IT Essentials: PC Hardware and Software Companion Guide, 4th Edition

IT Essentials: PC Hardware and Software Companion Guide , Fourth Edition, supports the Cisco Networking Academy IT Essentials: PC Hardware and Software version 4.1 course. The course provides an introduction to computer components, laptops and portable devices, wireless connectivity, security and safety, environmental concerns, and diagnostic tools.

As a CompTIA Authorized Quality Curriculum, the course helps you prepare for the CompTIA A+ certification. The fundamentals part of the course, covered in Chapters 1–10, helps you prepare for the CompTIA A+ Essentials exam (220-701). You learn the fundamentals of computer technology, networking, and security and validate the communication skills and professionalism required of all entry-level IT professionals. The advanced part of the course, covered in Chapters 11–16, helps you prepare for the CompTIA A+ Practical Application exam (220-702), providing more of a hands-on orientation and scenarios in which troubleshooting and tools must be applied to resolve problems. Students must pass both exams to earn the CompTIA A+ certification.

The features of the Companion Guide are designed to help you study and succeed in this course:

n Chapter objectives —Review core concepts by answering the focus
questions listed at the beginning of each chapter.

n Key terms —Refer to the updated lists of networking vocabulary introduced and turn to the highlighted terms in context.

n Check Your Understanding Questions and Answer Key —Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see on the online course quizzes.

Virtual Desktop, Virtual Laptop, and Packet Tracer Activities, on the CD that accompanies this book, are virtual learning tools to help you develop critical thinking and complex problem-solving skills. New for this edition, Cisco Packet Tracer simulation-based learning activities promote the exploration of networking and network security concepts and allow you to experiment with network behavior.

All the Labs, Worksheets, and Class Discussion Exercises from the course are available in the separate book, IT Essentials: PC Hardware and Software Lab Manual , Fourth Edition. More than 120 activities emphasize the practical application of skills and procedures needed for hardware and software installations, upgrades, and troubleshooting systems.

IT Essentials: PC Hardware and
Software
Lab Manual
Fourth Edition

ISBN-10: 1-58713-262-1
ISBN-13: 978-1-58713-262-9

IT Essentials: PC Hardware and
Software
Course Booklet
Version 4.1

ISBN-10: 1-58713-261-3
ISBN-13: 978-1-58713-261-2

The CD-ROM contains all of the Virtual Desktop Activities, Virtual Laptop Activities, and Packet Tracer Activities referenced throughout the book. Designed and developed by the Cisco Networking Academy, these standalone tools supplement classroom learning by providing “hands-on” experience where real equipment is limited. (Note: the Packet Tracer software is not included with this CD. Ask your instructor for access to Packet Tracer.)

Downloads

IT Essentials v4.1: Download Updated Material

Windows 7 content has been added to both exams required to achieve CompTIA A+ certification: CompTIA A+ Essentials (220-701) and CompTIA A+ Practical Application (220-702). Cisco Press now offers this updated content in a free supplement, for use with your Companion Guide. Download it now:

Downloadable Sample Chapter

Download these free chapters to get ready for your fall course.

Sample Pages

Download the sample pages (includes Chapter 3 and Index)

