CompTIA A+ 900 Series
CompTIA A+ 900 Series
Certified
In a digital world, digital
literacy is an essential
survival skill.
• The CompTIA A+ credential – provides foundation-level knowledge and skills necessary for a career in PC
repair and support.
• Starting Salary – CompTIA A+ Certified individuals can earn as much as $65,000 per year.
• Career Pathway – CompTIA A+ is a building block for other CompTIA certifications such as Network+,
Security+ and vendor specific technologies.
• More than 850,000 – individuals worldwide are CompTIA A+ certified.
• Mandated/Recommended by organizations worldwide – such as Cisco and HP and Ricoh, the U.S. State
Department, and U.S. government contractors such as EDS, General Dynamics, and Northrop Grumman.
Certification
Some of the primary benefits individuals report from becoming A+ certified are:
Helps Your Career • More efficient troubleshooting
• Improved career advancement
• More insightful problem solving
http://www.comptia.org/certifications/testprep/examobjectives.aspx
01
2. Practice for the Exam After you have studied for the certification, take a free assessment and sample test to get an idea what
type of questions might be on the exam.
http://www.comptia.org/certifications/testprep/practicetests.aspx
)2
3. Purchase an Exam Voucher Purchase exam vouchers on the CompTIA Marketplace, which is located at: www.comptiastore.com
(C
4. Take the Test! Select a certification exam provider and schedule a time to take your exam. You can find exam providers at
the following link: http://www.comptia.org/certifications/testprep/testingcenters.aspx
5. Stay Certified! All new CompTIA A+ certifications will be valid for three years from the date the candidate is certified. After
Continuing Education three years, those certifications must be renewed. For more information:
http://certification.comptia.org/getCertified/steps_to_certification/stayCertified.aspx
Acknowledgements
PROJECT TEAM
Logical Operations wishes to thank the members of the Logical Operations Instructor Community, and in particular Andrew
Karaganis, for contributing their technical and instructional expertise during the creation of this course.
Notices
DISCLAIMER
While Logical Operations, Inc. takes care to ensure the accuracy and quality of these materials, we cannot guarantee their
accuracy, and all materials are provided without any warranty whatsoever, including, but not limited to, the implied warranties of
merchantability or fitness for a particular purpose. The name used in the data files for this course is that of a fictitious company. Any
resemblance to current or future companies is purely coincidental. We do not believe we have used anyone's name in creating this
course, but if we have, please notify us and we will change the name in the next revision of the course. Logical Operations is an
independent provider of integrated training solutions for individuals, businesses, educational institutions, and government agencies.
The use of screenshots, photographs of another entity's products, or another entity's product name or service in this book is for
editorial purposes only. No such use should be construed to imply sponsorship or endorsement of the book by nor any affiliation of
such entity with Logical Operations. This courseware may contain links to sites on the Internet that are owned and operated by third
parties (the "External Sites"). Logical Operations is not responsible for the availability of, or the content located on or through, any
External Site. Please contact Logical Operations if you have any concerns regarding such links or External Sites.
TRADEMARK NOTICES
Logical Operations and the Logical Operations logo are trademarks of Logical Operations, Inc. and its affiliates.
® ®
CompTIA A+ is a registered trademark of CompTIA, Inc., in the U.S. and other countries. All other product and service names
used may be common law or registered trademarks of their respective proprietors.
Copyright © 2016 Logical Operations, Inc. All rights reserved. Screenshots used for illustrative purposes are the property of the
software proprietor. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, storage in an information retrieval system, or otherwise, without
express written permission of Logical Operations, 3535 Winton Place, Rochester, NY 14623, 1-800-456-4677 in the United States
and Canada, 1-585-350-7000 in all other countries. Logical Operations’ World Wide Web site is located at
www.logicaloperations.com.
This book conveys no rights in the software or other products about which it was written; all use or licensing of such software or
other products is the responsibility of the user according to terms and conditions of the owner. Do not make illegal copies of books
or software. If you believe that this book, related materials, or any other Logical Operations materials are being reproduced or
transmitted without permission, please call 1-800-456-4677 in the United States and Canada, 1-585-350-7000 in all other countries.
CompTIA® A+®: A
Comprehensive
Approach (Exams
220-901 and 220-902)
| Table of Contents |
| CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) |
| Table of Contents |
About This Course
If you are getting ready for a career as an entry-level information technology (IT)
professional or computer service technician, the CompTIA® A+® course is the first step in
your preparation. The course will build on your existing user-level knowledge and
experience with personal computer (PC) software and hardware to present fundamental
skills and concepts that you will use on the job. In this course, you will acquire the essential
skills and information you will need to install, configure, optimize, troubleshoot, repair,
upgrade, and perform preventive maintenance on PCs, digital devices, and operating
systems.
The CompTIA A+ course can benefit you in two ways. Whether you work or plan to work
in a mobile or corporate environment where you have a high level of face-to-face customer
interaction, where client communication and client training are important, or in an
environment with limited customer interaction and an emphasis on hardware activities, this
course provides the background knowledge and skills you will require to be a successful A+
technician. It can also assist you if you are preparing to take the CompTIA A+ certification
examinations, 2016 objectives (exam numbers 220-901 and 220-902), in order to become a
CompTIA A+ Certified Professional.
Course Description
Target Student
This course is designed for individuals who have basic computer user skills and who are
interested in obtaining a job as an entry-level IT technician. This course is also designed for
students who are seeking the CompTIA A+ certification and who want to prepare for the
CompTIA A+ 220-901 Certification Exam and the CompTIA 220-902 Certification Exam.
Course Prerequisites
To ensure your success in this course, you should have basic computer user skills, be able to
complete tasks in a Microsoft® Windows® environment, be able to search for, browse, and
access information on the Internet, and have basic knowledge of computing concepts. You
can obtain this level of skills and knowledge by taking any introductory computing course
from Logical Operations, such as:
• Using Microsoft ®Windows® 10
Caution: The prerequisites for this course differ significantly from the prerequisites for
the CompTIA certification exams. For the most up-to-date information about the exam
prerequisites, complete the form on this page: http://certification.comptia.org/
Training/testingcenters/examobjectives.aspx
.
| CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) |
Course Objectives
In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform
preventive maintenance on personal computers, digital devices, and operating systems.
You will:
• Identify the hardware components of personal computers and mobile digital devices.
• Identify the basic components and functions of operating systems.
• Identify networking and security fundamentals.
• Identify the operational procedures that should be followed by professional PC technicians.
• Install, configure, and troubleshoot display devices.
• Install and configure peripheral components.
• Manage system components.
• Manage data storage.
• Install and configure Microsoft Windows.
• Optimize and maintain Microsoft Windows.
• Work with other operating systems.
• Identify the hardware and software requirements for client environment configurations.
• Identify network technologies.
• Install and configure networking capabilities.
• Support mobile digital devices.
• Support printers and multifunction devices.
• Identify security threats, vulnerabilities, and controls.
• Implement security controls.
• Troubleshoot system-wide issues.
As You Review
Any method of instruction is only as effective as the time and effort you, the student, are willing to
invest in it. In addition, some of the information that you learn in class may not be important to you
immediately, but it may become important later. For this reason, we encourage you to spend some
time reviewing the content of the course after your time in the classroom.
As a Reference
The organization and layout of this book make it an easy-to-use resource for future reference.
Taking advantage of the glossary, index, and table of contents, you can use this book as a first
source of definitions, background information, and summaries.
Course Icons
Watch throughout the material for the following visual cues.
Icon Description
A Caution note makes you aware of places where you need to be particularly careful
with your actions, settings, or decisions so that you can be sure to get the desired
results of an activity or task.
LearnTO notes show you where an associated LearnTO is particularly relevant to
the content. Access LearnTOs from your CHOICE Course screen.
Checklists provide job aids you can use after class as a reference to perform skills
back on the job. Access checklists from your CHOICE Course screen.
Social notes remind you to check your CHOICE Course screen for opportunities to
interact with the CHOICE community using social media.
Lesson Objectives
In this lesson, you will identify the hardware components of personal computers and mobile
digital devices. You will:
• Identify personal computer components.
• Identify storage devices.
• Identify mobile digital devices.
• Compare PC and device connection interfaces and their characteristics.
Lesson Introduction
A very large percentage of the work that most IT technicians do entails working with
hardware, including installing, upgrading, repairing, configuring, maintaining, optimizing,
and troubleshooting computer components. To install and configure computer hardware,
you need to recognize the basic components that constitute most personal computers, along
with the functionality that each component provides to the computing experience. In this
lesson, you will identify hardware components and how they function.
Preparing for a career in computer support and maintenance can be a daunting task. A good
place to start is with the basics: the essential hardware components that you find in most
computers. Identifying hardware components and their roles give you a solid base on which
to build the knowledge and skills you need to install, configure, and troubleshoot computer
hardware.
2 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Personal Computer Components
In this lesson, you will identify the hardware components of a computer. The first step is to identify
the hardware that you will find in virtually all computer systems. In this topic, you will identify
computer system components.
If you are not familiar with the various components that a computer is made up of, it can seem like
a jigsaw puzzle. Like most puzzles, each part of a computer connects to other parts in a specific
place, but generally, you will find that the pieces fit together almost exactly the same way from one
system to another. To help you put the puzzle together, you need to understand what these pieces
look like and what they do.
The system unit The system unit, also commonly referred to as the CPU, or the tower, is
the main component of a computer, which houses most of the other
Emphasize that early in devices that are necessary for the computer to function. Traditionally, it
this course, you will
focus on desktop
comprises a chassis and internal components, such as the system board,
hardware, and later in the microprocessor, memory modules, disk drives, adapter cards, the
the course, you will power supply, fans and other cooling systems, and ports for connecting
cover laptop and other external components such as monitors, keyboards, mice, and other
mobile hardware devices.
components.
System units are also often referred to as boxes, main units, or base units.
In some newer computer models, the system unit is incorporated with the
display screen and referred to as an all-in-one computer. Similar to
laptops, the system unit is integrated into a smaller configuration, which
may make it harder to manage or replace the system unit components.
Component Description
Display devices A display device is a personal computer component that enables users to
view the text and graphical data output from a computer. Display devices
commonly connect to the system unit via a cable, and they have controls
to adjust the settings for the device. They vary in size and shape, as well
as the technologies used.
Common terms for various types of display devices include display,
monitor, screen, liquid crystal display (LCD), and flat-panel monitors.
Input devices An input device is a personal computer component that enables users to
enter data or instructions into a computer. Common input devices
include keyboards and computer mice. An input device can connect to
the system unit via a cable or a wireless connection.
Peripheral devices You can enhance the functionality of practically any personal computer
by connecting different types of peripheral devices to the system unit.
Also called external devices, peripheral devices can provide alternative input
or output methods or additional data storage. You connect peripheral
devices to the system unit via cable or a wireless connection. Some
devices have their own power source, while others draw power from the
system. Common examples of peripheral devices include microphones,
cameras, speakers, scanners, printers, and external drives. Of these
devices, speakers and printers are output devices; microphones, cameras,
and scanners are input devices; external drives are input/output devices.
Computer Cases
The computer case is the enclosure that holds all of the components of your computer. Computer
cases come in several sizes and arrangements. Some are designed to hold many internal components
and have a lot of room to work around those components. These are usually tower or desktop cases
and take up a good deal of room. Other cases are designed to use a minimum amount of space. The
trade-off is that the interior of the case is often cramped, with little room for adding additional
components. Because the tower proved to be popular, there are now several versions of the tower
model. These include:
• Full tower, which is usually used for servers or when you will be installing many drives and other
components.
• Mid tower, which is a slightly smaller version of the full-size tower.
• Micro, or mini tower, which is the size that replaces the original desktop case in most modern
systems.
• Slim line, which is a tower case that can be turned on its side to save room.
The Motherboard
The motherboard is the personal computer component that acts as the backbone for the entire
computer system. Sometimes called the system board, it consists of a large, flat circuit board with chips
The Motherboard
and other electrical components on it, with various connectors. Some components are soldered
directly to the board, and some components connect to the board by using slots or sockets.
The CPU
The central processing unit (CPU) is a computer chip where most of the computing calculations take
place. On most computers, the CPU is housed in a single microprocessor module that is installed on
CPUs
the system board in a slot or a socket.
Memory
Memory is the computer system component that provides a temporary workspace for the processor.
Memory refers to modules of computer chips that store data in a digital electronic format, which is
faster to read from and write to than tape or hard drives. Memory chips each contain millions of Memory
transistors etched on one sliver of a semiconductor. Transistors are nothing more than switches that
can be opened or closed. When a transistor is closed, it conducts electricity, representing the binary
number 1. When it is opened, it does not, representing the binary number 0.
There are two types of memory used in computer systems: Random Access Memory (RAM) and Read-
Only Memory (ROM). RAM is a computer storage method that functions as a computer's main
memory. This type requires a constant power source to access the data stored within the RAM.
However, data stored on ROM is saved and stored without a constant power source. Once data is
written to ROM, it cannot be modified easily.
memory is lost. The computer's main RAM is an example of volatile memory. The computer can
both read the data stored in RAM and write different data into the same RAM. Any byte of data
can be accessed without disturbing other data, so the computer has random access to the data in
RAM.
• Non-volatile memory retains the information stored on it whether or not electrical current is
available. ROM is an example of non-volatile memory.
Storage Devices
A storage device is a computer system component, such as a hard drive, that enables users to save data
for reuse at a later time, even after the personal computer is shut down and restarted. Storage
Storage Devices
devices can save data magnetically, optically, or electronically, depending on their design.
Power Supplies
A power supply is a computer system component that converts line-voltage alternating current (AC)
power from an electrical outlet to the low-voltage direct current (DC) power needed by other system
components. The power supply is often referred to as the power supply unit (PSU). The power Power Supplies
supply is typically a metal box in the rear of the system that is attached to the computer chassis and
to the system board. While the power supply is not itself a component of the system board, it is
required in order for system components to receive power. The power supply contains the power
cord plug and a fan for cooling, because it generates a lot of heat. Some power supplies have a
voltage selector switch that enables you to set them to the voltage configurations that are used in
different countries. AC adapters are generally built in to the power supply for desktop systems and
are external for laptops and other mobile systems.
6
Cooling Systems
A cooling system is a computer system component that prevents damage to other computer parts by
dissipating the heat generated inside a computer chassis. The cooling system can consist of one or
more fans and other components such as heat sinks or liquid cooling systems that service the entire Cooling Systems
computer as well as individual components, such as the power supply and CPU.
Expansion Cards
An expansion card is a printed circuit board that you install into an expansion slot on the computer’s
system board to expand the functionality of the computer. In standard desktop systems, cards have
Expansion Cards
connectors that fit into an expansion slot on a system board and circuitry to connect a specific
device to the computer. Laptops, on the other hand, typically have slots located on the outside of
the case for inserting expansion cards. These cards are often referred to as laptop expansion cards.
6
01
)2
(C
Note: An expansion card is also known as an adapter card, I/O card, add-in, add-on, or simply
as a board.
Riser Cards
A riser card is a board that plugs into the motherboard and provides additional expansion slots for
adapter cards. Because it rises above the motherboard, it enables you to connect additional adapters
to the system in an orientation that is parallel to the motherboard and thus saves space within the Riser Cards
system case. Riser cards are commonly found within rackmount server implementations to provide
additional slots for expanding the features of a server and in low rise smaller cases to fit larger
expansion cards.
Note: A riser card expands motherboard capabilities the way a power strip increases the
capabilities of electrical outlets.
Daughter Boards
Daughter board is a general computing and electronics term for any circuit board that plugs into
another circuit board. In personal computing, a daughter board can be used as a more general term
for adapter cards. Sometimes, in casual usage, the term “daughter board” is used interchangeably
with the term “riser card,” but technically they are not the same.
Firmware
Firmware is specialized software stored in memory chips that stores OS-specific information whether
or not power to the computer is on. It is most often written on an electronically reprogrammable
chip so that it can be updated with a special program to fix any errors that might be discovered after Firmware
a computer is purchased, or to support updated hardware components.
Note: Updating firmware electronically is called flashing.
Figure 1-10: The system BIOS resides on ROM chips, and sets the computer's configuration and
environment at startup.
UEFI
The Unified Extensible Firmware Interface (UEFI) is a standard firmware interface for PCs that was
designed to improve software interoperability and address the limitations in BIOSs. Providing legacy
UEFI
support for BIOS services, UEFI can support remote diagnostics and repair of computers, even
without an operating system being installed.
UEFI firmware provides several technical advantages over a traditional BIOS system:
• Ability to boot from large disks (over 2 TB) with a GUID Partition Table (GPT).
• CPU-independent architecture and drivers.
• Flexible pre-OS environment, including networking capabilities.
• Modular design.
Note: Some systems allow users to select options from BIOS or UEFI in order to support
legacy technologies.
The POST
The Power-On Self Test (POST) is a built-in diagnostic program that runs every time a personal
computer starts up. The POST checks your hardware to ensure that everything is present and
functioning properly, before the system BIOS begins the operating system boot process. If there is The POST
an error, then an audible beep will alert you that something is wrong.
The POST process contains several steps to ensure that the system meets the necessary
requirements to operate properly.
Note: The POST process can vary a great deal from manufacturer to manufacturer.
Power supply Must be turned on, and must supply its power good signal.
CPU Must exit Reset status mode, and must be able to execute instructions.
System firmware Must be readable.
System firmware memory Must be readable.
Memory Must be able to be read by the CPU, and the first 64 KB of memory
must be able to hold the POST code.
Input/output (I/O) bus Must be accessible, and must be able to communicate with the video
or I/O controller subsystem.
ACTIVITY 1-1
Identifying PC Components
Scenario
In this activity, you will identify personal computer components.
1. Your instructor might provide you with examples of computer components and ask you or other
Consider asking
participants to identify them.
participants to identify
the major components
(system unit, display 2. In this graphic, identify the (A) system unit(s), (B) display device(s), (C) input device(s), and (D) output
device, input devices, device(s).
and peripheral devices)
of their computers. This
can be an opportunity to
generate discussion on
the differences between
the various types of
components and their
uses.
Identifying PC
Components, Step 2
A: Moving clockwise from the far left, the components should be labeled: D, A, B, D, C, C.
5. In this graphic, identify the components listed by placing the corresponding letters into the boxes. A.
Motherboard, B. Power supply, C. Expansion card, D. Storage device, E. Memory, F. CPU.
A: Moving clockwise from the top-left corner, the components should be labeled B, E, D, A, C, F.
7. True or False? The GPT is what enables the UEFI to support booting from very large hard disks.
☑ True
☐ False
TOPIC B
Storage Devices
In the previous topic, you identified the main components of a personal computer. One of the
primary reasons for using a computer is to electronically store data. In this topic, you will identify
the types of storage devices used in personal computers.
As a computer technician, your responsibilities are likely to include installing and maintaining many
different types of computer components, including storage devices. By identifying the various types
of storage devices that can be found in most personal computers, you will be better prepared to
select, install, and maintain storage devices in personal computers.
Hard Drives
A hard disk drive (HDD) is a storage device that reads data from, and writes data to, a hard disk. A
hard disk consists of several metal or hard plastic platters with a magnetic surface coating. Data is
Hard Drive
stored magnetically and can be accessed directly. Although the HDD and the hard disk are not the
Characteristics same thing, they are packaged together and are often referred to interchangeably. HDDs are also
referred to as hard drives, and they can be internal or external devices. Internal hard drives are
mounted inside the chassis and connect directly to the system board through at least one cable for
data and one for power, while external hard drives generally connect to the system by means of an
expansion card or a port.
Disk Controllers
Hard drives require circuitry to communicate with the CPU. This circuitry is known as the disk
controller. Disk controllers can be built into the drive itself, or they can be contained on an expansion
card. In most modern hard drives, the controller is built into the drive.
USB flash drives USB flash drives come in several form factors, including thumb drives and
pen drives. Thumb drives can be small, from 50 to 70 mm long, 17 to 20 mm
wide, and 10 to 12 mm thick. Data storage capacities vary, from 128 MB up to
128 GB. Data transfer rates also vary, from 700 KBps to 28 MBps for read
operations, and from 350 KBps to 15 MBps for write operations.
SM cards SmartMedia (SM) cards are flash memory cards that are similar in size to the
CF cards, and are 45 mm long by 37 mm wide by 0.76 mm thick. They can
hold up to 128 MB and can transfer data at speeds of up to 8 MBps.
SM cards are commonly used for additional storage in:
• Digital cameras
• Digital camera recorders
• Older models of personal digital assistants (PDAs)
MSs Memory sticks (MSs) are flash memory cards that are 50 mm long by 21.5 mm
wide by 2.8 mm thick. They can hold up to 16 GB and are used extensively in
Sony products such as VAIO® laptops. Data transfer rates are 2.5 MBps for
read operations and 1.8 MBps for write operations.
Optical Discs
An optical disc is a storage device that stores data optically, rather than magnetically. The removable
plastic discs have a reflective coating and require an optical drive to be read. In optical storage, data
Optical Disc
is written by either pressing or burning with a laser to create pits (recessed areas) and lands (raised
Characteristics (2 areas) in the reflective surface of the disc. Common optical discs include compact discs (CDs),
Slides) digital versatile discs (DVDs), and Blu-ray discs.
Some optical discs, such as DVDs, can be single-sided or double-sided. Double-sided optical discs
have one recordable layer on each side of the disc. For writable and rewritable double-sided discs,
you burn data to one side, then flip the disc over to burn the other side.
CD-ROM Compact Disc-Read Only Memory. Data is permanently burned onto the
disc during its manufacture. The capacity for CD-ROMs ranges from
700 to 860 MB.
CD-RW CD-Rewritable. Data can be written to the disc multiple times. CD-RW
capacities also range from 700 to 860 MB.
DVD-ROM Digital Versatile Disc-Read Only Memory. Data is permanently burned
onto the disc during its manufacture. Single-sided DVD-ROMs have a
capacity of 4.7 GB, while double-sided DVD-ROMs can hold 9.4 GB.
Single Layer DVD-R Single Layer Digital Versatile Disc-Recordable. Data can be written to a
DVD-R disc once. Single Layer DVD-R discs hold up to 4.7 GB of data.
Single Layer DVD+R Single Layer Digital Versatile Disc+Recordable. Data can be written to a
DVD+R disc once. Single Layer DVD+R discs hold up to 4.7 GB of
Explain that DVD-R and data. DVD+R is faster than DVD-R.
DVD+R are competing Double Sided DVD-R Double-sided DVDs have one layer on each side of the disc. Discs can
formats. and DVD+R store up to 8.75 GB of data.
Optical Drives
An optical drive is an internal or external disc drive that reads data to and writes data from an optical
disc. Internal optical drives generally have a 5.25-inch form factor.
Optical Drives
Types of Optical Drives and Burners
Optical drives include CD, DVD, and Blu-ray drives. Some optical drives provide only read
capabilities, while others enable users to write, or burn, data to optical discs. CD, DVD, and Blu-ray
drives have varying characteristics and specifications.
CD CDs are widely used to store music and data. To meet the audio CD standard, the
CD drive on a computer must transfer data at a rate of at least 150 KBps. Most
CD drives deliver higher speeds: at least eight times (8x) or sixteen times (16x) the
audio transfer rate. There are also drives with much higher transfer rates, up to
52x. CD drives use one of two special file systems: Compact Disc File System
(CDFS) or Universal Disc Format (UDF).
Tape Drives
A tape drive is a storage device that stores data magnetically on a tape that is enclosed in a removable
tape cartridge. Data on the tape must be read sequentially. Sizes for external tape drives vary, but
Tape Drives
internal drives have a 5.25-inch form factor. Tape drives are most commonly used to store backup
copies of archived, offline data in large data centers and are almost never used with desktop
computers.
Mention that although
some think tape drives
are legacy components,
many companies have
invested heavily in tape
storage and continue to
use it even today.
The capacity for tape cartridges varies, but high-end tapes can store up to 10 TB of uncompressed
digital data.
Relatively recent technological advances made by IBM have allowed for data on tapes to be accessed
and read in a file format method similar to other storage media, such as optical discs and flash
drives. The specification is called Linear Tape File Systems (LTFS). LTFS is a tape format that
determines how data is recorded on tape and how specialized software will read that data. LTFS
works in conjunction with Linear Tape-Open (LTO) tape technology, which is an open-standards
magnetic tape data storage technology.
eMMC
An embedded Multi-Media Controller (eMMC) is a storage component that contains flash memory and a
flash memory controller integrated onto the same silicon die. The eMMC solution consists of at
least three components: eMMC
• A MMC (multimedia card) interface
• Flash memory
• A flash memory controller
Today’s embedded applications such as digital cameras, smartphones, and tablets almost always
store their content on flash memory. In the past, a dedicated controller managed the reading and
writing of data, driven by the application's CPU. As technology evolved to support increased storage Point out that eMMC is
density, it became inefficient for the controller to manage these functions from outside the flash slower and less
memory die. eMMC was developed as a standardized method for bundling the controller into the expensive than SSD.
flash die. The eMMC standard also supports features such as secure erase and trim and high-priority
interrupt to meet the demand for high performance and security.
ACTIVITY 1-2
Identifying Storage Devices
Scenario
In this activity, you will identify storage devices.
1. Your instructor might provide you with examples of storage devices and ask you or other participants to
Consider displaying
identify them.
various examples of
storage devices,
including both drives and 2. Which storage device records data magnetically and is most often used for backups?
discs or other media, ○ FDD
and ask participants to
identify them. This can
○ HDD
be an opportunity to ○ Optical disc drive
generate discussion on
the differences between
◉ Tape drive
the various types of ○ SSD
devices and the media
that they use, as well as 3. What is the primary benefit of using solid state storage?
the common practice of
A: Answers will vary, but should include the portability of thumb drives and other smaller solid state
treating the drive and the
devices, and the speed of data access when compared to traditional magnetic storage media.
medium as identical
entities.
4. Which two media types allow you to write to an optical disc only once?
☐ CD-ROM
TOPIC C
Mobile Digital Devices
In the last topic, you identified storage devices. Another category of hardware that you will
encounter as an IT technician includes portable devices like laptops, tablets, and similar mobile
devices. In this topic, you will identify mobile digital devices.
Not only has mobile technology reached a new level of performance and portability, but also the use
of these devices is on the rise every day. As a certified A+ technician, you will be expected to
understand how these devices work and how they should be deployed within the workplace. A good
place to start is to differentiate between the various mobile devices available today.
Laptops
A laptop is a complete computer system that is small, compact, lightweight, and portable. All laptops
have specialized hardware designed especially for use in a smaller portable system, use standard
operating systems, can run on battery or AC power, and can connect to other devices. Laptops and Laptops
their components can vary by the following factors:
• Size of the device. Smaller models are referred to as notebooks or sub-notebooks and typically
have fewer features.
• Display size, quality, and technology.
• Keyboard size, number of keys, and additional options.
• Pointing device used.
• Power supply type.
• Battery type used.
• Length of battery support time.
• How long it takes to recharge the battery.
Tablets
A tablet is a mobile device that includes a touch screen display, a virtual keyboard, and flash memory
for data storage.
