O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

IT Essentials v6 Companion Guide, Sixth Edition

Book Description

IT Essentials v6 Companion Guide supports the Cisco Networking Academy IT Essentials version 6 course. The course is designed for Cisco Networking Academy students who want to pursue careers in IT and learn how computers work, how to assemble computers, and how to safely and securely troubleshoot hardware and software issues.

As CompTIA Approved Quality Content, the course also helps you prepare for the CompTIA A+ certification exams 220-901 and 220-902. Students must pass both exams to earn the CompTIA A+ certification.

The features of the Companion Guide are designed to help you study and succeed in this course:

  • Chapter objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter.

  • Key terms–Refer to the updated lists of networking vocabulary introduced, and turn to the highlighted terms in context.

  • Course section numbering–Follow along with the course heading numbers to easily jump online to complete labs, activities, and quizzes referred to within the text.

  • Check Your Understanding Questions and Answer Key–Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see on the online course quizzes.

  • This icon in the Companion Guide indicates when there is a hands-on Lab to do. All the Labs from the course are compiled and published in the separate book, IT Essentials v6 Lab Manual. Practicing and performing all these tasks will reinforce the concepts and help you become a successful PC technician.

    Table of Contents

    1. About This E-Book
    2. Title Page
    3. Copyright Page
    4. About the Contributing Author
    5. Contents at a Glance
    6. Contents
    7. Syntax Conventions
    8. Introduction
      1. Who Should Read This Book
      2. Book Features
      3. Accessing Packet Tracer Activities
      4. How This Book Is Organized
      5. About the CompTIA A+ Certification
    9. Chapter 1. Introduction to the Personal Computer System
      1. Objectives
      2. Key Terms
      3. Introduction (1.0)
        1. Welcome (1.0.1)
      4. Personal Computer Systems (1.1)
        1. Cases and Power Supplies (1.1.1)
        2. Internal PC Components (1.1.2)
        3. External Ports and Cables (1.1.3)
        4. Input and Output Devices (1.1.4)
      5. Select Computer Components (1.2)
        1. Select PC Components (1.2.1)
      6. Configurations for Specialized Computer Systems (1.3)
        1. Specialized Computer Systems (1.3.1)
      7. Summary (1.4)
        1. Summary (1.4.1)
      8. Summary of Exercises
      9. Check your Understanding
    10. Chapter 2. Introduction to Lab Procedures and Tool Use
      1. Objectives
      2. Key Terms
      3. Introduction (2.0)
        1. Welcome (2.0.1)
      4. Safe Lab Procedures (2.1)
        1. Procedures to Protect People (2.1.1)
        2. Procedures to Protect Equipment and Data (2.1.2)
        3. Procedures to Protect the Environment (2.1.3)
      5. Proper Use of Tools (2.2)
        1. Hardware Tools (2.2.1)
        2. Software Tools (2.2.2)
        3. Organizational Tools (2.2.3)
        4. Demonstrate Proper Tool Use (2.2.4)
      6. Summary (2.3)
        1. Summary (2.3.1)
      7. Summary of Exercises
      8. Check Your Understanding
    11. Chapter 3. Computer Assembly
      1. Objectives
      2. Key Terms
      3. Introduction (3.0)
        1. Welcome (3.0.1)
      4. Assemble the Computer (3.1)
        1. Open the Case and Connect the Power Supply (3.1.1)
        2. Install the Motherboard (3.1.2)
        3. Install Drives (3.1.3)
        4. Install the Adapter Cards (3.1.4)
        5. Install Cables (3.1.5)
      5. Boot the Computer (3.2)
        1. POST, BIOS, UEFI (3.2.1)
        2. BIOS and UEFI Configuration (3.2.2)
      6. Upgrade and Configure a Computer (3.3)
        1. Motherboard and Related Components (3.3.1)
        2. Storage Devices (3.3.2)
        3. Peripheral Devices (3.3.3)
      7. Summary (3.4)
        1. Summary (3.4.1)
      8. Summary of Exercises
      9. Check Your Understanding
    12. Chapter 4. Overview of Preventive Maintenance
      1. Objectives
      2. Key Terms
      3. Introduction (4.0)
        1. Welcome (4.0.1)
      4. Preventive Maintenance (4.1)
        1. PC Preventive Maintenance Overview (4.1.1)
      5. Troubleshooting Process (4.2)
        1. Troubleshooting Process Steps (4.2.1)
        2. Common Problems and Solutions (4.2.2)
      6. Summary (4.3)
        1. Summary (4.3.1)
      7. Summary of Exercises
      8. Check your Understanding
    13. Chapter 5. Windows Installation
      1. Objectives
      2. Key Terms
      3. Introduction (5.0)
        1. Welcome (5.0.1)
      4. Modern Operating Systems (5.1)
