Explore 1.5M+ audiobooks & ebooks free for days

From $11.99/month after trial. Cancel anytime.

CompTIA A+ Complete Study Guide, 2-Volume Set: Volume 1 Core 1 Exam 220-1201 and Volume 2 Core 2 Exam 220-1202
CompTIA A+ Complete Study Guide, 2-Volume Set: Volume 1 Core 1 Exam 220-1201 and Volume 2 Core 2 Exam 220-1202
CompTIA A+ Complete Study Guide, 2-Volume Set: Volume 1 Core 1 Exam 220-1201 and Volume 2 Core 2 Exam 220-1202
Ebook3,865 pages35 hoursEnglish

CompTIA A+ Complete Study Guide, 2-Volume Set: Volume 1 Core 1 Exam 220-1201 and Volume 2 Core 2 Exam 220-1202

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Your complete, accurate resource for the updated CompTIA A+ Core 1 and Core 2 exams

In the newly revised sixth edition of CompTIA A+ Complete Study Guide 2-Volume Set: Volume 1 Core 1 Exam 220-1201 and Volume 2 Core 2 Exam 220-1202, you'll discover comprehensive coverage of all A+ certification exam objectives. A team of A+ certified IT professionals with a combined 50 years' experience in the industry walk you through the most popular information technology certification on the market today, preparing you for success on both the 220-1201 and 220-1202 A+ exams.

The set emphasizes on-the-job skills you'll use every day as a PC technician or in a related role, with timely updates covering major advances in mobile, cloud, network, and security technology. It walks you through mobile devices, networking, hardware, virtualization and cloud computing, hardware and network troubleshooting, operating systems, security, software troubleshooting, and operational procedures.

You'll also find:

  • Practical examples and technology insights drawn from the real-world experiences of current IT professionals
  • Exam highlights, end-of-chapter reviews, and other useful features that help you learn and retain the detailed info contained within
  • Complimentary access to the Sybex online test bank, including hundreds of practice test questions, flashcards, and a searchable key term glossary

Prepare smarter and faster, the Sybex way. CompTIA A+ Complete Study Guide 2-Volume Set is perfect for anyone preparing to take the A+ certification exams for the first time, as well as those seeking to renew their A+ certification and PC or hardware technicians interested in upgrading their skillset.

LanguageEnglish
PublisherWiley
Release dateJul 2, 2025
ISBN9781394330041
CompTIA A+ Complete Study Guide, 2-Volume Set: Volume 1 Core 1 Exam 220-1201 and Volume 2 Core 2 Exam 220-1202

Read more from Quentin Docter

Related authors

Related to CompTIA A+ Complete Study Guide, 2-Volume Set

Related ebooks

Certification Guides For You

View More

Related categories

Reviews for CompTIA A+ Complete Study Guide, 2-Volume Set

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    CompTIA A+ Complete Study Guide, 2-Volume Set - Quentin Docter

    Cover: CompTIA® A+® Complete Study Guide, Sixth Edition by Quentin Docter, Jon Buhagiar

    Table of Contents

    Cover

    Volume 1

    Title Page

    Copyright

    Dedication

    Acknowledgments

    About the Authors

    About the Technical Editor

    Table of Contents

    Table of Exercises

    Introduction

    What Is CompTIA A+ Certification?

    What Does This Book Cover?

    The CompTIA A+ Exam Objectives for Core 1 220-1201

    How to Contact the Publisher

    Assessment Test for Exam 220-1201

    Answers to Assessment Test 220-1201

    VOLUME 1: CompTIA A+ Core 1 Exam (220-1201)

    Chapter 1: Motherboards, Processors, and Memory

    Understanding Motherboards

    Understanding Processors

    Understanding Memory

    Understanding Cooling Systems

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question 1

    Performance-Based Question 2

    Chapter 2: Expansion Cards, Storage Devices, and Power Supplies

    Installing and Configuring Expansion Cards

    Understanding Storage Devices

    Understanding Power Supplies

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 3: Peripherals, Cables, and Connectors

    Understanding Peripheral Devices

    Understanding Cables and Connectors

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 4: Laptop and Mobile Device Hardware

    Working with Laptop and Mobile Device Hardware

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 5: Printers and Multifunction Devices

    Understanding Print Technologies and Imaging Processes

    Installing and Maintaining Printers

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 6: Networking Fundamentals

    Understanding Networking Principles

    Identifying Common Network Hardware

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 7: Introduction to TCP/IP

    Understanding TCP/IP

    Understanding Virtual Networks

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 8: Network Services

    Understanding Network Services

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 9: Wireless and SOHO Networking

    Understanding Wireless Networking Technologies

    Installing and Configuring SOHO Networks

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 10: Mobile Connectivity and Application Support

    Understanding Mobile Connectivity

    Understanding Mobile App Support

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 11: Virtualization and Cloud Computing

    Understanding Virtualization

    Understanding Cloud Computing

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 12: Core Hardware and Network Troubleshooting

    Understanding Troubleshooting Best Practices

    Troubleshooting Motherboards, RAM, CPUs, and Power Problems

    Troubleshooting Drives and RAID Arrays

    Troubleshooting Networking Problems

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 13: Mobile Device, Display, and Printer Troubleshooting

    Troubleshooting Video, Projector, and Display Issues

    Troubleshooting Common Mobile Device Issues

    Troubleshooting Printer Issues

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Appendix A: Answers to Review Questions

    Chapter 1: Motherboards, Processors, and Memory

    Chapter 2: Expansion Cards, Storage Devices, and Power Supplies

    Chapter 3: Peripherals, Cables, and Connectors

    Chapter 4: Laptop and Mobile Device Hardware

    Chapter 5: Printers and Multifunction Devices

    Chapter 6: Networking Fundamentals

    Chapter 7: Introduction toTCP/IP

    Chapter 8: Network Services

    Chapter 9: Wireless and SOHO Networking

    Chapter 10: Mobile Connectivity and Application Support

    Chapter 11: Virtualization and Cloud Computing

    Chapter 12: Core Hardware and Network Troubleshooting

    Chapter 13: Mobile Device, Display, and Printer Troubleshooting

    Appendix B: Answers to Performance-Based Questions

    Chapter 1: Motherboards, Processors, and Memory

    Chapter 2: Expansion Cards, Storage Devices, and Power Supplies

    Chapter 3: Peripherals, Cables, and Connectors

    Chapter 4: Laptop and Mobile Device Hardware

    Chapter 5: Printers and Multifunction Devices

    Chapter 6: Networking Fundamentals

    Chapter 7: Introduction to TCP/IP

    Chapter 8: Network Services

    Chapter 9: Wireless and SOHO Networking

    Chapter 10: Mobile Connectivity and Application Support

    Chapter 11: Virtualization and Cloud Computing

    Chapter 12: Core Hardware and Network Troubleshooting

    Chapter 13: Mobile Device, Display, and Printer Troubleshooting

    Index

    Volume 2

    Title Page

    Copyright

    Dedication

    Acknowledgments

    About the Authors

    About the Technical Editor

    Table of Contents

    Table of Exercises

    Introduction

    What Is CompTIA A+ Certification?

    What Does This Book Cover?

    The CompTIA A+ Exam Objectives

    Assessment Test for Exam 220-1202

    Answers to Assessment Test 220-1202

    VOLUME 2: CompTIA A+ Core 2 Exam (220-1202)

    Chapter 1: Operating System Basics

    Understanding Operating Systems

    Understanding Applications

    Introduction to Windows

    Preparing for the Exam

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 2: Windows Configuration

    Interacting with Operating Systems

    The Windows Registry

    Disk Management

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 3: Windows Administration

    Installing and Upgrading Windows

    Command-Line Tools

    Networking in Windows

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 4: Working with macOS and Linux

    macOS and Linux

    Applications on macOS

    macOS Components

    macOS System Folders

    Best Practices

    Linux Administration

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 5: Security Concepts

    Physical Security Concepts

    Physical Security for Staff

    Logical Security

    Malware

    Mitigating Software Threats

    Social Engineering Attacks, Threats, and Vulnerabilities

    Common Security Threats

    Exploits and Vulnerabilities

    Security Best Practices

    Destruction and Disposal Methods

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 6: Securing Operating Systems

    Working with Windows OS Security Settings

    Web Browser Security

    Securing a SOHO Network (Wireless)

    Securing a SOHO Network (Wired)

    Mobile Device Security

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 7: Troubleshooting Operating Systems and Security

    Troubleshooting Common Microsoft Windows OS Problems

    Troubleshooting Security Issues

    Best Practices for Malware Removal

    Troubleshooting Mobile OS Issues

    Troubleshooting Mobile Security Issues

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 8: Scripting, Remote Access, and Artificial Intelligence

    Scripting

    Remote Access

    Artificial Intelligence

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 9: Safety and Environmental Concerns

    Understanding Safety Procedures

    Understanding Environmental Controls

    Understanding Policies, Licensing, and Privacy

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 10: Documentation and Professionalism

    Documentation and Support

    Change Management Best Practices

    Backup and Recovery

    Demonstrating Professionalism

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Appendix A: Answers to Review Questions

