IT Essentials Companion Guide v8
Häftad, Engelska, 2023
789 kr
IT Essentials v8 Companion Guide supports the Cisco Networking Academy IT Essentials Version 8 course. The course is designed for Cisco Networking Academy students who want to pursue careers in IT and learn how computers work, how to assemble computers, and how to safely and securely troubleshoot hardware and software issues.
The features of the Companion Guide are designed to help you study and succeed in this course:
- Chapter objectives—Review core concepts by answering the focus questions listed at the beginning of each chapter.
- Key terms—Refer to the updated lists of networking vocabulary introduced and turn to the highlighted terms in context.
- Course section numbering—Follow along with the course heading numbers to easily jump online to complete labs, activities, and quizzes referred to within the text.
- Check Your Understanding Questions and Answer Key—Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see on the online course quizzes.
Produktinformation
- Utgivningsdatum2023-11-20
- Mått205 x 232 x 44 mm
- Vikt1 823 g
- FormatHäftad
- SpråkEngelska
- SerieCompanion Guide
- Antal sidor1 136
- Upplaga1
- FörlagPearson Education
- ISBN9780138166106
Tillhör följande kategorier
Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.
- Introduction xxxiiiChapter 1 Introduction to Personal Computer Hardware 1Objectives 1Key Terms 1Introduction to Personal Computers (1.0) 5Personal Computer Safety (1.1) 5What Is in a Computer? (1.1.1) 5Electrical and ESD Safety (1.1.2) 6PC Components (1.2) 7Case and Power Supplies (1.2.1) 7Motherboards (1.2.2) 13CPUs and Cooling Systems (1.2.3) 18Memory (1.2.4) 20Adapter Cards and Expansion Slots (1.2.5) 27Hard Disk Drives and SSDs (1.2.6) 31Optical Storage Devices (1.2.7) 35Ports, Cables, and Adapters (1.2.8) 37Input Devices (1.2.9) 46Output Devices (1.2.10) 54Computer Disassembly (1.3) 58The Technician's Toolkit (1.3.1) 58Computer Disassembly (1.3.2) 58Summary (1.4) 60Practice 60Check Your Understanding Questions 61Chapter 2 PC Assembly 65Objectives 65Key Terms 65Introduction to PC Assembly (2.0) 67Assemble the Computer (2.1) 67General and Fire Safety (2.1.1) 67Open the Case and Connect the Power Supply (2.1.2) 68Install the Motherboard Components (2.1.3) 71Install Internal Drives (2.1.4) 75Install the Adapter Cards (2.1.5) 80Select Additional Storage (2.1.6) 87Install the Cables (2.1.7) 90Summary (2.2) 95Practice 96Check Your Understanding Questions 96Chapter 3 Advanced Computer Hardware 101Objectives 101Key Terms 101Introduction to Advanced Computer Hardware (3.0) 104Boot the Computer (3.1) 104POST, BIOS, CMOS, and UEFI (3.1.1) 105BIOS/UEFI Configuration (3.1.2) 110Electrical Power (3.2) 113Wattage and Voltage (3.2.1) 113Power Fluctuation and Protection (3.2.2) 115Advanced Computer Functionality (3.3) 117CPU Architectures and Operation (3.3.1) 117RAID (3.3.2) 122Ports, Connectors, and Cables (3.3.3) 125Monitors (3.3.4) 142Computer Configuration (3.4) 146Upgrade Computer Hardware (3.4.1) 147Protecting the Environment (3.5) 152Safe Disposal of Equipment and Supplies (3.5.1) 153Summary (3.6) 155Practice 156Check Your Understanding Questions 156Chapter 4 Preventive Maintenance and Troubleshooting 161Objectives 161Key Terms 161Introduction (4.0) 162Preventive Maintenance (4.1) 162PC Preventive Maintenance Overview (4.1.1) 162Troubleshooting Process (4.2) 165Troubleshooting Process Steps (4.2.1) 165Common Problems and Solutions for PCs (4.2.2) 174Apply Troubleshooting Process to Computer Components and Peripherals (4.2.3) 182Summary (4.3) 186Practice 186Check Your Understanding Questions 186Chapter 5 Networking Concepts 191Objectives 191Key Terms 191Introduction (5.0) 194Network Components and Types (5.1) 194Types of Networks (5.1.1) 194Internet Connection Types (5.1.2) 202Networking Protocols, Standards, and Services (5.2) 208Transport Layer Protocols (5.2.1) 208Application Port Numbers (5.2.2) 213Wireless Protocols (5.2.3) 217Network Services (5.2.4) 222Network Devices (5.3) 233Basic Network Devices (5.3.1) 233Security Devices (5.3.2) 239Other Network Devices (5.3.3) 244Network Cables (5.4) 248Network Tools (5.4.1) 248Copper Cables and Connectors (5.4.2) 253Fiber Cables and Connectors (5.4.3) 