Tablets Tablets can range in size from larger tablets that look like a traditional laptop with a touch screen to
small notebook-sized mobile devices that operate similarly to a smartphone, but are a bit larger and
have more computing power. Just like smartphones, tablets can run different operating systems
depending on the manufacturer:
• iOS® runs on both Apple's iPad® and iPod touch®.
Point out that the Note: Because of its size and functionality, iPod touch is not considered a tablet, even
™ though it includes many features that tablets offer.
Microsoft Surface
devices that use the
® ™
Intel Atom processor
• The Android™ OS is used in several different tablets, including Amazon™ Kindle Fire™,
can only run Windows
® Samsung™ Galaxy tablets, and Toshiba Excite™.
8/8.1 RT, while other • Microsoft Windows 7, 8, 8.1, and 8.1 RT are used on various Windows-based tablets.
Surface devices that use • BlackBerry® OS is used on the BlackBerry PlayBook™.
other Intel processors
run Windows 8/8.1. For a complete list of tablets and operating systems, visit www.tabletpccomparison.net.
Smartphones
A smartphone is a mobile digital device that combines the functionality of a portable phone with that
of media players, GPS navigation units, personal digital assistants (PDAs), and cameras. Special
mobile operating systems enable the use of apps that extend the base functionality of the smart Smartphones
phone even further. New smartphones are emerging almost every day. The market is expanding, and
demand for powerful mobile devices has never been higher. While Android and iOS dominate the
smartphone marketplace, there are many other technologies and devices available.
As an A+ technician, it can be challenging to keep up with the mobile device market as it is
constantly changing and there are so many different smartphones, all with unique features and
functions. The following are the most popular devices used in the marketplace.
Type of Description
Smartphone
Phablets
A phablet is a mobile digital device that is typically larger than a smartphone and smaller than a tablet.
A phablet's screen generally measures from 5 to 7 inches on the diagonal. This screen size lends
itself to viewing multimedia files and intensive web browsing. Some phablets include a stylus for Phablets
drawing and writing.
Figure 1-15: Phablets are larger than phones but smaller than tablets.
Note: The term "phablet" is an industry term that was used to describe the Samsung Galaxy
Note®. Some experts believe that the term is being phased out in favor of phone or smartphone.
Wearable Technology
Wearable technology includes small mobile computing devices that are designed to be worn under, with,
or on top of a person's clothing.
Wearable Technology
Common examples of wearable technology include:
• Smart watches, which are multipurpose devices that run computing applications and are worn on a
Poll students to see if person's wrist. Smart watches use wireless communication technology to communicate with a
anyone has tried any of smartphone so that they can alert the wearer to missed messages or calls.
the wearable computing • Fitness monitors, which include activity trackers that record data such as the number of steps
devices discussed in this taken in a day or the heart rate and pulse of the wearer.
section. Ask if they can • Glasses and headsets, which provide access to hands-free, voice activated computing capabilities.
share their experience
with other class
members.
Smart Cameras
A smart camera is a digital camera that includes a processor, memory, cellular and Wi-Fi support, and
®
Some GoPro cameras a mobile operating system. Smart cameras often include apps for editing, organizing, and storing
connect to the Internet photos.
for live streaming and
could also be considered
wearable technology.
Smart Cameras
e-Readers
An e-reader is a mobile digital device designed primarily for reading digital publications such as e-
books and digital periodicals. Most e-readers are similar in size to tablets, but they might not have
the same feature set. They can hold hundreds of digital publications that the reader can access e-Readers
repeatedly. Most e-readers have enhanced readability to support reading in sunlight, as well as a
longer battery life.
GPS Devices
A global positioning system (GPS) device is a mobile digital device that provides navigational directions to
reach specified destinations. Features commonly included on GPS devices include:
• Destination search capabilities. GPS Devices
• Routing and rerouting instructions.
• Hands-free calling.
• Real-time traffic information.
• Integration with contacts and social media.
ACTIVITY 1-3
Identifying Mobile Digital Devices
Scenario
In this activity, you will identify mobile digital devices.
1. What do you think are the two most popular types of mobile digital devices?
Consider asking
participants if they are A: Responses will vary, but will likely include laptops, tablets, and smartphones.
willing to show any
mobile digital devices 2. What types of wearable technology have you experienced? If possible, share your experience with the
that they have brought to other participants.
class, and ask them to A: Responses will vary, but might include fitness monitors and smart watches.
explain their favorite
features.
3. Which other mobile devices do you have experience with?
A: Responses will vary, but might include smart cameras, e-readers, and GPS devices.
TOPIC D
Connection Interfaces
So far in this course, you have identified the common components that make up a personal
computer (PC), as well as commonly used mobile digital devices. Next, you need to be able to
identify how components are connected together to form a complete computer system. In this
topic, you will compare PC and device connection interfaces and their characteristics.
A PC is made up of many different components. All of these components need to be able to
communicate with each other so that the computer can function properly. As PCs have evolved
over the years, several connection technologies have been implemented to provide communication
among computer components. As a computer technician, identifying the methods used to connect
devices to a computer will enable you to install, upgrade, and replace PC components quickly and
effectively.
Physical Ports
An interface is the point at which two devices connect and communicate with each other. A port is a
hardware interface that you can use to connect devices to a computer. The port can also be referred
to as an endpoint. Physical Ports
The port transfers electronic signals between the device and the system unit. A port is either an
electrically wired socket or plug, or it can be a wireless transmission device. Ports can vary by shape,
by color, by the number and layout of the pins or connectors contained within the port, by the Logical ports are
signals the port carries, and by the port's location. Ports exist for both internal and external devices. discussed later in the
External ports often have a graphical representation of the type of device that should be connected course, in conjunction
to it, such as a small picture of a monitor adjacent to the video port. with networking
concepts.
6
Genders
Most ports and the cables that connect to them have genders. For example, most computer ports
are jacks, into which you plug in the matching cable. The computer's jacks are most often the female
connectors and the cable's plug is most often the male connector. You can always look directly at
the innermost electrical connections on the connectors to determine the gender. The one with the
protruding pins is the male and the one with the holes to accept the pins is the female.
Computer Connections
Computer connections are the physical access points that enable a computer to communicate with
internal or external devices. They include the ports on both the computer and the connected
Computer Connections
devices, plus a transmission medium, which is either a cable with connectors at each end or a
wireless technology. Personal computer connections can be categorized by the technology or
standard that was used to develop the device.
Emphasize that the
connection is a
combination of the ports,
connectors, and cables
that establish the link
between the two
computer components.
• Signal quality. This can include the likelihood of dropped connections, garbled transmissions, lag
or latency, slow connections, and susceptibility to interference.
• Their support for digital rights management (DRM) capabilities. DRM is a way to control access to
copyrighted content that is presented in digital format. Used to protect content such as e-books,
digital video and music, and even software programs, DRMs establish a copyright for a piece of
content, manage the distribution of that copyrighted content, and control what the consumer can
do with that content once it has been distributed.
• Their frequencies. For analog signals, frequency is the number of complete cycles per second in a
wave. For digital signals, frequency is often cited for wireless (radio) communication, as different
types of wireless communication operate at distinctly different frequencies.
USB Connections
A universal serial bus (USB) connection is used to connect multiple computer peripherals to a single port
that provides high performance and minimal device configuration. USB standards delineate high-
speed wired communication between a host computer and device peripherals. USB connections USB Connections (2
support two-way communications and hot-plugging, which allows you to install peripherals without Slides)
powering down the computer. All PCs today have multiple USB ports and can, with the use of USB
hubs, support up to 127 devices per port.
A USB interface consists of ports, cables, and connectors. The USB Implementers Forum (USB-IF)
standardized the interface and the original standard defined two types of connectors: the 4-pin Type
A and Type B. Type A connectors are used only on host devices that provide power, such as the
USB ports on the back of a computer or the side of a laptop. Type B connectors are used for
peripheral devices that receive power, such as printers.
There are several versions of USB connectors. The standard for USB 2.0 defined a smaller, 5-pin
version of the Type B connector called the Mini-B connector, for use with personal electronic
devices such as digital cameras and mobile phones. An update to the specification defined the
Micro-A and Micro-B connectors, which also have five pins and are widely used in thinner
smartphones, GPS units, digital cameras, MP3 players, game controllers, readers, tablets, and other
mobile devices. The Micro-A connector plugs into a computer or AC charger, and the Micro-B
connector connects to the peripheral device.
A supplement extends the USB 2.0 standard to enable point-to-point communication between two
USB devices: one USB On-The-Go (OTG) device and another OTG or standard USB device.
OTG-enabled devices, also called dual role devices, can function either as the host or peripheral
when cabled together or when a device like a flash drive connects directly to another device such as
a smartphone. OTG devices have an AB socket that accepts an OTG micro USB A or B plug.
The USB 3.0 standard boasts high data transfer rates and uses USB 3.0 Type A and Type B
connectors, which have five more connection pins recessed in the connector. The pins consist of
differential transmit and receive pairs and a ground. Also, the pin design allows for backward
compatibility with USB 2.0 and 1.1. USB 3.0 supports high-performance SSD drives, video, and
audio equipment.
USB connections transfer data serially, but at a much faster throughput than legacy serial
connections. USB devices also incorporate Plug-and-Play technology that allows devices to self-
configure as soon as a connection is made.
There are currently three versions of the USB standard: 1.1, 2.0, and 3.0.
• The original USB 1.0 standard, also called low-speed, has a data transfer speed of 1.5 Mbps,
which was suitable for non-gaming USB mice and keyboards. USB 1.0 is deprecated.
• USB 1.1, also called full-speed, is still commonly found in devices and systems. USB 1.1 uses
half-duplex communication.
• USB 2.0, also called high-speed, was released in April 2000, and is the most commonly
implemented standard. USB 2.0 supports low-bandwidth devices such as keyboards and mice, as
well as high-bandwidth devices such as scanners, multi-function printers, and high-resolution
webcams. A USB 2.0 device connected to a USB 1.1 hub or port will communicate at only USB
1.1 speeds, even though it might be capable of faster speeds. Generally, the operating system will
inform you of this when you connect the device. USB 2.0 uses half-duplex communication.
• The USB 3.0 specification, also called SuperSpeed USB and identified as Gen1 was released in
November 2008. It is 10 times faster than the USB 2.0 standard, has enhanced power efficiency,
and is backward compatible with USB-enabled devices currently in use. USB 3.0 provides full
duplex communication by using two unidirectional data paths for sending and receiving data
simultaneously.
• The USB 3.1 specification, identified as Gen 2 or SuperSpeed +, was released in July 2013, and
supports speeds up to 10 Gbps with the ability to provide up to 100 watts of power to connected
devices.
Characteristics of each version are described in the following table.
Note: For USB 1.1 and 2.0, to work around the distance limitations, you can use up to five hubs
to create a chain to reach the necessary cable length.
E
AT
IC
PL
DU
T
NO
6
DO
Thunderbolt Connections
A Thunderbolt connection is a high-speed I/O technology interface that consists of a host controller
that joins together PCI-Express data and/or DisplayPort video. The combined signal is sent via a
full-duplex pair of differential signals. that supports connecting a wide variety of peripheral devices Thunderbolt
to PCs. Cabling is available in both optical fiber and copper wire. A Thunderbolt connection can Connections
support up to six peripheral devices, including full 4K video displays, audio, external graphics, and
storage devices.
Characteristic Value
SATA Connections
A SATA connection is a drive connection standard that provides a serial data channel between the
drive controller and the disk drives. SATA transfer speeds are much higher than legacy hard drive
SATA Connections
connections for the same drive technologies. SATA's physical installation is also easier because the
SATA power and data cables are much smaller, thinner, and more flexible than legacy ribbon cables.
SATA connectors have seven pins.
External SATA (eSATA) is an external interface for SATA connections. Like USB and IEEE 1394,
it provides a connection for external storage devices. eSATA connections provide fast data transfers
If you have an eSATA without having to translate data between the device and the host computer. eSATA interfaces do
connector available, let require an additional power connector to function. You can provide eSATA functionality by
students see what the installing eSATA cards in systems.
connector looks like. Characteristics of SATA connections are described in the following tables.
Characteristic Value
Data transfer speeds vary with the version of SATA being used.
Version Characteristics
Version Characteristics
SATA 6Gb/s (SATA III) • Frequency: 150 MHz
• Transfer speed: 6.0 Gb/s
• Interface throughput: 600 MB/s
• Backwards-compatible with SATA 1.5Gb/s and SATA
3Gb/s
SATA 16Gb/s (version 3.2) • Transfer speed: 16.0 Gb/s
• Interface throughput: 1969 MB/s
eSATA • External SATA connectivity
• Transfer speed: 3.0 Gb/s
• Interface throughput: 30 MB/s
Other Connections
In addition to the connectors and cables already discussed in this topic, you are likely to encounter
other types of connectors and cables for attaching peripherals to PCs, the most common of which
are described in the following table. Other Connections
Connector Description
Analog audio connectors Analog audio splits sound into "Left" and "Right" components, or
stereo sound. Analog audio cables are split with red and white RCA-
style connectors at the end.
Characteristics:
• Analog or digital: Analog
• Distance limitations: Depends on cable capacitance and the source
impedance of the device, but a practical maximum cable length is
around 30 meters.
• Data transfer speed: Varies by interface
• Quality: Unless using a well-shielded cable, prone to EMI
interference which can show up as static, popping noises, or hissing
sounds, The voltage-based signal degrades after 30 meters.
Connector Description
Digital audio connectors Digital audio transmits Dolby® Digital, which can support front
center, right, and left speakers as well as rear right, left, and center
speakers. Digital audio cables and connectors are generally either
coaxial or optical (TOSLINK).
Characteristics:
• Analog or digital: Digital
• Distance limitations: 3 meters for coaxial; 15 meters for optical
• Data transfer speed: Maximum data rate of 125 Mbps
• Quality: TOSLINK optical cables are immune to interference and
optical audio connections do not suffer from distortion or signal
losses from resistance or capacitance unlike copper-based
connections.
Connector Description
RJ-45 connectors The RJ-45 is an eight-pin connector found on twisted pair cables that
are used in networking.
Characteristics:
• Analog or digital: Digital
• Distance limitations: 100 meters for Category 5 Ethernet cabling
• Data transfer speed: Depends on the type of cabling the connector
is attached to
• Quality: The strip-line flex technology within RJ45 jacks lowers the
impedance path significantly. This virtually eliminates crosstalk
within the connector.
• Connector and cable specifications for frequencies:
• Cat 5: Up to 100 MHz
• Cat 5e: Up to 100 MHz
• Cat 6: up to 250 MHz
RJ-11 connectors The RJ-11 connector is used for telephone system connections.
However, because the RJ-11 connector is similar in appearance to the
RJ-45 connector, they are sometimes confused. RJ-11 connectors are
smaller than RJ-45 connectors, and have either four or six pins.
6
Characteristics:
• Analog or digital: Analog
• Distance limitations: Average of 100 meters
• Data transfer speed: 10 Mbps
• Frequency: supports Transmission speed of 16 MHz
• Quality: Transmission errors if pushed to faster speeds.
Connector Description
PS/2 connectors The PS/2 connector is a legacy connection technology used primarily
to connect keyboards and mice to system units.
PS/2 connectors are
included here to support
the description of some
of the adapters and
converters that are
discussed later in this
topic.
Characteristics:
• Analog or digital: Digital
• Distance limitations: 7.6 meters
• Data transfer speed: 2 Kbps
• Quality: Lower latencies for keyboards than early USB
(specification 1.0) because USB polls the host controller and ps/2
does not.
DVI to HDMI adapter A DVI to HDMI adapter enables you to connect a PC that has a DVI
port to a HD TV that has an HDMI port. You can connect the adapter
to either a DVI cable or an HDMI cable.
DVI to VGA converter A DVI to VGA converter enables you to convert a DVI (digital) video
signal so that it can be displayed on a VGA (analog) monitor.
HDMI to VGA An HDMI to VGA converter enables you to convert an HDMI (digital)
converter video signal so that it can be displayed on a VGA (analog) monitor.
PS/2 to USB converter A PS/2 to USB converter uses an integrated circuit (pre-programmed
chip) to actively translate the PS/2 keyboard signal and convert it into a
USB keyboard signal. This allows the PS/2 keyboard to be
automatically recognized by the operating system as if it were a
standard, modern USB keyboard. A well-designed active PS/2 to USB
converter will use the built-in operating system drivers for a USB
keyboard.
Thunderbolt to DVI A Thunderbolt to DVI adapter enables you to connect a digital display
adapter device to a PC with a Thunderbolt port.
Audio to USB adapter An audio to USB adapter enables you to connect a headset and
microphone to a PC through a USB port.
USB A to USB B adapter USB A to USB B adapters come in several configurations to enable you
to connect USB devices that have different connector types. For
instance, you can buy a USB A Female to USB B Male connector, or a
USB A Female to USB B Female connector.
6
Note: Some adapters are implemented as dongles. A dongle is a device that connects to one of
the existing ports and provides additional functionality. Examples include USB to RJ-45 and
USB to Wi-Fi.
ACTIVITY 1-4
Comparing PC and Device Connection
Interfaces
Scenario
In this activity, you will identify and compare PC and device connection interfaces.
1. Your instructor might provide you with examples of device connections and interfaces and ask you or
Consider displaying
other participants to identify them.
various examples of
device connectors and
interfaces, and ask 2. In this graphic, identify the (A) audio ports, (B) video ports, and (C) USB ports.
participants to identify
them. This can be an
opportunity to generate
discussion on the
differences between the
various types of
connections and where
they might be used.
PC Ports
Encourage participants
to share their
experiences with using
both adapters and
converters. Be sure to
remind them that
adapters change the
physical connection
interface, while
converters also change A: Moving from left to right, the components should be labeled: C, B, C, A.
the signal being carried.
3. Which connection type supports up to 127 peripherals for a single connection?
○ IEEE 1394
○ SATA
○ Parallel
◉ USB
4. Which connection interface is compatible with both copper wire and optical fiber cables?
○ IEEE 1393 connection
○ SATA connection
◉ Thunderbolt connection
○ DVI-D connection
5. Of the adapters and converters discussed in this topic, which do you think you might use most often?
Be prepared to share your thoughts.
A: Responses will vary depending on the type of equipment being connected. For example, if you will
be connecting PCs to many types of display devices, you might find the DVI to HDMI or DVI to
VGA converters to be most useful.
Summary
In this lesson, you identified some of the hardware components that make up most personal
computers, along with the types of connections used to allow the devices to communicate properly.
The ability to identify hardware components and how to connect them together enables you to be
more efficient when you are installing, upgrading, repairing, configuring, maintaining, optimizing,
and troubleshooting PC components.
How many of the PC components described in this lesson were familiar to you?
A: Answers will vary, but may include the system unit, display devices, input devices such as the
Encourage students to
use the social keyboard and mouse, and peripheral devices such as printers and cameras.
networking tools
Which device connections have you used? Which are new to you?
provided on the CHOICE
Course screen to follow A: Answers will vary, but may indicate familiarity with USB and wireless, and unfamiliarity with IEEE 1394
up with their peers after and Thunderbolt.
the course is completed
for further discussion Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
and resources to support peers, and the larger CHOICE online community about the topics covered in this course or
continued learning. other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will identify the basic components and functions of operating systems.
You will:
• Identify common PC and mobile operating systems and their features.
• Identify utilities and tools used to manage PC operating systems.
Lesson Introduction
In the previous lesson, you identified the hardware components of standard desktop
personal computers. The other major element of a personal computer is the operating
system, which is the software that provides the user interface and enables you to access and
use the hardware components. In this lesson, you will identify the basic components and
functions of an operating system.
As a professional IT support representative or PC service technician, your job will include
installing, configuring, maintaining, and troubleshooting personal computer operating
systems. Before you can perform any of these tasks, you need to understand the basics of
what an operating system is, including the various versions, features, components, and
technical capabilities. With this knowledge, you can provide effective support for all types of
system environments.
54 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
PC and Mobile Operating Systems
In this lesson, you will identify the basic components and functions of personal computer and
mobile device operating systems. The first step is to learn about the various operating systems
available today, and to identify those that are commonly used on personal computers, tablets, and
smartphones. In this topic, you will identify the most common PC and mobile operating systems
and their features.
Aside from hardware, the operating system is the next most important piece of the personal
computer system or mobile device. Without a user-friendly operating system, most people would
not be capable of using their computers or mobile devices to successfully perform the tasks required
of them. As an IT professional, being familiar with the different types of operating systems that can
be installed on personal computers and mobile devices can help you to support a variety of
computer and mobile device environments.
Microsoft Windows
Microsoft® Windows® is the single most popular and widely deployed operating system on both
desktop computers and server systems in the world today. The various versions of Windows all
Microsoft Windows
feature a graphical user interface (GUI), support for a wide range of applications and devices, 32-bit
or 64-bit processing, native networking support, and a large suite of built-in applications and
accessories such as the Internet Explorer® browser. Windows currently comes pre-installed on
many commercially sold PCs.
There have been numerous versions of Windows since its inception. The three most current
versions are often deployed on personal and professional computers.
• Windows 8 was released in 2012, with the Windows 8.1 update released in 2013. Windows 8
introduced a new look and feel to the user interface (UI) that is designed to facilitate the use of
touch screen devices as well as mouse and keyboard interaction. You can also use the familiar
desktop used in previous versions of Windows. Microsoft account integration allows you to use
the same settings across all of the Windows 8/8.1 systems you log into.
• Windows 7 was released in 2009. Windows 7 returned to the overall look and feel found in
Windows XP in response to the criticism of the Windows Vista® interface. Rather than
introduce a multitude of new features like Windows Vista, Windows 7 instead offered many
critical upgrades to the system, including application and hardware compatibility, performance
improvements, and a redesigned shell.
• Windows Vista was released in 2007 and included many new features, the most noticeable
change being to the user interface. While it offered many upgrades to the system, specifically to
security features, many were critical of the redesigned interface.
Note: Microsoft released the latest version of Windows, Windows 10, in 2015.
Feature Description
Start Screen The central user interface of Windows 8/8.1 that acts as the hub from which Do not spend a lot of
you can access all of the capabilities of your computer. From the Start Screen, teaching time on this
table, but encourage
you can run programs, check email, add contacts, see the latest news, get
students to review it in
updates on the weather, change the settings on your PC, sign out of your preparation for testing.
computer, go online, and much more. The table is loosely
Modern UI Also known as the Metro UI, this is the user interface for Windows 8/8.1. This organized in reverse
chronological order.
includes the Start Screen and its tiles. Some of the tiles change based on the
content available and are known as Live Tiles.
File structure and Windows has a file structure that, by default, organizes each drive and partition
paths separately. The root of each drive/partition is assigned a letter and is in the
format <letter>:\ where the default installation drive is typically C:\.
Additional drives can be assigned to D:, E:, F:, and so on.
Each directory below this root is separated by the backslash character in the
directory path, but modern versions of Windows can also recognize a standard
slash ("/"). For example, the folder that holds much of the critical operating
system files is in the path C:\Windows\system32\ by default. The maximum
length for a Windows path is 260 characters.
Side by side apps You can tile Windows 8/8.1 Modern apps side by side.
• On most monitors, you can tile two apps side by side if your monitor
resolution is at least 1024 x 768.
• You can tile three apps if you have at least a 1600 x 1200 resolution
monitor.
• On larger monitors with at least 2560 x 1440 resolution, you can tile up to
four apps side by side.
Each monitor connected to the computer can have side by side apps in these
configurations.
Pinning You can pin your most frequently used applications to the Start Screen or to
the desktop taskbar.
Live sign in The email address you registered with Microsoft to use when you sign in to any
Microsoft program or service. This includes Windows 8/8.1 computers,
services such as OneDrive or Outlook.com, Windows phones, and even Xbox.
OneDrive The cloud storage users get with Windows 8/8.1. Saving documents to
OneDrive enables users to access those documents on any device they log into
using the same Live sign in they used to save the documents.
Windows Store The application store for Windows 8/8.1, Windows Server 2012, and Windows
8 phone. The apps range from free to $999.99. Apps in the store have been
certified to be compatible with Windows 8.
Feature Description
Multi-monitor If you have multiple monitors, you can choose how you want applications to
taskbars be listed on the taskbar. By default, all of the taskbar buttons from the main
screen taskbar are duplicated on the other monitor. You can change this to
show only the applications open on the second screen in that monitor's
taskbar, and have all taskbar buttons still be shown on the main monitor.
Another option is to only show the taskbar buttons for the applications open
on each monitor.
Charms Hidden on the right side of the screen, the Charms are universal tools that are
available from everywhere in Windows 8/8.1 that give you access to key
system-wide functions such as printing, searching, and sharing. Charms are
dynamic and context sensitive; for instance, using the Search Charm within
the Mail app will search through your email messages for the word or phrase
you enter; using Search from the Start screen is global and will take you to the
All Apps screen, where you can search for apps, files, and PC settings, or
begin a search using an app.
Windows A command line interface where you can run PowerShell cmdlets
PowerShell (commandlets). You can also use cmdlets in scripts.
Aero Windows Aero® is a color scheme available in Windows Vista and Windows 7.
Windows Aero provides a visually rich experience with its glossy and
transparent interface. It also provides dynamic visual and animation effects
such as Live Preview of taskbar buttons and a Flip 3D view of open windows.
You can choose one of the predefined color schemes available in Windows
Aero, or you can create a custom color scheme using the color mixer. Each
color has a default transparency level that you can change for both predefined
and custom color schemes. This feature was not carried over to Windows
8/8.1.
Gadgets The Desktop Gadget Gallery is a Windows Vista and Windows 7 feature that
displays different gadgets, which are mini applications that can perform
information-display tasks, including displaying the date and time, central
processing unit (CPU) usage, stock information, and user-selected news
headlines. If a gadget for a particular need is not available from Microsoft or
from a third-party developer, users can create their own. Available gadgets are
stored in the Gadget Gallery, which provides a link to download additional
gadgets. This feature was not carried over to Windows 8/8.1.
Sidebar The Sidebar is a designated area of the Windows Vista and Windows 7 desktop
that is displayed vertically along the side of the desktop. Users can add gadgets
to the Sidebar to provide information and access to frequently used tools or
programs.
BitLocker Windows BitLocker® is a security feature introduced with Windows 7 and
Windows Server® 2008. This security feature provides full disk-encryption
protection for your operating system, as well as all the data stored on the
operating system volume. BitLocker encrypts all data stored on the operating
system volume and is configured by default to use a Trusted Platform Module.
This feature ensures the protection of early startup components and locks any
BitLocker-secured volumes in order to prevent access or tampering when the
operating system is not running.
Shadow Copy The Shadow Copy technology is available on Windows Vista and newer versions.
It creates backup copies or "snapshots" of the system's data and stores them
locally or to an external location of the user's choosing. You can perform
Shadow Copy operations manually, or you can set up automatic backups at
scheduled intervals.
Feature Description
System Restore The System Restore utility is available in Windows Vista and Windows 7. It
monitors the system for changes to core system files, drivers, and the Registry.
It automatically creates a system restore point, which is a snapshot of the system
configuration at a given moment in time that contains information about any
changes to system components. Restore points are stored on the computer's
hard disk, and you can use them to restore system settings to an earlier state
without affecting changes in user data since that time.