    Chapter 1: Operating System Basics

    Chapter 2: Windows Configuration

    Chapter 3: Windows Administration

    Chapter 4: Working with macOS and Linux

    Chapter 5: Security Concepts

    Chapter 6: Securing Operating Systems

    Chapter 7: Troubleshooting Operating Systems and Security

    Chapter 8: Scripting, Remote Access, and Artificial Intelligence

    Chapter 9: Safety and Environmental Concerns

    Chapter 10: Documentation and Professionalism

    Appendix B: Answers to Performance-Based Questions

    Chapter 1: Operating System Basics

    Chapter 2: Windows Configuration

    Chapter 3: Windows Administration

    Chapter 4: Working with macOS and Linux

    Chapter 5: Security Concepts

    Chapter 6: Securing Operating Systems

    Chapter 7: Troubleshooting Operating Systems and Security

    Chapter 8: Scripting, Remote Access, and Artificial Intelligence

    Chapter 9: Safety and Environmental Concerns

    Chapter 10: Documentation and Professionalism

    Index

    End User License Agreement

    List of Tables

    Volume 1: Chapter 1

    TABLE 1.1 Desktop PC socket types and the processors they support

    TABLE 1.2 Select Intel desktop processors

    TABLE 1.3 13th Generation Intel Core CPU comparison

    TABLE 1.4 DDR DIMM characteristics

    TABLE 1.5 SODIMM pin counts

    Volume 1: Chapter 2

    TABLE 2.1 SATA standards and speeds

    TABLE 2.2 PCIe standards and transfer rates

    TABLE 2.3 SAS standards

    TABLE 2.4 M.2 keying characteristics

    TABLE 2.5 RAID characteristics

    TABLE 2.6 Optical disc and drive specifications

    TABLE 2.7 : 80 PLUS rating minimum efficiency

    Volume 1: Chapter 3

    TABLE 3.1 USB specifications

    TABLE 3.2 USB power standards

    TABLE 3.3 Thunderbolt standards

    TABLE 3.4 eSATA specifications

    Volume 1: Chapter 4

    TABLE 4.1 Laptop manufacturers’ service and support websites

    Volume 1: Chapter 6

    TABLE 6.1 Topologies—advantages and disadvantages

    TABLE 6.2 Coax RG types

    TABLE 6.3 Common twisted pair cabling standards

    TABLE 6.4 Common cable types and characteristics

    TABLE 6.5 Fiber-optic letter designations

    TABLE 6.6 PoE standards

    Volume 1: Chapter 7

    TABLE 7.1 Common port numbers

    TABLE 7.2 Popular FTP apps

    TABLE 7.3 IPv4 address classes

    TABLE 7.4 CIDR values

    TABLE 7.5 Private IP address ranges

    TABLE 7.6 IPv6 address ranges

    Volume 1: Chapter 8

    TABLE 8.1 Common DNS record types

    TABLE 8.2 Important email protocols

    TABLE 8.3 Syslog severity levels

    Volume 1: Chapter 9

    TABLE 9.1 Frequencies and channels

    TABLE 9.2 Legacy 802.11 standards

    TABLE 9.3 Gigabit 802.11 standards

    TABLE 9.4 Bluetooth major versions and features

    TABLE 9.5 Bluetooth device classes and specifications

    TABLE 9.6 RFID frequencies and characteristics

    TABLE 9.7 Common Internet connection types and speeds

    TABLE 9.8 Cable types and characteristics

    Volume 1: Chapter 10

    TABLE 10.1 Global Navigation Satellite Systems

    TABLE 10.2 U.S. GPS service levels

    TABLE 10.3 TCP/IP mail protocols

    TABLE 10.4 Secure mail ports

    TABLE 10.5 Secure mail servers for common email services

    TABLE 10.6 Cloud providers and features

    Volume 1: Chapter 11

    TABLE 11.1 Comparing containers and virtual machines

    TABLE 11.2 Availability downtime

    Volume 1: Chapter 12

    TABLE 12.1 S.M.A.R.T. software utilities

    TABLE 12.2 S.M.A.R.T. metrics most correlated with hard drive failure

    TABLE 12.3 ipconfig switches

    TABLE 12.4 ping options

    TABLE 12.5 netstat options

    TABLE 12.6 net switches

    TABLE 12.7 net share parameters

    TABLE 12.8 pathping switches

    Volume 1: Chapter 13

    TABLE 13.1 Common impact print quality problems

    TABLE 13.2 The EP imaging process

    Volume 2: Chapter 1

    TABLE 1.1 Windows 10 and Windows 11 minimum system requirements

    TABLE 1.2 Windows 10/11 features and editions

    TABLE 1.3 Windows features

    Volume 2: Chapter 2

    TABLE 2.1 Event Viewer logs

    TABLE 2.2 msinfo32 command-line options

    TABLE 2.3 Selected Windows Control Panel applets

    Volume 2: Chapter 3

    TABLE 3.1 Windows 10/11 system requirements

    TABLE 3.2 Windows servicing channel options

    TABLE 3.3 Common dir switches

    TABLE 3.4 cd/md/rmdir usage and switches

    TABLE 3.5 xcopy switches

    TABLE 3.6 sfc switches

    TABLE 3.7 shutdown switches

    TABLE 3.8 format switches

    Volume 2: Chapter 4

    TABLE 4.1 Essential Linux commands

    TABLE 4.2 Letter codes for file permissions

    Volume 2: Chapter 6

    TABLE 6.1 NTFS permissions

    TABLE 6.2 Share permissions

    Volume 2: Chapter 9

    TABLE 9.1 Computer cleaning tools

    TABLE 9.2 Computer recycling websites

    Volume 2: Chapter 10

    TABLE 10.1 Uptime for nines of an SLA

    List of Illustrations

    Volume 1: Chapter 1

    FIGURE 1.1 A typical motherboard

    FIGURE 1.2 ITX motherboards

    FIGURE 1.3 PCI expansion slots

    FIGURE 1.4 PCIe expansion slots

    FIGURE 1.5 Riser card in a motherboard

    FIGURE 1.6 Double data rate (DDR) memory slots

    FIGURE 1.7 Cache in a system

    FIGURE 1.8 Two heat sinks, one with a fan

    FIGURE 1.9 CPU socket examples

    FIGURE 1.10 GIGABYTE multisocket motherboard

    FIGURE 1.11 Dell laptop motherboard

    FIGURE 1.12 An ATX power connector on a motherboard

    FIGURE 1.13 Two PATA hard drive connectors

    FIGURE 1.14 Four SATA headers

    FIGURE 1.15 eSATA port (bottom center)

    FIGURE 1.16 M.2 connector on motherboard

    FIGURE 1.17 M.2 slot protective cover

    FIGURE 1.18 Motherboard headers

    FIGURE 1.19 Two motherboard USB headers

    FIGURE 1.20 A BIOS chip on a motherboard

    FIGURE 1.21 UEFI boot option

    FIGURE 1.22 System Recovery options

    FIGURE 1.23 Advanced Options

    FIGURE 1.24 UEFI settings

    FIGURE 1.25 TPM settings

    FIGURE 1.26 Windows TPM configuration screen

    FIGURE 1.27 Secure Boot in UEFI

    FIGURE 1.28 CMOS battery

    FIGURE 1.29 DIP and PGA

    FIGURE 1.30 Top and bottom of LGA Intel and PGA AMD CPUs

    FIGURE 1.31 Top (a) and bottom (b) of a Samsung RISC CPU

    FIGURE 1.32 CPU performance in Task Manager

    FIGURE 1.33 System information in the About screen

    FIGURE 1.34 Four memory sticks in a motherboard

    FIGURE 1.35 The 64-bit memory throughput formula

    FIGURE 1.36 SDR and DDR DIMMs

    FIGURE 1.37 SODIMMs

    FIGURE 1.38 DDR5 SODIMM and DIMM

    FIGURE 1.39 System unit airflow

    FIGURE 1.40 3-pin chassis-fan headers

    FIGURE 1.41 A 4-pin CPU fan header

    FIGURE 1.42 Position of a 3-pin connector on a 4-pin header

    FIGURE 1.43 Large heat sink and fan

    FIGURE 1.44 Thermal paste and a thermal pad

    FIGURE 1.45 AIO liquid cooling system

    FIGURE 1.46 An active hard disk cooler

    Volume 1: Chapter 2

    FIGURE 2.1 A PCIe video expansion card

    FIGURE 2.2 A classic sound card

    FIGURE 2.3 A network interface card

    FIGURE 2.4 A wireless NIC

    FIGURE 2.5 An internal analog modem

    FIGURE 2.6 USB and eSATA expansion cards

    FIGURE 2.7 Windows 11 Device Manager

    FIGURE 2.8 Video card properties

    FIGURE 2.9 NVIDIA driver installation

    FIGURE 2.10 Update driver in Windows

    FIGURE 2.11 Wireless NIC properties

    FIGURE 2.12 SATA hard drive connectors

    FIGURE 2.13 PATA hard drive connectors

    FIGURE 2.14 Anatomy of a hard drive

    FIGURE 2.15 A 3.5″ and a 2.5″ hard drive

    FIGURE 2.16 Intel PCIe SSD

    FIGURE 2.17 M.2 NVMe SSD

    FIGURE 2.18 mSATA SSD and a 2.5″ SATA SSD

    FIGURE 2.19 Four M.2 cards

    FIGURE 2.20 M.2 slots

    FIGURE 2.21 RAID 1 and RAID 5

    FIGURE 2.22 USB flash drives

    FIGURE 2.23 Typical SD cards

    FIGURE 2.24 A USB-attached SD card reader

    FIGURE 2.25 A DVD-ROM drive

    FIGURE 2.26 A desktop power supply

    FIGURE 2.27 110V (left) and 220V (right) wall outlets

    FIGURE 2.28 20-pin ATX power connector

    FIGURE 2.29 A 24-pin ATX12V 2.x connector, in two parts

    FIGURE 2.30 6-pin ATX12V 2.1 PCIe connector with extender for an 8-pin ATX12...

    FIGURE 2.31 SATA power connector

    FIGURE 2.32 Molex power connector

    FIGURE 2.33 Hot-swappable redundant PSUs

    FIGURE 2.34 An uninterruptible power supply front (a) and back (b)

    FIGURE 2.35 Large UPS

    Volume 1: Chapter 3

    FIGURE 3.1 Display settings

    FIGURE 3.2 Advanced display refresh rates

    FIGURE 3.3 Multiple displays detected

    FIGURE 3.4 Taskbar settings

    FIGURE 3.5 Monitor ports

    FIGURE 3.6 1/8″ audio connector

    FIGURE 3.7 A USB headset

    FIGURE 3.8 An ergonomic keyboard

    FIGURE 3.9 A computer mouse

    FIGURE 3.10 A network-attached storage device

    FIGURE 3.11 A 4-port USB hub

    FIGURE 3.12 USB ports on a motherboard

    FIGURE 3.13 Standard USB connectors

    FIGURE 3.14 USB Type-C (top) and Type-A (bottom)

    FIGURE 3.15 Kensington USB-to-Ethernet adapter

    FIGURE 3.16 Lightning cable

    FIGURE 3.17 Two Thunderbolt 2 interfaces

    FIGURE 3.18 Two Thunderbolt 3 interfaces

    FIGURE 3.19 Several peripheral ports

    FIGURE 3.20 DB-9 serial connector

    FIGURE 3.21 VGA connector and port

    FIGURE 3.22 DVI connectorSource: Evan Amos / Wikimedia Commons / Public doma...