        1. Operating System Terms and Characteristics (5.1.1)
        2. Types of Operating Systems (5.1.2)
        3. Customer Requirements for an Operating System (5.1.3)
        4. Operating Systems Upgrade (5.1.4)
      5. Operating System Installation (5.2)
        1. Storage Device Setup Procedures (5.2.1)
        2. Custom Installation Options (5.2.2)
        3. Boot Sequence and Registry Files (5.2.3)
        4. Multiboot (5.2.4)
        5. Disk Directories (5.2.5)
      6. Summary (5.3)
        1. Summary (5.3.1)
      7. Summary of Exercises
      8. Check Your Understanding
    14. Chapter 6. Windows Configuration and Management
      1. Objectives
      2. Key Terms
      3. Introduction (6.0)
        1. Welcome (6.0.1)
      4. The Windows GUI and Control Panel (6.1)
        1. Windows Desktop, Tools, and Applications (6.1.1)
        2. Control Panel Utilities (6.1.2)
        3. Administrative Tools (6.1.3)
        4. Disk Defragmenter and Disk Error-Checking Tool (6.1.4)
        5. Command Line Tools (6.1.5)
      5. Client-Side Virtualization (6.2)
        1. Purpose and Requirements of Virtualization (6.2.1)
      6. Common Preventive Maintenance Techniques for Operating Systems (6.3)
        1. OS Preventive Maintenance Plan (6.3.1)
      7. Basic Troubleshooting Process for Operating Systems (6.4)
        1. Applying the Troubleshooting Process for Operating Systems (6.4.1)
        2. Common Problems and Solutions for Operating Systems (6.4.2)
      8. Summary (6.5)
        1. Summary (6.5.1)
      9. Summary of Exercises
      10. Check Your Understanding
    15. Chapter 7. Networking Concepts
      1. Objectives
      2. Key Terms
      3. Introduction (7.0)
        1. Welcome (7.0.1)
      4. Principles of Networking (7.1)
        1. Computer Networks (7.1.1)
        2. Types of Networks (7.1.2)
      5. Networking Standards (7.2)
        1. Reference Models (7.2.1)
        2. Wired and Wireless Ethernet Standards (7.2.2)
      6. Physical Components of a Network (7.3)
        1. Network Devices (7.3.1)
        2. Cables and Connectors (7.3.2)
      7. Basic Networking Concepts and Technologies (7.4)
        1. Networked Equipment Addressing (7.4.1)
        2. Transport Layer Protocols (7.4.2)
      8. Summary (7.5)
        1. Summary (7.5.1)
      9. Summary of Exercises
      10. Check Your Understanding
    16. Chapter 8. Applied Networking
      1. Objectives
      2. Key Terms
      3. Introduction (8.0)
        1. Welcome (8.0.1)
      4. Computer to Network Connection (8.1)
        1. Networking Cards (8.1.1)
        2. Wireless and Wired Router Configurations (8.1.2)
        3. Network Sharing (8.1.3)
        4. Remote Connections (8.1.4)
      5. ISP Connection Technologies (8.2)
        1. Broadband Technologies (8.2.1)
      6. Internet Technologies (8.3)
        1. Data Centers and Cloud Computing (8.3.1)
        2. Networked Host Services (8.3.2)
      7. Common Preventive Maintenance Techniques Used for Networks (8.4)
        1. Network Maintenance (8.4.1)
      8. Basic Troubleshooting Process for Networks (8.5)
        1. Applying the Troubleshooting Process to Networks (8.5.1)
        2. Common Problems and Solutions for Networks (8.5.2)
      9. Summary (8.6)
        1. Summary (8.6.1)
      10. Summary of Exercises
      11. Check Your Understanding
    17. Chapter 9. Laptops and Mobile Devices
      1. Objectives
      2. Key Terms
      3. Introduction (9.0)
        1. Welcome (9.0.1)
      4. Laptop Components (9.1)
        1. Features of Laptop Components (9.1.1)
        2. Laptop Displays (9.1.2)
      5. Laptop Configuration (9.2)
        1. Power Settings Configuration (9.2.1)
        2. Wireless Configuration (9.2.2)
      6. Laptop Hardware and Component Installation and Configuration (9.3)
        1. Expansion Slots (9.3.1)
        2. Replacing Hardware Devices (9.3.2)
      7. Mobile Device Hardware Overview (9.4)
        1. Mobile Device Hardware (9.4.1)
        2. Other Mobile Devices (9.4.2)
      8. Common Preventive Maintenance Techniques for Laptops and Mobile Devices (9.5)
        1. Scheduled Maintenance for Laptops and Mobile Devices (9.5.1)
      9. Basic Troubleshooting Process for Laptops and Mobile Devices (9.6)
        1. Applying (9.6.1)
        2. Common Problems and Solutions for Laptops and Mobile Devices (9.6.2)
      10. Summary (9.7)
        1. Summary (9.7.1)
      11. Summary of Exercises
      12. Check Your Understanding
    18. Chapter 10. Mobile, Linux, and OS X Operating Systems
      1. Objectives
      2. Key Terms
      3. Introduction (10.0)
        1. Welcome (10.0.1)
      4. Mobile Operating Systems (10.1)
        1. Android versus iOS (10.1.1)
        2. Android Touch Interface (10.1.2)
        3. iOS Touch Interface (10.1.3)