ReadyBoost ReadyBoost® is a performance enhancer that is available for Windows Vista and
newer versions that enables the user to supplement the computer's memory
with an external storage device such as a flash drive.
Compatibility Compatibility mode enables older programs or applications to run on a newer
mode version of Windows. You can configure compatibility for specific applications
or programs by using the Properties options for the applications. Windows 7
can accommodate legacy applications dating back through Windows 95.
Windows XP Windows XP mode is a download that is available for Windows 7 versions and
mode that is designed to enable users running Windows 7 to access and use
Windows XP-compatible software and programs directly on their desktops.
Windows Windows Defender is the antispyware software that is included with Windows
Defender Vista and newer versions. You can configure Defender to scan for malicious
materials at scheduled intervals, automatically remove any spyware detected
during a scan, or even alert you in real time if spyware installs or runs on the
computer.
Category view and In Windows Vista and Windows 7, you can configure the Start menu, Control
classic view Panel, and other interface elements by using two options:
• Category view, which is the default setting, displays the options available
divided into high-level categories. For instance, in category view, the
Control Panel displays categories of options such as Appearance and
Themes or Performance and Maintenance.
• Classic view displays a more traditional view from earlier versions of
Windows, in which all of the available options are displayed, either in a list
or icon form.
Windows 8/8.1 does not have the Start menu, but you can still configure the
Control Panel to display in Category view or with Large or Small icons.
Action Center A centralized point of contact for security and maintenance items on your
system that require your attention. It can be accessed through the Control
Panel, or if there are items that currently need your attention, the Action
Center flag will appear in the notification area on the taskbar.
Versions of Microsoft
Versions of Microsoft Windows Windows
Microsoft creates different versions or editions of their operating systems so the end user can
purchase the edition most appropriate to how they will use their computers. To keep costs down for
home users, a basic edition of each Windows operating system is available, but it doesn't have all of Do not spend teaching
the features that the professional or enterprise edition will have. time on these tables, but
encourage students to
Microsoft Windows 8 and 8.1 is available in several different editions. review them in
preparation for testing.
The point to make here
is that not all editions of
Windows have the same
feature sets.
Windows 8 RT Windows 8 RT is only available pre-installed on devices that use the ARM 32-
bit architecture. It only supports up to 4 GB of RAM. Only Windows Store
apps can be installed on this edition. It comes with the Office 2013 Word,
Excel, PowerPoint®, and OneNote® applications. Drive encryption is
supported.
Windows 8/8.1 Windows 8 and 8.1 is the edition aimed at the home user. It comes pre-
installed on many computers and can also be purchased separately if you need
to perform an upgrade from a previous Windows version or if you are building
a computer from components. It offers basic operating system functions and
features. It does not include Office 2013. You can install Windows Store apps
and traditional desktop-style applications. It can be installed on computers that
use the Intel or AMD 32-bit or 64-bit architecture.
Windows 8/8.1 Windows 8 and 8.1 Pro is the edition aimed at the business user. This edition
Pro enables the system to be part of a Windows Server domain, to use remote
desktop connections, use Hyper-V virtualization features, and use Group
Policy.
Windows 8/8.1 Windows 8 and 8.1 Enterprise edition is for large organizations that use
Enterprise volume licensing. It has the same features and requirements as the Pro edition.
Note: A complete feature comparison between Windows 8.1 and Windows 8.1 Pro can be
found at http://windows.microsoft.com/en-US/windows/compare.
Windows 7 Starter Windows 7 Starter is a simple, basic edition with very few features and
limited customization. Windows Aero and the majority of the visual
styles included on the higher versions are not included in Starter. Unlike
the other versions of Windows 7, it is only available in a 32-bit version.
Windows 7 Home Windows 7 Home Premium is a low-cost edition for beginners and
Premium home users. This edition offers basic OS functions such as Windows
Explorer and Internet Explorer 8, and support for other productivity
software.
Windows 7 Professional Windows 7 Professional enables users to run programs in Windows XP
mode, connect to domains, and back up data to a network location.
Windows 7 Enterprise Windows 7 Enterprise is available for enterprise organizations that need
large volumes of Windows licenses for employee use. Enterprise features
include support for multiple languages through the Multilingual User
Interface (MUI), BitLocker, and compatibility with UNIX applications
that may be present in the corporate environment
Windows 7 Ultimate Windows 7 Ultimate offers the same features as Windows 7 Enterprise,
but is available for individual licensing for personal home use.
Windows Vista Home Windows Vista Home Basic is a lower-budget OS for beginners and
Basic home users who do not require advanced multimedia capabilities and
who do not require networking more advanced than a workgroup.
OS Description
Linux Linux is an open-standards UNIX derivative originally developed and released by a
Finnish computer science student named Linus Torvalds. The Linux source code was
posted publicly on a computing newsgroup, and the code was developed and tested
cooperatively all over the world. Because the source code is open, it can be
downloaded, modified, and installed freely. However, many organizations prefer to
purchase and implement a Linux distribution. A Linux distribution is a complete Linux
implementation, including kernel, shell, applications, utilities, and installation media,
that is packaged, distributed, and supported by a software vendor.
Linux features include:
• Multiple desktops: Also known as virtual desktops, is used in Linux GUI
environments. A workspace switcher is used to switch between the various
desktops.
• Keychain: The keychain feature in Linux is different than the Mac feature of the
same name. In Linux, it is a manager for the ssh agent and is typically run from the
~/.bash_profile.
• iCloud: Support has been added to iCloud so that it can be accessed from a Linux
system.
• Gestures: On most Linux systems, the basic scrolling and tap gestures will work on
touch pads, but you will need to configure multi-touch gestures through
configuration files.
• Remote Disk: To access remote disks from a Linux system, you can use command-
line commands such as rdesktop and ssh.
• Command line and GUI: Linux is often used from the command line, but a variety
of GUI interfaces can also be used with most distributions. You can also configure
your Linux system to use a variety of GUI desktops.
Note: For more information about Linux and its versions, see the Linux home
page at www.linux.org.
OS Description
OS X OS X® is the operating system developed by Apple® Computing, Inc. OS X is a Linux
derivative, and consists of UNIX-based operating systems and GUIs. This proprietary
operating system is included on all Macintosh® computer systems.
OS X features include:
• Mission Control: A feature that allows users to use multiple Spaces that can be
thought of as multiple desktops.
• Keychain: The keychain feature in OS X is different than the Linux feature of the
same name. In OS X, it is a password management system.
• Spot Light: A feature that enables users to search for apps, documents, images, and
other files. With Mountain Lion or later, you can also search Wikipedia, news sites,
Maps, iTunes, movie listings, and other files and other searchable content.
• iCloud: A cloud storage solution accessed with the user's Apple ID. iCloud can also
be used with non-Apple operating systems.
• Gestures: Using one or more fingers on the Mac Multi-Touch trackpad, Magic
Trackpad, or Magic Mouse, users can scroll, zoom, and navigate desktop,
document, and application content. For a full list of gestures, refer to https://
support.apple.com/en-us/HT204895.
• Finder: The file and folder management app on Mac computers.
• Remote Disc: A remote disk feature that enables users to access external drives or
share disks from another computer. This is especially useful for Macs that don't
have an optical drive built in.
• Dock: A bar along the bottom or side of the screen that contains icons for apps
that come with the Mac. Users can also add apps to or remove apps from the
Dock. Documents and folders can also be added to the Dock.
• Boot Camp: An app that enables users to install Microsoft Windows on their Mac,
then switch between OS X and the Windows operating systems.
Note: With the release of the OS X version Mountain Lion in 2012 and with the increased use
of iOS for mobile devices, Apple officially dropped “Mac” from its operating system's name. It
is now known simply as OS X, pronounced "OS 10."
Mac OS Versions
You may want to show
There have been several versions of the Macintosh operating system. El Capitan refines and the LearnTO Use OS X
improves features and performance, rather than introducing new features. Yosemite improved Features presentation
integration between iOS and Mac features. Mavericks was a free upgrade to any system with Snow from the CHOICE
Leopard or later and a 64-bit Intel processor. Other previous versions included Mountain Lion, Course screen or have
Lion, Snow Leopard, Leopard, and Tiger. students navigate out to
the Course screen and
watch it themselves as a
Note: For additional information, check out the LearnTO Use OS X Features presentation in supplement to your
the LearnTOs for this course on your CHOICE Course screen. instruction. If not, please
remind students to visit
the LearnTOs for this
course on their CHOICE
Course screen after
class for supplemental
information and
additional resources.
Mobile OS Differences
One major difference between Android and iOS is that iOS runs on Apple products only, where the
Android OS is used by many different mobile device manufacturers and is more widespread across a
number of different mobile devices. Android also enables manufacturers to overlay a suite of
applications that they support.
For developers of mobile device apps, obtain the appropriate Software Development Kit (SDK) for
your mobile operating system. Apps for iOS devices are built using the iOS SDK and use the
programming language swift. Windows Phone 8.1 apps are built using the Windows SDK and the You might want to ask
programming language is .net. Android devices use a SDK that uses the Java programming language. participants if they are
They can also use the Android Application Package (APK) format to package their apps. An APK aware of any other
file contains all of that program's code, including .dex files), resources, assets, certificates, and differences between the
manifest files. Similar to other file formats, APK files can be named almost anything, as long as the main mobile OSs.
file name ends in ".apk"
ACTIVITY 2-1
Identifying PC and Mobile Operating Systems
Scenario
In order to gain experience in identifying and working with various operating systems, you ask your
co-workers and friends if they would be willing to show you some of the features and functions of
their devices.
Note: Activities may vary slightly if the software vendor has issued digital updates. Your
instructor will notify you of any changes.
Notify students of any
changes to activities
based on digital software
updates issued by the 1. Identify the operating system installed on your classroom computer.
software vendor. a) If necessary, turn on the device.
b) If necessary, log in using the credentials provided by your instructor.
c) Swipe in from the right edge of the screen to display the Charms bar.
d) Select Settings.
e) Select PC Info.
Note: If you are viewing the PC info screen, close the PC Settings window.
d) Scroll through the Settings until you find a setting that starts with About. If you have a phone, it will
say About Phone and if you have a tablet, it will say About Tablet or similar wording.
e) Review the information displayed. Some devices have more or less information, and on some
devices, you might need to select another option to go a level deeper in the menu structure to view
the Android version.
TOPIC B
PC Operating System Tools and Utilities
In order to work with your computer, you need to let your computer know who you are. You might
log in with administrative capabilities or standard end user capabilities. You will interact with your
computer through either a graphic user interface (GUI) for some tasks and through a command line
interface for other, often more advanced, set up and configuration tasks. In this topic, you will
examine some of the PC operating system tools and utilities for Windows, Mac, and Linux
computers.
The various operating systems you might encounter use different tools, but the functionality of
those tools is common across all of the operating systems. You will need to access the file and
folders, and add or delete users. These are just a couple of the many tasks you will perform.
User Authentication
User authentication is a security measure in which a computer user proves his or her identity in order
to gain access to resources. There are many possible authentication methods; one of the most
User Authentication
common is a combination of a user name and a password. There are three phases in the user access
process that a person or system must perform in order to gain access to resources:
• Identification: The claim of identity made by the user when entering a user name and password.
• Authentication: The verification of that claim.
• Authorization: The action taken as a result of verifying the claim.
Most authentication schemes are based on the use of one or more authentication factors. You can
combine these authentication factors for multi-factor authentication. The factors include:
• Something you know, such as a password.
• Something you have, such as a key or an ID card.
• Something you are, including physical characteristics, such as fingerprints.
Multi-factor authentication is any authentication scheme that requires validation of two or more
authentication factors. It can be any combination of who you are, what you have, what you know,
where you are or are not, and what you do. Requiring a physical ID card along with a secret
password is an example of multi-factor authentication. A bank ATM card is a common example of
this. Keep in mind that multi-factor authentication requires the factors to be different, not just the
specific objects or methods.
Administrator These accounts give users the most control over aspects of the computer. This
accounts type of account is typically created when users first set up a computer. This type
of account should only be used when complete control over the computer is
required.
Standard These accounts should be used for day-to-day activities. It is less likely that the
accounts user can accidentally delete crucial files or change settings they should not
change. If the account is compromised through a security attack, it gives the
attacker less access to critical information.
Child accounts These accounts allow parents or other figures of authority to monitor or limit
computer usage. The settings are configured using the Family Safety settings.
Windows 7 includes several built-in user accounts to provide you with initial access to a computer.
Note: Complaints from end users against Windows Vista's UAC are common because many
tasks that users were able to perform on their own in previous Windows versions require
additional privileges in Vista. However, in Windows 7, this issue has been addressed and UAC is
now less intrusive.
Other default groups are also created, and can perform the action indicated by the group name,
including:
• Backup Operators who can back up and restore files on the computer.
• Cryptographic Operators who can perform cryptographic operations.
• Distributed COM Users who can start, activate, and use DCOM objects on the computer.
• IIS_IUSRS used by the Internet Information Services (IIS).
• Network Configuration Operators who can make TCP/IP setting changes as well as release and
renew TCP/IP addresses.
• Performance Log Users who can manage performance counters, logs, and alerts on the computer
without being a member of the Administrators group.
• Performance Monitor Users who can monitor performance counters on the computer without
being a member of the Performance Log Users group.
• Offer Remote Assistance Helpers who can offer Remote Assistance to users of the computer.
Note: In Windows, the maximum depth of a folder structure is restricted by the 255-character
limit in the overall file path, including the character representing the drive and any file name and
extension. Otherwise, there is no set limit on the length of a particular file or folder name.
Note: You can run Windows Explorer in Windows Vista and Windows 7 from the Accessories
group on the Start menu. Windows Explorer opens with the object selected in the folder
hierarchy. For example, if you display the pop-up menu for the Start menu and select Explore,
Windows Explorer opens and displays the contents of the Start Menu folder on the disk.
In the Windows 8 family of operating systems, this feature has been renamed to File Explorer. You
can access it from the File Explorer icon on the Desktop taskbar.
File Explorer
File Extensions
Standard file extensions that follow the names of files in the Microsoft Windows environment can
indicate whether a particular file is a program file or a data file. If it is a data file, the extension can
File Extensions
indicate the application category that might be used to edit the file. Many common file extensions
are three or four characters long, although there is no longer a strict character limit for the file name
or extension in most modern operating systems. A period separates the extension from the file
name itself.
Windows uses the file extension to determine how the system will use a file. If you alter a file name
extension, you might find that a program file will not execute properly or that a data file will not
automatically open in the associated application.
By default, the folder view options in Windows 7, Computer and Windows Explorer, are set so that
common file extensions do not display. You can display the extensions by unchecking Hide
extensions for known file types on the View page in the Folder Options dialog box. To display
file extensions in Windows 8, in File Explorer, from the View menu, in the Show/hide group,
check File name extensions.
File Attributes
File attributes are characteristics that can be associated with a file or folder that provide the operating
system with important information about the file or folder and how it is intended to be used by
File Attributes
system users.
There are several standard attributes that can be enabled for files or folders on Windows systems.
Archive (A) Indicates that a file has not been backed up. Windows automatically sets the
Archive attribute on any file you create or modify. When you back up data, you
can choose to back up only the files on which the Archive attribute is set.
Hidden (H) Hides a file from view in file management tools.
ACTIVITY 2-2
Viewing File Extensions and Attributes
Scenario
In this activity, you will view the file extensions and attributes for the files that are stored on your
Windows 8.1 system.
1. On your Windows 8 system, open the folder that contains the Windows system files.
a) From the Start screen, select the Desktop tile.
b) On the taskbar, select the File Explorer icon.
c) Double-click This PC.
d) Double-click the C drive.
e) Double-click the Windows folder.
• Another method for opening some tools is through the Microsoft Management Console (MMC).
In Windows, the commands are not case sensitive.
• If you know the name of the tool you need, which often will have the .msc extension, you can
also search for and then select the file name to open the tool.
Windows PowerShell is a powerful command line tool designed for scripting as an alternative to
some of the GUI tools. PowerShell ISE (Integrated Scripting Environment) is a GUI version of
PowerShell in which you can write, run, and test script using tools that aren't available in the
Console (command line) version of PowerShell. Most of the commands that can be used at the
Command Prompt command line can also be used at the PowerShell command line.
Note: If you are interested in learning more about using PowerShell ISE, visit https://
technet.microsoft.com/library/dd819514.aspx.
Command Description
md The Make Directory command creates a folder with the specified name.
rd The Remove Directory command deletes the specified folder and its contents.
cd The Change Directory command moves the command prompt to the specified
folder.
del The Delete command deletes the specified file.
copy The Copy command copies the specified file(s) to a different location. The other
location can be a different file name in the current folder or the same or a different
name in another folder.
xcopy The Xcopy command copies the specified file(s), and if desired, a directory tree, to
the specified destination.
robocopy The Robust Copy for Windows command offers many more options than either
XCOPY or COPY. With the robocopy command, you specify the source directory,
followed by the destination directory, then the file(s) and any options you want to
use.
dir The Directory command lists the contents of the specified folder.
help The Help command by itself lists the available commands. To get information on a
specific command, enter help command_name.
command /? Displays the same information as help command_name.
Linux Tools
Most of the Linux tools you will use are command-line-based tools. Some tools might also be
available as GUI applications depending on the Linux distribution you have installed and which
Linux Tools
GUI you are using.
The types of Linux tools you will most often encounter as an A+ technician include:
• Backup and restore.
• Image recovery.
• Disk maintenance.
• Screen sharing.
• Application management.
Specific tools and applications will be covered in detail later in this course.
OS X Tools
Most OS X tools are run from the GUI on a Mac. Some commands are accessed from a command
line terminal user interface. OS X is a UNIX-based operating system, so the command line
commands are UNIX commands. You can enter man command_name to get help on using a specific OS X Tools
command.
As with Linux, the types of OS X tools you will most often encounter as an A+ technician include:
• Backup and restore
• Image recovery The list of categories is
• Disk maintenance the same as the one
included for Linux. This
• Screen sharing parallels the CompTIA
• Application management exam objectives and
Specific tools and applications will be covered in detail later in this course. their treatment of the
Linux and OS X OSs.
Note: For additional information, check out the LearnTO Use Linux and OS X Tools
presentation in the LearnTOs for this course on your CHOICE Course screen.
You may want to show
the LearnTO Use Linux
and OS X Tools
presentation from the
CHOICE Course screen
or have students
navigate out to the
Course screen and
watch it themselves as a
supplement to your
instruction. If not, please
remind students to visit
the LearnTOs for this
course on their CHOICE
Course screen after
class for supplemental
information and
additional resources.
ACTIVITY 2-3
Exploring Windows Tools
Scenario
You have been reading about some of the tools used to manage and configure Windows. You would
like to become familiar with how they are accessed and how to view help about some of the tools.
Summary
In this lesson, you identified features of various PC and mobile operating systems and some of the
PC operating system tools and utilities. By comparing functions and features of common operating
systems and the tools used in each of them, you have prepared yourself to be more effective in
selecting the operating system that is most appropriate for a specific situation.
With which type of operating system (mobile, desktop, or web-based) do you have the most experience?
Which do you have the least experience using?
Encourage students to
A: Answers will vary but the more common might be Windows 8 and Apple iOS. Linux is not as use the social
commonly used by end users. networking tools
provided on the CHOICE
How will you remember which commands and tools are used with which operating systems? Why do you Course screen to follow
think this is important? up with their peers after
A: Answers will vary. You might create a table listing the functionality on one axis of the table and the the course is completed
operating systems on the other axis, then fill in the table cells with the command or tool used to for further discussion
and resources to support
perform the function for each operating system. When you are supporting computers for other end
continued learning.
users, you need to be able to quickly know which command or tool to use.
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will identify networking and security fundamentals. You will:
• Identify common network types.
• Identify network components.
• Identify the properties and purpose of services provided over a network.
• Identify basic cloud concepts.
• Identify basic concepts related to security.
Lesson Introduction
So far you have looked at hardware and operating system fundamentals. In this lesson, you
will examine some basic networking and security fundamentals.
Having a basic background in networking and security fundamentals will help you as you
begin installing and working with your computer. In today's computing environment, stand-
alone computing is a rarity. Almost from the moment you begin installing the operating
system, you are connected to a network. Knowing how the computer connects to the
network and making sure it is safe from predators is an important first step in having a
secure and functional computer.
84 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Network Types
In this lesson, you will identify networking and security fundamentals. To start, you will identify
common network types. Recognizing network models and coverage types will help you determine
the best approach to identifying the scope of network issues.
Networks
A network is a group of connected computers that communicate and share resources such as files,
printers, Internet connections, and databases. Whether wired or wireless, most networks will include
Networks
network media, such as a cable to carry network data; network adapter hardware to translate the data
between the computer and the network media; an operating system to enable the computer to
recognize the network; and a network protocol to control the network communication. All these
components work together to enable a fully functioning computer network. Any computing device
that will communicate with a network will also include a network interface card (NIC) that is usually
built into most devices. Older devices may require an adapter card that can be inserted into an
expansion port or slot.
6
Network Models
There are two primary network models, which are design specifications for how the computers and
other nodes on a network can interact.
Network Models
LANs
A Local Area Network (LAN) is a self-contained network that spans a small area, such as a single
building, floor, or room. In a LAN, all parts of the network are directly connected with cables or
short-range wireless media. LANs
6
01
)2
(C
WANs
A Wide Area Network (WAN) is a network that spans multiple geographic locations. WANs typically
connect multiple LANs using long-range transmission media. Such a network scheme facilitates
WANs
communication among users and computers in different locations. WANs can be private, such as
those built and maintained by large, multinational corporations, or they can be public, such as the
Internet.
PANs
A Personal Area Network (PAN) connects two to three devices together for use by one person using a
router with cabling; most often seen in small or home offices.
PANs A Wireless Personal Area Network (WPAN) is a network that connects wireless devices in very close
proximity but not through a Wireless Access Point (WAP). Infrared and Bluetooth are some
technologies used for connecting devices in a WPAN.
MANs
A metropolitan area network (MAN) covers an area equivalent to a city or other municipality. In many
cases, the MAN connects multiple LANs.
MANs
VPNs
A virtual private network (VPN) is a private communications network transmitted across a public,
typically insecure, network connection such as the Internet. With a VPN, a company can extend a
VPNs
virtual LAN segment to employees working from home or other remote locations by transmitting
data securely across the Internet.
6
ACTIVITY 3-1
Identifying Network Types
Scenario
Your manager wants to make sure that all of the interns are using the same terminology when
discussing network types, so he asked you to prepare a presentation on the various network types.
As a follow up to the presentation, you created some questions to make sure everyone understands
the terminology.
1. What is the one component that any device that connects to a network requires?
A: All devices require a network interface card.
2. Which network model does a Windows workgroup use and which model does a company-wide server
use?
A: A workgroup uses a peer-to-peer network model and a company-wide server uses the client/
server network model.
3. Your company has a global presence where all of the locations can communicate. Within each site,
there is a network, and that network connects to the overall organizational network. In some locations,
there are multiple sites within the city. Identify each type of network described here.
A: The global network is a WAN. The network within each site is a LAN. The sites within the city
compose a MAN.
TOPIC B
Network Components
Before you start setting up a network, you need to be aware of the devices that you need on a
network. In this topic, you will identify several types of network devices and other components.
Switches and routers are fundamental network connectivity devices, so you are likely to encounter
them in the network environments that you support. In addition, there are other types of
networking devices that you might be asked to support. Understanding the capabilities of these
devices will prepare you to support a wide variety of network environments.
Network Devices
There are many network devices that you can use to connect devices to a network. Typically, you
will find devices such as switches, routers, and access points. Patch panels are often used to
Network Devices
distribute access throughout the building. You might also encounter older technology such as hubs,
bridges, and repeaters.
Legacy Devices
Some of the network devices that you might encounter are older, or legacy devices, such as hubs,
bridges, and repeaters.
Legacy Devices
Device Description
Hub A hub, or multiport repeater, is a networking device used to connect the nodes in
Hubs can boost the a physical star topology network into a logical bus topology. A hub contains
signal. multiple ports that you can connect devices to. When data from the transmitting
device arrives at a port, it is copied and transmitted to all other ports so that all
other nodes receive the data. However, only the specified destination node reads
and processes the data while all other nodes ignore it.
Two common types of hubs used were passive and active.
• A passive hub simply has its ports wired together physically. It connects
devices plugged into it without the use of power. Acting like a patch panel, it
merely makes the electrical connection without repeating or transmitting any
frames.
• An active hub is a true multiport repeater. It receives incoming data and
retransmits it out all ports with a signal boost.
Note: In today's networks, hubs have been replaced by switches.
Bridge A bridge is an older version of a switch. It has the same basic functionality of a
switch, but it has fewer ports and is software-based, rather than hardware-based.
Repeater A repeater, sometimes referred to as a signal extender, is a device that regenerates
a signal to improve signal strength over transmission distances. By using repeaters,
you can exceed the normal limitations on segment lengths imposed by various
networking technologies.
Switches
A switch is a network hardware device that joins multiple computers together within the same LAN.
Unlike a hub, switches forward data only to the intended destination. Because of this, they are
slightly "smarter" than hubs, and are more common. Switches can also be connected to other Switches
switches, thus increasing the number of devices on a LAN without sacrificing performance.
Troubleshooting a switch is easier because of the status indicator lights on the individual ports.
PoE
Power over Ethernet (PoE) uses the IEEE 802.3af standard for transferring both electrical power
and data to remote devices over twisted-pair cable in an Ethernet network. This technology allows
you to place devices such as network switches, VoIP phones, wireless access points, and cameras in
locations where it would be inconvenient or impossible to run electrical power for the device. PoE
provides up to 15.4 W of power and requires CAT 5 or higher copper cable.
The updated IEEE 802.3at standard, also known as Power over Ethernet+ (PoE+), provides up to
25.5 W of power per port and is backward compatible with all existing IEEE 802.3af devices. PoE+
allows for a broader range of devices to be powered such as:
• Cameras with pan/tilt/zoom capabilities.
• Door controllers.
• Point of Sale terminals.
Many switches provide PoE directly from their switch ports. This is used to power Voice-over-IP
(VoIP) phones that are plugged into the switch.
Another common implementation is a midspan device that plugs into AC power at the wall, such as
an external PoE injector. A PoE injector enables PoE-compliant devices such as IP cameras and
wireless access points to connect to a non-PoE switch.
The PoE injector inserts the DC voltage onto the Ethernet cable that leads to the PoE device,
allowing the camera or access point to be mounted on a pole or under the eave of a roof, where
power is not normally available. Typically, the injector itself is located in the wiring closet near the
switch.
Routers
A router is a networking device that connects multiple networks. Traffic from one network to
another does not always have to travel between the same routers. On the Internet, for example,
Routers
traffic is routed according to the best available path at the time. Troubleshooting a router is made
easier by the use of status indicator lights on the various ports.
Access Points
An access point (AP) is a device or software that facilitates communication and provides enhanced
security to wireless devices. It also extends the physical range of a WLAN. The AP functions as a
Access Points
bridge between wireless STAs (stations) and the existing network backbone for network access.
6
network repeaters and bridges are frequently used to extend the range of a WAP. Repeaters are not
needed in twisted pair networks because other devices act as repeaters.
Figure 3-10: A Wi-Fi repeater expands the effective wireless network coverage area.