    FIGURE 3.23 Types of DVI connectors

    FIGURE 3.24 DVI-to-VGA adapter

    FIGURE 3.25 HDMI port and cable

    FIGURE 3.26 DVI-to-HDMI adapter

    FIGURE 3.27 HDMI connector types

    FIGURE 3.28 A DisplayPort port and cable

    FIGURE 3.29 mDP and DisplayPort connectors

    FIGURE 3.30 SATA connectors and cable

    FIGURE 3.31 eSATA port and cable

    FIGURE 3.32 USB over eSATA

    FIGURE 3.33 Molex connector

    Volume 1: Chapter 4

    FIGURE 4.1 PC technician toolkit

    FIGURE 4.2 Laptop repair road map

    FIGURE 4.3 Removing nine screws to take off the bottom cover

    FIGURE 4.4 Inside the laptop

    FIGURE 4.5 Disconnecting the speaker cable

    FIGURE 4.6 The speaker wire

    FIGURE 4.7 Webcam and microphone

    FIGURE 4.8 Display cable (left) and touchscreen board cable connectors (righ...

    FIGURE 4.9 Display assembly hinge screws

    FIGURE 4.10 Wires inside a laptop display

    FIGURE 4.11 A laptop motherboard

    FIGURE 4.12 A laptop daughterboard

    FIGURE 4.13 Disconnecting the motherboard connectors

    FIGURE 4.14 Removing the screws

    FIGURE 4.15 Laptop SODIMM and Desktop DIMM

    FIGURE 4.16 SODIMM in a laptop

    FIGURE 4.17 Removing a SODIMM

    FIGURE 4.18 172-pin MicroDIMM and a SODIMM

    FIGURE 4.19 A 3.5″ hard drive (left) compared to a 2.5″ hard drive (right)

    FIGURE 4.20 2.5″ SSD, motherboard connector, and cable

    FIGURE 4.21 M.2 SSD and M.2 connector

    FIGURE 4.22 Removing an M.2 SSD

    FIGURE 4.23 2.5″ SATA SSD

    FIGURE 4.24 Disconnected SATA SSD

    FIGURE 4.25 Laptop trackpad

    FIGURE 4.26 Touchpad settings

    FIGURE 4.27 Track point

    FIGURE 4.28 Point stick properties

    FIGURE 4.29 Mini PCIe card in a laptop

    FIGURE 4.30 A removable laptop Li-ion battery

    FIGURE 4.31 Internal laptop battery

    FIGURE 4.32 A laptop AC adapter

    FIGURE 4.33 Removing the system fan

    FIGURE 4.34 Removing the heat sink

    FIGURE 4.35 Removing the wireless NIC

    FIGURE 4.36 Disconnecting the two antenna wires

    FIGURE 4.37 Disconnect the CMOS battery

    FIGURE 4.38 Laptop fingerprint scanner

    FIGURE 4.39 A cable lock

    FIGURE 4.40 Cable lock in a laptop

    FIGURE 4.41 Laptop privacy screen

    FIGURE 4.42 Fn+F2 enables the privacy screen.

    FIGURE 4.43 Several touch pens

    FIGURE 4.44 USB headset

    FIGURE 4.45 Drawing pad accessory with stylus

    FIGURE 4.46 A USB-C docking station

    FIGURE 4.47 HP laptop docking port

    Volume 1: Chapter 5

    FIGURE 5.1 A daisy-wheel printer mechanism

    FIGURE 5.2 Formation of images in a dot-matrix printer

    FIGURE 5.3 A printhead carriage (holding two ink cartridges) in an inkjet pr...

    FIGURE 5.4 A carriage stepper motor

    FIGURE 5.5 Carriage stepper motor, carriage belt, stabilizer bar, and printh...

    FIGURE 5.6 Inkjet pickup roller (center darker roller)

    FIGURE 5.7 Inkjet separation pads

    FIGURE 5.8 A paper tray on an inkjet printer

    FIGURE 5.9 A paper feed sensor on an inkjet printer

    FIGURE 5.10 Duplexing assembly rollers

    FIGURE 5.11 An EP toner cartridge

    FIGURE 5.12 The EP laser scanning assembly (side view and simplified top vie...

    FIGURE 5.13 Paper transport rollers

    FIGURE 5.14 The transfer corona assembly

    FIGURE 5.15 The fuser

    FIGURE 5.16 The charging step of the EP process

    FIGURE 5.17 The exposing step of the EP process

    FIGURE 5.18 The developing step of the EP process

    FIGURE 5.19 The transferring step of the EP process

    FIGURE 5.20 The fusing step of the EP process

    FIGURE 5.21 The cleaning step of the EP process

    FIGURE 5.22 The EP imaging process

    FIGURE 5.23 Printers & Scanners

    FIGURE 5.24 Add Printer wizard

    FIGURE 5.25 Printer options

    FIGURE 5.26 Print Queue

    FIGURE 5.27 HP Smart printer app

    FIGURE 5.28 Printer Properties, General tab

    FIGURE 5.29 Sharing tab

    FIGURE 5.30 Ports tab

    FIGURE 5.31 Advanced tab

    FIGURE 5.32 Security tab

    FIGURE 5.33 Printer-specific options

    FIGURE 5.34 Adding an IP printer

    FIGURE 5.35 Bonjour service is running and set to start automatically.

    FIGURE 5.36 Xerox AltaLink badge scanner and touchscreen

    FIGURE 5.37 SAFEQ authentication screen

    FIGURE 5.38 Secured print job

    FIGURE 5.39 Xerox print log

    FIGURE 5.40 A flatbed scanner

    FIGURE 5.41 Automatic document feeder (ADF) on an MFD

    FIGURE 5.42 Scan to email

    FIGURE 5.43 New button in Google Drive

    Volume 1: Chapter 6

    FIGURE 6.1 Distributed processing

    FIGURE 6.2 A simple LAN

    FIGURE 6.3 A simple WAN

    FIGURE 6.4 Bluetooth USB adapter

    FIGURE 6.5 Storage area network (SAN)

    FIGURE 6.6 Block storage

    FIGURE 6.7 The peer-to-peer resource model

    FIGURE 6.8 The client-server resource model

    FIGURE 6.9 The bus topology

    FIGURE 6.10 The star topology

    FIGURE 6.11 The ring topology

    FIGURE 6.12 The mesh topology

    FIGURE 6.13 The OSI model

    FIGURE 6.14 A NIC's Speed & Duplex setting

    FIGURE 6.15 Physical (MAC) address

    FIGURE 6.16 Device Manager

    FIGURE 6.17 NIC properties Driver tab

    FIGURE 6.18 Coaxial cable

    FIGURE 6.19 Thicknet transceiver and cable inside a vampire tap

    FIGURE 6.20 Two T-connectors, male BNC connector, and two terminators

    FIGURE 6.21 Attached coax cables and connectors

    FIGURE 6.22 A coax splitter

    FIGURE 6.23 F-type and BNC connectors

    FIGURE 6.24 Unshielded twisted pair cable

    FIGURE 6.25 Shielded twisted pair cable

    FIGURE 6.26 RJ11 and RJ45 connectors

    FIGURE 6.27 Cables in a punchdown block

    FIGURE 6.28 T568A standard

    FIGURE 6.29 T568B standard

    FIGURE 6.30 Fiber-optic cable

    FIGURE 6.31 Drawing of a fiber-optic cable

    FIGURE 6.32 Ethernet Cat 8 (top) and fiber-optic cables (bottom)

    FIGURE 6.33 ST (left), SC (center), and LC (right) fiber connectors

    FIGURE 6.34 DSL modem

    FIGURE 6.35 Optical network terminal (ONT)

