptive DSL (RADSL), 254
RDP (Remote Desktop Protocol), 201
read-only memory (ROM), 24
rebooting in troubleshooting, 501
rechargeable batteries, 570
recovery environment, 512
redirection
search engines, 450
Redundant Array of Independent Disks (RAID), 38–39, 38
Registry
load problems, 505
uninstalling applications, 231–232
reliability factor in network connections, 268
Remote Access Service (RAS), 252
Remote Desktop Protocol (RDP), 201
remote desktop software, 200–201
removable media, cleaning, 563–564
removing
applications, 230–232, 230–231
pop-up windows, 232
renaming files, 161
repairing applications, 231
reports for databases, 193
reseating chips and cables, 500
reset buttons, 19
resolution
CRT displays, 64
workstation screens, 478–480, 479
resources, shared
web-based, 329
restarting computer in troubleshooting, 501
restore points, 506
Restriction of Hazardous Substances (RoHS) Directive, 568, 569
retina scanning, 425
retroviruses, 393
RJ-11 connectors, 44, 44, 105–107, 106
RJ-45 connectors, 105–106, 106
RoHS (Restriction of Hazardous Substances) Directive, 568, 569
ROM (read-only memory), 24
rootkits, 396
SOHO. See SOHO routers
wireless
.rtf extension, 191
rules for Windows Firewall, 223–224, 223–224
Runtime Error Has Occurred message, 513
S
SaaS (Software as a Service), 325
safety. See environmental and safety concepts
saidar tool, 130
SARC (Symantec AntiVirus Research Center), 206
SATA (Serial ATA) drives, 14, 14
saving files, 161
scanners, disposal of, 569
scatternets, 306
.scexe extension, 188
scheduling
backups, 527
malware scans, 208
scientific software, 218
screen orientation in mobile devices, 345–346, 345–346
screen readers, 168
screen resolution in workstations, 478–480, 479
Screen Saver Settings dialog box, 381, 382
screen-sharing software, 204
SCSI (small computer system interface), 33
SDR (single data rate) SDRAM, 27
SDSL (symmetric DSL), 254
search engine redirection, 450
Secure File Transfer Protocol (SFTP), 332–333
Secure Shell (SSH) sessions, 333
Secure Sockets Layer (SSL)
HTTPS connections, 329
POP3, 351
secure websites, 440
secure websites, recognizing, 440–444, 441–444
security
best practices. See security best practices
file systems for, 151
folders, 203
mobile devices, 346–348, 346–348
network connections, 263, 265, 267, 269
threats. See security threats
wireless routers, 287–290, 290
workstation software, 480–483, 482
security best practices, 405–407
disabling unused and dangerous features, 408–411, 408–411
locking system, 412
permissions and encryption, 412–417, 413–414, 416
Internet. See Internet security best practices
summary, 455
dumpster diving, 383
exam essentials, 399
lab, 399
overview, 378
software-based. See software-based security threats
summary, 398
Select Users Or Groups dialog box, 413, 413
Serial ATA (SATA) drives, 14, 14
serial buses, 8
serial connections for printers, 79, 79
servers
home and SOHO computers, 472–474, 473–474
service packs, 389
Service Set Identifiers (SSIDs)
configuring, 284
disabling broadcasts, 289
services, disabling, 409–411, 410
session cookies, 436
Set Associations window, 189, 189
7-Zip program, 215–217, 216–217
.7z extension, 215
SFF (small form factor) boards, 5
SFTP (Secure File Transfer Protocol), 332–333
shared folders, 311
ShareNet, 304
shareware
description, 225
installing, 229
sharing
networks. See local network sharing; web-based sharing
shells
description, 122
Linux, 131
shortcuts, 162–163, 163–164, 511–512
shoulder surfing, 386
Simple Mail Transfer Protocol (SMTP), 352
single data rate (SDR) SDRAM, 27
single sided (SS) optical drives, 40
single sign-on (SSO), 426
single user software, 225
site licenses, 225
sitting in ergonomics, 543–544
64-bit CPUs, 21
64-bit operating system, 123
size of tablets, 468
slave drives, 34
slowdown, operating system, 513–514
small computer system interface (SCSI), 33
small form factor (SFF) boards, 5
small office networks, configuring, 294
Small Outline DIMM (SODIMM) memory, 9–10, 10, 28–29
SmartScreen filters, 445–447, 446–447
SMTP (Simple Mail Transfer Protocol), 352
SnagIt application, 166
social side of troubleshooting, 495
sockets
web resources, 329
SODIMM (Small Outline DIMM) memory, 9–10, 10, 28–29
software applications, 181–185