Modems
A modem is a device that modulates and demodulates digital data to an analog signal that can be sent
over a telephone line. Its name is a combination of modulate and demodulate.
Use a modem to connect to the Internet and to translate digital information to and from your Modems
computer. Depending on the type of connection used, you will use either a cable modem, a DSL
modem, a wireless modem, a voice modem, or a radio modem. A laptop modem can be an internal
device, or you can add it to a system as an external device by using an expansion card.
6
01
)2
(C
Firewalls
A firewall is a software program or hardware device that protects networks from unauthorized data
by blocking unsolicited traffic. Firewalls allow incoming or outgoing traffic that has specifically been
Firewalls
permitted by a system administrator and incoming traffic that is sent in response to requests from
internal systems.
Patch Panels
A patch panel is connection point for drop and patch cables. Typically, a patch panel has one or
more rows of RJ-45 or other connectors. Drop cables are connected to the connectors. Cables run
Patch Panels
between the connectors to connect drop cables as needed.
Patch cables plug into the patch panel to connect two drop cables. They are most often stranded,
and not solid core cables.
Point out the importance A wiring closet, network closet, or telecommunications closet is a small room in which patch panels
of labeling ports and are installed. Drop cables radiate out from the wiring closet to the components on the network.
cables in patch panels.
E
AT
IC
PL
DU
T
NO
6
DO
ACTIVITY 3-2
Identifying Network Components
Scenario
You continue to work on the presentation you started earlier and have included some network
components that your manager asked you to include. To wrap up this section of the presentation,
you decide to make sure everyone can identify various network components.
TOPIC C
Common Network Services
So far in this lesson, you have identified common network types and the components that make
them functional. Now it's time to examine what this network can provide to you and other users. In
this topic, you will identify the properties and purposes of services provided over a network.
Server Roles
In most organizations, the network will have several servers, each taking on a different role. In
smaller networks and test environments, one server might perform several roles.
Server Roles The following table includes some of the common server roles you are likely to encounter.
Internet Appliances
An Internet appliance is a relatively inexpensive PC that enables Internet access and a specific activity.
Often used by organizations to ease remote management and to cut costs, Internet appliances lack
many of the features of a fully equipped PC, and they provide a complete solution consisting of Internet Appliances
limited hardware and software that is needed to perform a single or specialized set of functions. This
hardware device allows for quick installation, ease-of-use, and low maintenance, and is typically
managed through a Web browser. Common Internet appliances are described in the following table.
Internet Description
Appliance
Legacy Systems
You might encounter some older, legacy systems. These are often for specific functions in an
organization. For example, a manufacturing device might only run on a DOS-based system, so the
organization might need to keep this old system running in order to use a device. Legacy Systems
Embedded Systems
Some consumer products, such as the set-top box for a television, often use an operating system
that is contained on a chip or set of chips that is embedded inside the device. Often, this is a Linux-
based system. Embedded Systems
ACTIVITY 3-3
Discussing Common Network Services
Scenario
Your consulting group has been asked to prepare an overview of the network services you would
configure for a new organization. This organization is a non-profit that will not have a web presence
at the current time, but might in the future. They will be using cloud storage and hosted email
addresses. They will have confidential information they need to store locally and also want to be able
to share a color laser printer between the 25-30 employees they anticipate working out of this office.
1. What are the minimum network services you would recommend for this organization based on the
requirements given in the Scenario?
A: Answers will vary, but at a minimum, they should have file and print services.
2. After some discussion amongst the members of the organization, they have decided that they do need
a web site. However, they have no one in-house that can create and maintain the web site. Will they
need web services on their server? Why or why not?
A: Answers will vary, but at a minimum, if they have a consultant create the web site, chances are
that the consultant can also host the site as well, so no web services are needed at this time. If
later down the line, the organization decides they need to host it internally, they can add web
services at that time.
3. Discuss any other network services you feel the organization should implement at this time, or should
plan for in the future.
TOPIC D
Cloud Concepts
So far, you've examined network types, components, and services. One of the latest trends in
networking is to outsource part of an organization's IT infrastructure, platforms, storage, or services
to a cloud service provider. In this topic, you will identify basic cloud concepts.
Cloud Services
Cloud computing is a model for providing or purchasing off-premise computing services over the
Internet. In broad terms, cloud computing is a service (that you purchase or set up on your own) by
which you can dynamically expand or contract computation or storage capabilities on an as-needed Cloud Services
basis.
The National Institute of Standards and Technology (NIST) defines several components of cloud
computing services. Resource allocation is available through rapid elasticity and resource pooling.
Automated service changes are covered through on-demand self service. The capabilities of cloud
systems and the footprint of the overall service is referred to as broad network access. The
provider's ability to control a customer's use of resources through metering is referred to as
measured service.
6
Type Description
Types of Clouds
Cloud computing can be deployed following a public, private, or mixed model.
Benefit Description
Benefits of Cloud
Rapid elasticity To end users, cloud storage often appears to be unlimited storage space. This is Computing
due to rapid elasticity. Users request additional space, and the provider allocates
additional resources seamlessly to the end user. This can often be done
dynamically without any need for the user to contact the hosting provider.
On-demand On-demand cloud services enable end users to request and access cloud
resources as they are needed. This type of cloud service is useful for project-
based needs, giving the project members access to the cloud services for the
duration of the project, and then releasing the cloud services back to the hosting
provider when the project is finished. This way, the organization is only paying
for the services for the duration of the project.
Resource Resource pooling enables the cloud services provider to service multiple
pooling customers to suit each customer's needs without any changes made to one
customer affecting any of the other customers. Customers can change their
service dynamically through on-demand self-service of their accounts.
Measured Measured service refers to the cloud provider's ability to monitor and meter the
service customer's use of resources. This supports the customer's ability to dynamically
make changes to the resources they receive. Based on the metered and measured
information, the provider knows what resources the customer has used and can
then bill for those resources during the next billing cycle.
ACTIVITY 3-4
Discussing Cloud Services
Scenario
There has been a lot of talk around the office recently about cloud services. You have heard some
other people touting this as the only way to go for storage. In order to be sure of yourself before
you join in these conversations, you wrote down some questions and did a little research about them
to make sure you know what you are talking about.
Consider having 1. How do the five components of cloud computing defined by the NIST work together to provide users
students connect to a with cloud computing services?
free cloud storage site A: Resource allocation is provided through rapid elasticity and resource pooling. Resource allocation
and view the available is requested through on-demand self-service. Broad network access makes the resources
space and any other available to the user. Measured service enables the provider to meter customer usage and bill the
information available customer accordingly.
about the service.
2. Which types of services would your organization be likely to use?
A: Answers will vary. You might use IaaS if your organization doesn't have the resources or
knowledge to support its own data center. SaaS can be helpful for mobile or transient workforces.
You might use PaaS if you want to rent a fully configured system that is set up for a specific
purpose.
TOPIC E
Security Fundamentals
This lesson has introduced you to the basics of networking. Any time that users are sharing files and
resources, there is a chance that a security incident can occur. In this topic, you will identify basic
concepts related to security.
Security Compliance
Security compliance refers to an organization's efforts to enforce its security policies. To ensure data
sensitivity and security, many organizations will include the following guidelines in a security policy:
• Patch management guidelines.
• User account and group management.
• Access Control List (ACL) verification.
• Auditing of both systems and data.
• Security testing.
• User education materials, such as documentation, resources, and training schedules.
Strong Passwords
A strong password is a password that meets the complexity requirements that are set forth by a system
administrator and documented in a security policy or password policy. Strong passwords increase
Strong Passwords
the security of systems that use password-based authentication by protecting against password
guessing and other password attacks.
Strong password requirements should meet the security needs of an individual organization, and can
Explain to students that
specify:
there is risk involved • The minimum length of the password.
when requiring a strong • Required characters, such as a combination of letters, numbers, and symbols.
password. Users can
easily forget passwords
• Forbidden character strings, such as the user account name, personal identification information,
if they are too complex, or words found in a dictionary.
but security breaches
can occur if passwords
are too weak.
User Education
The best protection against malicious software or any other security threat is user awareness and
education. Providing end users with information about common threats, hoaxes, and security
User Education
warning signs will enable them to recognize and delete hoax email messages, avoid unauthorized
software, and keep antivirus definitions updated. You must support and encourage users to follow
security trends and use the organization's resources to stay up-to-date on all recent security incidents
and preventative actions. User education is the best defense against data compromise or system
damage.
Physical security Employees should not allow anyone in the building without an ID badge.
Employees should not allow other individuals to tailgate on a single ID badge.
Employees should be comfortable approaching and challenging unknown or
unidentified individuals in a work area. Access within the building should be
restricted to only those areas an employee needs to access for job purposes.
Data handling procedures of confidential files must be followed. Employees
must also follow clean desk policies to ensure that confidential documents and
private corporate information are secured and filed away from plain sight.
System security Proper password behaviors can be crucial in keeping systems resources secure
from unauthorized users. Employees must use their user IDs and passwords
properly and comply with the ID and password requirements set forth by
management. Password information should never be shared or written down
where it is accessible to others. All confidential files should be saved to an
appropriate location on the network where they can be secured and backed up,
not on a hard drive or removable media device.
Device security Employees must follow the correct procedures to log off all systems and shut
down computers when not in use. Wireless communication and personally
owned devices must (or at least should) be approved by the IT department and
installed properly. Policies might be in place to specify how and when personal
devices can be used. These devices can be a gateway for attackers to access
corporate information and sensitive data. Portable devices, such as laptops and
mobile devices, must be properly stored and secured when not in use.
Social networking Employees must be made aware of the potential threats and attacks that target
security social networking applications and websites. The use of these applications can
lead to potential breaches in security on an organization's network. Security
policies should include guidelines and restrictions for users of any social
networking application or website.
Authentication Methods
Most organizations will employ a variety of authentication methods in order to prevent
unauthorized access to the physical building, infrastructure, and resources. Common authentication
Authentication Methods
methods include the following.
Authentication Description
Method
User name and In this system, a user or computer must have a valid user name and an
password associated secret password. The user submits the user name/password
combination to an authenticating system such as a network directory server,
which validates the credentials against a database and verifies the user's
identity. The security of the system can be breached if the authentication
database is altered or compromised, whether accidentally or maliciously, or if
the credentials, particularly the password, are lost, stolen, or guessed by a third
party.
Biometrics Biometrics are authentication schemes based on individuals' physical
characteristics, such as fingerprints or vocal patterns. Biometrics require
specialized equipment and software to store, access, and verify the physical
information. As biometric authentication becomes less expensive to
implement, it is becoming more widely adopted.
Tokens Tokens are physical or virtual objects, such as RSA tokens, smart cards, and ID
badges that store authentication information. Tokens can store personal
identification numbers (PINs), information about the user, or passwords. For
example, a smart card is a plastic card containing an embedded computer chip
that can store different types of electronic information. The contents of the
card are read with a special device called a smart card reader, which can be
attached to a PC. When used for authentication, the smart card will store user
credentials or private information such as a password or PIN. The user must
present the smart card as a token of the user's identity, and so smart cards are
sometimes classified as a form of token-based authentication.
Multi-factor An authentication scheme with just one factor can be called single-factor
authentication authentication, while a two- or three-factor authentication scheme can simply
be called multi-factor authentication. It can be any combination of what you are,
what you have, and what you know. System designers determine what specific
factors are required during the design phase.
If a user is required to pass a fingerprint scan as well as to enter a password to
gain access to a secure facility, this would combine the "who you are" and
"what you know" factors. Multi-factor authentication enhances the security of
using any single factor alone. Token-based or biometric-based authentication
are rarely deployed alone; more frequently, they are used in addition to user
name and password authentication.
Mutual Mutual authentication is a security mechanism that requires that each party in a
authentication communication verify its identity. First, a service or resource verifies the
client’s credentials, and then the client verifies the resource’s credentials.
Mutual authentication prevents a client from inadvertently submitting
confidential information to a non-secure server. Any type or combination of
authentication mechanisms can be used.
Biometric Description
Authentication
Method
Fingerprint scanner A user's fingerprint pattern is scanned and stored. To authenticate, the user
scans a finger again and the print is compared to the stored image in the
authentication database. The fingerprint scanner can be a small separate
hardware device, and is even built into some laptops, mice, and universal
serial bus (USB) flash drives.
Hand geometry An individual's hand geometry can also be used for authentication. Hand
scanner scanners have pegs between which users insert their fingers. Once the
initial scan is stored, and then used to authenticate, subsequent scans are
compared to the stored scan in the authentication database.
Retinal scanner The pattern on a user's retina is scanned and stored. To authenticate, the
user scans an eye again and the pattern is compared to the authentication
database.
Voice recognition The user provides a speech sample that is analyzed with voice-recognition
software and stored. To authenticate, the user speaks again and the speech
patterns are analyzed by the software and compared against the stored
sample in the authentication database.
Face recognition A digital image of the user's face is analyzed with face-recognition software
and stored. To authenticate, the user's face is scanned digitally again and
the facial appearance is compared against the stored image in the
authentication database.
Biometric Biometric user data can be scanned and encoded once and then stored on a
authentication tokens chip on some form of portable electronic security token, such as a smart
card or a digital key fob. To authenticate, the user presents the token
instead of submitting to another biometric scan. Because the token could
be lost or stolen, it is best to combine this type of authentication with a
password or PIN, or at least to include a user photograph on the card for
visual confirmation of the user's identity.
Encryption
Encryption is the process of converting data into a form that is not easily recognized or understood
by anyone who is not authorized to access the data. Only authorized parties with the necessary
decryption information can decode and read the data. Encryption can be one-way, which means the Encryption
encryption is designed to hide only the cleartext and is never decrypted, or it can be two-way, in
which the encryption can be decrypted back to cleartext and read.
Malware
Malware is any unwanted software that has the potential to damage a system, impede performance,
or create a nuisance condition. The software might be introduced deliberately or inadvertently and
Malware
might or might not be able to propagate itself to other systems.
ACTIVITY 3-5
Identifying Security Concepts
Scenario
In this activity, you will identify common security concepts.
1. Katie works in a high-security government facility. When she comes to work in the morning, she places
her hand on a scanning device in her building's lobby, which reads her hand print and compares it to a
master record of her hand print in a database to verify her identity. This is an example of:
◉ Biometric authentication
○ Multi-factor authentication
○ Data encryption
○ Tokens
3. While assigning privileges to the accounting department in your organization, Cindy, a human resource
administrative assistant, insists that she needs access to the employee records database in order to
fulfill change of address requests from employees. After checking with her manager and referring to the
organization's access control security policy, Cindy's job role does not fall into the authorized category
for access to that database. What security concept is being practiced in this scenario?
○ The use of strong passwords.
○ User education.
◉ The principle of least privilege.
○ Common user security practices.
Summary
In this lesson, you got a brief introduction to network and security concepts and features. Every
organization will implement these features and concepts in one way or another, depending on their
needs.
Which of the network features presented in this lesson does your organization currently use and support?
Which ones do you think they should use if they are not currently using them?
Encourage students to
use the social A: Answers will vary. Depending on the size of the organization, different features will be implemented.
networking tools For example, a small organization might use more vendor-based or subscription services, while a
provided on the CHOICE larger organization will be more likely to implement services on their own servers.
Course screen to follow
up with their peers after How do the security fundamentals presented in this lesson support the network components and services
the course is completed and cloud features presented in this lesson?
for further discussion A: Answers will vary. Defining the corporate security policies for network components and services as
and resources to support
well as cloud services should include items such as strong passwords, principle of least privilege, the
continued learning.
authentication and encryption methods to be used, and security best practices. These policies all
support keeping the components and services secure.
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will identify the operational procedures that should be followed by
professional PC technicians. You will:
• Identify basic tools and techniques for maintaining PCs, mobile devices, and printing
devices.
• Identify best practices to follow to ensure personal and electrical safety.
• Identify best practices to follow to ensure environmental safety and the proper handling
of potentially harmful materials.
• Identify best practices for entry-level IT professionals to use for appropriate
communication with clients and colleagues.
• Identify common organizational policies and procedures that deal with computer use.
• Explain troubleshooting theory.
Lesson Introduction
In the previous lessons, you gained fundamental knowledge about personal computer
hardware components and operating systems. In addition to that information, every PC
technician also needs a working knowledge of tools, safety and environmental precautions,
and when professional conduct is important in the workplace. In this lesson, you will
identify the operational procedures that you should follow to ensure a safe working
environment.
As an A+ technician, you will be asked to install, configure, maintain, and correct problems
with a variety of PC components. To work with these components without damaging them
or causing physical injury to yourself or others, there are several tools to use and operational
procedures to follow in order to get the job done quickly, safely, and correctly.
112 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Basic Maintenance Tools and Techniques
In this lesson, you will identify the operational procedures that can help ensure your success as an A
+ certified professional. To begin, it's critical to select the right tool or technique for the job. In this
topic, you will identify common hardware and software tools, maintenance techniques, and
resources that are used by professional PC technicians.
When it comes to computer maintenance, having the right tool will save time, trouble, and money.
Having a good collection of software and hardware tools at your disposal, a foundational knowledge
of maintenance techniques, and access to documentation or resources when you need assistance is
essential to help you perform your job tasks efficiently.
• Three-prong retriever.
• Ratchets.
• Allen wrenches.
• Cotton swabs.
• Batteries.
• Anti-static cleaning wipes.
• Anti-static wrist band.
• Compressed air canister.
• Mini vacuum.
• Pen knife.
• Clamp.
• Chip extractor.
• Chip inserter.
• Multimeter.
• Soldering iron and related supplies.
• Spare parts container.
• Circuit tester.
• Drive adapters (USB to IDE/SATA and SATA/PATA/IDE to USB).
Cleaning Materials
Cleaning materials for computers range from standard household cleaning supplies to supplies
specifically designed for computers and electronics.
Cleaning Materials
Cleaning Supply Description
Wipes and cloths There are several types of wipes and cloths that you can use to clean
displays, keyboards, and other equipment.
• Monitor cleaning wipes are alcohol-based, lint-free, pre-moistened wipes
for cleaning monitor screens. Use these only on cathode ray tube (CRT)
or TV monitors and not on plastic-coated liquid crystal display LCD
screens.
• Keyboard cleaning wipes are pre-moistened wipes for cleaning
keyboards.
• You can use microfiber cloths to lightly remove dust and smudges from
LCD displays. You can also use an LCD cleaning solution with the cloth
to remove particles and smudges that are stuck to the screen.
• If you choose not to use pre-moistened wipes, you can use rubbing
alcohol applied to a lint-free cloth to wipe down screens and keyboards.
You can also use this to clean other components.
• A toner cloth is a special cloth that you stretch that picks up toner
particles that are either in the printer or around the printer. Be careful if
you are using it inside the printer so that the cloth does not get caught
on any components and leave fibers behind.
Cleaning solutions There are a variety of cleaning solutions that you can use to clean displays,
keyboards, and other equipment.
• You can use rubbing alcohol on cotton swabs or lint-free cloths to clean
many components.
• You can use mild household cleaner to keep the exterior of computer
components clean. This helps prevent dirt and debris from getting inside
the equipment. Never spray the cleaner directly on the equipment. Avoid
using ammonia-based cleaners around laser printers; the ammonia may
react chemically with the toner.
• For older monitors, especially plastic monitors, read the device's manual
to determine the cleaning method recommended by the manufacturer.
While some recommend water or isopropyl alcohol (IPA), others claim it
is acceptable to use volatile chemicals such as hexane or petroleum
benzene, a soft detergent such as Palmolive and water, no suds, or
nothing but a dry soft cloth. While some recommend a top-down
motion, others subscribe to the circular method.
• For flat screens such as LCDs, light emitting diodes (LEDs), and
plasmas, you can use distilled water, or an equal ratio of water and
vinegar on a microfiber or lint-free cloth. There are also specialized
cleaners available for flat screens, but make sure to check the
manufacturer's instructions before use.
• In some cases, you can use standard household window cleaner on
components if you spray it on a lint-free cloth first. You can use this to
clean smudges from optical discs. Never use window cleaner on plastic
monitor screens, and even on glass screens; this cleaner might strip off
the anti-glare protection. The best option is a damp, clean, soft cloth
with water or a cleaner specifically made for monitors (or one that states
it is safe for use with monitors) and will not damage anti-glare finishes.
Resource Description
User/installation manuals User and installation manuals can provide you with basic guidance
for installing, configuring, and troubleshooting hardware and
software.
By providing users with various user and installation manuals, users
can fix minor issues and problems before requesting additional
assistance from a technician. Examples include installing company-
specific applications, installing network printers, and mapping
drives.
Internet/web-based Internet and web-based resources can provide a wealth of
resources information on installing, configuring, and troubleshooting
hardware and software. Many hardware and software manufacturers
maintain knowledge bases and wikis to share information about
both common and unusual issues that can arise with PC hardware
and software.
Internet and web-based materials can also provide users with quick
reference materials for dealing with everyday issues on their own.
Some organizations provide a web page or wiki with user-specific
information and reference materials.
Training materials Most major hardware and software manufacturers provide training
materials on how to install and use their products. These materials
can be helpful for both new and experienced technicians.
You can provide training materials for various tasks that users may
need to complete on their own, such as virus scans, computer
maintenance tasks, and PC clean-up tasks. By providing training
materials, you empower users to be proactive in maintaining their
systems.
ACTIVITY 4-1
Discussing Basic Maintenance Tools and
Techniques
Scenario
In this activity, you will examine the various tools and techniques used to maintain computer
equipment and the workplace environment.
1. You are asked to correct a network cabling problem at a customer site. Which set of tools would be best
suited for the task?
○ Phillips screwdriver (#0), torx driver (size T8, T10, and T15), tweezers, and a three-prong retriever
◉ Wire strippers, precision wire cutters, digital cable tester, and cable crimper with dies
○ Chip extractor, chip inserter, ratchet, and Allen wrench
○ Anti-static cleaning wipes, anti-static wrist band, flashlight, and cotton swabs
2. You suspect that contaminants from the environment have prevented the fan on a PC from working
optimally. Which set of tools would be best suited to fix the problem?
○ Phillips screwdriver (#0), torx driver (size T8, T10, and T15), tweezers, and a three-prong retriever
○ Wire strippers, precision wire cutters, digital multimeter, and cable crimper with dies
○ Chip extractor, chip inserter, ratchet, and Allen wrench
◉ Anti-static cleaning wipes, anti-static wrist band, flashlight, and cotton swabs
3. True or False? Windows includes software diagnostic tests that help you find and correct hardware
problems.
☑ True
☐ False
4. Examine the tools that are available to you in class. Discuss how and when they may be used to repair,
fix, or maintain computer equipment.
Facilitate a discussion of
the tools that you have
provided, and ask
participants to suggest
other tools that might be
helpful and that they
would want to include in
a "Dream Toolkit."
TOPIC B
Personal and Electrical Safety
In the previous topic, you identified basic maintenance tools and techniques that you will use as a
PC technician. In addition to these basic maintenance practices, you need to be aware of specific
tools and techniques that are available to promote electrical safety. In this topic, you will identify the
best practices for PC technicians to follow to promote electrical safety.
The most prevalent physical hazards that computer technicians face are electrical hazards. Electricity
is necessary to run a computer, but it can also damage sensitive computer equipment, and in some
cases, pose a danger to humans. Following established best practices for promoting electrical safety
will protect not only the computer equipment that you work on, but also your personal safety and
the safety of others.
Static Electricity
Static electricity is a build-up of electrical potential energy that is caused by bringing two different
materials into contact. Rubbing those materials together increases the frequency of the contact, and
Static Electricity
this produces static electricity through triboelectric generation. When two materials are in contact, one
can attract more electrons than the other. Separate the materials, and some electrons can transfer to
the material that attracts them most strongly. That leaves one material with extra electrons (and
negatively charged) and the other material with fewer electrons (and positively charged). This
Point out that static accumulated imbalance of charges on an object is static electricity.
electricity is an
imbalance of electrons. Note: Static charges can be as small as the sparks that come off a dry blanket in the wintertime
or as massive as a lightning strike, with its millions of volts.
ESD
Electrostatic discharge (ESD) occurs when a path is created that allows electrons to rush from a
statically charged body to another with an unequal charge. The electricity is released with a spark.
ESD
The charge follows the path of least resistance, so it can occur between an electrical ground, such as
a doorknob or a computer chassis, and a charged body, such as a human hand. ESD can damage
sensitive computer equipment.
Point out that you can
Because air has very high resistance, a static electric discharge usually requires contact with the
see a spark at 8,000 V, statically charged object. For a static discharge to arc through the air, it requires a very high voltage,
but a circuit can be and no other path to the ground with lower resistance. You can feel a static discharge starting at
damaged by as little as around 3,000 volts (V). The drier the air, the greater the resistance, which is why static shocks on dry
10 to 100 V. winter days can fall within the range of 10,000 to 20,000 V. Keeping a room humidified is one way
to reduce the risk of static electricity.
If 120 V from a household electrical outlet can kill you, why does a static spark of 20,000 V just
startle you? Because, while the voltage might be high, the current is very low; very few total
electrons are transferred in a static spark. All the energy of all the electrons in a spark added together
cannot hurt you, even though it may surprise you. Each electron in a static discharge has extremely
high energy, but the human body is just too big for the very small number of electrons involved in
the spark to cause widespread damage. A few cells in your fingertip may be damaged, but they easily
grow back.
conductors and insulators, as well as in the human body. When you work with computer equipment,
you must take steps to protect against ESD.
There are several prevention techniques that you can use to protect yourself and equipment when
you are working with computer components.
Eliminate activities and By eliminating unnecessary activities that create static charges and by
tasks removing unnecessary materials that are known charge generators, you
can protect against ESD-related damage and injuries.
Use self-grounding Use grounding conductive materials and self-grounding methods before
methods touching electronic equipment. You can prevent ESD injuries by using
ESD straps that can be attached to your ankle or wrist.
Use equipment Grounding equipment made up of dissipative material can also be used to
grounding methods avoid a static shock. A dissipative material is a conductor, but with high
resistance. It loses its electrical charge slowly, so when you touch it, the
electron flow is spread over time and you do not feel a shock. Prevent
ESD damage to equipment by:
• Using anti-static vacuums for cleaning computer components (such
as system units, power supplies, and fans).
• Using ESD mats and materials such as electric grounded flooring,
work benches, or surfaces.
• Using anti-static bags to store computer components that are
particularly sensitive to ESD, such as RAM and power supplies.
Maintain air quality You can maintain air quality and prevent a high-ESD work environment
by:
• Using an air ionizer, which releases negative ions into the air. They
attract positively charged particles and form neutrally charged
particles.
• Humidifying the air to speed up the static discharge from
components. When the air is extremely dry, more static is likely. A
higher humidity is best for ESD prevention. A rate of 50 to 60
percent is comfortable for both computers and technicians.
Anti-static Bags
Anti-static bags that are used for shipping components actually conduct electricity, so keep them
away from equipment that is powered on.
ESD Tools
Some people who work on computer equipment never use a single piece of ESD safety equipment.