Table of Contents

Chapter 1 Introduction to the Personal Computer

Explain IT Industry Certifications

Identify Education and Certifications

Describe the A+ Certification

Describe the EUCIP Certification

Module 1: PC Hardware

Module 2: Operating Systems

Module 3: Local Area Network and Network Services

Module 4: Expert Network Use

Module 5: IT Security

Describe a Computer System

Identify the Names, Purposes, and Characteristics of Cases and Power Supplies

Describe Power Supplies

Electricity and Ohm’s Law

Identify the Names, Purposes, and Characteristics of Internal Components

Identify the Names, Purposes, and Characteristics of Motherboards

Identify the Names, Purposes, and Characteristics of CPUs

Identify the Names, Purposes, and Characteristics of Cooling Systems

Identify the Names, Purposes, and Characteristics of ROM and RAM

Identify the Names, Purposes, and Characteristics of Adapter Cards

Identify the Names, Purposes, and Characteristics of Storage Drives

External Flash Drive

Types of Drive Interfaces

Identify the Names, Purposes, and Characteristics of Internal Cables

Identify the Names, Purposes, and Characteristics of Ports and Cables

Serial Ports and Cables

Modem Ports and Cables

USB Ports and Cables

FireWire Ports and Cables

Parallel Ports and Cables

SCSI Ports and Cables

Network Ports and Cables

Video Ports and Connectors

Identify the Names, Purposes, and Characteristics of Input Devices

Identify the Names, Purposes, and Characteristics of Output Devices

Monitors and Projectors

Speakers and Headphones

Explain System Resources and Their Purposes

Input/Output (I/O) Port Addresses

Direct Memory Access

Summary of Exercises

Check Your Understanding

Chapter 2 Safe Lab Procedures and Tool Use

Explain the Purpose of Safe Working Conditions and Procedures

Identify Safety Procedures and Potential Hazards for Users and Technicians

General Safety Guidelines

Electrical Safety Guidelines

Fire Safety Guidelines

Identify Safety Procedures to Protect Equipment from Damage and Data from Loss

Power Fluctuation Types

Power Protection Devices

Identify Safety Procedures to Protect the Environment from Contamination

Material Safety Data Sheet

Proper Disposal of Batteries

Proper Disposal of Monitors or CRTs

Proper Disposal of Toner Kits, Cartridges, and Developers

Proper Disposal of Chemical Solvents and Aerosol Cans

Identify Tools and Software Used with Personal Computer Components and Their Purposes

Identify Hardware Tools and Their Purpose

Identify Software Tools and Their Purpose

Disk Management Tools

Protection Software Tools

Identify Organizational Tools and Their Purpose

Personal Reference Tools

Internet Reference Tools

Implement Proper Tool Use

Demonstrate Proper Use of an Antistatic Wrist Strap

Demonstrate Proper Use of an Antistatic Mat

Demonstrate Proper Use of Various Hand Tools

Part Retriever, Needle-Nose Pliers, or Tweezers

Demonstrate Proper Use of Cleaning Materials

Computer Cases and Monitors

Summary of Exercises

Check Your Understanding

Chapter 3 Computer Assembly—Step by Step

Install the Power Supply

Attach the Components to the Motherboard and Install the Motherboard

Install a CPU and a Heat Sink/Fan Assembly

Heat Sink/Fan Assembly

Install the RAM

Install the Motherboard

Install Internal Drives

Install Drives in External Bays

Install the Optical Drive

Install the Floppy Drive

Install Adapter Cards

Install the NIC

Install the Wireless NIC

Install the Video Adapter Card

Connect All Internal Cables

Connect the Power Cables

Motherboard Power Connections

SATA Power Connectors

Molex Power Connectors

Berg Power Connectors

Connect the Data Cables

PATA Data Cables

SATA Data Cables

Reattach the Side Panels and Connect External Cables to the Computer

Reattach the Side Panels to the Case

Connect External Cables to the Computer

Floppy Drive Data Cables

Boot the Computer for the First Time

Identify Beep Codes

Describe BIOS Setup

Summary of Exercises

Virtual Desktop Activities

Check Your Understanding

Chapter 4 Basics of Preventive Maintenance and Troubleshooting

Explain the Purpose of Preventive Maintenance

Identify the Steps of the Troubleshooting Process

Explain the Purpose of Data Protection

Identify the Problem

Establish a Theory of Probable Causes

Test the Theory to Determine an Exact Cause

Implement the Solution

Verify Solution, Full System Functionality, and If Applicable, Implement Preventive Measures

Document Findings, Actions, and Outcomes

Summary of Exercises

Check Your Understanding

Chapter 5 Fundamental Operating Systems

Explain the Purpose of an Operating System

Describe Characteristics of Modern Operating Systems

Control Hardware Access

File and Folder Management

Explain Operating System Concepts

Modes of Operation

Virtual Real Mode

32-Bit Versus 64-Bit

Describe and Compare Operating Systems to Include Purpose, Limitations, and Compatibilities

Describe Desktop Operating Systems

Describe Network Operating Systems

Determine Operating System Based on Customer Needs

Identify Applications and Environments That Are Compatible with an Operating System