    FIGURE 6.36 Wireless router

    FIGURE 6.37 Rack-mounted patch panels

    FIGURE 6.38 Cisco routers and switches

    FIGURE 6.39 Network example

    FIGURE 6.40 Power over Ethernet injector

    FIGURE 6.41 Power over Ethernet switch

    Volume 1: Chapter 7

    FIGURE 7.1 The DoD and OSI models

    FIGURE 7.2 TCP/IP protocol suite

    FIGURE 7.3 FileZilla interface

    FIGURE 7.4 Network & Internet

    FIGURE 7.5 Advanced Network Settings

    FIGURE 7.6 Wi-Fi connection properties

    FIGURE 7.7 Manually configuring IP settings

    FIGURE 7.8 Network connection properties

    FIGURE 7.9 IPv4 properties

    FIGURE 7.10 Binary values

    FIGURE 7.11 IPv6 address

    FIGURE 7.12 ipconfig output with IPv4 and IPv6 addresses

    FIGURE 7.13 Two VLAN configurations

    FIGURE 7.14 A VPN

    FIGURE 7.15 IPSec VPNs

    FIGURE 7.16 Adding a VPN

    FIGURE 7.17 Test VPN added

    Volume 1: Chapter 8

    FIGURE 8.1 Server roles

    FIGURE 8.2 Screened subnets

    FIGURE 8.3 Internet name hierarchy

    FIGURE 8.4 The DNS name resolution process

    FIGURE 8.5 The DHCP request process

    FIGURE 8.6 A D-Link print server

    FIGURE 8.7 Printer management options

    FIGURE 8.8 Kiwi Syslog

    FIGURE 8.9 RSA SecurID

    FIGURE 8.10 PingID

    FIGURE 8.11 Security log in Event Viewer

    FIGURE 8.12 Microsoft Edge site-viewing history

    FIGURE 8.13 Simple data in a worksheet

    FIGURE 8.14 Cross-region load balancing

    FIGURE 8.15 Content-based load balancing

    FIGURE 8.16 Proxy settings

    FIGURE 8.17 Edit Proxy Server

    FIGURE 8.18 A proxy server on a network

    FIGURE 8.19 ecobee smart thermostat

    FIGURE 8.20 Schlage smart door lock

    FIGURE 8.21 Lutron smart light switch

    Volume 1: Chapter 9

    FIGURE 9.1 2.4 GHz communication channels

    FIGURE 9.2 2.4 GHz network layouts

    FIGURE 9.3 Channel availability in the 5 GHz spectrum

    FIGURE 9.4 Wireless router

    FIGURE 9.5 Office network map

    FIGURE 9.6 A DSL modem

    FIGURE 9.7 A DSL splitter

    FIGURE 9.8 Voice telephone and ADSL frequencies used

    FIGURE 9.9 Connecting DSL Internet

    FIGURE 9.10 Add A Device window

    FIGURE 9.11 Advanced Network Settings

    FIGURE 9.12 TCP/IPv6 Properties

    FIGURE 9.13 Available Wi-Fi Networks

    FIGURE 9.14 Cable trough

    FIGURE 9.15 Floor cable guard

    FIGURE 9.16 Logging into the wireless router

    FIGURE 9.17 Basic setup screen

    FIGURE 9.18 Basic wireless settings tab

    FIGURE 9.19 Wi-Fi Settings tab

    FIGURE 9.20 Local Network Settings screen

    FIGURE 9.21 Option to clone a MAC address

    FIGURE 9.22 5 GHz channels available to select

    FIGURE 9.23 A network with a screened subnet

    FIGURE 9.24 Enabling the firewall

    Volume 1: Chapter 10

    FIGURE 10.1 Google Play Store app settings

    FIGURE 10.2 Personal hotspot screen in iOS

    FIGURE 10.3 Mobile hotspot in Android

    FIGURE 10.4 Android hotspot network name, password, and options

    FIGURE 10.5 Verizon Wireless MiFi hotspot

    FIGURE 10.6 Connections in (a) iOS and (b) Android

    FIGURE 10.7 (a) Control center in iOS and (b) Android notification area

    FIGURE 10.8 Android SIM chip

    FIGURE 10.9 (a) About in iOS and (b) About Phone in Android

    FIGURE 10.10 Turning on Wi-Fi in iOS

    FIGURE 10.11 Wi-Fi settings with a network that's been joined

    FIGURE 10.12 Settings page with Wi-Fi network connected

    FIGURE 10.13 Enabling Wi-Fi in Android

    FIGURE 10.14 List of available networks

    FIGURE 10.15 Connected to a network

    FIGURE 10.16 iOS Cellular settings

    FIGURE 10.17 Cellular data options

    FIGURE 10.18 Cellular data for individual apps

    FIGURE 10.19 App settings

    FIGURE 10.20 Data usage in Android OS

    FIGURE 10.21 Viewing Wi-Fi app data usage in Android OS

    FIGURE 10.22 Individual application data usage

    FIGURE 10.23 VPN settings

    FIGURE 10.24 Adding a VPN connection

    FIGURE 10.25 More connection settings

    FIGURE 10.26 Edit VPN network

    FIGURE 10.27 Saved VPN

    FIGURE 10.28 Connect to VPN

    FIGURE 10.29 Enabling Bluetooth in Windows 11

    FIGURE 10.30 Available Bluetooth devices

    FIGURE 10.31 Bluetooth pairing request

    FIGURE 10.32 Paired Bluetooth device with gear

    FIGURE 10.33 Bluetooth and Devices

    FIGURE 10.34 Send or receive files via Bluetooth.

    FIGURE 10.35 Choosing the paired device

    FIGURE 10.36 Accepting Bluetooth file transfer

    FIGURE 10.37 Received file in Android

    FIGURE 10.38 Sharing a file

    FIGURE 10.39 Choose a location to save the file.

    FIGURE 10.40 iOS Bluetooth

    FIGURE 10.41 Sharing a file in iOS

    FIGURE 10.42 Garmin Nuvi GPS

    FIGURE 10.43 iOS location services

    FIGURE 10.44 Android location settings

    FIGURE 10.45 Android location (a) app permissions and (b) location services ...

    FIGURE 10.46 Corporate app store

    FIGURE 10.47 Email accounts

    FIGURE 10.48 Adding an account

    FIGURE 10.49 Creating a new email account

    FIGURE 10.50 New Account screen

    FIGURE 10.51 Accounts in Android

    FIGURE 10.52 Adding an account

    FIGURE 10.53 Incoming Server Settings

    FIGURE 10.54 Email port setting

    FIGURE 10.55 Email security options

    FIGURE 10.56 iCloud configuration settings

    FIGURE 10.57 iCloud Photos settings

    FIGURE 10.58 iTunes Summary page

    FIGURE 10.59 Devices Preferences in iTunes

    FIGURE 10.60 Samsung Accounts and Backup

    FIGURE 10.61 Google Drive backup

    FIGURE 10.62 iOS Sync data types

    FIGURE 10.63 Android Sync Account

    FIGURE 10.64 iOS Calendar Accounts

    FIGURE 10.65 Android Manage Calendars

    FIGURE 10.66 Windows Backup Sync Settings

    FIGURE 10.67 Google Drive

    Volume 1: Chapter 11

    FIGURE 11.1 Type 1 and Type 2 hypervisors

    FIGURE 11.2 Enabling Hyper-V

    FIGURE 11.3 Hyper-V Manager

    FIGURE 11.4 Container versus virtual machine

    FIGURE 11.5 Enabling virtualization in the BIOS/UEFI

    FIGURE 11.6 Virtual NICs connecting to a physical NIC

    FIGURE 11.7 Download VirtualBox

    FIGURE 11.8 VirtualBox preconfiguration

    FIGURE 11.9 VirtualBox with a virtual drive

    FIGURE 11.10 Lubuntu – Settings window

    FIGURE 11.11 Lubuntu live session

    FIGURE 11.12 Installing Lubuntu

    FIGURE 11.13 Common cloud service levels

    FIGURE 11.14 Google Apps

    FIGURE 11.15 Google Docs

    FIGURE 11.16 Sharing a folder

    FIGURE 11.17 Creating AWS account

    FIGURE 11.18 Selecting a support plan

    FIGURE 11.19 AWS Console Home

    FIGURE 11.20 EC2 dashboard

    FIGURE 11.21 Launch an Instance

    FIGURE 11.22 Instance Type

    FIGURE 11.23 Create Key Pair

    FIGURE 11.24 EC2 Instances

    FIGURE 11.25 Instance Details

    FIGURE 11.26 Connect to Instance

    FIGURE 11.27 Windows Security

    FIGURE 11.28 Connect to Instance

    Volume 1: Chapter 12

    FIGURE 12.1 UEFI boot priority settings

    FIGURE 12.2 USB POST card

    FIGURE 12.3 Distended capacitors on a motherboard

    FIGURE 12.4 Windows Task Manager

    FIGURE 12.5 Local disk properties

    FIGURE 12.6 Storage app

    FIGURE 12.7 Cleanup Recommendations

    FIGURE 12.8 Advanced Storage Settings

    FIGURE 12.9 Optimize Drives

    FIGURE 12.10 Iometer test results

    FIGURE 12.11 GSmartControl

    FIGURE 12.12 NVMe information in GSmartControl

    FIGURE 12.13 A multimeter

    FIGURE 12.14 A UTP crimper and connectors

    FIGURE 12.15 Cable stripper

    FIGURE 12.16 Handheld Wi-Fi analyzer

    FIGURE 12.17 Toner probe

    FIGURE 12.18 Punchdown tool

    FIGURE 12.19 Cable tester

    FIGURE 12.20 Ethernet loopback plug

    FIGURE 12.21 Network tap

    FIGURE 12.22 ipconfig output

    FIGURE 12.23 ipconfig /all output

    FIGURE 12.24 Hardware And Connection Properties

    FIGURE 12.25 A successful ping

    FIGURE 12.26 hostname output

    FIGURE 12.27 netstat output

    FIGURE 12.28 Starting nslookup and using help

    FIGURE 12.29 net share command

    FIGURE 12.30 Administrator Command Prompt

    FIGURE 12.31 Sharing a folder

    FIGURE 12.32 tracert output

    FIGURE 12.33 pathping output

    FIGURE 12.34 Gigabit SFP

    Volume 1: Chapter 13

    FIGURE 13.1 LCD cutoff switches (video toggle keys), F7 on the top keyboard ...

    FIGURE 13.2 Windows Display settings

    FIGURE 13.3 Scaling settings

    FIGURE 13.4 Display resolutions

    FIGURE 13.5 Advanced Display refresh rate

    FIGURE 13.6 Laptop function keys

    FIGURE 13.7 Windows sound settings

    FIGURE 13.8 iPhone with a swollen battery

    FIGURE 13.9 The Fn key on a laptop

    FIGURE 13.10 Network card toggle switch above the keyboard

    FIGURE 13.11 iOS (a) and Android (b) network settings

    FIGURE 13.12 iOS Control Center (a) and Android notifications area (b)

    FIGURE 13.13 iOS Battery (a) and Battery Health & Charging (b) settings]

    FIGURE 13.14 Laser printer roller circumference chart

    FIGURE 13.15 Print jobs in the print queue in Windows

    FIGURE 13.16 Printer ellipsis menu

    FIGURE 13.17 Print job printing correctly

    FIGURE 13.18 The Print Spooler service

    FIGURE 13.19 Printing Preferences

    FIGURE 13.20 Paper/Quality tab

    FIGURE 13.21 Finishing tab, including page orientation

    Volume 2: Chapter 1

    FIGURE 1.1 The operating system interacts with resources.

    FIGURE 1.2 Microsoft 365 Apps (Office) download

    FIGURE 1.3 Cached Exchange Mode

    FIGURE 1.4 OneDrive Choose Folders

    FIGURE 1.5 The Microsoft Edge web browser

    FIGURE 1.6 The BitLocker Control Panel applet

    FIGURE 1.7 Windows Theme settings

    FIGURE 1.8 Microsoft Defender

    FIGURE 1.9 The Settings app in Windows 11

    FIGURE 1.10 An application context menu

    FIGURE 1.11 Windows Snap Assist

    FIGURE 1.12 The Windows 11 Desktop context menu

    FIGURE 1.13 The Windows 11 Personalization setting screen

    FIGURE 1.14 The Windows 11 Taskbar

    FIGURE 1.15 Windows 11 Start menu

    FIGURE 1.16 The Properties window of an application

    FIGURE 1.17 The Compatibility settings possible with an older program

    FIGURE 1.18 The basic elements of a window, as seen in Notepad and Calculato...