        4. Windows Phone Touch Interface (10.1.4)
        5. Common Mobile Device Features (10.1.5)
      5. Methods for Securing Mobile Devices (10.2)
        1. Passcode Locks (10.2.1)
        2. Cloud-Enabled Services for Mobile Devices (10.2.2)
        3. Software Security (10.2.3)
      6. Network Connectivity and Email (10.3)
        1. Wireless and Cellular Data Network (10.3.1)
        2. Bluetooth (10.3.2)
        3. Configuring Email (10.3.3)
        4. Mobile Device Synchronization (10.3.4)
      7. Linux and OS X Operating Systems (10.4)
        1. Linux and OS X Tools and Features (10.4.1)
        2. Linux and OS X Best Practices (10.4.2)
        3. Basic CLI (10.4.3)
      8. Basic Troubleshooting Process for Mobile, Linux, and OS X Operating Systems (10.5)
        1. Applying the Troubleshooting Process to Mobile, Linux, and OS X Operating Systems (10.5.1)
        2. Common Problems and Solutions for Mobile, Linux, and OS X Operating Systems (10.5.2)
      9. Summary (10.6)
        1. Summary (10.6.1)
      10. Summary of Exercises
      11. Check Your Understanding
    19. Chapter 11. Printers
      1. Objectives
      2. Key Terms
      3. Introduction (11.0)
        1. Welcome (11.0.1)
      4. Common Printer Features (11.1)
        1. Characteristics and Capabilities (11.1.1)
        2. Printer Types (11.1.2)
      5. Installing and Configuring Printers (11.2)
        1. Installing and Updating a Printer (11.2.1)
        2. Configuring Options and Default Settings (11.2.2)
        3. Optimizing Printer Performance (11.2.3)
      6. Sharing Printers (11.3)
        1. Operating System Settings for Sharing Printers (11.3.1)
        2. Print Servers (11.3.2)
      7. Maintaining and Troubleshooting Printers (11.4)
        1. Printer Preventive Maintenance (11.4.1)
        2. Troubleshooting Printer Issues (11.4.2)
        3. Common Problems and Solutions for Printers (11.4.3)
      8. Summary (11.5)
        1. Summary (11.5.1)
      9. Summary of Exercises
      10. Check Your Understanding
    20. Chapter 12. Security
      1. Objectives
      2. Key Terms
      3. Introduction (12.0)
        1. Welcome (12.0.1)
      4. Security Threats (12.1)
        1. Types of Security Threats (12.1.1)
      5. Security Procedures (12.2)
        1. Windows Local Security Policy (12.2.1)
        2. Securing Web Access (12.2.2)
        3. Protecting Data (12.2.3)
        4. Protection Against Malicious Software (12.2.4)
        5. Security Techniques (12.2.5)
        6. Protecting Physical Equipment (12.2.6)
      6. Common Preventive Maintenance Techniques for Security (12.3)
        1. Security Maintenance (12.3.1)
      7. Basic Troubleshooting Process for Security (12.4)
        1. Applying the Troubleshooting Process to Security (12.4.1)
        2. Common Problems and Solutions for Security (12.4.2)
      8. Summary (12.5)
        1. Summary (12.5.1)
      9. Summary of Exercises
      10. Check Your Understanding
    21. Chapter 13. The IT Professional
      1. Objectives
      2. Key Terms
      3. Introduction (13.0)
        1. Welcome (13.0.1)
      4. Communication Skills and the IT Professional (13.1)
        1. Communication Skills, Troubleshooting, and the IT Professional (13.1.1)
        2. Working with a Customer (13.1.2)
        3. Employee Best Practices (13.1.3)
      5. Ethical and Legal Issues in the IT Industry (13.2)
        1. Ethical and Legal Considerations (13.2.1)
        2. Legal Procedures Overview (13.2.2)
      6. Call Center Technicians (13.3)
        1. Call Centers, Level One Technicians, and Level Two Technicians (13.3.1)
      7. Summary (13.4)
        1. Summary (13.4.1)
      8. Summary of Exercises
      9. Check Your Understanding
    22. Chapter 14. Advanced Troubleshooting
      1. Objectives
      2. Key Terms
      3. Introduction (14.0)
        1. Welcome (14.0.1)
      4. Computer Components and Peripherals (14.1)
        1. Apply Troubleshooting Process to Computer Components and Peripherals (14.1.1)
      5. Operating Systems (14.2)
        1. Apply Troubleshooting Process to Operating Systems (14.2.1)
      6. Networks (14.3)
        1. Apply Troubleshooting Process to Networks (14.3.1)
      7. Security (14.4)
        1. Apply Troubleshooting Process to Security (14.4.1)
      8. Summary (14.5)
        1. Summary (14.5.1)
      9. Summary of Exercises
      10. Check Your Understanding
    23. Appendix A. Answers to “Check Your Understanding” Questions
      1. Chapter 1:
      2. Chapter 2:
      3. Chapter 3:
      4. Chapter 4:
      5. Chapter 5:
      6. Chapter 6:
      7. Chapter 7:
      8. Chapter 8:
      9. Chapter 9:
      10. Chapter 10:
      11. Chapter 11:
      12. Chapter 12:
      13. Chapter 13:
      14. Chapter 14:
    24. Glossary
    25. Index