259Summary (5.5) 265Practice 266Check Your Understanding Questions 266Chapter 6 Applied Networking 271Objectives 271Key Terms 271Introduction (6.0) 273Device to Network Connection (6.1) 273Network Addressing (6.1.1) 273Configure a NIC (6.1.2) 290Configure a Wired and Wireless Network (6.1.3) 296Firewall Settings (6.1.4) 309IoT Device Configuration (6.1.5) 317The Basic Networking Troubleshooting Process (6.2) 319Applying the Troubleshooting Process to Networking (6.2.1) 319Network Problems and Solutions (6.2.2) 323Summary (6.3) 328Practice 328Packet Tracer Activities 329Check Your Understanding Questions 329Chapter 7 Laptops and Other Mobile Devices 333Objectives 333Key Terms 333Introduction (7.0) 336Characteristics of Laptops and Other Mobile Devices (7.1) 336Mobile Device Overview (7.1.1) 337Laptop Components (7.1.2) 344Laptop Display Components (7.1.3) 349Laptop Configuration (7.2) 353Power Settings Configuration (7.2.1) 353Wireless Configuration (7.2.2) 355Laptop Hardware and Component Installation and Configuration (7.3) 359Expansion Slots (7.3.1) 359Replacing Laptop Components (7.3.2) 365Other Mobile Device Hardware Overview (7.4) 369Other Mobile Device Hardware (7.4.1) 369Specialty Mobile Devices (7.4.2) 373Network Connectivity and Email (7.5) 377Wireless and Cellular Data Networks (7.5.1) 377Bluetooth (7.5.2) 383Configuring Email (7.5.3) 387Mobile Device Synchronization (7.5.4) 392Preventive Maintenance for Laptops and Other Mobile Devices (7.6) 397Scheduled Maintenance for Laptops and Other Mobile Devices (7.6.1) 397Basic Troubleshooting Process for Laptops and Other Mobile Devices (7.7) 400Applying the Troubleshooting Process to Laptops and Other Mobile Devices (7.7.1) 400Common Problems and Solutions for Laptops and Other Mobile Devices (7.7.2) 404Summary (7.8) 410Practice 411Check Your Understanding Questions 411Chapter 8 Printers 415Objectives 415Key Terms 415Introduction (8.0) 417Common Printer Features (8.1) 417Characteristics and Capabilities (8.1.1) 417Printer Connections (8.1.2) 421Printer Type Comparison (8.2) 425Inkjet Printers (8.2.1) 425Laser Printers (8.2.2) 431Laser Printing Process (8.2.3) 435Thermal Printers and Impact Printers (8.2.4) 442Virtual Printers (8.2.5) 4443D Printers (8.2.6) 446Installing and Configuring Printers (8.3) 450Installing and Updating a Printer (8.3.1) 450Configuring Options and Default Settings (8.3.2) 452Optimizing Printer Performance (8.3.3) 454Sharing Printers (8.4) 456Operating System Settings for Sharing Printers (8.4.1) 456Print Servers (8.4.2) 459Maintaining and Troubleshooting Printers (8.5) 462Printer Preventive Maintenance (8.5.1) 462Inkjet Printer Preventive Maintenance (8.5.2) 464Laser Printer Preventive Maintenance (8.5.3) 464Thermal Printer Preventive Maintenance (8.5.4) 465Impact Printer Preventive Maintenance (8.5.5) 4673D Printer Preventive Maintenance (8.5.6) 468Applying the Troubleshooting Process to Printers (8.5.7) 469Problems and Solutions (8.5.8) 472Summary (8.6) 476Practice 477Check Your Understanding Questions 477Chapter 9 Virtualization and Cloud Computing 481Objectives 481Key Terms 481Introduction (9.0) 482Virtualization (9.1) 482Virtualization (9.1.1) 482Client-Side Virtualization (9.1.2) 486Cloud Computing (9.2) 491Cloud Computing Applications (9.2.1) 491Cloud Services (9.2.2) 492Summary (9.3) 497Practice 497Check Your Understanding Questions 498Chapter 10 Windows Installation 503Objectives 503Key Terms 503Introduction (10.0) 505Modern Operating Systems (10.1) 505Operating System Features (10.1.1) 505Customer Requirements for an Operating System (10.1.2) 510Operating System Upgrades (10.1.3) 514Disk Management (10.2) 518Disk Management (10.2.1) 518Install Windows (10.3) 524Basic Windows Installation (10.3.1) 524Custom Installation Options (10.3.2) 526Windows Boot Sequence (10.3.3) 533Summary (10.4) 537Practice 537Check Your Understanding Questions 538Chapter 11 Windows Configuration 541Objectives 541Key Terms 542Introduction (11.0) 547Windows Desktop and File Explorer (11.1) 547Comparing Windows Versions (11.1.1) 548The Windows Desktop (11.1.2) 550Windows Task Manager (11.1.3) 555Windows File Explorer (11.1.4) 558Configure Windows with Control Panels (11.2) 567Control Panel Utilities (11.2.1) 568User and Account Control Panel