    FIGURE 1.19 A window with many more components, as seen in Microsoft Word

    FIGURE 1.20 Windows 11 File Explorer

    Volume 2: Chapter 2

    FIGURE 2.1 The default Task Manager in Windows

    FIGURE 2.2 The Details tab of Task Manager

    FIGURE 2.3 The various columns for the Details tab

    FIGURE 2.4 The Performance tab of Task Manager

    FIGURE 2.5 Computer Management

    FIGURE 2.6 Event Viewer

    FIGURE 2.7 Disk Management

    FIGURE 2.8 Task Scheduler

    FIGURE 2.9 Device Manager

    FIGURE 2.10 Certificate Manager

    FIGURE 2.11 Local Users and Groups

    FIGURE 2.12 Performance Monitor

    FIGURE 2.13 Group Policy Editor

    FIGURE 2.14 Group Policy Editor browse dialog box

    FIGURE 2.15 System Configuration General tab

    FIGURE 2.16 System Configuration Boot tab

    FIGURE 2.17 System Configuration Services tab

    FIGURE 2.18 System Configuration Startup tab and Task Manager Startup tab

    FIGURE 2.19 System Configuration Tools tab

    FIGURE 2.20 The Msinfo32 interface shows configuration values for the system...

    FIGURE 2.21 Resource Monitor

    FIGURE 2.22 Resource Monitor Memory tab

    FIGURE 2.23 Disk Cleanup

    FIGURE 2.24 The Windows Control Panel in Category view

    FIGURE 2.25 Windows Date and Time/Internet Time settings

    FIGURE 2.26 Windows Region Control Panel applet

    FIGURE 2.27 Windows Additional Settings Region Control Panel applet

    FIGURE 2.28 Internet Options Control Panel applet

    FIGURE 2.29 File Explorer General Options

    FIGURE 2.30 File Explorer View Options

    FIGURE 2.31 Windows System Properties Control Panel applet

    FIGURE 2.32 Windows System Properties Advanced tab

    FIGURE 2.33 Windows environment variables

    FIGURE 2.34 Windows User Profiles Settings

    FIGURE 2.35 Windows Startup And Recovery options

    FIGURE 2.36 Windows System Protection Options

    FIGURE 2.37 Windows Remote options

    FIGURE 2.38 Windows User Accounts applet

    FIGURE 2.39 Windows Power Options applet

    FIGURE 2.40 Windows Edit Plan Settings

    FIGURE 2.41 Windows Advanced Power Options settings

    FIGURE 2.42 Windows Define Power Buttons And Turn On Password Protection dia...