They discharge themselves by touching an unpainted metal part of the computer case before
touching any components. In other instances, a company policy might require that you use a ESD Tools
properly equipped ESD-free work area. The minimum equipment in this case would be a grounded
wrist ESD strap. Other ESD-protection equipment includes leg ESD straps, anti-static pads to
cover the work surface, and grounded floor ESD mats to stand on. The mats contain a snap that
you connect to the wrist or leg strap. Anti-static bags for storing components might also be included
in an ESD toolkit. If the technician's clothing has the potential to produce static charges, an ESD
smock, which covers from the waist up, can be helpful.
To ensure that the ESD equipment remains effective, you should test it frequently. A minor shock
that you cannot feel can compromise ESD-sensitive equipment.
EMI
Electromagnetic interference (EMI) occurs when a magnetic field builds up around one electrical circuit
and interferes with the signal being carried on an adjacent circuit, causing network communication
EMI
interference issues. All current-carrying devices generate magnetic fields, and fluctuating magnetic
fields generate electrical current in nearby wires. While ESD is the primary electrical danger to
computer equipment, EMI also causes problems with microcomputer circuitry and data
transmissions between computing devices.
EMI-related issues can also be a result of magnets being placed too close to computer systems.
Magnets can be harmful to computer components, and components should not be placed in close
proximity to any magnets or items that contain magnets. It's important that you inform users to
keep magnets away from their computer equipment.
Electrical Hazards
Because computers are powered by electricity, there are some common potential electrical hazards
that you should be aware of when you are servicing them.
Electrical Hazards
Electrical Hazard Description
Electric shock If you touch a high-voltage source, and if you are either grounded or in
contact with another electrical circuit, your body may complete an electrical
circuit, permitting electrons to flow through you. Water is a better
conductor than air or dry skin, so touching an electrical contact with wet
hands reduces resistance and increases the current flow even more.
Depending on the conditions, this may cause pain, burns, or even death.
Equipment Grounding
Grounding is the connection of a shield or conductor to an electrical ground point, such as a pipe or
wire that is in contact with the ground. Grounding at one point in a segment helps prevent noise on
Equipment Grounding
the data conductor by shunting noise signals to ground. Connecting to ground at multiple points can
introduce noise onto the line, degrading network performance.
Electrical devices often must be connected to a ground point for safety. In these situations, the
ground connection serves as a way to direct high voltages safely away from humans and other
devices, sending them instead into the ground.
You should ground networking and other sensitive electronic equipment to dedicated ground points
rather than to pipes and conduits. Electricians refer to this sort of ground connection as an isolated
ground and will use an orange socket for such circuits.
Category Guidelines
Personal safety • Make sure that you disconnect the power before repairing computer
equipment.
• Do not attempt repair work when you are tired; you may make careless
mistakes, and your primary diagnostic tool, deductive reasoning, will not be
operating at full capacity.
• Do not assume anything without checking it out for yourself.
• Remove jewelry or other articles that could accidentally contact circuitry
and conduct current.
• Wear rubber-soled shoes to insulate yourself from ground.
• After turning off the device and removing the power source, press the
power button again to drain any residual power.
Environment • Suspend work during an electrical storm.
conditions • Do not handle electrical equipment when your hands or feet are wet or
when you are standing on a wet surface. Perform as many tests as possible
with the power off.
Anti-static • Prevent static electricity from damaging components by standing on a
equipment totally insulated rubber mat to increase the resistance of the path to
ground. In some cases, workstations are located in areas with grounded
floors and workbenches, so static electricity has a low-resistance, non-
destructive path to ground.
• When removing circuit boards, place them on a dissipative ground mat or
put them in an anti-static bag.
• Use an anti-static wrist strap when you are handling static-sensitive
components such as system boards, sound cards, and memory chips.
Disassembly safety • After cleaning a component, be completely sure it is dry before powering it
up.
• Label wires and connectors as you detach them, and make sure that you
plug them back into the proper sockets in the proper order.
• When you replace the computer's case, make sure that all of the wires are
inside. The case may have sharp edges that can cut through exposed
cables.
Power supply • Power supplies have a high voltage in them any time the computer is
safety plugged in, even if the computer power is turned off. Before you start
working inside the computer case, disconnect the power cord and press
the power button to dissipate any remaining power in the system circuitry.
Leave the power off until you are done servicing the system unit.
• Never stick anything into the power supply fan to get it to rotate. This
approach does not work, and it is dangerous.
Category Guidelines
Electrical fire Electrical fires in computer facilities are especially dangerous. The damage
safety done to computers is extremely expensive, and the chemicals used in the
machines may emit toxic substances. It is not practical to fight these fires with
small extinguishers or to douse fires with water. Special gases should be used
to extinguish fires in computer facilities. To prevent electrical fires:
• Check the electrical wiring of computer systems and components regularly.
• Implement a strategy to make sure any old, worn, or damaged cables,
network appliances, and computer systems are checked and replaced
regularly.
• Verify that smoke detectors are installed to sense the presence of smoke.
• Use heat sensors that are triggered either when a target temperature is
reached or when there is a high rate of increase in temperature.
• Use flame detectors with optical sensors to record incoming radiation at
selected wavelengths.
Commercial fire detection systems should be connected to a central reporting
station where the location of the suspected fire is indicated. In some cases, the
detection system or monitoring station is connected directly to a fire
department.
ACTIVITY 4-2
Discussing Personal and Electrical Safety Issues
Scenario
In this activity, you will identify electrical safety issues.
1. True or False? If you are using an anti-static ESD floor mat, you do not need any other ESD safety
equipment.
☐ True
☑ False
2. Electrical injuries include electrocution, shock, and collateral injury. Would you be injured if you are not
part of the electrical ground current?
A: Yes, you could receive a thermal burn from the head of an electric arc or electric equipment. Your
clothes can catch on fire, or your skin can be burned.
3. Which computer component presents the most danger from electrical shock?
○ System boards
○ Hard drives
◉ Power supplies
○ System unit
4. Have you had any personal experience with any of the electrical hazards covered in this topic? What
safety precautions could have prevented the incident?
A: Answers will vary depending on individual experiences. Common precautions include
disconnecting a computer from the electrical outlet or power strip before servicing it, using anti-
static equipment to protect computer components, and implementing smoke and flame detectors
to alert you of electrical fires.
TOPIC C
Environmental Safety and Materials Handling
In the previous topic, you identified best practices for safely dealing with electricity. Electrical safety
is just one factor that you need to consider to ensure a safe work area. In this topic, you will identify
best practices for promoting environmental safety and proper materials handling.
In addition to electrical issues, there are other environmental issues that computer technicians must
deal with on a regular basis. The health and safety of you and those around you should always be
your highest priority. Recognizing potential environmental hazards and properly dealing with them
in a safe manner is a critical responsibility for an A+ technician.
Environmental Considerations
Certain environmental conditions can be extremely dangerous to you and those around you.
embedded laser beam is accessible, precautions must be based on the classification of the embedded
laser (Class 3 or 4).
Precautions include the following:
• Never point a laser beam in someone’s eyes.
• Never look directly at a laser beam.
• Never disable safety mechanisms when servicing a device with an embedded laser.
UPS or battery An uninterruptible power supply (UPS), also referred to as a battery backup, is a
backup device that continues to provide power to connected circuits when the main
source of power becomes unavailable. Depending on the design, UPSs can
be battery operated, AC powered, or both. They are meant for temporary use
and are intended to support computer systems until they can be powered off
normally. Power is likely to be interrupted when the batteries or other power
sources are discharged.
Generators A generator creates its own electricity through the use of motors. Generators
provide long-term power and are often started while a UPS system supports
equipment through the initial power loss. Generators can fail when motor
fuel runs out or when a mechanical failure occurs.
Surge suppressor A surge suppressor is a device that provides power protection circuits that can
reduce or eliminate the impact of surges and spikes.
UPS Types
Depending on the needs of an organization, different types of UPSs might be used. Common types
include:
• A standby UPS, which is primarily AC-powered, until the power source fails. When the power
source fails, it switches to the backup power source or battery. This UPS is used most often with
personal computers.
• A line interactive UPS is commonly used in smaller business settings to provide power through a
constant AC connection. When the AC power fails, the inverter switches to battery power. This
UPS is unique in that while the AC power is available, it is used to also charge the battery.
Liquid Hazards
There are many different professional situations when you may come in contact with a hazardous
liquid. Some such compounds are used to clean or condition equipment, including the computer’s
case, adapter card contacts and connections, and glass surfaces. They may present safety or Liquid Hazards
environmental problems. Make sure you read the labels and follow the instructions carefully when
you are disposing of hazardous materials.
Chemical Hazards
Working with personal computers can cause you to come in contact with some chemical hazards.
Caution: The capacitors in power supplies and monitors do not discharge when they are turned
off or unplugged, and contain enough charge to kill you. Do not open or attempt to service
internal components of power supplies or monitors.
MSDS Documentation
A Material Safety Data Sheet (MSDS) is a technical bulletin that is designed to give users and
emergency personnel information about the proper procedures for the storage and handling of a
hazardous substance. This applies to any situation in which an employee is exposed to a chemical MSDS Documentation
under normal use conditions or in the event of an emergency. The manufacturers supply MSDSs
with the first shipment to a new customer and with any shipment after the MSDS is updated with
significant and new information about safety hazards. You can get MSDSs online; the Internet has a
wide range of free resources. OSHA regulations govern the use of MSDSs and the information an
MSDS must contain.
Incident Reports
An incident report is a record of any instance where a person is injured or computer equipment is
Incident Reports damaged due to environmental issues. The report is also used for accidents involving hazardous
materials, such as chemical spills, that could have an impact on the environment. Any time an
accident occurs at a work site, you should submit an incident report. Reporting these occurrences is
often part of company policy and can help provide protection against liability.
ACTIVITY 4-3
Discussing Environmental Safety and Materials
Handling
Scenario
In this activity, you will identify the best practices for promoting environmental safety and proper
handling of materials.
1. You are on a service call, and you accidentally spill some liquid cleaner on the user's work surface.
What actions should you take?
☑ Refer to the MSDS for procedures to follow when the material is spilled.
☐ Wipe it up with a paper towel and dispose of the paper towel in the user's trash container.
☑ Report the incident.
3. What item reacts with heat and ammonia-based cleaners to present a workplace hazard?
○ Capacitor
○ Laser
◉ Toner
○ Battery
TOPIC D
Professionalism and Communication
So far in this lesson, you have identified best practices for working directly with computer
equipment. On almost every service call, you will also need to interact with users who are
experiencing problems. In this topic, you will identify best practices for PC technicians to use to
communicate appropriately with clients and colleagues and to conduct business in a professional
manner.
You are a representative of your profession, as well as your company. Working with customers is a
fundamental job duty for every A+ technician. How you conduct yourself will have a direct and
significant impact on the satisfaction of your customers, and your level of professionalism and
communication skills can directly affect whether or not you will do business with them again.
Communication Skills
Using the proper communication skills when dealing with clients and colleagues creates a
professional environment that is conducive to solving the problem at hand. Some of the
Communication Skills
communication techniques you should master include:
• Use proper language. Avoid the use of jargon, acronyms, and slang when applicable.
• Maintain a positive attitude and project confidence.
• Actively listen to the customer. This might include taking notes and avoiding interrupting the
customer.
• Be culturally sensitive to the customer. In some cases this can include the use of appropriate
professional titles. Also, different cultures define personal space differently, so be aware of how
close or far you are from the customer.
• Be on time. If you are unavoidably detained, contact the customer to let them know you will be
late. In some cases you will need to reschedule your appointment with the customer.
• Avoid distractions. This includes not taking personal calls, texting, or visiting social media sites
while with a customer. Also, avoid talking to co-workers while interacting with customers or
letting personal interruptions affect the client interaction.
• Deal appropriately with a customer's confidential and private materials. This includes items
located on their computer, on their desk, on a printer, or elsewhere.
When you meet with a customer, be sure that the expectations and timeline are set and met. If
resolution of the issue is going to take a considerable amount of time, be sure to communicate the
status of the issue with the customer. You might need to offer different repair or replacement
options if the user is going to be without their device for awhile. Always provide the proper
documentation on the services you provide to the customer. Be sure to follow up with the customer
at a later date to verify their satisfaction with your work and that the issue has been successfully
resolved.
Some customers or situations are more intense than others. A customer might become difficult if
you cannot instantly resolve their problem. When dealing with a difficult customer or situation:
• Do not argue with the customer or be defensive.
• Avoid dismissing customer problems.
• Clarify customer statements by asking open ended questions to help narrow the scope of the
problem. You should consider restating the issue or question back to the customer to verify
understanding.
• Do not disclose experiences via social media sites.
ACTIVITY 4-4
Discussing Professionalism and Communication
Techniques
Scenario
In this activity, you will examine different professionalism and communication techniques.
2. You have received an off-site service call to service a network printer at a customer location. When you
arrive, the user is at the printer and starts talking about how the printer is not working properly, and he
cannot get his reports handed in on time. As a result, you start asking more clarifying questions to
gather more information, so you can identify the specific issue with the printer. What type of technique
are you using to gather information?
○ Passive listening
○ Non-verbal communication
◉ Active listening
TOPIC E
Organizational Policies and Procedures
In the last topic, you identified best practices for communicating appropriately with customers.
You'll also need to deal appropriately with management, particularly when it comes to established
protocols for the use and care of computing devices. In this topic, you will identify common
organizational policies and procedures that deal with computer use.
By identifying common organizational policies and procedures that deal with computer use, you will
be more capable of dealing with compliance issues as they arise and protecting organizational
resources.
E
AT
IC
PL
DU
T
NO
6
DO
a customer. There are different levels of prohibited content, which can be described as distasteful,
inappropriate, or illegal.
Every organization will have different guidelines and restrictions based on the type of content. For
example, some organizations will discourage access to social networking sites, or websites that
contain questionable words or phrases, but will not explicitly forbid it. On the other hand,
restrictions on content or data that can be categorized as inappropriate or illegal, such as
pornography, will be enforced heavily, and accessing such content will have immediate
consequences.
In each of these cases, it is your responsibility to follow organizational procedure to report the
incident. When reporting potentially illegal activities, you must follow the organization's policy on
reporting, collecting, and documenting the specifics of the situation and what evidence was found.
Phase Description
First response First response refers to the immediate actions that follow an incident, as well as
the individual or individuals who perform these actions. There are a few
actions that take place during the first response to an incident:
• Identifying the data and/or hardware.
• Reporting the details of the discovery and evidence through the proper
channels. This will vary depending on the specific organization's policies
and reporting instructions.
• Preserving the data and/or device as evidence. This is also called computer
forensics.
Chain of custody The chain of custody is the record of tracking evidence from collection through
presentation in court. The evidence can be hardware components, electronic
data, or telephone systems. The chain of evidence reinforces the integrity and
proper custody of evidence from collection, to analysis, to storage, and
presentation in a court of law. Every person in the chain who handles evidence
must log and document the process, methods, and tools they used.
Documentation In the process of identifying and reporting incidents with prohibited content,
you should follow the organization's documented procedures to ensure that
you are carrying out the correct response tasks and guidelines. You must also
be aware of any changes made to the documentation so that you are always
following the right procedures in handling incidents, managing evidence, and
reporting findings to the appropriate individuals.
Removing Computers
When computer crimes are reported, one of the first response activities is removing computers from
the crime location. They are tagged with a chain of custody record to begin the process of making
the evidence secure for future presentation in court.
Computer Forensics
Computer forensics is the practice of collecting and analyzing data from storage devices, computer
systems, networks, and wireless communications and presenting this information as a form of
Computer Forensics
evidence in a court of law. Primarily, forensics deals with the recovery and investigation of potential
evidence. Computer forensics is a fairly new field, so there is little standardization or consistency in
practicing it across organizations and courts. Basically, computer forensics is a blend of the elements
of law with computer science in analyzing evidence in a way that is permissible in the court of law.
Forensic response procedures for IT help security professionals collect data evidence in a form that
is admissible in a court of law.
Capture system image One of the most important steps in computer forensic evidence procedures
is to capture exact duplicates of the evidence, also known as forensic
images. This is accomplished by making a bit-for-bit copy of a piece of
media as an image file with high accuracy.
Examine network Attackers always leave behind traces; you just need to know how and where
traffic and logs to look. Logs record everything that happens in an intrusion prevention
system (IPS) or intrusion detection system (IDS), and in routers, firewalls,
servers, desktops, mainframes, applications, databases, antivirus software,
and virtual private networks (VPNs). With these logs, it is possible to
extract the identity of hackers and provide necessary evidence.
Capture video Video forensics is the method by which video is scrutinized for clues.
Tools for computer forensics are used in reassembling video to be used as
evidence in a court of law.
Record time offset The format in which time is recorded against a file activity, such as file
creation, deletion, last modified, and last accessed, has developed to
incorporate a local time zone offset against GMT. This makes it easier for
forensic examiners to determine the exact time the activity took place, even
if the computer is moved from one time zone to another or if the time
zone has deliberately been changed on a system.
Take hashes Federal law enforcement agencies and federal governments maintain a list
of files such as files relating to components of Microsoft® Windows® and
other application software. The hash codes generated by a file or software
can be compared to the list of known file hashes and hacker tools if any are
flagged or marked as unknown.
Take screenshots You should capture screenshots of each and every step of a forensic
procedure, especially when you are retrieving evidence by using a forensic
tool. This will ensure that data present on a compromised system is not
tampered with and also provides the court with proof of your use of valid
computer forensic methods while extracting the evidence.
Identify witnesses Courts generally accept evidence if it is seconded by the testimony of a
witness who observed the procedure by which the evidence was acquired.
A computer forensics expert witness is someone who has experience in
handling computer forensics tools and is able to establish the validity of
evidence.
Privacy
All organizations must consider their legal obligations, rights, liabilities, and limitations when
creating policies. Because incidents can potentially be prosecuted as technology crimes,
organizations must be prepared to work with civil authorities when investigating, reporting, and Privacy
resolving each incident. Information security practices must comply with legal requirements that are
documented in other departmental policies, such as human resources. A company's response to any
incident must conform to the company's legal limitations as well as the civil rights of individuals
involved.
Legal issues can affect different parties within each organization.
PII
One of the more common types of information that is protected by organizational policies is
personally identifiable information (PII). Personally identifiable information (PII) is any information that
can be used by itself or in combination with additional information as a way to identify, contact, or
find a single person, or to identify a particular individual by using the various pieces of information
together to determine the person's identity. The definition of what PII is can differ by legal
jurisdiction.
Note: Although the abbreviation PII is widely accepted in the U.S., the phrase it abbreviates can
have four variations depending on the chosen forms of the words personal (or personally) and
identifiable (or identifying). These variants are not identical from a legal standpoint. Each term's
definition can change depending on the jurisdiction and the reason the term is being used.
PII can include a user's full name, fingerprints, license plate number, phone numbers, street address,
driver's license number, and so on.
Software Licensing
Most software has a software license agreement that allows the user to install and use the software
on a single computer. Unless the license explicitly states that the software can be used on more than
Software Licensing
one computer, installing it on additional computers is illegal. Also, be sure that you are buying
legitimate copies of the software and not bootlegged copies.
Two terms you often encounter when discussing licensing are Digital Rights Management (DRM)
and End User License Agreement (EULA). DRM is a copy protection method used for digital
content and devices. EULA is a legal contract specifying what the purchaser is allowed to do with
the software. Many users acknowledge the DRM and EULA as part of software installation without
actually reading the content of those two legally binding documents. Be sure you know what you are
agreeing to when you acknowledge those items.
Open source software is free to use, can be modified, and can be shared. Open source software
licenses approved by the Open Source Initiative state that the software meets the requirements of
being free, open to modification, and being shared. Many open source applications use the GNU
General Public License. The full content of the GNU GPL can be found at opensource.org/
licenses/GPL-3.0.
Commercial licenses can be found in both proprietary closed-source and open-source software.
Some software may be free to use for personal use, but if you want the software to be used in a
business, you might need to purchase the application or contact the publisher or author of the
software to make arrangements for its use.
A personal license for an application means that you can use the software for your own use, but not
for any commercial application of the software.
An Enterprise license might be available for applications and closed-source operating systems for
large organizations. These are often sold in increments of 50-100 users, 100-500 users, 1000-5000
users, and so forth. Enterprise licensing makes it easier for large organizations to make sure they are
in compliance with having enough licenses for all of their users without needing to purchase and
track individual licenses for each user.
ACTIVITY 4-5
Discussing Organizational Policies and
Procedures
Scenario
In this activity, you will examine organizational policies and procedures as they relate to computers
and data.
1. Thinking about your organization's acceptable use policy, based on the information covered in this
course, do you feel any changes need to be made? Discuss your thoughts with the class.
2. Share any experiences you have had (or read about) where computer forensics was employed to deal
with prohibited content or activities.
3. Share with the class your experience with ensuring that software licensing policies are adhered to.
4. While answering a service call on a computer that is located in a common area of the office, you come
across information showing that some unauthorized websites have been viewed. The activity has been
linked to a particular user account. What is the appropriate action to take?
A: Answers will vary, but will most likely include referring to procedures and guidelines documented
by your specific organization and following the best practices used when responding to an
incident, such as first response procedures, chain of custody guidelines, and documenting the
entire incident.
TOPIC F
Troubleshooting Theory
Often, computer technicians spend a large percentage of their time troubleshooting various software
and hardware components used in computers and printers. Before you can even begin to
troubleshoot a physical problem with a piece of hardware, you need to understand the basics of
troubleshooting and some best practices used. In this topic, you will apply troubleshooting theory.
The most elaborate toolkit and expensive diagnostic software can be useless if you do not have a
consistent plan of attack for solving problems. Even experienced technicians can sometimes
overlook obvious problems or solutions. Troubleshooting can be extremely challenging and not
always easy, but if you follow common best practices and basic troubleshooting procedures, you will
often be able to determine the specific cause of a problem, as well as possible solutions to the
problem.
Identify the Identify the issue or problem. Ask questions and try to extrapolate key
Let students know that problem information that will help you identify any anomalies.
recreating an issue can Make sure to perform backups before making any changes. This will allow you
be one of the most
useful tools used by
to restore any information that may be lost during the troubleshooting process.
experienced Use open-ended questions when working with users to help identify the issue
troubleshooters. behind the symptoms. For example, instead of asking if the user can start the
computer, try asking what happens when the user tries to start the computer.
Use following questions to help identify the problem:
As you discuss the • Were you able to complete this task before? If not, maybe the system is simply
factors in this table, ask unable to perform the task without additional hardware or software.
participants to share any
experiences they have
• If you could do the task before, when did you notice there was an issue? If you can
with help desk identify what happened immediately before the problem, then it could lead
personnel, both as a you right to the issue.
user and as a • What types of changes have you noticed since the last time you completed this task? If
technician. Use the you cannot get a specific answer from the user, then you may need to
responses to generate follow up with a few more targeted questions such as "Did something get
discussion about basic added to the computer?" or "Did you follow the exact same procedure or
troubleshooting theory.
did you do this task differently?"
• Were error messages displayed? If you can get the exact text of any error
messages displayed, you can try searching the manufacturer’s website (or
just a general Internet search) to get an explanation of the message and to
see if any problem reports have been logged related to this message.
Factor Description
Establish a theory Establish a theory. Verify anything that may seem too obvious. Make no
assumptions and check everything that may seem too simple and easy. Always
verify that components are plugged in, connected, and powered on.
Oftentimes, problems are the result of simple things.
• If applicable, try to re-create the issue so that you can experience it for
yourself and can see exactly what the results are. If you can, observe the
user as they complete the steps to verify that they are following the proper
procedures.
• Depending on the issue, develop a theory and determine how the problem
may be corrected. Use your personal experiences, refer to support websites
and online forums, and discuss theories with your colleagues to build
possible resolutions and how they may be implemented.
Test the theory Test the theory to determine the cause by testing related components;
inspecting connections, hardware and software configurations; and consulting
vendor documentation, to solve the problem or identify a likely solution.
Once the theory is confirmed, if the problem is not resolved, then determine
what the next steps will be. If the theory is not confirmed, then determine what
the next steps are to resolve the problem. In some cases, you may need to
escalate the issue to a designated party or individual.
Establish a plan Establish a plan of action to resolve the problem and implement the solution.
You may need to conduct further research and establish new ideas and
determine priorities. Research and planning may result in using a different
approach that may need detailed planning. You may also end up with more
than one plan depending on what the possible causes are, so prioritize and
execute each plan carefully. During this process, you need to make sure that
productivity does not suffer and that any downtime is limited.
Verify When the issue is resolved, verify full system functionality and, if applicable,
implement preventative measures. This part of the process may also involve
consulting with colleagues or vendors to communicate known issues, solutions,
and preventative measures. Preventative measures might include applying
system updates and installing antivirus software.
Once the issue has been resolved, make sure that the solution implemented is
actually working the way you intended and did not cause any additional or new
issues. Always make sure that the user or customer is completely satisfied with
the results.
Document Document your findings, actions, and outcomes. Documentation of computer
problems and their solutions can be a helpful part of the overall
documentation plan for your company’s computers. Not only will this provide
you with an ever-growing database of information specific to the computers
you are responsible for, but it also will be valuable reference material for use in
future troubleshooting instances. In addition, documenting as you troubleshoot
enables you to capture each step of the troubleshooting routine, as well as the
outcome, for future reference.
available so you can reinstall it if needed, software for removing viruses or other malware, drivers
for the common hardware used in your organization, and other software specific to your needs.
Another piece of software that can be considered part of your toolkit is a tracking database where
incidents that occur can be documented with the information about the call, including the hardware
or software affected, who performed the troubleshooting and resolved the issue, and what the
resolution was. This might be a simple spreadsheet or database, or it might be a complex help desk
management tracking application; it all depends on the needs of your organization.
ACTIVITY 4-6
Examining Troubleshooting Tracking Software
Scenario
Your organization has come a long way in tracking help desk calls. Originally there was no tracking,
then paper forms were used and placed in 3-ring binders based on the type of call. Then, one of the
technicians created a simple Access database in which the information could be recorded. As your
organization has continued to grow, you have found that you need a better solution, so your
manager has asked you to research what help desk tracking software is available.
1. Search for comparison charts and reviews of help desk software. Allow 5 to 10 minutes for
a) Log in to your computer. learners to complete
b) Verify that you are connected to the Internet. their research.
c) Open a web browser and open your preferred search site.
d) Search for help desk software.
e) Locate reviews and comparison charts for help desk software.
2. Determine which help desk software best follows the troubleshooting method described in this topic.
Encourage students to
share their results. See if
the class can come to a
consensus on which
help desk tracking
software they would
recommend. Try to get
students to give pros
and cons for the
software they found.
Summary
In this lesson, you identified best practices that are followed by professional PC technicians. With
the proper tools, awareness of safety and environmental issues, basic communication skills, and a
solid method to use when troubleshooting, you are prepared to do your job in a safe, effective, and
professional manner.
Which of the best practices discussed in this lesson apply in your workplace?
A: Answers will vary, but may include silencing phones and pagers, using active listening techniques, and
Encourage students to
use the social treating clients with respect.
networking tools
Have you ever been in a situation where you uncovered inappropriate conduct or prohibited activity?
provided on the CHOICE
Course screen to follow A: Answers will vary, but may include finding inappropriate content on a user's machine while you are
up with their peers after performing general maintenance on the machine.
the course is completed
for further discussion Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
and resources to support peers, and the larger CHOICE online community about the topics covered in this course or
continued learning. other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will install, configure, and troubleshoot display devices. You will:
• Install display devices.