Items (11.2.2) 576Network and Internet Control Panels (11.2.3) 580Display Settings and Control Panel (11.2.4) 590Power and System Control Panels (11.2.5) 593Hardware and Sound Control Panels (11.2.6) 600Clock, Region, and Language (11.2.7) 604Programs and Features Control Panels (11.2.8) 609Other Control Panels (11.2.9) 611System Administration (11.3) 615Administrative Tools (11.3.1) 615System Utilities (11.3.2) 624Disk Management (11.3.3) 632Application Installation and Configuration (11.3.4) 640Command-Line Tools (11.4) 649Using Windows CLI (11.4.1) 649File System CLI Commands (11.4.2) 655Disk CLI Commands (11.4.3) 670Task and System CLI Commands (11.4.4) 674Other Useful CLI Commands (11.4.5) 679Windows Networking (11.5) 683Network Sharing and Mapping Drives (11.5.1) 683Sharing Local Resources with Others (11.5.2) 688Configure a Wired Network Connection (11.5.3) 691Configure a Wireless Network Interface in Windows (11.5.4) 698Remote Access Protocols (11.5.5) 699Remote Desktop and Assistance (11.5.6) 701Common Preventive Maintenance Techniques for Operating Systems (11.6) 702OS Preventive Maintenance Plan (11.6.1) 702Backup and Restore (11.6.2) 706Basic Troubleshooting Process for Windows Operating Systems (11.7) 709Applying Troubleshooting Process to Windows Operating Systems (11.7.1) 709Common Problems and Solutions for Windows Operating Systems (11.7.2) 713Advanced Troubleshooting for Windows Operating Systems (11.7.3) 718Summary (11.8) 723Practice 724Check Your Understanding Questions 726Chapter 12 Mobile, Linux, and macOS Operating Systems 731Objectives 731Key Terms 731Introduction (12.0) 733Mobile Operating Systems (12.1) 733Android vs. iOS (12.1.1) 733Mobile Touch Interface (12.1.2) 739Common Mobile Device Features (12.1.3) 746Methods for Securing Mobile Devices (12.2) 762Passcode Locks (12.2.1) 763Cloud-Enabled Services for Mobile Devices (12.2.2) 766Software Security (12.2.3) 771Linux and macOS Operating Systems (12.3) 775Linux and macOS Tools and Features (12.3.1) 775Linux and macOS Best Practices (12.3.2) 790Basic CLI Commands (12.3.3) 795Basic Troubleshooting Process for Mobile, Linux, and macOS Operating Systems (12.4) 806Applying the Troubleshooting Process to Mobile, Linux, and macOS Operating Systems (12.4.1) 806Common Problems and Solutions for Other Operating Systems (12.4.2) 810Summary (12.5) 818Practice 818Check Your Understanding Questions 819Chapter 13 Security 823Objectives 823Key Terms 823Introduction (13.0) 82613.1 Security Threats (13.1) 826Malware (13.1.1) 827Preventing Malware (13.1.2) 832Network Attacks (13.1.3) 837Social Engineering Attacks (13.1.4) 842Security Procedures (13.2) 846Security Policy (13.2.1) 846Protecting Physical Equipment (13.2.2) 847Protecting Data (13.2.3) 854Data Destruction (13.2.4) 860Securing Windows Workstations (13.3) 862Securing a Workstation (13.3.1) 862Windows Local Security Policy (13.3.2) 868Managing Users and Groups (13.3.3) 873Windows Firewall (13.3.4) 881Web Security (13.3.5) 889Security Maintenance (13.3.6) 898Wireless Security (13.4) 901Configure Wireless Security (13.4.1) 901Basic Troubleshooting Process for Security (13.5) 916Applying the Troubleshooting Process to Security (13.5.1) 916Common Problems and Solutions for Security (13.5.2) 920Summary (13.6) 923Practice 924Packet Tracer Activity 925Check Your Understanding Questions 925Chapter 14 The IT Professional 929Objectives 929Key Terms 929Introduction (14.0) 932Communication Skills and the IT Professional (14.1) 932Communication Skills, Troubleshooting, and Professional Behavior (14.1.1) 932Working with a Customer (14.1.2) 934Professional Behavior (14.1.3) 936The Customer Call (14.1.4) 939Operational Procedures (14.2) 941Documentation (14.2.1) 942Change Management (14.2.2) 948Disaster Prevention and Recovery (14.2.3) 951Ethical and Legal Considerations (14.3) 955Ethical and Legal Considerations in the IT Profession (14.3.1) 955Legal Procedures Overview (14.3.2) 960Call Center Technicians (14.4) 964Call Centers, Level One and Level Two Technicians (14.4.1) 964Basic Scripting and the IT Professional (14.4.2) 969Summary (14.5) 978Practice 979Check Your Understanding Questions 979Appendix A Answers to “Check Your Understanding” Questions 985Glossary 1007 9780138166106 TOC 6/14/2023