Determine Minimum Hardware Requirements and Compatibility with the OS Platform

Hardware Compatibility List

Install an Operating System

Identify Hard Drive Setup Procedures

Partitioning and Formatting

Prepare the Hard Drive

Install the Operating System Using Default Settings

Create User Accounts

Complete the Installation

Describe Custom Installation Options

Factory Recovery Partition

Identify the Boot Sequence Files and Registry Files

Windows XP Boot Process

NTLDR and the Windows Boot Menu

Describe How to Manipulate Operating System Files

Describe Directory Structures

File Extensions and Attributes

Describe NTFS and FAT32

Navigate a GUI (Windows)

Manipulate Items on the Desktop

My Network Places

Explore Control Panel Applets

Control Panel Applets

Explore Administrative Tools

Install, Navigate, and Uninstall an Application

Add or Remove Programs Applet

Add an Application

Uninstall an Application

Describe Upgrading an Operating System

Upgrading the Operating System to Windows XP

Upgrading the Operating System to Windows Vista

Identify and Apply Common Preventive Maintenance Techniques for Operating Systems

Create a Preventive Maintenance Plan

Preventive Maintenance Planning

Device Driver Updates

Operating System Updates

Schedule a Task

Backup Status and Configuration

Back Up the Hard Drive

Troubleshoot Operating Systems

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probable Causes

Step 3: Determine an Exact Cause

Step 4: Implement a Solution

Step 5: Verify Solution and Full System Functionality

Step 6: Document Findings

Identify Common Problems and Solutions

Summary of Exercises

Check Your Understanding

Chapter 6 Fundamental Laptops and Portable Devices

Describe Laptops and Other Portable Devices

Identify Common Uses of Laptops

Identify Common Uses of PDAs and Smartphones

Identify and Describe the Components of a Laptop

Describe the Components Found on the Outside of the Laptop

Describe Input Devices Found on Laptops

Describe the Components Found on the Laptop Docking Station

Compare and Contrast Desktop and Laptop Components

Compare and Contrast Desktop and Laptop Motherboards

Compare and Contrast Desktop and Laptop Processors

Compare and Contrast Desktop and Laptop Power Management

Compare and Contrast Desktop and Laptop Expansion

Explain How to Configure Laptops

Describe How to Configure Power Settings

Configuring Power Settings in Windows XP and Vista

Managing Power Usage

Power Management for the Hard Drive and the Display

Setting the Laptop Power Options

Adjusting Low Battery Warnings

Describe the Safe Installation and Removal of Laptop Components

Battery Replacement Steps

Optical Drive Replacement Steps

Hard Drive Replacement Steps

Expansion Memory Replacement Steps

PC Expansion Card Replacement Steps

Hot-Swappable Device Removal Steps

Laptop Communication Hardware Installation and Configuration

Ethernet Installation and Configuration Steps

Wireless Ethernet Installation and Configuration Steps

Modem Installation and Configuration Steps

Bluetooth Installation and Configuration Steps

Infrared Installation and Configuration Steps

Cellular WAN Installation and Configuration Steps

Compare the Different Mobile Phone Standards

Identify Common Preventive Maintenance Techniques for Laptops and Portable Devices

Identify Appropriate Cleaning Procedures

Laptop Keyboard Cleaning Procedures

Ventilation Cleaning Procedures

LCD Cleaning Procedures

Touch Pad Cleaning Procedures

Floppy Drive Cleaning Procedures

Optical Drive Cleaning Procedures

Cleaning a CD or DVD Disc

Identify Optimal Operating Environments

Describe How to Troubleshoot Laptops and Portable Devices

Review the Troubleshooting Process

Identify Common Problems and Solutions

Summary of Exercises

Virtual Laptop Activities

Check Your Understanding

Chapter 7 Fundamental Printers and Scanners

Describe the Types of Printers Currently Available

Describe the Characteristics and Capabilities of Printers

Capacity and Speed

Color or Black and White

Total Cost of Ownership

Describe Printer-to-Computer Interfaces

Describe Laser Printers

Describe Impact Printers

Describe Inkjet Printers

Describe Solid-Ink Printers

Describe Other Printer Types

Describe the Installation and Configuration Process for Printers

Describe How to Set Up a Printer

Explain How to Power and Connect the Device Using a Local or Network Port

Describe How to Install and Update the Device Driver, Firmware, and RAM

Identify Configuration Options and Default Settings

Describe How to Optimize Printer Performance

Describe How to Print a Test Page

Printing a Test Page

Printing from an Application

Testing a Printer

Testing the Printer from the Printer Panel

Describe How to Share a Printer

Describe the Types of Scanners Currently Available

Describe Scanner Types, Resolution, and Interfaces

Describe All-in-One Devices

Describe Flatbed Scanners

Describe Handheld Scanners

Describe Drum Scanners

Describe the Installation and Configuration Process for Scanners

Explain How to Power and Connect a Scanner

Describe How to Install and Update the Device Driver

Identify Configuration Options and Default Settings

Identify and Apply Common Preventive Maintenance Techniques for Printers and Scanners