• Configure display devices.
• Troubleshoot common video, projector, and display issues.
Lesson Introduction
So far in this course, you have identified the hardware and software that makes up a
personal computer system and examined some general best practices for working with
them. Now that you have a solid base of background information, it is time to roll up your
sleeves and start working with some of those hardware components. In this lesson, you will
install, configure, and troubleshoot display devices.
Much of the work that you will perform as a PC technician will involve installing and
configuring various hardware and software components. As an IT professional, you will
often find yourself setting up end-user workstations or helping those end users with the
hardware they need to make their daily lives easier. Installing and configuring display devices
is one of the more common tasks that you will perform.
152 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Install Display Devices
Generally, one of the most common peripherals that you will be asked to install is the display device.
In this topic, you will install display devices.
The display device provides visual output from the computer system. Without the display device,
you can't see any images on screen to guide your interactions with programs or see the results of
your input. Correctly installing the display device enables you to meet the basic user need to see
what you are working on.
Mini-High Definition Mini-HDMI is similar to the full size Type C HDMI connector, except that it
Multimedia Interface is specified for use with portable devices. The connector is a smaller version
(Mini-HDMI) of the full size with the same number of pins. The difference between the full
size and the mini is that some of pins have different transmission functions.
A micro-HDMI cable is also available for portable devices such as the
original Microsoft Surface RT tablet and some smartphones.
6
Component Component video is a color video analog format that separates video signals
in three or more channels. The wires are identified as Y, Pb, and Pr. Y
consists of luminance and represents the brightness of the image; Pr consists
of Red minus luminance; and Pb consists of Blue minus luminance.
Sometimes component video refers to RGB signals, and the three wire analog
RGB cable is often used for high-end video cameras.
Composite video Composite video is an analog video format that combines video information
on one single channel.
Coaxial cable A coaxial cable, or coax, is a type of copper cable that features a central
conducting copper core surrounded by an insulator and braided or foil
shielding. An insulator separates the conductor and shield, and the entire
package is wrapped in an insulating layer called a jacket. The data signal is
transmitted over the central conductor. The outer shielding serves to reduce
electromagnetic interference.
Bayonet Neill- The BNC connector is used with coaxial cable to carry radio frequencies to
Concelman (BNC) and from devices. The BNC cable can be used to connect radio equipment,
aviation electronics, and to carry video signals. The actual BNC connectors
come in two versions.
Aspect Ratios
The aspect ratio is the ratio of width to height of a display. The aspect ratio is found by determining
the proportion of the number of pixels across the screen to the number of pixels down the screen.
For example, a resolution of 640 x 480 has a 4:3 aspect ratio. Aspect Ratios
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Install Display Devices.
ACTIVITY 5-1
Installing Display Devices
Scenario
The marketing department of your company is moving to new offices, and you have been assigned To prepare student
the task of setting up the computers in their new offices. The computers and monitors have been computers for this
delivered to each office. Employees want to begin using their computers as soon as possible. activity, power off the
computers, disconnect
the monitors from the
system units, and unplug
1. Install the monitor.
the monitors from the
a) Verify that the power is off at the computer. electrical source.
b) Locate the monitor cable and examine the connector.
c) Locate the VGA, 29-pin DVI, HDMI, or the USB port on the computer.
d) Insert the monitor connector into the appropriate port, being sure to align the pins carefully.
e) Tighten the screws if the connector is equipped with screws. Do not over-tighten them.
f) Plug in the monitor power cord to a power source.
Remind students that it
2. Verify that the monitor is functional. is easy to bend the pins.
a) Turn on the computer power.
b) Turn on the monitor power.
c) After the system has started to boot, verify that the power light on the monitor is green and is not
flashing.
d) Watch the monitor and verify that the display is clear.
TOPIC B
Configure Display Devices
You have installed a display device. It might work just fine using the default configuration, but you
may need to configure it. Correctly configuring the display device enables you to meet users'
requirements for their particular usage. In this topic, you will configure display devices.
Resolution The number of pixels that make up the dimensions of a display. The
Traditional wide-screen resolution value is given as the number of horizontal pixels by vertical
monitors were 16:10, but
16:9 is becoming more
pixels, or width by height, traditionally in the ratio of 4:3. For wide screen
popular due to sharing displays, the ratio is 16:10. Common resolutions are 640 x 480, 800 x 600,
manufacturing with TVs. 1024 x 768, and 1600 x 1200. The higher the resolution, the more objects
or information you can fit on the screen at once. Just as widescreen
televisions have become popular, video monitors with higher aspect ratio
are also becoming more common.
Native resolution A fixed resolution for LCD or other flat panel display devices. Display
devices with native resolution will only display the best quality image when
the input signal and the native resolution are the same. Other resolutions
may display on a device where that signal input is not the same as the
native resolution, but it will result in image quality loss.
Refresh rate The number of times per second that a CRT monitor is “refreshed,” or the
screen redrawn, expressed in hertz (Hz). A refresh rate of 60 Hz (a common
value) means that the monitor will redraw the screen 60 times per second.
Adjusting the refresh rates for laptop LCD screens or flat-panel LCD
monitors is not necessary. Sometimes referred to as "frame rate."
Brightness The amount of light that is being emitted from a display device. Brightness
is measured in lumens, which is the unit of measurement for visible light
that is being emitted from a light source. On a display device, brightness
can be increased or decreased for the display. If the brightness is set too
high, you might get an aura effect displayed on the screen. If it is set too
low, you might not see anything on the screen.
Analog vs. digital Depending on the type and make of the display device, it may support
either analog or digital inputs. Most devices providing the input signals (like
a computer) are inherently digital. Display devices such as LCD or LED
Point out CRT monitors can innately support digital input signals, and do so via Digital Video
were analog devices. Interface (DVI) connections between the input device and the display
device.
Contrast Ratio
The contrast ratio is a metric of a display system, defined as the difference (in luminance) as
expressed as a ratio: the "white" brightness divided by the "black." For example, a contrast ratio of
500:1 means the "white" areas are 500 times the brightness of the "black." High contrast ratio is a
desired aspect of any display.
Multiple Displays
Many users choose to use more than one display device to increase the amount of display space. The
typical setup is two displays, though more than two displays can be configured with the appropriate
expansion card that can support that setup. Multiple displays are most commonly used for either a Multiple Displays
professional computer workstation or for gaming environments, where an extended desktop is
useful.
Within the monitor's display properties, you can designate one of the two monitors as the primary
monitor, which controls where the desktop administrative features (Start menu, taskbar, and so on)
appear. The other monitor would contain extra desktop space. While it is far more common to have
the desktop span both monitors and contain a different window in each, it is also possible to have
the two monitors display the same image, which is useful for presentations.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Configure Display Devices.
Consider demonstrating
use of Control Panel and
Charms methods of
changing display
settings.
ACTIVITY 5-2
Configuring Display Devices
Scenario
You want to try out some of the settings and features you recently learned about. You know that
customers will be asking you to adjust their displays, so you want to become familiar with how the
settings are changed and the results of making those changes.
Note: Depending on your system, this might be done through buttons and
menus on the monitor, or through Control Panel settings, or even through an
application that is installed from the monitor manufacturer.
e) Accept the new settings or return to the previous setting as needed.
TOPIC C
Troubleshoot Video and Display Devices
In this lesson, you have installed and configured display devices. The final major task in supporting
display devices is to identify and resolve issues related to display devices. In this topic, you will
troubleshoot display devices.
Dark screen A dark screen, or an indicator light that is not lit, can indicate general power
problems, such as the power is not turned on, the power cable is
disconnected, or the power is on but the display is plugged into a power strip,
surge protector, or uninterruptible power supply (UPS) that is not turned on.
To correct the problem, turn on the power or power strip and reconnect the
cables and cords at both ends. If a circuit breaker has tripped, reset it. Press
or jiggle the power button on the monitor itself.
Dim image or no If there is no power light, check for and correct power problems.
image in screen
The data cable to the Video Graphics Array (VGA), Digital Video Interface
(DVI), High-Definition Multimedia Interface (HDMI), or display port on the
PC may be disconnected. Except on very old displays, you will see an On
Screen Display (OSD) message in this case, indicating a signal problem.
Connect or re-seat the cables and connectors. If the cable is disconnected,
and you do not see an OSD message, the display may be bad.
Brightness or contrast may be adjusted improperly. Adjust the settings using
the display controls. (The OSD message is not affected by brightness or
contrast.)
The display may be in power saving mode. The power light will typically
change from green to solid or blinking orange. Press a key or move the
mouse to wake up the monitor.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Troubleshoot Video and Display Devices.
ACTIVITY 5-3
Troubleshooting Video and Display Devices
Scenario
An employee recently had to move the location of his workstation. The employee reports that, since Before having students
the move, the display does not appear in the center of the monitor. The images are too dark, making begin this activity, adjust
them difficult to see, and he cannot see as much on the screen as he would like. The employee needs the following settings on
you to resolve these issues so that he can get back to work. their monitors so they
are not correct:
• Brightness
1. Adjust the monitor display. • Contrast
a) Referring to the monitor's documentation as necessary, locate the physical controls to adjust the • Vertical and
brightness of the display image. horizontal display
position
b) Adjust the brightness so that the monitor is comfortable to view.
• Height and width of
c) Adjust the contrast so that you can view all the screen elements easily.
image
• Screen resolution
2. Change the resolution.
Then, restart the
a) To open the Screen Resolution window, right-click the desktop and select Screen resolution.
computers.
b) In the Resolution section, select the current resolution to display the drop-down list.
c) In the Screen Resolution window, drag the slider or click to select the appropriate resolution.
d) Select OK.
e) In the Display Settings message box, select Keep changes to set the new resolution.
Summary
In this lesson, you supported display devices by installing, configuring, and troubleshooting them. It
is likely that you will be called upon to support display devices often as a computer technician.
What types of monitors do you have experience with? What types of connections have you used to connect
those monitors to computers?
Encourage students to
use the social A: Answers will vary, but are likely to include LCD monitors with VGA, HDMI, or DVI connectors.
networking tools
In your current job role, have you had to troubleshoot display device problems? If so, what did you do and
provided on the CHOICE
Course screen to follow how did you resolve the issues?
up with their peers after A: Answers will vary but may include fixing a display output issue, adjusting display settings to resolve
the course is completed picture issues, or fixing some basic problems with connections, cables, or ports.
for further discussion
and resources to support Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
continued learning. peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will install and configure peripheral components. You will:
• Install and configure input devices.
• Install and configure output devices.
• Install and configure input/output devices.
• Install and configure PC expansion cards.
Lesson Introduction
So far in this course, you have identified the hardware and software that makes up a
personal computer system and examined some general best practices for working with
them. Now that you have a solid base of background information, it is time to roll up your
sleeves and start working with some of those hardware components. In this lesson, you will
install and configure peripheral computer components.
Much of the work that you will perform as a PC technician will involve installing and
configuring various hardware and software components. As an IT professional, you will
often find yourself setting up end-user workstations or helping those end users with the
hardware they need to make their daily lives easier. Installing and configuring peripheral
components—like display devices, keyboards, and mice, or even more specialized devices—
are some of the more common tasks that you will perform.
172 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Install and Configure Input Devices
In the previous lesson, you examined display devices and how to install and configure them so that
users can see the computer system's output. Users also need to be able to interact with the computer
system by using input devices. In this topic, you will install and configure input devices.
Computers need user input such as directions or commands and user interaction with the programs
that are included in order to produce something of use. Keyboards and pointing devices are the
standard input devices for personal computers these days, but there is an ever-growing number of
input devices available for the user to interact with in a variety of ways. As an A+ technician, part of
your responsibilities will include installing and configuring all types of input devices.
Keyboards
Keyboards are a standard input device. They include letters, numbers, and special characters on
dedicated keys. Keys can also be used in combination to create additional characters. Special keys
Keyboards
such as the Shift, Ctrl, Alt, Esc, and Windows keys can be combined with other keys on the
keyboard to issue special commands to the operating system or application.
When selecting a keyboard for a user, in addition to considering its ergonomics, you should also
Poll students to find out
consider whether the keyboard offers additional features (such as customizable hot keys and
what types of keyboards scrolling) as well as wireless connectivity. Many users now prefer to use a wireless keyboard as it
they are experienced in gives them the freedom to locate the keyboard anywhere on their desks. In some cases, users might
using. be able to use a Bluetooth-enabled keyboard to communicate with both their desktop computers
and a mobile device such as a tablet or a smartphone. Be sure to determine the potential keyboard's
connector requirements; if the keyboard uses USB, you will need to make sure the user's computer
has an available USB port.
Pointing Devices
A wide variety of pointing devices are available to accommodate the comfort and space needs of
users. The most common pointing device is the mouse. Other pointing devices include game pads,
joysticks, and touch pads. Most users prefer wireless mice over wired mice because of the freedom it Pointing Devices
gives them to move around while working. Choosing between a mouse, a trackball, and a touch pad
usually comes down to the personal preference of the user.
Again, ask students
which types of pointing
devices they are
experienced in using.
button clicks.
Scanner A scanner is used to take a photo-identical copy (scan) of a physical hard copy of
any kind of document, such as a piece of paper or a photo, and create a digital-
format copy of the document.
A scanner is similar to a photocopy machine or copier, but with a much smaller
footprint. Scanners can be attached directly to a personal computer to import
scanned copies of documents. With the proper software or program installed,
scanned versions can be manipulated and edited once they have been imported.
A scanner typically uses a USB or high-speed USB connection to connect
between devices.
Note: Many printers are multi-function devices and include a built-in
scanner. Printers and scanners are covered in depth later in the course.
Barcode reader Barcodes provide a simple and inexpensive method of encoding text information
that is easily read by inexpensive electronic readers. A barcode reader decodes a
barcode by scanning a light source across the barcode and converting the pattern
of reflected light to an electronic signal that is decoded back to the original data
by electronic circuits. There are currently four different types of barcode readers
available: pen-type readers (or barcode wands), laser scanners, Charge Coupled
Device (CCD) readers, and camera-based readers.
Barcode scanners or readers connect to a device via a USB connection or are
wireless.
Digital camera A digital camera uses electronic signals to capture and store
photographic images or video images. The resulting files are often
stored on embedded memory cards, removable memory cards, or
optical discs. Connecting the digital camera or its removable memory
card to a PC enables you to save, transfer, print, and otherwise work
with the images.
If the digital camera has a removable memory card, the card itself may
need to be connected to a computer through a media reader. Most
digital cameras also offer USB and FireWire cables and connections.
Microphone A computer microphone is used to input audio into the device, either
for recording the audio as data or for use in real-time, such as the audio
input that accompanies a webcam or video conferencing chat.
Microphones can be connected to the microphone port or jack of any
sound card. If the card is color-coded, it will be pink. Otherwise, it will
be labeled MIC or have a picture of a microphone. Many microphones
have a 1/8-inch phono plug built into the attached cable.
to test the device to make sure that it accurately verifies his or her identity against the authentication
object, permitting them access to the location or device.
Whether or not a biometric device is being deployed will likely be a decision made based on an
organizational security policy or standard. If biometric devices will be deployed at individual
workstations, you will need to determine the specific biometric device's connector requirements; as
most use a USB connection, you will need to make sure that the user's computer has an available
USB port to connect the device.
Several types of security input devices might be used in an organization.
Smart card reader Smart card readers read the information stored
in a microprocessor on a smart card. It is used as
a physical authentication token for accessing
computers, rooms, or buildings. The smart card
is often an employee ID card with the
microprocessor embedded in the card.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Install Input Devices.
ACTIVITY 6-1
Installing Input Devices
Scenario
Provide replacement You have received a service call to replace a user's mouse and keyboard. The user doesn't like the
keyboards and mice to style of their current keyboard, so they would like to try an alternative keyboard style. The user
the students. If no would also like to try a different style of pointing device than what they are currently using.
replacements are
available, you can have
students swap
1. Replace the keyboard.
components with one
another. a) Determine the connection type used by the replacement keyboard.
b) Unplug the old keyboard from the system unit.
c) If you are using a wireless keyboard, insert batteries and move the switch to the ON position.
d) Plug the new keyboard or transceiver into the appropriate port.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Configure Input Devices. If you have any input
devices that use third-
party configuration
utilities, consider
demonstrating the utility
interface.
ACTIVITY 6-2
Configuring Input Devices
Scenario
You just replaced a user's mouse and keyboard. The user is left-handed and prefers a slow-blinking
cursor. She also has a hard time distinguishing the mouse pointer from other screen elements, and
asks if you can adjust the pointer to something more easily discernible.
E
AT
IC
PL
DU
T
NO
6
01
DO
)2
(C
e) Select Apply.
f) Select OK.
c) In the Mouse Properties dialog box, on the Buttons tab, if the options shown in the following image
are displayed, select the Left-handed radio button.
d) To verify that the right mouse button is now the primary button, right-click the Pointers tab.
e) Right-click the Buttons tab.
f) Select the Pointers tab.
h) Select OK.
3. Reconfigure the mouse settings to suit your personal preferences, and close the Control Panel.
TOPIC B
Install and Configure Output Devices
Earlier in the course, you worked with display devices, which are the most prevalent type of output
device. However, you will be responsible for supporting different types of output devices as part of
your duties as an A+ technician. In this topic, you will install and configure other output devices.
Although being able to view the user interface and documents is essential to working with a PC,
there are other types of output in addition to simple visual display output. By installing and
configuring all sorts of output devices, you can be sure that you are appropriately supporting your
users' needs.
Output Devices
Output devices take information stored in the computer and make it available in a visual, audio, or
tactile format.
Output Devices • Probably the most common type of output device is the display device, which you worked with
in the last lesson. As you saw, there are a wide variety of device types and associated connection
interfaces.
If available, show • Another common output device type is the printer, which you will work with in greater depth
students examples of later in the course. As with display devices, there are many types of printers and related output
output devices besides devices that provide physical output from a PC.
speakers, printers, and • Another common output device is a pair of speakers, or a set of speakers that you can configure
monitors. Examples for surround sound effects. Speakers are connected to the Line Out port or jack on the sound
might include plotters, card or motherboard. Some speaker sets are permanently connected to each other, while other
Braille printers, screen
readers, or other
speaker sets are connected by the user to each other or to a subwoofer. A cable runs from one of
devices. the speakers to the Line Out port to connect both speakers to the computer. If the card or
motherboard is color-coded, the speaker port will be lime green. The port might be labeled as
Line Out, Out, Spkr, or Speaker, or it may have an image with an arrow indicating the
direction of the audio (out). Speakers typically have a 1/8-inch phono plug built into the attached
cable.
• Headphones are another output device. They might connect to a port on an external speaker, or
be connected directly to the speaker port, a Line Out port, or a dedicated headphone port.
• For blind or visually impaired users, using a standard monitor display device is not possible. One
method for a blind person to access what would usually be displayed on a monitor is to use a
screen reader application. This application reads any text on screen and uses information
available about graphics and images that are displayed. For example, a well-designed website will
have alternate text available for the screen reader to read that describes the image displayed. The
information is provided to the user through audio devices such as speakers or headphones.
• Another output device for the blind or visually impaired user is an alternative to a standard
printer. Instead of printing with standard ink, raised tactile output is created for Braille reading or
raised-line drawing images.
Surround Sound
Surround Sound
Most home audio systems are set up with either 5.1 or 7.1 surround sound. The 5.1 configuration
places one speaker at the front center, a pair of speakers to the front side of the listener and another
pair to the rear or even with the listener, and a subwoofer speaker anywhere in the room. A 7.1
If students are not configuration adds another pair of speakers to the sides, between the front and rear speakers.
familiar with 5.1 or 7.1
surround sound, explain
the typical configuration
to them.
Computers can be connected to more than just a standard pair of PC speakers or a headphone.
Some computers include connections for all of the speakers used in a 5.1 or 7.1 surround sound
system. Even if the computer doesn't have all of the ports needed to connect the speakers to an
audio receiver and its connected speakers, you can use a variety of methods to connect a computer
to a home audio system.
Connection Description
Method
Analog cable In this method, an analog cable with a mini stereo plug on one end plugs into
the Audio Out or headphone jack on the computer. The other end of the
analog cable is equipped with RCA plugs that can be connected to a port on
the audio receiver, typically the auxiliary ports.
USB cable • Using a cable that has a USB port on one end and RCA plugs on the other
end allows the computer to send audio and visual information to the home
audio system.
• An external digital-to-audio converter (DAC) is often connected to the
computer via USB cable and to the home audio system using RCA cables.
Digital audio • Some computers have an S/PDIF port. With this port, you can use a
cable coaxial cable with RCA connectors or a TOSLINK cable to connect the
computer and the home audio system.
• Other computers, such as Mac computers, have a digital port for the
headphone jack. When a standard pair of headphones or speakers is
connected, the port works in analog mode. When a digital cable is
connected, the information is sent digitally to the home audio system.
Connection Description
Method
HDMI If your computer is equipped with an HDMI port, and your home audio
system also has HDMI ports, you can send audio and visual data over the
HDMI cable.
You will also need to configure the surround sound through Control Panel. You can specify how
many speakers there are, what types of speakers each one is, and balance the system for the type of
room.
Device Manager
You can use Device Manager to manage and configure hardware devices. In Windows 7, there are
several ways to access Device Manager:
Device Manager • Open Control Panel and then select System and Security→Device Manager.
• At a command prompt or in the Run dialog box, enter the devmgmt.msc command.
• In the navigation pane of Computer Management, select Device Manager.
You can use the same methods in Windows 8 to open Device Manager. You can also use the
Charms Search to search for Device Manager, or from the Desktop, right-click the Windows
button and select Device Manager.
You can use Device Manager to:
• View a list of all devices attached to the system.
• See the status of a device. An exclamation point means there is a problem with a device; a yellow
question mark means the device has been detected but a driver is not installed, or there is a
resource conflict.
• Enable or disable a device. A disabled device appears with a red X.
• Determine the device driver a device is using; upgrade a device driver; roll a device driver back to
a previous version.
• Determine any system resources that the device is using, such as interrupt request lines (IRQs) or
Direct Memory Access (DMA) ports.
• Uninstall or reinstall devices.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Install and Configure Output Devices.
ACTIVITY 6-3
Installing and Configuring Output Devices
Scenario
You are working with the team that is presenting a slide show that includes audio portions. You Provide any
need to verify that the speakers work with the computer. documentation available
with surround sound
systems if you choose to
use that option rather
1. If you were given a pair of speakers, perform this step. If you were given a surround sound system,
than standard PC
perform the next step instead.
speakers.
a) Connect the speakers to each other.
b) Connect the speakers to the Spkr, Speaker, or Line out port on the computer.
c) If necessary, connect the speakers to a power source.
TOPIC C
Install and Configure Input/Output Devices
Some devices function as both input devices and as output devices. In this topic, you will install and
configure input/output devices.
Input/Output Devices
An input/output device contains components that enable one device to perform both input and
output functions.
Input/Output Devices
Device Description
MIDI-enabled The Musical Instrument Digital Interface (MIDI) connection enables you to
If you have a MIDI device connect and control musical devices such as electric keyboards, synthesizers,
instrument, MIDI cables, guitars, drum kits, and mixers. Sound cards usually include built-in synthesizers
and a MIDI connection as well, to produce MIDI sounds. MIDI devices can be connected to each other
device available, and then to the computer.
consider demonstrating
how they work together. MIDI devices can connect to the computer using a number of ports. MIDI to
If you have MIDI USB interface, MIDI to serial, or MIDI to FireWire connections are most
recording software commonly used, allowing for faster communication between the musical
available, consider instrument and the computer or controller device.
briefly demonstrating
how the song data can Multi-function Multi-function printers combine input and output features in one device. They
be shown on screen as printers typically include printer (output), scanner (input), and fax (input/output or send/
notes, as wave forms, as receive) capabilities.
discrete data points, and
any other methods of Headset A headset combines headphones (audio output) with a microphone (audio
showing the data your input). You can use headsets to participate in online meetings, to participate in
software includes. gaming with other players, and to use with communication applications such as
Skype.
KVM Switches
A keyboard, video, mouse (KVM) switch is a device that enables a computer user to control multiple
computers with a single keyboard and mouse, with the display sent to a single monitor. This feature
KVM Switches
is particularly useful in managing multiple test environments, or in accessing multiple servers that
have no need for dedicated display or input devices. KVM switches are available with PS/2 or USB
connections, and come in desktop, inline, or rack-mount varieties. Higher-end rack-mount models
can be uplinked to connect dozens of computers.
Ask students why this is
considered an input/
output device. Also point
out that many KVM
switches, particularly for
servers using KVM over
IP, still include PS/2
ports.
Touch Screens
Touch screen monitors enable input by touching images on the screen. This technology is used in
bank ATMs, some point-of-sale terminals at fast food restaurants, and other situations where a
separate keyboard for input is not appropriate. Touch screens are also found on many smartphones, Touch Screens
tablets, and laptops sold for general public use.
Touch screens enable users to enter inputs by touching areas on a monitor screen. They can be
activated by a finger touch or a stylus touch.
Touch screens are composed of:
• Touch sensors. The sensors can be a panel that lays over a standard monitor or can be built into
a special touch screen monitor where the user actually touches the surface of the monitor.
• A controller. If using an overlay panel, the controller connects to the panel and then to a PC
port. Many use a COM or USB port, although there are special instances where the controller
connects to a drive or other device or port. For touch screens with built-in touch sensors, the
controller is built into the monitor. In this case, the monitor contains two cables—one to the
monitor port and one to the COM or USB port (or other port).
• A device driver or specialized software. This enables the operating system to receive and
interpret information from the touch screen device.
Smart TVs
Smart TVs
A smart TV is a hybrid device. This is a television set with web and Internet features built into it.
Ask students if they
You can access the Internet using voice commands or the remote without the need to connect other have heard of any of the
devices to the TV. It seems like a good idea, but some devices are not being updated as new features potential problems with
from content providers are made available, while other manufacturers are providing updates for these devices such as
apps and firmware. third parties listening in
Another drawback for some smart TVs is that the voice commands are sent to a third party without on voice menus and new
features not being added
any security measures in place to protect the information you request. Some manufacturers use the
to existing sets.
information you send to add additional advertising to your viewing experience. Consult the
documentation that came with your smart TV to see if there is a TV privacy policy.
Set-Top Boxes
Set-Top Boxes
A set-top box is a device that takes video content and converts it to a format that can be viewed on a
television. Set-top boxes are also known as streaming players (streaming TV) or media players. Ask if anyone has
experience with these
devices.
Traditionally, set-top boxes were used by cable companies to descramble the broadcast signal so that
only authorized customers could view the programming offered. Satellite television providers also
have a set-top box that acts as a converter to allow over-the-air content to be viewed on televisions.
You can also purchase set-top boxes that are not tied to a cable or satellite television provider.
Examples include the Apple TV, Amazon Fire TV, and Google TV set-top boxes. These devices
use Wi-Fi or Ethernet connections to connect the television to the Internet so that you can view
content from providers such as Netflix, Hulu, or other content sites. Some also have built-in
Internet browsers.