    FIGURE 2.43 Device Manager, Device Properties detail, Power Management tab

    FIGURE 2.44 Windows Credential Manager applet

    FIGURE 2.45 Windows Programs and Features applet

    FIGURE 2.46 Windows Bluetooth & Devices settings

    FIGURE 2.47 Windows Sound applet

    FIGURE 2.48 Windows Troubleshooting Settings app

    FIGURE 2.49 Windows Network and Sharing Center applet

    FIGURE 2.50 Windows Device Manager

    FIGURE 2.51 Windows BitLocker Drive Encryption applet

    FIGURE 2.52 Windows Defender Firewall in Windows 11

    FIGURE 2.53 Windows Defender Firewall with Advanced Security in Windows

    FIGURE 2.54 Outlook Mail applet

    FIGURE 2.55 Indexing Options dialog box

    FIGURE 2.56 Advanced Options for indexing

    FIGURE 2.57 Ease of Access Center applet

    FIGURE 2.58 Windows 11 Windows Tools applet

    FIGURE 2.59 Windows 11 Settings app

    FIGURE 2.60 Date & Time settings

    FIGURE 2.61 Language settings

    FIGURE 2.62 Windows Update Settings

    FIGURE 2.63 Windows Security settings

    FIGURE 2.64 Stand-alone Windows Security settings

    FIGURE 2.65 Virus & Threat Protection settings

    FIGURE 2.66 Account Protection settings

    FIGURE 2.67 Firewall & Network Protection settings

    FIGURE 2.68 Device Performance & Health

    FIGURE 2.69 Protection History

    FIGURE 2.70 Windows 11 Personalization settings

    FIGURE 2.71 Installed Apps settings

    FIGURE 2.72 Privacy settings

    FIGURE 2.73 System settings

    FIGURE 2.74 Bluetooth & Devices settings

    FIGURE 2.75 Devices settings

    FIGURE 2.76 Network & Internet settings

    FIGURE 2.77 Gaming settings

    FIGURE 2.78 Windows 10 Xbox Game Bar

    FIGURE 2.79 Accounts settings

    FIGURE 2.80 Accessibility settings

    FIGURE 2.81 Disk Management MMC

    FIGURE 2.82 Storage Spaces

    Volume 2: Chapter 3

    FIGURE 3.1 System Information

    FIGURE 3.2 Windows default disk layout

    FIGURE 3.3 Select Language Settings screen

    FIGURE 3.4 Select Keyboard Settings screen

    FIGURE 3.5 Select Setup Option screen

    FIGURE 3.6 Product Key screen

    FIGURE 3.7 Windows edition selection

    FIGURE 3.8 Windows end-user license agreement

    FIGURE 3.9 Windows installation partitioning

    FIGURE 3.10 Ready To Install screen

    FIGURE 3.11 Windows installation progress

    FIGURE 3.12 Windows Installing screen

    FIGURE 3.13 Operating system locale (region) setting

    FIGURE 3.14 Operating system keyboard layout setting

    FIGURE 3.15 Operating system name

    FIGURE 3.16 Just A Moment screen

    FIGURE 3.17 Windows account options

    FIGURE 3.18 Windows Updates installation

    FIGURE 3.19 Microsoft account options for personal use

    FIGURE 3.20 Set Up A PIN

    FIGURE 3.21 Choose Privacy Settings For Your device

    FIGURE 3.22 Restore From This PC screen

    FIGURE 3.23 Let's Customize Your Experience

    FIGURE 3.24 Browsing data synchronization opt-in

    FIGURE 3.25 Welcome To Windows

    FIGURE 3.26 Adjusting Time Zone

    FIGURE 3.27 Sign In To OneDrive

    FIGURE 3.28 Back Up Folders On This PC

    FIGURE 3.29 Signing in to Edge

    FIGURE 3.30 Download And Install Windows 11

    FIGURE 3.31 Install Windows 11 screen

    FIGURE 3.32 Windows 11 end-user license agreement

    FIGURE 3.33 Windows 11 updates check

    FIGURE 3.34 Windows 11 Ready To Install screen

    FIGURE 3.35 Installing Windows 11 upgrade percentage

    FIGURE 3.36 Windows 11 upgrade percentage after reboot

    FIGURE 3.37 Discovering your version of Windows 11

    FIGURE 3.38 Pause options for Windows Updates

    FIGURE 3.39 Opening a command prompt with admin privileges in Windows 11

    FIGURE 3.40 Windows 11 Settings app for joining a domain

    FIGURE 3.41 Windows 11 domain credentials prompt

    FIGURE 3.42 Windows domain joining

    FIGURE 3.43 Entra ID Sign In

    FIGURE 3.44 Make Sure This Is Your Organization

    FIGURE 3.45 Access Work Or School

    FIGURE 3.46 Windows local authentication

    FIGURE 3.47 Windows domain authentication

    FIGURE 3.48 Single sign-on

    FIGURE 3.49 Wireless connectivity

    FIGURE 3.50 VPN connectivity

    FIGURE 3.51 Windows Cellular

    FIGURE 3.52 Windows Proxy settings

    FIGURE 3.53 Mapping a network drive

    FIGURE 3.54 Connecting to printers

    FIGURE 3.55 Windows Defender Firewall

    FIGURE 3.56 Windows Defender Firewall notifications

    FIGURE 3.57 Windows Defender Firewall with Advanced Security

    FIGURE 3.58 Settings App network configuration

    FIGURE 3.59 Control Panel network configuration

    FIGURE 3.60 Alternate Configuration tab

    Volume 2: Chapter 4

    FIGURE 4.1 macOS App Store

    FIGURE 4.2 macOS Applications folder

    FIGURE 4.3 macOS Disk Utility

    FIGURE 4.4 FileVault encryption

    FIGURE 4.5 macOS General System Settings

    FIGURE 4.6 Displays tab

    FIGURE 4.7 Network tab

    FIGURE 4.8 Details Network settings

    FIGURE 4.9 Firewall settings

    FIGURE 4.10 Printers & Scanners tab

    FIGURE 4.11 Privacy & Security

    FIGURE 4.12 Accessibility System Settings

    FIGURE 4.13 Time Machine settings

    FIGURE 4.14 Viewing multiple apps with Mission Control

    FIGURE 4.15 Apple Passwords app

    FIGURE 4.16 Apple Spotlight utility

    FIGURE 4.17 iCloud configuration settings on macOS

    FIGURE 4.18 Settings for default gestures on macOS

    FIGURE 4.19 Apple Finder utility

    FIGURE 4.20 Apple macOS Dock

    FIGURE 4.21 Apple iOS software update

    FIGURE 4.22 Ubuntu apt tool

    FIGURE 4.23 The top command

    FIGURE 4.24 The nano editor

    FIGURE 4.25 The man command

    Volume 2: Chapter 5

    FIGURE 5.1 A common access control vestibule setup

    FIGURE 5.2 A typical PIR sensor

    FIGURE 5.3 A typical combination door lock

    FIGURE 5.4 A Universal Security Slot

    FIGURE 5.5 A standard cable lock

    FIGURE 5.6 Interior data center fences

    FIGURE 5.7 A typical bollard

    FIGURE 5.8 A key fob

    FIGURE 5.9 A typical smartcard

    FIGURE 5.10 A fingerprint biometric lock

    FIGURE 5.11 A typical corporate network

    FIGURE 5.12 An RSA security key fob

    FIGURE 5.13 Active Directory security tokens

    FIGURE 5.14 A hybrid OU structure

    FIGURE 5.15 The Group Policy Management Console

    FIGURE 5.16 Group Policy Object settings

    FIGURE 5.17 Profile settings for a user account

    FIGURE 5.18 CryptoLocker

    FIGURE 5.19 A virus spreading from an infected system using email

    FIGURE 5.20 A multipartite virus commencing an attack on a system

    FIGURE 5.21 Antivirus software components

    FIGURE 5.22 Antimalware components

    FIGURE 5.23 Windows Recovery Environment

    FIGURE 5.24 Windows Advanced Options

    FIGURE 5.25 Windows Defender Firewall with Advanced Security on Windows 11

    FIGURE 5.26 Windows Defender Firewall with Advanced Security defaults

    FIGURE 5.27 An ICMP-based smurf attack

    FIGURE 5.28 An amplified attack

    FIGURE 5.29 A DDoS attack

    FIGURE 5.30 Evil twin attack

    FIGURE 5.31 IP address spoofing attack

    FIGURE 5.32 On-path attack

    FIGURE 5.33 Threat agents, exploits, and vulnerabilities

    FIGURE 5.34 Data and encryption

    FIGURE 5.35 Windows Group Policy security options

    FIGURE 5.36 Password expiration

    FIGURE 5.37 Users, groups, and resources

    FIGURE 5.38 Account restrictions

    FIGURE 5.39 Account lockout policy settings

    FIGURE 5.40 Disabled Guest account

    FIGURE 5.41 The Screen Saver Settings dialog box

    Volume 2: Chapter 6

    FIGURE 6.1 Microsoft account screen

    FIGURE 6.2 Changing the account type

    FIGURE 6.3 Windows authentication

    FIGURE 6.4 Claims-based authentication

    FIGURE 6.5 Windows Hello Sign-in options

    FIGURE 6.6 UAC prompt

    FIGURE 6.7 Network share permissions and NTFS permissions

    FIGURE 6.8 NTFS folder permissions

    FIGURE 6.9 Effective permissions

    FIGURE 6.10 The Advanced Attributes dialog box

    FIGURE 6.11 Choose People To Share With

    FIGURE 6.12 Advanced file and folder sharing

    FIGURE 6.13 Disabling inheritance

    FIGURE 6.14 Permission entry

    FIGURE 6.15 Windows file attributes

    FIGURE 6.16 Microsoft Defender settings

    FIGURE 6.17 This screen provides you with several options to specify how pro...

    FIGURE 6.18 Firewall & Network Protection

    FIGURE 6.19 Deactivating Windows Defender Firewall network protection

    FIGURE 6.20 Windows Defender Firewall Allowed Apps

    FIGURE 6.21 Windows Firewall with Advanced Security

    FIGURE 6.22 Windows Defender Firewall with Advanced Security inbound rules

    FIGURE 6.23 BitLocker Drive Encryption applet

    FIGURE 6.24 Encrypting a file in Windows 11

    FIGURE 6.25 Downloading Microsoft Edge

    FIGURE 6.26 Microsoft Edge add-ons

    FIGURE 6.27 Microsoft Credential Manager

    FIGURE 6.28 Trusted root CAs

    FIGURE 6.29 Permissions for a site

    FIGURE 6.30 Clearing browsing data

    FIGURE 6.31 InPrivate browsing

    FIGURE 6.32 Account details

    FIGURE 6.33 Proxy Settings

    FIGURE 6.34 Edge Extension Settings

    FIGURE 6.35 Edge Extension Details

    FIGURE 6.36 Edge Experiments screen

    FIGURE 6.37 The 2.4 GHz channel plan

    FIGURE 6.38 The 5 GHz channel plan

    FIGURE 6.39 A typical screened subnet with two firewalls

    FIGURE 6.40 A typical screened subnet with two routers

    FIGURE 6.41 A typical screened subnet with one firewall

    Volume 2: Chapter 7

    FIGURE 7.1 The Performance tab in Task Manager

    FIGURE 7.2 The Processes tab in Task Manager

    FIGURE 7.3 The Details tab in Task Manager

    FIGURE 7.4 Resource Monitor

    FIGURE 7.5 Selective isolation in Resource Monitor

    FIGURE 7.6 The ntbtlog.txt file

    FIGURE 7.7 System Configuration options for boot logging

    FIGURE 7.8 Recovery Environment menu

    FIGURE 7.9 Startup Settings menu

    FIGURE 7.10 Windows 11 Repair My PC menu

    FIGURE 7.11 Windows Reliability Monitor

    FIGURE 7.12 Windows event logs in Event Viewer

    FIGURE 7.13 Blue Screen of Death

    FIGURE 7.14 Power Options

    FIGURE 7.15 Service Control Manager events

    FIGURE 7.16 Services properties

    FIGURE 7.17 Low memory warning

    FIGURE 7.18 Windows Virtual Memory settings

    FIGURE 7.19 USB controller error

    FIGURE 7.20 Startup items in Task Manager

    FIGURE 7.21 Configuration of date & time

    FIGURE 7.22 Manually starting a service

    FIGURE 7.23 Service recovery

    FIGURE 7.24 Repairing an application

    FIGURE 7.25 Preparing to reset

    FIGURE 7.26 System Protection

    FIGURE 7.27 Uninstalling an update

    FIGURE 7.28 Rolling back a driver

    FIGURE 7.29 Deleting a local user profile

    FIGURE 7.30 Malware-generated call-in alert

    FIGURE 7.31 Malware-generated download alert

    FIGURE 7.32 An untrusted SSL certificate warning

    FIGURE 7.33 A self-signed certificate

    FIGURE 7.34 Process Explorer

    FIGURE 7.35 System Protection

    FIGURE 7.36 Microsoft Defender Antivirus Security updates

    FIGURE 7.37 Microsoft Defender Antivirus (offline scan)

    FIGURE 7.38 An offline Microsoft Defender Antivirus scan

    FIGURE 7.39 Creating a Windows Defender Security scheduled scan

    FIGURE 7.40 Bluetooth status icons

    FIGURE 7.41 The Portrait Orientation Lock button

    Volume 2: Chapter 8

    FIGURE 8.1 Programming pyramid

    FIGURE 8.2 Compiling a programming language

    FIGURE 8.3 Interpreting a scripting language

    FIGURE 8.4 PowerShell ISE

    FIGURE 8.5 The PyCharm IDE

    FIGURE 8.6 The Remote Desktop Connection client

    FIGURE 8.7 A typical site-to-site VPN

    FIGURE 8.8 A typical host-to-site VPN

    FIGURE 8.9 Client-to-site VPN connection

    FIGURE 8.10 PuTTY SSH Client

    FIGURE 8.11 Windows Quick Assist tool

    Volume 2: Chapter 9

    FIGURE 9.1 ESD strap using an alligator clip

    FIGURE 9.2 Proper use of an ESD antistatic mat

    FIGURE 9.3 An antistatic component bag

    FIGURE 9.4 Antistatic foam

    FIGURE 9.5 PC toolkit

    FIGURE 9.6 Floor cable guard

    FIGURE 9.7 Cable ties

    FIGURE 9.8 A simple power strip

    FIGURE 9.9 A surge protector

    FIGURE 9.10 An uninterruptible power supply

    FIGURE 9.11 The back of a UPS

    FIGURE 9.12 A Microsoft product key

    Volume 2: Chapter 10

    FIGURE 10.1 An asset tag

    FIGURE 10.2 An example of a procurement life cycle

    FIGURE 10.3 Standard operating procedures

    FIGURE 10.4 The Shadow Copies tab

    FIGURE 10.5 The Previous Versions tab

    FIGURE 10.6 Windows Server Backup

    Volume 2: Appendix B

    FIGURE 3.61 The Set Up A Work Or School Account dialog box

    FIGURE 3.62 Domain dialog box

    FIGURE 3.63 Domain administrative credentials dialog box

    FIGURE 3.64 Local administrative rights dialog box

    CompTIA® A+® Complete Study Guide

    Volume 1: Core 1 Exam 220-1201

    Sixth Edition

    Quentin Docter

    Jon Buhagiar

    Wiley Logo

    Copyright © 2025 by John Wiley & Sons, Inc. All rights reserved, including rights for text and data mining and training of artificial intelligence technologies or similar technologies.

    Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

    Published simultaneously in Canada and the United Kingdom.

    ISBNs for the 2-volume set: 9781394330034 (paperback), 9781394330058 (ePDF), 9781394330041 (ePub)

    No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permission.

    The manufacturer's authorized representative according to the EU General Product Safety Regulation is Wiley-VCH GmbH, Boschstr. 12, 69469 Weinheim, Germany, e-mail: Product_Safety@wiley.com.

    Trademarks: Wiley, the Wiley logo, and Sybex are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries and may not be used without written permission. CompTIA, A+, and the CompTIA logo are trademarks or registered trademarks of CompTIA, Inc. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

    Limit of Liability/Disclaimer of Warranty: While the publisher and authors have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

    For general information on our other products and services, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002. For product technical support, you can find answers to frequently asked questions or reach us via live chat at https://sybexsupport.wiley.com.

    Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.

    Library of Congress Control Number: 2025938071

    Cover Design: Wiley

    Cover Image: © Jeremy Woodhouse/Getty Images

    For the fam.

    —Quentin Docter

    For my wife and son.

    —Jon Buhagiar

    Acknowledgments

    As we were putting together this book, I was reminded of the proverb that begins It takes a village … That beginning definitely holds true for creating a book of this scope and size. From beginning to end, scores of dedicated professionals have focused on delivering the best book possible to you, the readers.

    First, I need to thank my coauthor, Jon Buhagiar. I appreciate him diving in and dedicating himself to helping to produce an excellent book. I also need to give special thanks to our technical editor, Chris Crayton. He was meticulous and thorough, and challenged me to always find new and better ways to communicate complex concepts. His entire focus was on providing the best training material possible, and I doubt there's better in the business. Now, on to the rest of the team.

    Kenyon Brown and Kim Wimpsett kept us on track and moving forward, which was a challenge at times. Saravanan Dakshinamurthy had the fun job of keeping us organized, which is akin to herding cats. Copyeditor Liz Welch reminded me yet again that I am no master of the English language and saved me from butchering it (too badly). Many thanks also go out to our proofreader, Nancy Carrasco, and our indexer, Tom Dinse. Without their great contributions, this book would not have made it into your hands.

    On a personal note, I need to thank my family. My wife and kids are all incredibly supportive. Unfortunately, book writing as a side hustle while holding down a full‐time job takes up a lot of time. I end up hiding in my office a lot, but they're always there for me, and I couldn't do it without them. Another huge thanks goes to my late grandpa, Joe, who got me into computers and taught me so many lessons I will never be able to repay. Finally, thanks to my friends who keep me relatively sane—Sean, Kurtis, Tim, John, Cory, Kevin, and others—and laugh at me when I tell them I spent my weekend writing about network cables and protocols.