Describe Printer Maintenance

Describe Scanner Maintenance

Troubleshoot Printers and Scanners

Review the Troubleshooting Process

Identify Common Problems and Solutions

Summary of Exercises

Check Your Understanding

Chapter 8 Fundamental Networks

Explain the Principles of Networking

Define Computer Networks

Explain the Benefits of Networking

Describe Types of Networks

Describe a WLAN

Explain Peer-to-Peer Networks

Explain Client/Server Networks

Describe Basic Networking Concepts and Technologies

Explain Bandwidth and Data Transmission

Describe IP Addressing

Describe Internet Protocols and Applications

Describe the Physical Components of a Network

Identify the Names, Purposes, and Characteristics of Network Devices

Bridges and Switches

Wireless Access Points

Identify the Names, Purposes, and Characteristics of Common Network Cables

Describe LAN Topologies and Architectures

Describe LAN Topologies

Describe LAN Architectures

Identify Standards Organizations

Identify Ethernet Standards

Explain Cabled Ethernet Standards

Summary of Ethernet Technologies

Explain Wireless Ethernet Standards

Explain the OSI and TCP/IP Data Models

Define the TCP/IP Model

Application Layer Protocols

Transport Layer Protocols

Internet Layer Protocols

Network Access Layer Protocols

Define the OSI Model

Compare the OSI and TCP/IP Models

Describe How to Configure a NIC and a Modem

Install or Update a NIC Driver

Uninstall a NIC Driver

Attach the Computer to an Existing Network

Describe the Installation of a Modem

Identify the Names, Purposes, and Characteristics of Other Technologies Used to Establish Connectivity

Describe Telephone Technologies

Integrated Services Digital Network (ISDN)

Digital Subscriber Line (DSL)

Define Power Line Communication

Identify and Apply Common Preventive Maintenance Techniques Used for Networks

Counterfeiting and the IT Industry

Troubleshoot a Network

Review the Troubleshooting Process

Identify Common Network Problems and Solutions

Summary of Exercises

Packet Tracer Activities

Check Your Understanding

Chapter 9 Fundamental Security

Explain Why Security Is Important

Describe Security Threats

Define Viruses, Worms, and Trojans

Explain Web Security

Define Adware, Spyware, and Grayware

Explain Denial of Service

Describe Spam and Popup Windows

Explain Social Engineering

Explain TCP/IP Attacks

Explain Data Wiping, Hard Drive Destruction, and Recycling

Hard Drive Destruction

Hard Drive Recycling

Identify Security Procedures

Explain What Is Required in a Basic Local Security Policy

Explain the Tasks Required to Protect Physical Equipment

Describe Ways to Protect Data

Smart Card Security

File System Security

Describe Wireless Security Techniques

Identify Common Preventive Maintenance Techniques for Security

Explain How to Update Signature Files for Antivirus and Antispyware Software

Explain How to Install Operating System Service Packs and Security Patches

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probably Causes

Step 3: Determine an Exact Cause

Step 4: Implement the Solution

Step 5: Verify Solution and Full System Functionality

Step 6: Document Findings

Identify Common Problems and Solutions

Summary of Exercises

Packet Tracer Activities

Check Your Understanding

Chapter 10 Communication Skills

Explain the Relationship Between Communication and Troubleshooting

Describe Good Communication Skills and Professional Behavior

Determine the Computer Problem of the Customer

Display Professional Behavior with the Customer

Focus the Customer on the Problem During the Call

Use Proper Netiquette

Implement Time and Stress Management Techniques

Observe Service Level Agreements

Follow Business Policies

Explain Ethics and Legal Aspects of Working with Computer Technology

Describe the Call Center Environment and Technician Responsibilities

Describe the Call Center Environment

Describe Level-One Technician Responsibilities

Describe Level-Two Technician Responsibilities

Summary of Exercises

Check Your Understanding

Chapter 11 Advanced Personal Computers

Give an Overview of Field, Remote, and Bench Technician Jobs

Explain Safe Lab Procedures and Tool Use

Review Safe Working Environments and Procedures

Review Names, Purposes, Characteristics, and Safe and Appropriate Use of Tools

Identify Potential Safety Hazards and Implement Proper Safety Procedures for Computer Components