These devices connect to the television through coaxial or HDMI connections.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Install and Configure Input/Output Devices.
ACTIVITY 6-4
Installing and Configuring Input/Output
Devices
Scenario
You have installed input and output devices. Now you want to try installing a device which can be Input/output devices
both an input and an output device. might include KVM
switches with cables,
set-top boxes and TVs,
devices such as a
1. If you have a MIDI device, connect it through the USB-to-MIDI device or a MIDI expansion card.
Google Chromecast or
a) Locate the appropriate port and connect the MIDI adapter to it. Amazon Fire stick, MIDI
b) If necessary, connect MIDI cables to the MIDI adapter. instruments and cables,
c) Connect the MIDI cable to the MIDI instrument. headsets, or touch
d) If necessary, install drivers for the MIDI instrument. screens.
e) If necessary, install software to work with the MIDI instrument.
f) Test the MIDI device by playing a few notes to ensure that it is working properly.
2. If you have a KVM switch, working with a partner, connect one set of peripherals to multiple computers.
a) Identify the ports on your computer that will connect to the KVM switch so that you can determine
the type of KVM switch you need. There are two types of KVM switches available: PS/2 and USB.
b) Obtain the appropriate type of KVM switch you need.
c) Turn off all the computers that are to be connected.
d) Insert the KVM connectors into the appropriate ports on the computer.
Due to the variety of set-
e) Connect all the computers to the KVM switch in the same way. top box devices and the
f) Connect a monitor, keyboard, and mouse in the appropriate ports of the KVM switch. possible devices to
which they can be
Note: Some KVM switches also have speaker or headphone ports. connected, it is
impractical to step out
the directions in the
g) Turn on all the computers and monitors.
activity. Be prepared to
assist students as
Note: Some KVM switches require a power source and might have a power
needed to install and
switch.
configure these devices.
h) Toggle the KVM device through all the connected PCs to check whether it is functioning correctly.
3. Disconnect the devices connected through the KVM switch and connect the devices directly to the You can have students
computers again. test headsets by using
the Desktop Sound
4. If you have a set-top box, refer to the documentation provided to determine how to connect and Record application and
configure the device to work with the television or computer. then save the recording
to the Desktop. Double-
Note: Some set-top boxes provide the ability to access the Internet, using your click the sound file to
television as the display device. Other set-top boxes allow a computer to receive open it in the default
television signals. application. Or have
students use another
app you are familiar
5. Connect a headset to the computer. with.
TOPIC D
Install and Configure Expansion Cards
In the previous topics, you installed input, output, and input/output devices. These devices typically
connect using standard ports that are available on most machines, such as a USB port. You can
expand the functionality of your computer by adding expansion cards that provide additional ports
for a variety of peripheral devices. In this topic, you will install and configure expansion cards.
Display devices, keyboards, and other pointing devices are the most common devices you are likely
to install and configure; these devices are typically included in a standard workstation environment
when a PC is requested. When a user needs to connect a peripheral component that doesn't have an
existing interface, like a multimedia device, you will need to install an expansion card. As an A+
technician, your responsibilities are likely to include upgrading users' computers by installing a
variety of components, including expansion cards.
Sound cards A sound card or audio card provides the interface necessary for the input
of audio signals to, and output from, the computer. Serial and parallel are
no longer covered on the
Video cards A video card, sometimes called a display card or graphics card, provides
exam, but if students
the interface necessary to generate the visual output that is sent to the need to use older
display device. devices that use these
Network cards A network card, sometimes called a network interface card (NIC), connection types, most
systems don't include
provides the interface necessary for network communications, whether
these ports, so they
for wired or wireless connectivity. could add the ports
USB cards A USB card provides the interface necessary for the computer to through expansion
recognize and interact with all devices that connect to the computer via a cards.
USB connection. Devices that utilize USB connections include
keyboards, flash drives, cameras, and more.
FireWire cards A FireWire card provides the interface necessary for the computer to
recognize and interact with all devices that connect to the computer via a
FireWire connection. FireWire is mainly used for high-speed data
transfer. Devices that use FireWire connections include external hard
drives, video and audio recording devices, and more.
Thunderbolt cards A Thunderbolt expansion card can be added to systems whose
motherboard has a Thunderbolt header. The header needs to match the
version of Thunderbolt the card uses. After installing a Thunderbolt
card, you can daisy chain up to 9 devices from the port on the card.
Storage cards A storage card provides the interface for the computer to recognize and
interact with a storage device such as a disk. Systems with multiple disk
drives, especially of different types, may require multiple storage cards to
manage the communication between the disks and the system board.
Modem cards A modem card provides the interface necessary for remote
communications over phone or data lines that have been provided by a
cable or Internet service provider.
If students ask about Note: Read the installation instructions for the expansion card to determine if any software is
troubleshooting content
required prior to the installation. Failure to do so could cause the installation to fail or the card
6
ACTIVITY 6-5
Installing Expansion Cards
Scenario
You have been asked to install several expansion cards on a user's system. The appropriate drivers Encourage students to
for the cards are also available to you should you need them. practice the electrostatic
discharge (ESD)
techniques they learned
earlier in the course
1. Open the system cover and access the slots.
whenever they open a
a) Turn off the system power. computer case.
b) Unplug the computer from the electrical outlet.
c) Unplug peripherals from the system.
d) Remove the cover. If possible, have a
e) Determine if you need to move or remove any components in order to access the slots. container full of different
card types and have
2. Insert the card in an available slot. students pick several
card types from the
Caution: Some manufacturers require installing a driver prior to inserting the container to install in this
adapter card. It is therefore important to read the manufacturer’s instructions activity. Be sure to
before installing the card. provide enough cards for
each student to install at
a) Locate an open slot. least one expansion
b) Remove the slot cover. card, access to drivers
c) Firmly press the card into the slot. for the card, and, if
necessary, a device to
Caution: Do not rock the card side to side when installing or removing it. connect to the card to
test its functionality.
d) Secure the card to the chassis with the screw from the slot cover. Normally, you would now secure
the cover back on to the system, but because you will be doing more work inside the system, leave
it off.
Summary
In this lesson, you installed and configured various types of peripheral computer components,
including input and output devices and the expansion cards that may be necessary to connect them.
As an IT professional, having the ability to successfully install and configure these components is an
integral part of your daily work life, as you will be expected to set up workstations or assist users in
installing anything that they may need to perform their job duties effectively.
What types of peripheral components do you anticipate having to install and configure most often in your
current job role?
Encourage students to
use the social A: Answers will vary, but might include multimedia, storage, display devices, or expansion cards.
networking tools Depending on how data is input into a company's databases, input devices could include a stylus,
provided on the CHOICE mobile device, or touch pad.
Course screen to follow
up with their peers after Will there be any specialty input devices that you will need to install or configure at your workplace? How
the course is completed might this affect your day-to-day activities as an IT professional?
for further discussion A: Answers will vary according to the type of business where the individual works or expects to work. If
and resources to support
the company has a great need for security, biometric devices may be incorporated at many key levels
continued learning.
of entry, including computers. Specialty input devices might include touch screens, bar code readers,
gamepads, or interactive whiteboards. Having knowledge of various types of devices, how they work,
and how they are installed and configured will be necessary. Keeping up with evolving technology will
likely be necessary as well.
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will manage system components. You will:
• Explain the importance of motherboard components, their purpose, and properties.
• Install various types of CPUs and apply the appropriate cooling methods.
• Install a power supply.
• Troubleshoot common problems related to motherboards, CPU, and power.
Lesson Introduction
In the previous lesson, you worked with peripheral components such as display devices,
input devices, expansion cards, and multimedia devices. As an A+ technician, you are not
only responsible for the components outside the system unit, but all the internal
components as well. On the job, you may be asked to connect peripheral components for a
user, or you may be asked to swap out a motherboard.
A large part of your time as an A+ technician will be spent helping users to install and
configure new software and hardware components. Having the knowledge and skills to
properly install and configure the internal system components is crucial because, in most
cases, users will not have the knowledge or the experience to install the components
themselves. It will be your professional responsibility to know the technical specifications
for these components and how to manage them appropriately.
202 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Identify Motherboard Components and Features
In this lesson, you will dive inside the computer system and take a closer look at the internal
components that enable the computer to run successfully. In this topic, you will start by examining
motherboards.
The most important system component in a computer system is the motherboard. Although you
can argue a case for almost any system component as being most important, without the
motherboard, the computer simply cannot run. As an A+ technician, you must be knowledgeable
about motherboards and their purpose within the computer system.
Motherboards
As you learned earlier in the course, a motherboard or system board is a circuit board that contains the
basic electronic components that form the backbone of a PC.
Motherboards
Motherboard Description
Form Factor
Motherboard Description
Form Factor
Mini-ATX The mini-ATX board has a maximum size of 11.2 inches by 8.2 inches. The main
difference between the mini board and the full-size ATX board is its smaller size.
For example, it uses the same power supply form factor and case mounting holes
as the full-size board.
Motherboard Description
Form Factor
microATX The microATX board, introduced in late 1997, is often written as μATX, and has
a maximum size of 9.6 inches by 9.6 inches. MicroATX boards with integrated
graphics are often used by system board manufacturers as a basis for small form
factor and home entertainment PCs. MicroATX boards are backward compatible
with the full size ATX boards and often use the same chipsets, so they can usually
use the same components. However, because the cases are generally smaller, there
are fewer I/O ports available than in ATX systems, so it might be necessary to
use external USB hard drives, CD burners, and so forth.
Motherboard Description
Form Factor
ITX and mini- ITX, also known as Embedded Platform Innovative Architecture (EPIA), is a
ITX small motherboard originally designed for industrial applications. They are also
used in firewalls, home theater PCs, and embedded car computers. The mini-ITX
and Pico-ITX motherboards are the most popular versions of ITX motherboards.
The mini-ITX motherboards are small, compact boards that fit the same form
factor as the ATX and the micro-ATX boards. They have a maximum size of 6.7
inches by 6.7 inches. ITX boards were developed by a company named VIA
technologies in 2001 to provide a compact board that does not drain system
power. The boards are unique in that they are uniquely designed to consume less
power while providing adequate processing power. Because of this, the board
itself does not demand excessive cooling components. Due to their small size and
low power consumption, the boards can be implemented in a number of cases
and electronics and are popular among the industries that purchase motherboards
in bulk to be incorporated into a number of different products.
Note: For processor voltage regulators that have been designed for 12V input, an additional
12V power connector was added. ATX power supplies with the 12V connector are designated as
ATX 12V.
ACTIVITY 7-1
Identifying Motherboards
Scenario
In this activity, you will analyze and identify some of the more common motherboards in use today.
This activity is designed 1. Examine the graphic and answer the following question.
to be an introduction to
common motherboard
types. If you have
sample motherboards
available during class,
have students identify
them as a group activity.
If no boards are
available, you can use
the images presented in
this activity.
Identifying
Motherboards, Step 1
What type of motherboard is displayed here, and what characteristics did you use to help you identify
the board type?
A: Based on its small size dimensions and compact component design, this motherboard is a mini-
ITX.
Identifying
Motherboards, Step 2
What type of motherboard is displayed here, and what characteristics did you use to help you identify
the board type?
A: You can tell by the large size and vast number of available components and slots that this
motherboard is an ATX.
3. Take the case off the PC you are using for this course to identify the type of motherboard installed in the
PC. Use the descriptions presented in this topic to help you.
Expansion Slots
Features include:
• Upgradeable; Mini PCI cards are removable and easy to upgrade to newer
technologies.
• Flexibility: A single Mini PCI card interface can accommodate different
types of communication devices.
• High Performance: uses 32-bit, 33MHz bus and support for bus
mastering and DMA.
• 2 W maximum power consumption.
• Mini PCI cards can be used with PCI using a Mini PCI-to-PCI converter.
Mini PCI is an older technology; it has been superseded by PCI Express
Mini Card.
ACTIVITY 7-2
Identifying Expansion Slots
Scenario
In this activity, you will examine and identify the expansion slots on your PC's motherboard.
You may have to help 1. With the case removed from your PC, examine the expansion slots on your motherboard.
students identify the
slots on their system 2. Try to identify the different types of expansion slots.
boards, because it may
be difficult to identify
them with all the RAM Slots
connections made.
RAM slots come in several form factors, and each module will connect to the system board through
a RAM slot of a compatible type.
Have students keep the
case cover off their PCs RAM Form Factor Description
in preparation for the
DIMM Dual In-line Memory Modules (DIMMs) are found in many systems, and
next activity.
they have a 64-bit data path. The development of the DIMM solved the
issue of having to install memory modules in matched pairs. DIMMs also
have separate electrical contacts on each side of the module, whereas the
RAM Slots contacts on older RAM on both sides are redundant. DIMMs have a 168-
pin connector, and they generally have 16 or 32 random access memory
chips mounted on a small circuit board.
Show examples if RIMM Rambus Inline Memory Modules (RIMMs) have a metal cover that acts as
available, and if students a heat sink. Although they have the same number of pins, RIMMs have
are interested, provide a
brief description of other
different pin settings and are not interchangeable with DIMMs. RIMMs
RAM types, such as can be installed only in RIMM slots on a system board.
SIMMs, that are not
mentioned in the exam
objectives.
ACTIVITY 7-3
Identifying RAM Slots
Scenario
In this activity, you will examine and identify the RAM slots on your PC's motherboard.
1. With the case removed from your PC, examine the available RAM slots on your motherboard. Have students keep the
case covers off their
2. How many RAM slots are on your motherboard? Are they all being used? PCs in preparation for
A: Answers will vary depending on the individual PCs. the next activity.
The chipset architecture, including the number, function, name, and placement of the various chips
in a chipset, will vary depending on the type and manufacturer of the system board. For example, on
many Intel Pentium computers, the two main chips in the chipset are known as the Northbridge and
the Southbridge.
• The Northbridge controls the system memory and the AGP video ports, and it may also control
cache memory. The Northbridge is closer to the processor and communicates directly with it
using a 64-bit front side bus.
• The Southbridge controls input/output functions, the system clock, drives and buses, advanced
power management (APM), and various other devices. The Southbridge is further from the CPU
and uses the PCI bus to communicate with the Northbridge.
Newer Intel systems employ the Intel Hub Architecture (IHA) chipset. This also has two main
chips, now named the Graphics and AGP Memory Controller Hub (GMCH) and the I/O
Controller Hub (ICH), which perform functions roughly analogous to the Northbridge and
Southbridge, but the communication between the two new chips is designed to be faster.
CPU Sockets
CPUs use either sockets or slots to connect to the motherboard. Older slot-based processors
plugged into a system board in much the same way as an expansion board, whereas socketed
CPU Sockets
processors plug into a system board using a pin grid array (PGA). Modern CPUs usually fall into
either the AMD or Intel category. Although there are other CPU manufacturer brands available,
Intel and AMD technologies tend to dominate in the marketplace.
Bus Speeds
The motherboard bus speed determines how fast circuits will carry data simultaneously from one
area of the motherboard to another. Speed can vary based on the capacity of the specific bus. The
bus speed will depend on what components are installed in the computer. Bus Speeds
CMOS Batteries
The complementary metal-oxide-semiconductor (CMOS) battery is a small battery on the motherboard that
provides power to the real-time system clock when the computer is turned off. You may find cases
when the CMOS battery fails, which will result in a CMOS Battery Failure message (or possibly a CMOS Batteries
CMOS Read Error). Replacing a CMOS battery is not difficult, but it is not always necessary. Start
by leaving the computer on for a day, and see if this helps the battery recharge. If this does not
work, and you need to replace the battery, immediately write down all of your CMOS settings, as
you will need to re-enter them later after replacing the battery. Note that not all motherboards can
have their CMOS batteries replaced; in these cases you can add a new CMOS battery, but not
remove the old one. Consult the documentation for your motherboard.
CMOS Settings
CMOS settings can be changed if needed in the system setup program that is loaded from the
system firmware setup utility. The CMOS battery supports the BIOS or UEFI utility by providing
enough power to save critical system settings.
System date and You can set the system's real-time clock using DOS date and time
time commands, or by setting the clock in Windows, which will adjust the real-
time clock.
Password You can specify whether a user or administrator password is required to start
up the system.
Boot sequence You can specify the order that Power-On Self Test (POST) checks drives for
an operating system.
Memory Some systems require you to specify in CMOS how much RAM is installed
on the system. You might also be able to specify whether the system uses
parity memory or non-parity memory. Most modern systems automatically
detect and report the installed RAM.
Hard drive You can specify the number, type, and size of the hard drives attached to the
system.
Display You can specify the monitor type and port.
Power management In most modern computers, you can specify settings such as powering down
components (such as the monitor, video card, and hard drives) when the
components have not been used for a specified time period, as well as
options and time limits for standby and suspend modes. You can also disable
or enable global power management.
Power Connections
Every component in a PC requires electrical power, and most components get that power from the
PC's power supply. Because all of the components, including the power supply, are connected to the
motherboard, you will find several different power connectors on a typical motherboard. Power Connections
• Main power connector (24 pins)
• CPU power connector (4/8-pin 12V). Lower-end boards supporting CPUs with lower thermal
design power (TDP) will likely have a four-pin connector, and boards that support higher-end Use this section to
processors will have an eight-pin connector. introduce the power
• CPU fan connector (3 or 4 pins). Three-wire connectors are typically used for small chassis fans connections on the
with low power consumption. The four-wire connectors are for processor fans with higher motherboard. Students
consumption. Four-pin connectors can control fan speed via pulse width modulation (PWM). will install power
supplies later in the
• Legacy ATA ATX P4 or 4-pin connector. lesson.
• SATA power connector. SATA power connectors have 15-pins. A difference between a SATA
power connector and the four-pin connector is a pin that provides 3.3V of power. Some SATA
drives have specific power requirements. SATA drives don't always include a SATA power
connector. In that instance, you can attach the legacy ATA four-pin power connector to the
drive. However, do not connect a four-pin power connector and a SATA power connector to
the drive. This will likely cause the drive to malfunction.
• PCIe 6/8-pin.
Fan Connectors
There are several uses for fans within a computer. The components installed and how much heat
they produce will determine what type of fans you should install. Full-size desktop systems will
generally have a case fan that will pull the hot air out, letting cooler air circulate through the chassis. Fan Connectors
There is no current standard that dictates the size and form factor of the fan connector. Common
connectors include:
• A 3-pin Molex KK connector, commonly used to connect a fan directly to the motherboard.
• A 4-pin Molex KK connector that is similar in function to the 3-pin KK connector, except that
it has an extra pin to provide the ability to control the speed of the fan.
• A 4-pin Molex connector that connects directly to the system's power supply.
In some systems, the system firmware monitors the fan speed. In order for this to happen, the
power supply requires an external fan connector that is attached to the motherboard. The fan does
not draw power from the connector; it only is used to provide information to the system firmware.
Based on the information received, the system can increase the fan speed for improved cooling or
decrease the fan speed when less cooling is needed so that the system operates more quietly.
Motherboard Description
Headers
USB header The USB header contains the pins that the USB cable connects to. This
connects the USB drive installed in the computer case directly to the
motherboard. USB headers will have one pin missing from the second row on
the end. This can be a visual guide when identifying the different headers.
Front panel The front panel header of the motherboard contains many system connection
header pins that are used to connect components installed in the computer case to the
motherboard. Most front and top panel headers will include:
• Power switch
• Power light emitting diode (LED)
• Reset switch
• Hard drive LED
• Speaker
6
Motherboard Description
Headers
Audio header The audio header contains the pins to connect the system audio cable to the
motherboard.
ACTIVITY 7-4
Identifying Motherboard Components
Scenario
In this activity, you will examine various motherboard components.
TOPIC B
Install and Configure CPUs and Cooling Systems
In the last topic, you identified the various types of motherboards used in computer systems. Now
that you understand the purpose of the motherboard, you can take a closer look at the components
that make up the board. Two of these components are the central processing unit, or CPU, and the
cooling systems that service it. In this topic, you will examine CPUs and cooling systems.
Much like the motherboard, the CPU is another important component of the computer system that
actually carries out all the tasks requested by the applications installed in the computer. The CPU is a
heat generator, so part of understanding the CPU includes understanding how to manage heat inside
the computer case by managing the airflow and temperature. Keeping the system cool is an easy but
important way to maintain or even increase its productivity. A computer that runs too hot risks
damaging its own components. As an A+ technician, you need to be familiar with these essential
components of the computer system.
LGA 775 The land grid array (LGA) 775 CPU is also referred to as Socket T.
• Supports Intel CPUs from 1.8 to 3.8 GHz with front-side bus frequencies Point out that even
ranging from 533 MHz to 1600 MHz. though the exam
objectives do not include
• Uses 775 copper pins with no socket holes to attach to the motherboard's "LGA" with the socket
pins. The CPU is connected via a load plate that the CPU attaches to and types, you will almost
is lowered onto the board by the load lever. always see LGA in front
• Has 775 contacts in a 33x30 grid array with a 15x14 grid depopulation in of the number in
the center of the array, and with one corner contact and four contacts on documentation and
two sides of the socket removed. catalogs.
• Base metal for the contacts is high strength copper alloy, and the areas on
the socket contacts that mate with the processor are gold-plated.
• Proper cooling is accomplished by the design of the CPU connection to
the motherboard. By using the load plate to connect, the CPU is properly
seated into place and is perfectly level. This ensures that the CPU is
making full contact with the heat sink or liquid cooling method.
• Commonly used in consumer desktop computers.
• Used for Pentium 4, Celeron D, Pentium Extreme Edition, Core 2 Duo,
Core 2 Extreme, and Core2Quad processors.
AM3 The AM3 was designed to replace AM2+. The socket is not compatible with
the previous versions AM2 and AM2+ because of the pin layout being
slightly different than the older models. The AM3 has 941 pins, while the
AM2+ has 940.
AM3+ The AM3+, also referred to as AM3b, is designed to be more efficient and
use less power.
FM1 FMI is AMD's next generation socket type that is designed to be used with
the Fusion and Athlon II processors.
FM2 FM2 works with Athlon X2 and X4 processors. It has 904 pins.
FM2+ FM2+ is not compatible with FM2 motherboards. It has 906 pins.
CPU Characteristics
There are many different characteristics and technologies that can affect a CPU's performance.
Clock speed The number of processing cycles that a microprocessor can perform in a
given second. Some CPUs require several cycles to assemble and perform a
single instruction, whereas others require fewer cycles. The clock speed is a
technical rating; actual performance speeds can vary from the published
clock speed rating. The clock speed is typically referred to as the processor
performance.
Multi-CPU Motherboards
Prior to the development of multicore processors, some hardware manufacturers offered additional
processing power by designing motherboards that could hold more than one CPU. With the advent
of the multicore processors, these are less common in PCs, but they are still widely used in servers.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Install and Configure CPUs.
ACTIVITY 7-5
Planning for a CPU Upgrade
Scenario
A user has asked you to upgrade the CPU in her PC. You need to make sure that the CPU you are
installing will perform better than the one currently installed, and that it will work with the existing
motherboard and other components.
Fans Computer fans provide cooling by simply blowing regular air across heated
Point out the various components. It is common to see case fans, power supply fans, adapter card
cooling methods used fans, and CPU fans.
on PCs in the
classroom. Point out that
Vents Computer cases are designed with vents to facilitate airflow through the case
liquid-based cooling and across all components. A common implementation is to include air vents
systems are much near the bottom of the front of the case and to place a fan near the top of
quieter than fans. the rear of the case to pull cooler air through the system.
Heat sinks A heat sink is designed to provide direct cooling to a system's CPU. Modern
CPUs have enormous processing power that requires instant cooling that is
attached right to the CPU itself. Heat sinks have metal fins to increase their
surface area to aid in heat dissipation. Cool air is blown past it by a fan,
removing the heat from the processor.
Thermal paste Thermal paste is used to connect a heat sink to a CPU. At the microscopic
level, when two solids touch, there are actually air gaps between them that
act as insulation; the liquid thermally conductive compound gel fills these
gaps to permit a more efficient transference of heat from the processor to
the heat sink.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Install and Configure Cooling Systems.
ACTIVITY 7-6
Discussing Cooling Systems
Scenario
In this activity, you will discuss cooling systems.
Use the questions in this 1. When might you need more than one cooling system in a computer?
activity to generate A: Answers will vary, but should include instances such as high processing levels that generate
discussion about the excessive heat.
cooling systems
presented in this topic. 2. When would liquid cooling systems be more appropriate than adding a fan?
A: Answers will vary, but might include when there is not much room inside the computer case or
when an externally mounted fan is not appropriate.
TOPIC C
Install Power Supplies
In the previous topic, you examined CPUs and cooling systems. The next logical step is to select and
install a compatible power supply in the system unit. In this topic, you will take a closer look at the
computer's power supply and its connections to the other system components.
The computer's power supply is the main source of power for all components installed within the
system unit. Understanding the power requirements of all the components and the maximum power
supplied is crucial in managing the overall computer system power needs. Whether you are
upgrading or replacing faulty components, you need to effectively manage the capacity of the
current power supply.
Size Hardware manufacturers across the globe strive to standardize the power
supply unit specifications in terms of dimensions and layout to make
computer users' lives simpler. This has resulted in a range of power supply
unit types that are accepted worldwide. The key to replacing and installing a
power supply is to make sure that the form factor matches the case and the
motherboard it will connect to. Form factors available today are:
• ATX, which can be used in ATX and NLX cases and with ATX and NLX
motherboards. Dimensions are 150 mm x 140 mm x 86 mm. Found in
desktops and towers. ATX power supplies do not have a pass-through
outlet, but instead usually have a physical on-off switch.
• Micro ATX is essentially the same form factor as ATX, only with fewer
expansion slots, which reduces the power supplied to the motherboard,
and physical size.
• Proprietary, which includes motherboards that do not conform to
standards. It is likely that these proprietary system boards will require
nonstandard power supply form factors as well, although you might be
able to use an ATX power supply.
• The number of connectors (pins) is also an important form factor. For
example, a 4-pin male connector will not work properly with a 24-pin
female connector.
Connector style There are generally three types of connectors used to connect different
devices in a computer to the power supply:
• Berg, a square-shaped connector used to supply power to floppy disk
drives and some tape drives.
• Molex, a round-shaped connector used to supply power to Parallel ATA
drives, optical drives, and SCSI drives.
• SATA, used to supply power to Serial ATA drives.
Specification Description
Voltage All system components require specific voltages. Some devices have different
voltage requirements depending on use. This is particularly true of some
memory chips, which vary in voltage requirements from 1.8 volts (V) to 3.3 V,
and some can actually function at different voltages (voltage range). You must
verify that the power supply used can provide the volts demanded by the
system.
Some power supplies are dual-voltage. They can contain multiple channels
that provide discrete voltages, with 5 V, 12 V, 15 V, and 24 V being the most
common.
In order to calculate whether your power supply meets your power needs, you
will need to add up the maximum power you might use at one time. A range
of maximum power consumption for various components has been
established. Most components use much less than the maximum, so by using
the published requirements as a guide, you are overestimating the power
usage, and therefore making it more likely that you never test the capacity of
the power supply. You can check the documentation for the component to
determine how much power it actually will use.