best practices. See best practices for software applications
description, 118
for device hardening, 417–420, 421
installing, 483
lab, 243
productivity. See productivity software
summary, 242
utility. See utility software
Software as a Service (SaaS), 325
software-based security threats
adware, 395
ransomware, 396
rootkits, 396
spam, 397
spyware, 395
worms, 394
Software Center in Lubuntu, 231, 231
SOHO computer categories, 469–474, 473–474
SOHO routers, 277
administrator password, 285–286, 285
configuring, 277–278, 280–283, 281–283
connecting, 278–280, 279–280, 286–287, 286–287
solid-state drives (SSDs), 34–35
source code, 122
spam
antispam software, 419
dealing with, 452
overview, 397
spambots, 397
spear phishing, 386
specialized software, 217
CAD, 218
financial, 218
gaming and entertainment, 219–220
medical and scientific, 218
speed
CPU, 21
hard drive spin rates, 32
spelling errors in suspicious sites, 445
spin rates of hard drives, 32
sprays, antistatic, 551
spreadsheet software, 191–192, 192
Spybot Search & Destroy tool, 419
spyware, 206
antispyware software, 419
overview, 395
SRAM (static random access memory), 24
SS (single sided) optical drives, 40
SSDs (solid-state drives), 34–35
SSH (Secure Shell) sessions, 333
SSIDs (Service Set Identifiers)
configuring, 284
disabling broadcasts, 289
SSL (Secure Sockets Layer)
HTTPS connections, 329
POP3, 351
secure websites, 440
SSO (single sign-on), 426
standard user accounts, 125
standard workstations, 470
standardization of operating systems, 120–121
Standby mode, 552
static electricity, 549–552, 550
static IP addressing, 274
static random access memory (SRAM), 24
storage
device overview. See disks and drives
networks
DAS, 309
tablets, 468
streaming media, 473–474, 473–474
striping, disk, 38
subnet masks for IP addresses, 273
Super VGA video standard, 480
support. See troubleshooting
suspicious material, recognizing, 444–447, 446–447
swap files, 25
swipe gesture, 344
switches for power supplies, 47–48, 545, 545
Symantec Antivirus Research Center (SARC), 206
symmetric DSL (SDSL), 254
synchronization
files, 202
mobile devices, 361–362, 362–363
system-based documentation in troubleshooting, 503
System Configuration utility, 509–512, 509–511
system health, monitoring, 129–130, 130
system images, 526
System Is Low On Virtual Memory message, 513
System Monitor tool, 130
System Properties dialog box, 25–26, 507, 507
System Protection dialog box, 507–508
System Restore feature, 506–508, 507–508
System Software, 133
System32 folder, 505
SysWOW64 folder, 505
T
tables for databases, 193
tap gesture, 344
.tar extension, 215
Task Manager, 514
tax preparation software, 218
TCP/IP. See Transmission Control Protocol/Internet Protocol (TCP/IP) suite
telephone connectors, 106–107, 106
telepresence, 203
Temporal Key Integrity Protocol (TKIP), 288
testing backups, 530
Text Services And Input Languages dialog, 85–86, 85
theft
data, software, and licenses, 380–383, 382
theories in troubleshooting, 497–498
thermal printers, 78
third extended file system (ext3), 152
third-party cookies, 436
32-bit CPUs, 21
32-bit operating systems, 123
threats in suspicious sites, 445
throughput factor for network connections, 269
Thunderbolt technology, 70, 71, 104–105
.tiff extension, 199
TinyTake application, 166
TKIP (Temporal Key Integrity Protocol), 288
TLS (Transport Layer Security)
HTTPS connections, 329
secure websites, 440
toner, 562
cartridges, 563
description, 77
disposal, 570
safety, 78
toolbars for browsers, 430–432, 430–431
touchscreens, 66
Transmission Control Protocol/Internet Protocol (TCP/IP) suite, 270–271, 271
connectivity issues, 519–521, 520–522
Transmission Control Protocol (TCP), 270
Transport Layer Security (TLS)
HTTPS connections, 329
secure websites, 440
Trend Micro tools, 420
exam essentials, 532
examples
application failures, 514–517, 516
blank monitors, 504
device failures, 517–521, 520–522
Mac OS load problems, 512
operating system error messages, 512–513
operating system slowdown and lockup, 513–514
overview, 503
Windows load problems, 505–512, 507–511
lab, 533
social side, 495
steps, 493
problem identification, 493–497
verifying functionality, 502
Twain, Mark, 144
.txt extension, 191
U
UAC (User Account Control), 206