Describe Environmental Issues

Describe Situations Requiring Replacement of Computer Components

Select a Case and Power Supply

Select a Motherboard

Select the CPU and Heat Sink/Fan Assembly

Select Adapter Cards

Network Interface Cards

Select Storage Devices and Hard Drives

Floppy Disk Drive

Solid State Drives

Select Input and Output Devices

Upgrade and Configure Personal Computer Components and Peripherals

Upgrade and Configure a Motherboard

CMOS Battery Installation

Advanced BIOS Settings

Upgrade and Configure a CPU and a Heat Sink/Fan Assembly

Upgrade and Configure RAM

Upgrade and Configure BIOS

Upgrade and Configure Storage Devices and Hard Drives

Upgrade and Configure Input and Output Devices

Identify and Apply Common Preventive Maintenance Techniques for Personal Computer Components

Clean Internal Components

Inspect Computer Components

CPU and Cooling System

Keyboard and Mouse

Troubleshoot Computer Components and Peripherals

Review the Troubleshooting Process

Identify Common Problems and Solutions

Storage Device Problems

Motherboard and Internal Component Problems

Power Supply Problems

CPU Problems and Memory Problems

Apply Troubleshooting Skills

Summary of Exercises

Check Your Understanding

Chapter 12 Advanced Operating Systems

Select the Appropriate Operating System Based on Customer Needs

Describe Operating Systems

Describe Network Operating Systems

Windows OS Directory Structures

User File Locations

System File Locations

Offline Files and Folders

Install, Configure, and Optimize an Operating System

Compare and Contrast a Default Installation and a Custom Installation

Install Windows XP Professional Using a Custom Installation

Unattended Installation in Windows XP

Unattended Installation in Windows Vista

Create, View, and Manage Disks, Directories, and Files

Identify Procedures and Utilities Used to Optimize the Performance of Operating Systems

Regional and Language Options

Identify Procedures and Utilities Used to Optimize the Performance of Browsers

Describe Installation, Use, and Configuration of Email Software

Set Screen Resolution and Update the Video Driver

Describe Installation of a Second Operating System

The Boot.ini File

Windows CLI Commands

Describe How to Upgrade Operating Systems

Describe Preventive Maintenance Procedures for Operating Systems

Schedule Automatic Tasks and Updates

GUI Scheduled Tasks

CLI Scheduled Tasks

Windows Automatic Updates

Set Restore Points

Troubleshoot Operating Systems

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probable Causes

Step 3: Determine an Exact Cause

Step 4: Implement a Solution

Step 5: Verify Solution and Full System Functionality

Step 6: Document Your Findings

Identify Common Problems and Solutions

Apply Troubleshooting Skills

Summary of Exercises

Check Your Understanding

Chapter 13 Advanced Laptops and Portable Devices

Describe Wireless Communication Methods for Laptops and Portable Devices

Describe Bluetooth Technology

Describe Infrared Technology

Describe Cellular WAN Technology

Describe Wi-Fi Technology

Describe Satellite Technology

Describe Repairs for Laptops and Portable Devices

Select Laptop Components

Select a Docking Station or Port Replicator

Select Storage Devices

Select Additional RAM

Describe Preventive Maintenance Procedures for Laptops

Describe How to Schedule and Perform Maintenance on Laptops

Explain How to Manage Data Version Control Between Desktops and Laptops

Describe How to Troubleshoot a Laptop

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probable Causes

Step 3: Determine an Exact Cause

Step 4: Implement a Solution

Step 5: Verify Solution and Full System Functionality

Step 6: Document Findings

Identify Common Problems and Solutions

Hard Drive Replacement Steps

Expansion Memory Replacement Steps

Optical Drive Replacement Steps

Battery Replacement Steps

PC Expansion Card Replacement Steps

Hot-Swappable Device Removal Steps

Apply Troubleshooting Skills

Summary of Exercises

Check Your Understanding

Chapter 14 Advanced Printers and Scanners

Describe Potential Safety Hazards and Safety Procedures Associated with Printers and Scanners