    —Quentin Docter

    I would like to first thank my coauthor, Quentin Docter. Throughout the writing of this book, he helped me with his insight and his expertise in writing technical books. Without his words of wisdom and guidance, this book would not be the product it stands to be. I would also like to give special thanks to our technical editor, Chris Crayton. His thorough review of the material helped to identify many areas for us to elaborate on and polish.

    I would also like to thank the many people who made this book possible: Kenyon Brown at Wiley Publishing, for giving me the opportunity to write this book and work with this wonderful team; Kim Wimpsett, for keeping us on track during the writing process; Pete Gaughan, who also kept us on track and organized during the publishing process; and our copyeditor, Liz Welch, for helping me use proper English. I'd also like to thank the many other people I've never met but who worked behind the scenes to make this book a success.

    During the writing of this book, many others in my life supported me, and I'd like to take this opportunity to thank them as well. First and foremost, thanks to my wife and son for their support during the many evenings and weekends spent in my office at the computer. Finally, thanks to my friend and coworker, Bill, for encouraging me daily with his insight and jokes, as well as to all my other coworkers and friends. Thank you.

    —Jon Buhagiar

    About the Authors

    Quentin Docter (A+, Network+, Tech+, Cloud Essentials +, MCSE, CCNA) is an IT author and consultant who started as a tech support agent for Packard Bell in 1994. Since then, he's worked in tech support, network administration, consulting, training, web development, and project management. During his career, he has achieved certifications from CompTIA, Microsoft, Cisco, Novell, and Sun Microsystems. He has written more than a dozen books for Sybex, including books on A+, Tech+, Cloud Essentials+, Server+, Windows, and Solaris 9 certifications, as well as PC hardware and maintenance.

    Jon Buhagiar (Network+, A+, CCNA, MCSA, MCSE, BS/ITM) is an IT professional with two decades of experience in higher education. During the past 22 years he has been responsible for network operations at Pittsburgh Technical College and has led several projects, such as virtualization (server and desktop), VoIP, Microsoft 365, and many other projects supporting the quality of education at the college. He has achieved several certifications from Cisco, CompTIA, and Microsoft, and he has taught many of the certification paths. He is the author of several books, including Sybex's CompTIA Network+ Review Guide: Exam N10‐008 (2021) and CCNA Certification Practice Tests: Exam 200‐301 (2020).

    About the Technical Editor

    Chris Crayton is a technical consultant, trainer, author, and industry‐leading technical editor. He has worked as a computer technology and networking instructor, information security director, network administrator, network engineer, and PC specialist. Chris has authored several print and online books on PC repair, CompTIA A+, CompTIA Security+, and Microsoft Windows. He has also served as technical editor and content contributor on numerous technical titles for several of the leading publishing companies. He holds numerous industry certifications, has been recognized with many professional and teaching awards, and has served as a state‐level SkillsUSA final competition judge.

    Table of Contents

    Cover

    Table of Contents

    Title Page

    Copyright

    Dedication

    Acknowledgments

    About the Authors

    About the Technical Editor

    Table of Exercises

    Introduction

    What Is CompTIA A+ Certification?

    What Does This Book Cover?

    The CompTIA A+ Exam Objectives for Core 1 220-1201

    How to Contact the Publisher

    Assessment Test for Exam 220-1201

    Answers to Assessment Test 220-1201

    VOLUME 1: CompTIA A+ Core 1 Exam (220-1201)

    Chapter 1: Motherboards, Processors, and Memory

    Understanding Motherboards

    Understanding Processors

    Understanding Memory

    Understanding Cooling Systems

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question 1

    Performance-Based Question 2

    Chapter 2: Expansion Cards, Storage Devices, and Power Supplies

    Installing and Configuring Expansion Cards

    Understanding Storage Devices

    Understanding Power Supplies

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 3: Peripherals, Cables, and Connectors

    Understanding Peripheral Devices

    Understanding Cables and Connectors

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 4: Laptop and Mobile Device Hardware

    Working with Laptop and Mobile Device Hardware

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 5: Printers and Multifunction Devices

    Understanding Print Technologies and Imaging Processes

    Installing and Maintaining Printers

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 6: Networking Fundamentals

    Understanding Networking Principles

    Identifying Common Network Hardware

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 7: Introduction to TCP/IP

    Understanding TCP/IP

    Understanding Virtual Networks

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 8: Network Services

    Understanding Network Services

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 9: Wireless and SOHO Networking

    Understanding Wireless Networking Technologies

    Installing and Configuring SOHO Networks

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 10: Mobile Connectivity and Application Support

    Understanding Mobile Connectivity

    Understanding Mobile App Support

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 11: Virtualization and Cloud Computing

    Understanding Virtualization

    Understanding Cloud Computing

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 12: Core Hardware and Network Troubleshooting

    Understanding Troubleshooting Best Practices

    Troubleshooting Motherboards, RAM, CPUs, and Power Problems

    Troubleshooting Drives and RAID Arrays

    Troubleshooting Networking Problems

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Chapter 13: Mobile Device, Display, and Printer Troubleshooting

    Troubleshooting Video, Projector, and Display Issues

    Troubleshooting Common Mobile Device Issues

    Troubleshooting Printer Issues

    Summary

    Exam Essentials

    Review Questions

    Performance-Based Question

    Appendix A: Answers to Review Questions

    Chapter 1: Motherboards, Processors, and Memory

    Chapter 2: Expansion Cards, Storage Devices, and Power Supplies

    Chapter 3: Peripherals, Cables, and Connectors

    Chapter 4: Laptop and Mobile Device Hardware

    Chapter 5: Printers and Multifunction Devices

    Chapter 6: Networking Fundamentals

    Chapter 7: Introduction toTCP/IP

    Chapter 8: Network Services

    Chapter 9: Wireless and SOHO Networking

    Chapter 10: Mobile Connectivity and Application Support

    Chapter 11: Virtualization and Cloud Computing

    Chapter 12: Core Hardware and Network Troubleshooting

    Chapter 13: Mobile Device, Display, and Printer Troubleshooting

    Appendix B: Answers to Performance-Based Questions

    Chapter 1: Motherboards, Processors, and Memory

    Chapter 2: Expansion Cards, Storage Devices, and Power Supplies

    Chapter 3: Peripherals, Cables, and Connectors

    Chapter 4: Laptop and Mobile Device Hardware

    Chapter 5: Printers and Multifunction Devices

    Chapter 6: Networking Fundamentals

    Chapter 7: Introduction to TCP/IP

    Chapter 8: Network Services

    Chapter 9: Wireless and SOHO Networking

    Chapter 10: Mobile Connectivity and Application Support

    Chapter 11: Virtualization and Cloud Computing

    Chapter 12: Core Hardware and Network Troubleshooting

    Chapter 13: Mobile Device, Display, and Printer Troubleshooting

    Index

    End User License Agreement

    List of Tables

    Chapter 1

    TABLE 1.1 Desktop PC socket types and the processors they support

    TABLE 1.2 Select Intel desktop processors

    TABLE 1.3 13th Generation Intel Core CPU comparison

    TABLE 1.4 DDR DIMM characteristics

    TABLE 1.5 SODIMM pin counts

    Chapter 2

    TABLE 2.1 SATA standards and speeds

    TABLE 2.2 PCIe standards and transfer rates

    TABLE 2.3 SAS standards

    TABLE 2.4 M.2 keying characteristics

    TABLE 2.5 RAID characteristics

    TABLE 2.6 Optical disc and drive specifications

    TABLE 2.7 : 80 PLUS rating minimum efficiency

    Chapter 3

    TABLE 3.1 USB specifications

    TABLE 3.2 USB power standards

    TABLE 3.3 Thunderbolt standards

    TABLE 3.4 eSATA specifications

    Chapter 4

    TABLE 4.1 Laptop manufacturers’ service and support websites

    Chapter 6

    TABLE 6.1 Topologies—advantages and disadvantages

    TABLE 6.2 Coax RG types

    TABLE 6.3 Common twisted pair cabling standards

    TABLE 6.4 Common cable types and characteristics

    TABLE 6.5 Fiber-optic letter designations

    TABLE 6.6 PoE standards

    Chapter 7

    TABLE 7.1 Common port numbers

    TABLE 7.2 Popular FTP apps

    TABLE 7.3 IPv4 address classes

    TABLE 7.4 CIDR values

    TABLE 7.5 Private IP address ranges

    TABLE 7.6 IPv6 address ranges

    Chapter 8

    TABLE 8.1 Common DNS record types

    TABLE 8.2 Important email protocols

    TABLE 8.3 Syslog severity levels

    Chapter 9

    TABLE 9.1 Frequencies and channels

    TABLE 9.2 Legacy 802.11 standards

    TABLE 9.3 Gigabit 802.11 standards

    TABLE 9.4 Bluetooth major versions and features

    TABLE 9.5 Bluetooth device classes and specifications

    TABLE 9.6 RFID frequencies and characteristics

    TABLE 9.7 Common Internet connection types and speeds

    TABLE 9.8 Cable types and characteristics

    Chapter 10

    TABLE 10.1 Global Navigation Satellite Systems

    TABLE 10.2 U.S. GPS service levels

    TABLE 10.3 TCP/IP mail protocols

    TABLE 10.4 Secure mail ports

    TABLE 10.5 Secure mail servers for common email services

    TABLE 10.6 Cloud providers and features

    Chapter 11

    TABLE 11.1 Comparing containers and virtual machines

    TABLE 11.2 Availability downtime

    Chapter 12

    TABLE 12.1 S.M.A.R.T. software utilities

    TABLE 12.2 S.M.A.R.T. metrics most correlated with hard drive failure

    TABLE 12.3 ipconfig switches

    TABLE 12.4 ping options

    TABLE 12.5 netstat options

    TABLE 12.6 net switches

    TABLE 12.7 net share parameters

    TABLE 12.8 pathping switches

    Chapter 13

    TABLE 13.1 Common impact print quality problems

    TABLE 13.2 The EP imaging process

    List of Illustrations

    Chapter 1

    FIGURE 1.1 A typical motherboard

    FIGURE 1.2 ITX motherboards

    FIGURE 1.3 PCI expansion slots

    FIGURE 1.4 PCIe expansion slots

    FIGURE 1.5 Riser card in a motherboard

    FIGURE 1.6 Double data rate (DDR) memory slots

    FIGURE 1.7 Cache in a system

    FIGURE 1.8 Two heat sinks, one with a fan

    FIGURE 1.9 CPU socket examples

    FIGURE 1.10 GIGABYTE multisocket motherboard

    FIGURE 1.11 Dell laptop motherboard

    FIGURE 1.12 An ATX power connector on a motherboard

    FIGURE 1.13 Two PATA hard drive connectors

    FIGURE 1.14 Four SATA headers

    FIGURE 1.15 eSATA port (bottom center)