Ubuntu operating system, 125, 126
UDP (User Datagram Protocol), 271
unclean uninstallations, 231–232
unexpected charges for mobile devices, 367–368, 368
uninstalling
applications, 230–232, 230–231
uninterruptible power supplies (UPSs), 547–548, 547–548
Universal Serial Bus. See USB (Universal Serial Bus)
Unix operating system, 120
unneeded software, uninstalling, 481, 482
unshielded twisted pair (UTP) wire, 262–263, 566
unused features, disabling, 408–411, 408–411
updates
applications, 239
operating systems, 234–239, 235, 237–238
upgrading vs. updating, 234
UPSs (uninterruptible power supplies), 547–548, 547–548
USB (Universal Serial Bus)
connectors, 69
introduction, 8
pointing devices, 93
ports, 19
printers, 80
use factor in computer selection, 465
User Account Control (UAC), 206
user accounts
single sign-on, 426
working with, 124–128, 125–128
User Datagram Protocol (UDP), 271
user error in troubleshooting, 500–501
utility software, 205
anti-malware, 205–208, 207–209
diagnostic and maintenance, 210–214, 212–213
UTP (unshielded twisted pair) wire, 262–263, 566
V
vacuum cleaners, 560
VDC (volts DC), 45
VDSL (very high bit-rate DSL), 254
verifying
backups, 530
functionality in troubleshooting, 502
versions
operating systems, 122
very high bit-rate DSL (VDSL), 254
VESA (Video Electronics Standards Association), 70
VGA (Video Graphics Array), 67–68, 67, 480
video
standards, 480
video editing workstations, 471
Video Electronics Standards Association (VESA), 70
Video Graphics Array (VGA), 67–68, 67, 480
videoconferencing software, 203–204
virtual memory, 25
Virtual Memory dialog box, 26
virtualization in cloud computing, 325
viruses, 206
antivirus software, 417–420, 421
application failures, 517
overview, 389
vishing, 386
Voice over Internet Protocol (VoIP), 204, 386
VoiceOver screen reader, 168
voltages
electrostatic discharge, 549
volts DC (VDC), 45
vulnerabilities, 388
W
walk-up infrared, 266
WANs (wide area networks), 304–307, 305
Waste Electrical and Electronic Equipment (WEEE) Directive, 568, 569
watts of power supplies, 46
.wav extension, 220
web-based sharing, 324
cloud
concepts, 325
resource access, 329
summary, 333
webcams, 66
websites, suspicious, 444–447, 446–447
WEEE (Waste Electrical and Electronic Equipment) Directive, 568, 569
WEP (Wired Equivalency Protocol), 288
whaling, 386
Wi-Fi Protected Access (WPA), 288
Wi-Fi Protected Access 2 (WPA2), 289
wide area networks (WANs), 304–307, 305
Widescreen XGA (WXGA) video standard, 480
WIMP interface, 122
Windows Action Center, 420, 421
Windows Backup, 525, 525, 527–530, 528–530
Windows Defender, 206, 207, 419
Windows Explorer, 138, 155–157, 155–157
Windows Firewall, 420
Windows Has Recovered From A Serious Error message, 513
Windows operating systems
accessibility options, 169
laptop prices, 469
load problems, 505
recovery environment, 512
System Configuration, 509–512, 509–511
System Restore, 506–508, 507–508
media streaming, 473–474, 473–474
usage, 140
user accounts, 127–128, 127–128
workstation, 136–140, 137–139, 141
Windows phone operating system, 146–148, 147
Windows Recovery Environment (Windows RE), 512
Windows Update, 234–238, 235, 237
WinZip program, 215
Wired Equivalency Protocol (WEP), 288
wired internal network connections, 262–264
wireless connections for mobile devices, 349–350, 349–351
wireless devices. See mobile devices
wireless LANs (WLANs), 264–268, 266–267
wireless networks, 467
wireless personal area networks (WPANs), 265, 306
wireless routers
services
wiretaps, 263
WLANs (wireless LANs), 264–268, 266–267
.wmv extension, 219
Word application, 190–191, 190
word processing software, 190–191, 190
audio/video editing, 471
cables
exam essentials, 485
graphic design, 471
home and SOHO computers, 469–474, 473–474
Internet connections, 482–483, 482
lab, 485
localization settings, 477, 478
operating systems
Windows, 136–140, 137–139, 141
screen resolution, 478–480, 479
security
standard, 470
worms, 394
WPA (Wi-Fi Protected Access), 288
WPA2 (Wi-Fi Protected Access 2), 289
WPA2 Personal security, 284
WPANs (wireless personal area networks), 265, 306
wrist straps, 550
WUXGA video standard, 480
WXGA (Widescreen XGA) video standard, 480
X
XFS (Extended File System), 152
Z
.zip extension, 215
3.135.202.203