Install and Configure a Local Printer and Scanner

Connect the Device to a Local Port

Install and Configure the Driver and Software

Printer Driver Installation

Page Description Language

Configure Options and Default Settings

Describe How to Share a Printer and a Scanner on a Network

Describe the Types of Print Servers

Network Print Server Devices

Dedicated PC Print Servers

Describe How to Install Network Printer Software and Drivers on a Computer

Upgrade and Configure Printers and Scanners

Describe Printer Upgrades

Installing Printer Memory

Additional Printer Upgrades

Describe Scanner Optimization

Describe Printer and Scanner Preventive Maintenance Techniques

Determine Scheduled Maintenance According to Vendor Guidelines

Describe a Suitable Environment for Printers and Scanners

Describe Cleaning Methods

Describe Checking Capacity of Ink Cartridges and Toners

Troubleshoot Printers and Scanners

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probable Causes

Step 3: Determine an Exact Cause

Step 4: Implement a Solution

Step 5: Verify Solution and Full System Functionality

Step 6: Document Findings

Identify Common Problems and Solutions

Apply Troubleshooting Skills

Summary of Exercises

Check Your Understanding

Chapter 15 Advanced Networks

Identify Potential Safety Hazards and Implement Proper Safety Procedures Related to Networks

Explain Fiber-Optic Safety

Explain Cable, Cable Cutters, and Cable-Cutting Safety Hazards

Design a Network Based on the Customer’s Needs

Determine a Topology

Determine Protocols and Network Applications

Determine the Components for the Customer’s Network

Select Cable Types

Design for the Future

Select the ISP Connection Type

Plain Old Telephone Service

Integrated Services Digital Network

Digital Subscriber Line

Compare ISP Connection Types

Select Network Cards

Select the Network Device

Implement the Customer’s Network

Install and Test the Customer’s Network

Configure the Customer’s Internet and Network Resources

Temporary Internet Files

Upgrade the Customer’s Network

Install and Configure a Wireless NIC

Install and Configure a Wireless Router

802.11 Protocol Selection

Static IP Address Configuration

Test the Connection

Describe the Installation, Configuration, and Management of a Simple Mail Server

Email Server Installation

Describe Preventive Maintenance Procedures for Networks

Troubleshoot the Network

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probable Causes

Step 3: Determine an Exact Cause

Step 4: Implement a Solution

Step 5: Verify Solution and Full System Functionality

Step 6: Document Findings

Identify Common Problems and Solutions

Apply Troubleshooting Skills

Summary of Exercises

Packet Tracer Activities

Check Your Understanding

Chapter 16 Advanced Security

Outline Security Requirements Based on Customer Needs

Outline a Local Security Policy

Explain When and How to Use Security Hardware

Explain When and How to Use Security Application Software

Select Security Components Based on Customer Needs

Describe and Compare Security Techniques

Logging and Auditing

Describe and Compare Access Control Devices

Describe and Compare Firewall Types

Implement a Customer’s Security Policy

Configure Security Settings

Permission Levels for Folders and Files

Network Device Access Permissions

Wireless Security Modes

MAC Address Filtering

Port Forwarding and Port Triggering

Describe Configuring Firewall Types

Windows XP Firewalls

Windows Vista Firewalls

Describe Protection Against Malicious Software

Perform Preventive Maintenance on Security

Describe the Configuration of Operating System Updates

Terminating Employee Access

Explain Data Backup Procedures, Access to Backups, and Secure Physical Backup Media

Review the Troubleshooting Process

Step 1: Identify the Problem

Step 2: Establish a Theory of Probable Solutions

Step 3: Determine an Exact Cause

Step 4: Implement a Solution

Step 5: Verify the Solution and Verify Full System Functionality

Step 6: Document Your Findings

Identify Common Problems and Solutions

User Accounts and Permissions

Firewall and Proxy Settings

Apply Troubleshooting Skills

Summary of Exercises

Check Your Understanding

Appendix: Answers to Check Your Understanding Questions

9781587132636 TOC 9/7/2010