    FIGURE 1.16 M.2 connector on motherboard

    FIGURE 1.17 M.2 slot protective cover

    FIGURE 1.18 Motherboard headers

    FIGURE 1.19 Two motherboard USB headers

    FIGURE 1.20 A BIOS chip on a motherboard

    FIGURE 1.21 UEFI boot option

    FIGURE 1.22 System Recovery options

    FIGURE 1.23 Advanced Options

    FIGURE 1.24 UEFI settings

    FIGURE 1.25 TPM settings

    FIGURE 1.26 Windows TPM configuration screen

    FIGURE 1.27 Secure Boot in UEFI

    FIGURE 1.28 CMOS battery

    FIGURE 1.29 DIP and PGA

    FIGURE 1.30 Top and bottom of LGA Intel and PGA AMD CPUs

    FIGURE 1.31 Top (a) and bottom (b) of a Samsung RISC CPU

    FIGURE 1.32 CPU performance in Task Manager

    FIGURE 1.33 System information in the About screen

    FIGURE 1.34 Four memory sticks in a motherboard

    FIGURE 1.35 The 64-bit memory throughput formula

    FIGURE 1.36 SDR and DDR DIMMs

    FIGURE 1.37 SODIMMs

    FIGURE 1.38 DDR5 SODIMM and DIMM

    FIGURE 1.39 System unit airflow

    FIGURE 1.40 3-pin chassis-fan headers

    FIGURE 1.41 A 4-pin CPU fan header

    FIGURE 1.42 Position of a 3-pin connector on a 4-pin header

    FIGURE 1.43 Large heat sink and fan

    FIGURE 1.44 Thermal paste and a thermal pad

    FIGURE 1.45 AIO liquid cooling system

    FIGURE 1.46 An active hard disk cooler

    Chapter 2

    FIGURE 2.1 A PCIe video expansion card

    FIGURE 2.2 A classic sound card

    FIGURE 2.3 A network interface card

    FIGURE 2.4 A wireless NIC

    FIGURE 2.5 An internal analog modem

    FIGURE 2.6 USB and eSATA expansion cards

    FIGURE 2.7 Windows 11 Device Manager

    FIGURE 2.8 Video card properties

    FIGURE 2.9 NVIDIA driver installation

    FIGURE 2.10 Update driver in Windows

    FIGURE 2.11 Wireless NIC properties

    FIGURE 2.12 SATA hard drive connectors

    FIGURE 2.13 PATA hard drive connectors

    FIGURE 2.14 Anatomy of a hard drive

    FIGURE 2.15 A 3.5″ and a 2.5″ hard drive

    FIGURE 2.16 Intel PCIe SSD

    FIGURE 2.17 M.2 NVMe SSD

    FIGURE 2.18 mSATA SSD and a 2.5″ SATA SSD

    FIGURE 2.19 Four M.2 cards

    FIGURE 2.20 M.2 slots

    FIGURE 2.21 RAID 1 and RAID 5

    FIGURE 2.22 USB flash drives

    FIGURE 2.23 Typical SD cards

    FIGURE 2.24 A USB-attached SD card reader

    FIGURE 2.25 A DVD-ROM drive

    FIGURE 2.26 A desktop power supply

    FIGURE 2.27 110V (left) and 220V (right) wall outlets

    FIGURE 2.28 20-pin ATX power connector

    FIGURE 2.29 A 24-pin ATX12V 2.x connector, in two parts

    FIGURE 2.30 6-pin ATX12V 2.1 PCIe connector with extender for an 8-pin ATX12...

    FIGURE 2.31 SATA power connector

    FIGURE 2.32 Molex power connector

    FIGURE 2.33 Hot-swappable redundant PSUs

    FIGURE 2.34 An uninterruptible power supply front (a) and back (b)

    FIGURE 2.35 Large UPS

    Chapter 3

    FIGURE 3.1 Display settings

    FIGURE 3.2 Advanced display refresh rates

    FIGURE 3.3 Multiple displays detected

    FIGURE 3.4 Taskbar settings

    FIGURE 3.5 Monitor ports

    FIGURE 3.6 1/8″ audio connector

    FIGURE 3.7 A USB headset

    FIGURE 3.8 An ergonomic keyboard

    FIGURE 3.9 A computer mouse

    FIGURE 3.10 A network-attached storage device

    FIGURE 3.11 A 4-port USB hub

    FIGURE 3.12 USB ports on a motherboard

    FIGURE 3.13 Standard USB connectors

    FIGURE 3.14 USB Type-C (top) and Type-A (bottom)

    FIGURE 3.15 Kensington USB-to-Ethernet adapter

    FIGURE 3.16 Lightning cable

    FIGURE 3.17 Two Thunderbolt 2 interfaces

    FIGURE 3.18 Two Thunderbolt 3 interfaces

    FIGURE 3.19 Several peripheral ports

    FIGURE 3.20 DB-9 serial connector

    FIGURE 3.21 VGA connector and port

    FIGURE 3.22 DVI connectorSource: Evan Amos / Wikimedia Commons / Public doma...

    FIGURE 3.23 Types of DVI connectors

    FIGURE 3.24 DVI-to-VGA adapter

    FIGURE 3.25 HDMI port and cable

    FIGURE 3.26 DVI-to-HDMI adapter

    FIGURE 3.27 HDMI connector types

    FIGURE 3.28 A DisplayPort port and cable

    FIGURE 3.29 mDP and DisplayPort connectors

    FIGURE 3.30 SATA connectors and cable

    FIGURE 3.31 eSATA port and cable

    FIGURE 3.32 USB over eSATA

    FIGURE 3.33 Molex connector

    Chapter 4

    FIGURE 4.1 PC technician toolkit

    FIGURE 4.2 Laptop repair road map

    FIGURE 4.3 Removing nine screws to take off the bottom cover

    FIGURE 4.4 Inside the laptop

    FIGURE 4.5 Disconnecting the speaker cable

    FIGURE 4.6 The speaker wire

    FIGURE 4.7 Webcam and microphone

    FIGURE 4.8 Display cable (left) and touchscreen board cable connectors (righ...

    FIGURE 4.9 Display assembly hinge screws

    FIGURE 4.10 Wires inside a laptop display

    FIGURE 4.11 A laptop motherboard

    FIGURE 4.12 A laptop daughterboard

    FIGURE 4.13 Disconnecting the motherboard connectors

    FIGURE 4.14 Removing the screws

    FIGURE 4.15 Laptop SODIMM and Desktop DIMM

    FIGURE 4.16 SODIMM in a laptop

    FIGURE 4.17 Removing a SODIMM

    FIGURE 4.18 172-pin MicroDIMM and a SODIMM

    FIGURE 4.19 A 3.5″ hard drive (left) compared to a 2.5″ hard drive (right)

    FIGURE 4.20 2.5″ SSD, motherboard connector, and cable

    FIGURE 4.21 M.2 SSD and M.2 connector

    FIGURE 4.22 Removing an M.2 SSD

    FIGURE 4.23 2.5″ SATA SSD

    FIGURE 4.24 Disconnected SATA SSD

    FIGURE 4.25 Laptop trackpad

    FIGURE 4.26 Touchpad settings

    FIGURE 4.27 Track point

    FIGURE 4.28 Point stick properties

    FIGURE 4.29 Mini PCIe card in a laptop

    FIGURE 4.30 A removable laptop Li-ion battery

    FIGURE 4.31 Internal laptop battery

    FIGURE 4.32 A laptop AC adapter

    FIGURE 4.33 Removing the system fan

    FIGURE 4.34 Removing the heat sink

    FIGURE 4.35 Removing the wireless NIC

    FIGURE 4.36 Disconnecting the two antenna wires

    FIGURE 4.37 Disconnect the CMOS battery

    FIGURE 4.38 Laptop fingerprint scanner

    FIGURE 4.39 A cable lock

    FIGURE 4.40 Cable lock in a laptop

    FIGURE 4.41 Laptop privacy screen

    FIGURE 4.42 Fn+F2 enables the privacy screen.

    FIGURE 4.43 Several touch pens

    FIGURE 4.44 USB headset

    FIGURE 4.45 Drawing pad accessory with stylus

    FIGURE 4.46 A USB-C docking station

    FIGURE 4.47 HP laptop docking port

    Chapter 5

    FIGURE 5.1 A daisy-wheel printer mechanism

    FIGURE 5.2 Formation of images in a dot-matrix printer

    FIGURE 5.3 A printhead carriage (holding two ink cartridges) in an inkjet pr...

    FIGURE 5.4 A carriage stepper motor

    FIGURE 5.5 Carriage stepper motor, carriage belt, stabilizer bar, and printh...

    FIGURE 5.6 Inkjet pickup roller (center darker roller)

    FIGURE 5.7 Inkjet separation pads

    FIGURE 5.8 A paper tray on an inkjet printer

    FIGURE 5.9 A paper feed sensor on an inkjet printer

    FIGURE 5.10 Duplexing assembly rollers

    FIGURE 5.11 An EP toner cartridge

    FIGURE 5.12 The EP laser scanning assembly (side view and simplified top vie...

    FIGURE 5.13 Paper transport rollers

    FIGURE 5.14 The transfer corona assembly

    FIGURE 5.15 The fuser

    FIGURE 5.16 The charging step of the EP process

    FIGURE 5.17 The exposing step of the EP process

    FIGURE 5.18 The developing step of the EP process

    FIGURE 5.19 The transferring step of the EP process

    FIGURE 5.20 The fusing step of the EP process

    FIGURE 5.21 The cleaning step of the EP process

    FIGURE 5.22 The EP imaging process

    FIGURE 5.23 Printers & Scanners

    FIGURE 5.24 Add Printer wizard

    FIGURE 5.25 Printer options

    FIGURE 5.26 Print Queue

    FIGURE 5.27 HP Smart printer app

    FIGURE 5.28 Printer Properties, General

    Enjoying the preview?
    Page 1 of 1