Even some of the most powerful current CPUs only use 1.1 to 1.3 V. The
necessary voltage for CPU and RAM is usually detected by the motherboard
(system firmware) and configured appropriately, but sometimes you have to
manually configure it by accessing the system firmware utility and entering the
appropriate values. The power supply will supply 3.3 V for the CPU, RAM,
and other devices, but the motherboard regulates how much they actually get.
Most power supplies have a voltage selector switch that gives you the option
to specify the input voltage to the power supply as 115 V (as used in the US)
or as 230 V(as used in other countries).
Wattage Power supply specifications are given in watts. Watts are volts times amps
(voltage x current). Older systems typically had power supplies under 200
watts (W) and often even under 100 W. Newer power supplies typically have
wattages ranging from 200 to 500 W. Because of their increased power
demands, high-powered servers or computers designed for gaming can have
power supplies with wattages from 500 W up to 1 kilowatt (kW).
Note: Although most devices require specific voltages, some devices have different voltage
requirements depending on use. This is particularly true of some memory chips, which vary in
voltage requirements from 1.8 V to 3.3 V, and some can actually function at different voltages,
or in a voltage range.
Molex Molex connectors are most commonly used to connect hard drives (4-pin)
and power supplies (20/24-pin) to a motherboard. The voltage and color
configuration of a 4-pin molex connector is as follows:
• +12 V (yellow)
• Ground (black)
• Ground (black)
• +5 V (red)
4/8–pin 12 V The 4-pin and 8-pin connectors are similar in that they both provide 12
volts of power to the CPU on the motherboard. The 8-pin was designed to
provide power to multiple CPUs in the system. The 4-pin has a maximum
wattage of 192, and the 8-pin has a maximum wattage of 336.
Main power The main power connector to the motherboard is either a 20-pin or 24-pin
connectors ATX connector. The 24-pin connector contains four additional pins to
support the requirements for PCI Express slots on the motherboard. The
20-pin connector has a maximum wattage of 72, while the 24-pin has 144.
Both connectors provide power at three voltages:
• +3.3
• +5
• +12
Check for certification Be sure to purchase power supplies that are certified by the Underwriters
Laboratories, Inc. (UL). UL standard #1950, the Standard for Safety of
Information Technology Equipment, Including Electrical Business
Equipment, Third Edition, regulates computer power supplies (along with
other components). When it comes to electricity, you do not want to take
a chance with a non-certified power supply. The risk of electrocution or
fire from a malfunctioning power supply is simply not worth saving a few
dollars by purchasing a low-quality power supply.
Replace instead of You run the risk of electrocution if you open a power supply to attempt to
repair the power repair it. Even when you unplug a computer, the power supply can retain
supply dangerous voltage that you must discharge before servicing it. Because
power supplies are relatively inexpensive, it is easier (and safer) to simply
replace a failed power supply rather than attempting to repair it.
Keep the computer Make sure that you run computers with their cases on. The fans inside
case on power supplies are designed to draw air through the computer. When you
remove the cover, these fans simply cool the power supplies and not the
computer's components. Leaving the case open puts the computer at risk
of overheating.
Protect the power Use a power protection system such as an uninterruptible power supply
supply (UPS) or surge suppressor to protect each computer's power supply (and
thus the computer) from power failures, brownouts, surges, and spikes.
You should also make sure that the computer's power cord is plugged into
a properly grounded electrical outlet. (Three-pronged outlets include
grounding; never use an adapter to plug a computer's power cord into a
two-pronged electrical outlet.) You can buy a socket tester (available at
hardware stores) to test your outlets if you suspect that they are not
properly grounded.
Note: You should also make sure to cover empty slots in the system board with filler brackets.
If you do not install a filler bracket, you reduce the efficiency of the power supply's fan and
increase the chances of the computer overheating.
Note: For additional information, check out the LearnTO Install a Power Supply presentation
in the LearnTOs for this course on your CHOICE Course screen.
You may want to show
the LearnTO Install a
Power Supply
Access the Checklist tile on your CHOICE Course screen for reference information and presentation from the
job aids on How to Install Power Supplies. CHOICE Course screen
6
or have students
navigate out to the
Course screen and
watch it themselves as a
supplement to your
instruction. If not, please
remind students to visit
the LearnTOs for this
course on their CHOICE
Course screen after
class for supplemental
information and
additional resources.
ACTIVITY 7-7
Calculating Power Requirements
Scenario
In this activity, you will calculate the power required by the computer you are using for this course.
As a guide, you can refer to the following table that includes common component types, example
specifications, and required wattages.
1. Examine your PC, and complete the Specifications column of the following table. If you have different or
additional components in your PC, revise the table accordingly.
2. If you can, determine the power required by each component, and complete the table. Again, example
values have been provided for your reference.
3. Calculate the total wattage required for your PC. Compare this value with the maximum wattage output
listed on the power supply. Does this power supply need to be upgraded?
4. Add a buffer of 30 percent to the total wattage required for your PC. Will the existing power supply
continue to supply enough power if additional components are added to the system?
ACTIVITY 7-8
Installing a Power Supply
Scenario
After calculating the power needed for all the components added to a user's system, you have
determined that it exceeds the capacity of the installed power supply. You have ordered and received
a replacement power supply and now you need to install it.
Note: If you don't have another power supply, reinstall the power supply you just
removed.
a) Insert the power supply into the case. Align the guides on the base of the supply with the base.
b) Secure the power supply to the case.
c) Plug all power connections into the devices.
d) Plug the power supply into the system board.
e) Reinstall any components you removed to access the power supply.
f) Plug the power cord from the power supply to the electrical outlet.
TOPIC D
Troubleshoot System Components
So far in this lesson, you have worked with several crucial components that are found inside a
computer case. As an A+ technician, it is essential for you to be comfortable working with these
components, whether you are installing them, configuring them, or trying to figure out how to
resolve issues with them. In this topic, you will troubleshoot system hardware components.
It is only a matter of time before a personal computer's internal system hardware components
experience problems, and generally these are problems users themselves cannot fix. As an A+
technician, many of the service calls that you respond to will involve troubleshooting system
hardware components, and your ability to quickly and effectively diagnose and solve the problems
will be essential in maintaining the satisfaction level of the users you support.
Overheating and Most problems with CPUs can be attributed to overheating or outright failure.
failure The main solution to CPU problems is to replace the CPU. In some cases, Rather than presenting
you may be able to add additional cooling units to prevent the CPU from every item in the table,
overheating and prevent further damage from occurring. Other times, it may consider giving a brief
be possible to simply pro-actively optimize the existing cooling system, such overview of the table
as by clearing dust from chips, heat sinks, and fans. contents and having
students read it in depth
as homework.
Problem Description
Slot and socket Before you replace a processor, you need to make sure you select a processor
compatibility that matches the type of socket on the system board.
• Some sockets use a pin grid array (PGA) that enables the chip to drop in
and ensures that Pin 1 on the processor is properly aligned with Pin 1 on
the socket. This method prevents you from bending the pins when
removing or inserting the processor. The chip fits easily into the socket
and does not need to be forced. Once the chip is in place, the retaining clip
is secured.
• The land grid array (LGA) is another type of socket that contains pins that
connect to pads located on the bottom of the processor package.
When examining CPU issues, confirming the socket type may help you to
identify any possible CPU connection issues.
Not all processors that use a particular socket will be compatible with your
system; this is just one of several items you will need to check for
compatibility.
Cooling system Because CPUs are prone to damage from overheating, you should always
issues consider the cooling system components when you are troubleshooting CPU
issues. For instance, if a user is experiencing intermittent problems during
operation, there could be inadequate airflow within the computer chassis that
can be corrected by providing space in front of the vents and fans. Also, dust
can often accumulate on the CPU's heatsink, and can reduce the efficiency of
the heatsink, possibly causing the CPU to overheat.
When thermal problems cause a system to shut down or fail to boot, it could
be that the overall system cooling is inadequate, a cooling device has failed, or
the processor is overclocked, whether intentionally or not.
• If you suspect the cooling system is a problem, you can add more cooling
devices, upgrade to more efficient devices, or clean or replace failed
devices.
• If you suspect the CPU is overclocked, check the manufacturer's
specifications to determine the supported clock speed, Then, use firmware
settings to reduce the CPU speed. If you have an advanced system BIOS,
then you may be able to see the actual CPU temperature readings.
Excess power Power consumption is a major factor for manufacturers when designing
consumption CPUs. When troubleshooting possible CPU issues, keep in mind that because
some CPUs operate at higher clock frequencies, they require more power. If
not properly cooled, this can result in the CPU overheating. In this case, you
may need to either reduce the clock frequency of the processor using Power
Management, or install additional cooling devices.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Troubleshoot CPU Problems.
ACTIVITY 7-9
Troubleshooting CPU Issues
Scenario
You are attempting to resolve problems for a user who has been reporting intermittent but severe If you have a PC that
system errors, such as frequent unexpected shutdowns. The problems have been getting more has CPU issues that you
frequent, and you have been unable to pinpoint a cause within the system software, power supply, can have students
memory, or any adapter cards. You are starting to suspect that there is a bad CPU, and you need to diagnose and fix, have
proceed accordingly to get the user back to work with as little downtime and cost as possible. students work as a team
to repair the system.
1. What initial steps should you take to identify and resolve a potential CPU problem?
☐ Replace the CPU with a known-good processor.
☑ Verify that the CPU fan and other cooling systems are installed and functional.
☐ Replace the motherboard.
☑ If the CPU is overclocked, throttle it down to the manufacturer-rated clock speed.
2. All other diagnostic and corrective steps have failed. You need to verify that it is the CPU itself that is
defective. What should you do?
◉ Replace the CPU with a known-good chip.
○ Remove all the adapter cards.
○ Reinstall the operating system.
○ Replace the motherboard.
Issue Solution
Common Cooling
Dust buildup Over time, dust will build up on components inside the computer. Dust can act System Issues
as a thermal insulator once it has gathered on a system's heat sinks and fans. In
this case, the dust can act as an insulator and keep heat from escaping from the
components, and can inhibit proper airflow within the system. As a result,
system components will not perform to capacity and can burn out quicker than
expected. Make sure to keep system components clean and free of dust.
Poor airflow When system components are not properly placed inside the computer's case,
the result can be reduced airflow within the system. This can happen when
system board components are placed too close together and create too much
heat. Another cause for concern is when there is more than one fan used in the
cooling system. Both of these examples can create irregular airflow and can also
create small pockets of hot air inside the case. Always check the manufacturer
information for your system before adding additional components, including
core cooling devices such as CPUs and case fans.
Issue Solution
Poor heat Thermal compounds are used to aid in the cooling of computer devices.
transfer Thermal compounds are often used in conjunction with a heat sink to maximize
the cooling effect. In cases when the thermal compound is not applied properly,
heat transfer may not be effective and can result in heat damage to the
components instead of the heat being properly dissipated.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Troubleshoot Cooling System Issues.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Troubleshoot Motherboard Problems.
ACTIVITY 7-10
Troubleshooting Motherboards
Scenario
Several trouble tickets related to motherboards have been assigned to you.
If you have a PC with 1. Problem #1 When the user turns on the computer, he sees a message stating that the computer's date
motherboard problems, and time are incorrect. He must reset this information in the computer's system firmware each time he
consider having students starts the computer.
work as a team to What should you do to resolve this issue?
troubleshoot and fix the
problem. A: This problem indicates that the CMOS memory on the motherboard has failed. Replace the CMOS
memory.
2. Problem #2 When the user turns on the PC, it does not always come on and sometimes it just shuts
itself down abruptly, with no warning. When she turns on the PC again, there is no fan noise. Her data is
becoming corrupted from the frequent reboots.
3. Problem #3 One of the other hardware technicians has been trying to troubleshoot a power problem.
The computer periodically and randomly reboots. The other technician has determined that the user has
an ATX motherboard and power supply. You have been assigned to take over this trouble ticket.
Line noise Line noise occurs when there is a fluctuation in the electrical current. Causes
include:
• Electromagnetic interference (EMI)
• Radio frequency interference (RFI)
• Lightning
• Defective power supply.
Fan will not work. The fan and openings around the power supply bring in air to cool system
components, but they also allow dirt and dust to gather around the power
supply. This can cause the fan bearings to wear and the fan to turn more
slowly. You can use compressed air to remove this debris from the system. If
the fan becomes damaged due to dust, replace the power supply or have
qualified personnel replace the fan.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Troubleshoot Power Supply Problems.
ACTIVITY 7-11
Troubleshooting Power Supplies
Scenario
You have been assigned several power problems to solve.
1. Problem #1 When the user turns on the PC, it does not always come on and sometimes it just shuts
itself down abruptly, with no warning. When she turns on the system again, there is no fan noise. She is
using a legacy database application and the data is being corrupted during the improper shutdowns.
2. Problem #2 A user is reporting an odor coming out of his computer. You have serviced this machine
recently and replaced the computer's power supply unit.
3. Problem #3 One of the other hardware technicians has been trying to troubleshoot a power problem.
The system will not come on when the user turns on the power switch. He determined that the user has
an ATX motherboard and power supply. You have been assigned to take over this trouble ticket.
a) Set the multimeter for DC volts over 12 V.
b) Locate an available internal power supply connector. If none are free, power off the system and
If you have power supply unplug it, then remove one from a CD drive, and then power on the system again.
testers available, you c) Insert the black probe from the multimeter into one of the two center holes on the internal power
can have students use supply connector.
them instead of d) Insert the red probe from the multimeter into the hole for the red wire.
multimeters. You will e) Verify that the multimeter reading is +5 V DC.
need to lead them
f) Move the red probe into the hole for the yellow wire.
through the testing
process. g) Verify that the multimeter reading is +12 V DC.
h) Check the documentation for the ATX motherboard to see if there is a logic circuit switch that signals
power to be turned on or off, that it is properly connected, and how it should be set.
i) Verify that the motherboard, processor, memory, and video card are all correctly installed and
As an alternative to this working.
step, if you have a PC
with a power supply
problem, have the
students work as a team
to troubleshoot and
resolve the issue.
4. Problem #4 The user turns on the power switch, but the PC does not come on. He does not hear the
fan, there is no power light on, and he hears no beeps or other sounds coming from the system. His
system is plugged into a surge protector.
Summary
In this lesson, you installed and configured internal system components. In your role as an A+
technician, you will be responsible for helping users with installing and troubleshooting
motherboards, CPUs, cooling systems, and power supplies, so having the skills to install and
troubleshoot them will be crucial to assisting users.
In your current job role, what system components have you worked with the most? In future job roles as an
A+ technician, what system components do you think you will be working with the most?
Encourage students to
use the social A: Answers will vary, but may include upgrading CPUs, replacing power supplies, and troubleshooting
networking tools internal system components.
provided on the CHOICE
Course screen to follow What types of cooling systems have you worked with? What would you recommend for the average user?
up with their peers after A: Answers will vary, but all systems have vents, fans, and heat sinks at a minimum. Some systems
the course is completed might include liquid cooling and external or case fans. The average user typically just needs the
for further discussion vents, fans, and heat sinks included with their systems. A case fan might be added if the system
and resources to support
overheats.
continued learning.
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will manage data storage. You will:
• Compare and contrast various RAM types and their features.
• Troubleshoot RAM issues.
• Install and configure storage devices.
• Configure settings through BIOS or UEFI tools on a PC.
• Troubleshoot hard drives and RAID arrays using appropriate tools.
Lesson Introduction
Data storage comes in a variety of types and sizes and for different purposes. Temporary
data storage in RAM, long term battery powered storage in CMOS, and permanent storage
on disks, in flash memory, and on tape are the main types of storage you will encounter.
252 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Identify RAM Types and Features
In this lesson, you will manage data storage. All PCs have both long-term and short-term data
storage. In this topic, you will examine RAM.
Just as some people say you can never be too rich or too thin, you can never have too much
memory. Adding memory is one of the simplest and most cost effective ways to increase a
computer's performance, whether it is on a brand-new system loaded with high-performance
applications or an older system that performs a few basic tasks. Upgrading the memory is a common
task for any PC technician.
RAM Modules
A RAM module, or memory module, is a printed circuit board that holds a group of memory chips that
act as a single unit. Memory modules reside in slots on the motherboard, and they are removable
RAM Modules
and replaceable. Memory modules are defined by their design and by the number and type of chips
they contain.
RAM Types
Static RAM (SRAM) is used for cache memory, which is high-speed memory that is directly accessible
by the CPU. It does not need to be refreshed to retain information. It does not use assigned
RAM Types
memory addresses. It is faster than Dynamic RAM, but it is also more expensive. Cache is used for
active program instructions that software refers to on a frequent basis. Cache is divided into levels
based on how close it is to the CPU. Level 1, or L1, cache is embedded on the CPU chip. L2 cache
is memory that resides within the processor package but is not on the processor chip itself. L3 cache
To provide context, is specialized memory designed to improve L1 and L2 cache performance; it is further from the
consider a brief processor core but still within the processor package.
discussion of the history
of RAM from DRAM to Dynamic RAM (DRAM) is used on single and dual in-line memory modules (SIMMs and DIMMs).
SDRAM. It needs to be refreshed every few milliseconds. It uses assigned memory addresses and is used in
the memory modules installed in the RAM slots on the motherboard. It uses an asynchronous
interface that operates independently from the CPU. This outdated technology was replaced with
Synchronous DRAM (SDRAM), which is synchronized with the system bus, making it less likely
that information is lost during transfer and processing by the CPU.
There are several types of RAM modules used for system memory. These all use SDRAM.
DDR Double Data Rate Synchronous DRAM (DDR SDRAM) transfers data twice
per clock cycle, which means it processes data on the rising side and falling
side of the system clock. It is a replacement for SDRAM. DDR uses
additional power and ground lines and is packaged on a 184-pin DIMM
module.
DDR2 DDR2 chips increase data rates over those of DDR chips. DDR2 modules
require 240-pin DIMM slots. Although DDR2 chips are the same length as
DDR, they will not fit into DDR slots.
DDR3 DDR3 chips transfer data at twice the rate of DDR2, and use 30 percent less
power in the process, Like DDR2, DDR3 chips use 240-pin connections, but
cannot be used interchangeably because of differences in notch location and
electrical requirements.
RAM Configurations
Different chipset configurations used in RAM will determine how fast data can be transferred
between the chips on the board. In this context, the number of channels correlate to how many
DIMM slots the memory controller can address at one time. RAM Configurations
• The slowest configuration is the single channel because the memory controller can access only
one DIMM at a time.
• In a dual-channel configuration, the memory controller can access two DIMMs at one time,
which doubles the speed of memory access.
• In a triple-channel configuration, the memory controller can access three DIMMs at the same
time.
• In a quad-channel configuration, the memory controller can access four DIMMs at the same
time.
Consider mentioning
that some high-end
computers use quad Parity vs. Non-Parity
channel memory.
Parity is an older error-checking method that is sometimes used in RAM modules to detect errors
that may occur during data transmission. When parity is used, a data transmission contains 8 bits of
data with the ninth bit being the parity bit. The parity bit is used to determine whether a piece of
Parity vs. Non-Parity data is equal to another piece of data. The parity bit value can be either true, or a 1, or it can be false,
or 0. An error is detected if the parity bit values of two data strings do not match.
The controller can detect that an error has occurred, but it cannot correct it. When an error is
detected, the system simply tries again after discarding the data. Or, a parity error might cause the
system to stop and the screen displays an error message such as: Parity Error 1 (parity error on the
motherboard).
Parity memory is rarely used; however, there are usually other system components that are relied on
to verify that the data contained in memory is accurate when non-parity memory is used. You will
typically find this type of memory used in servers.
RAM Compatibility
If you want to add additional memory or you need to replace the existing memory in your system,
the RAM modules you install must be compatible with your motherboard. The technology for each
RAM Compatibility
type of memory module (DDR, DDR2, DDR3, and so forth) is not compatible with each other. In
addition to the technology, another way memory manufacturers prevent you from accidentally
installing the wrong memory modules is by the placement of the notches on the edge of the RAM
modules. Even though the modules might be the same physical size, the location of the notches will
Point out that timings are be different.
indicated on packages
and in descriptions by Most memory manufacturers have tools on their website to help you identify the RAM you will need
four numbers separated for your system. Typically, you need to specify the manufacturer of the computer, the product line,
by dashes such as and the model of the system. Some sites will scan your system to see what is currently installed and
7-8-7-24. make recommendations based on the results of the scan.
The best results when installing additional RAM is to install the exact same modules as what is
already installed. If that isn't possible, make sure that the new modules have the same specifications.
Memory modules of different speeds will cause the faster modules to run at the speed of the slowest
module.
Specification Description
CAS latency Column address strobe (CAS) is a signal the processor sends to a memory
circuit to activate a column address. The latency indicates how many clock
cycles it will take for the memory module to read or write a column of data
from a memory module and return the data requested by the CPU. Make sure This refers to the
that additional modules have the same CAS latency. latency between
Timing In addition to the CAS latency timing, the other timings you need to match memory and the
memory controller.
include:
• Row Access Strobe (RAS): After sending the memory controller a row
address, this is the number of cycles that must pass before the system can
access one of the row's columns.
• Row Precharge Time (RP): If a row is already selected, this indicates how
many cycles must pass before another row can be selected.
• Row Active Time: This specifies the minimum number of clock cycles a
row needs to be active to make sure there is enough time to access the
information stored in the row.
Voltage The voltage should be the same as the existing memory modules.
ACTIVITY 8-1
Comparing RAM Types and Features
Scenario
In order to choose the right type of RAM for a computer system, you typically will compare the
various types and features.
1. You have a typical system with RAM that runs at 10 ns, and you add a 12 ns memory module. How fast
will the RAM run? Explain your reasoning.
A: 12 ns, because RAM runs at the speed of the slowest DIMM.
2. When selecting a RAM module, when would you choose RAM enabled with ECC as opposed to RAM
with only parity?
A: The difference between ECC and parity is that ECC can detect errors and correct them, while
parity can only detect errors. If you are adding or replacing RAM in a high-end system or a server
where errors can have a critical impact on data integrity, you should consider choosing ECC RAM.
ACTIVITY 8-2
Install RAM (Optional)
Scenario
A user has asked you to install additional memory in their PC. You will need to figure out what type
of memory is currently installed, then determine which memory modules would be compatible with
the existing modules already installed.
1. Determine the specifications for the memory currently installed in the PC.
a) Open a web browser and access a search site.
b) Search for RAM finder
c) Select the manufacturer of your choice and access their web page.
d) Enter the required information about your PC to find out what memory works in the system.
This typically includes the computer manufacturer name and the model name or number.
e) Determine the maximum amount of RAM that can be installed in the PC.
This information should be shown in the results from your search.
f) View System information to see how much RAM is currently installed.
Note: If your instructor has additional memory available for you to install in the
PC, they will give it to you now. If not, you can remove the existing memory
module and reinstall it. Be sure to follow ESD best practices when you work with Be prepared to provide
6
RAM modules to
RAM modules.
students or assist them
a) Shut down the PC and prepare to work inside the system. in removing the existing
b) Locate an empty RAM slot on the motherboard. module so they can
reinstall it. Also, remind
Note: Refer to any documentation you have about whether modules must be students about using
installed in certain slots if multiple slots are available. ESD protection when
working with RAM
c) Open the retaining clips for the selected RAM slot. modules.
d) Holding the RAM by the edges, line up the RAM with the RAM slot, then press down on it until the
clips lock the module in place.
e) Restart your PC.
f) Log in, then view System information to see how much RAM is installed.
TOPIC B
Troubleshoot RAM Issues
You have identified RAM types and features. Fully functional RAM is essential to the system and to
creating a working system. In this topic, you will examine some of the common RAM issues you
might encounter and how to resolve those issues.
Computer crashes, • ESD, overheating, or other power-related problems that can affect
Point out you can use system lockups, and memory.
system firmware unexpected shutdowns.
configuration to hide the
• Registry writing to bad memory, General Protection Faults (GPFs),
manufacturer splash and exception errors caused by software and operating system.
screen that covers the
Memory errors appear on • Memory address errors at boot time.
memory test at boot
time.
screen. • Applications that require large amounts of memory or that do not
properly release memory.
Blank screen on bootup. • Memory is not correct for the system. For instance, the computer is
expecting memory that uses error checking and you installed non-
parity memory.
• Memory module is not fully inserted into the slot.
Computer does not boot. • CPU cannot communicate with memory due to the memory being
POST beep codes sound. improperly installed or the BIOS not recognizing the memory. Beep
codes are specific to the BIOS manufacturer and the ones for
memory can be found in the manufacturer's beep codes list.
• For additional information on specific beep codes, visit
www.computerhope.com/beep.htm.
Some or all newly • You exceeded the maximum amount of RAM that can be addressed
installed RAM is not by the system. Even though the slots can accept Dual In-line
recognized. Memory Modules (DIMMs) containing more memory, the system
can only recognize a certain amount of memory on most systems.
• The wrong memory type was installed.
• The memory was not installed in the proper sequence.
• You might need to leave empty slots between multiple modules, or
you might need to install modules containing more memory in
lower-numbered slots than smaller modules.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Troubleshoot RAM Problems.
ACTIVITY 8-3
Troubleshooting RAM Issues
Scenario
You have been assigned some trouble tickets that deal with memory issues.
1. Problem #1 The user is experiencing corrupted data in his database application. The hard drive has If you have a system
been checked and no problems were found with it. The application was reinstalled and the database available that has RAM
was re-indexed and all data problems have been corrected. No other users are experiencing this issues, consider having
problem when they enter data. He has been successfully entering data until just recently. students work as a team
After troubleshooting this trouble ticket, you have discovered symptoms of a memory problem. What to troubleshoot and
factors could cause sudden memory problems in this situation? resolve the issue.
☑ New virus
☑ Power spike
☐ New memory not compatible
☑ Power surge
2. Problem #2 Additional memory was installed in a user's system, and now it will not boot.
3. Problem #3 The user is complaining of application crashes. He is fine if he is running only his email and
word processing programs. If he also opens his graphics program at the same time, then the
applications are crashing.
Why is the user experiencing the problem only when additional applications are opened?
○ There is not enough memory in the system.
◉ Memory errors are occurring in one of the higher memory modules.
○ The memory modules are incompatible with one another.
TOPIC C
Install and Configure Storage Devices
So far in this lesson, you have worked with RAM, which is short-term data storage. Now it's time to
look at long-term storage solutions. Storage devices such as hard disks are one of the most common
system components you will install. In this topic, you will install and configure storage devices.
Users rely on local storage devices to keep their applications and data current and available. As an A
+ technician, your responsibilities are likely to include installing and configuring different types of
storage devices to provide your users with the data-storage capabilities that they need to perform
their jobs.
Storage Devices
As you have seen previously in the course, there are several types of storage devices. These include
internal and external devices. The data is stored on optical discs, magnetic media, solid state devices,
Storage Devices
and using RAID.
Consideration Details
Does the placement of the Make sure there is enough total air flow to handle whatever heat the
device interrupt the air new storage device will add to the computer.
flow of the case?
Note: Although any user can access Disk Management and view information about their
drives, only an administrator can use the other disk management tools available through this
utility.
Action Description
Views Displays all of the drives on the system, the drive letter assigned, the total
capacity of the drive and how much free space is available, and the current
status of the drive. It also displays the partitions for each drive.
Assign a drive Can be used to assign or change a drive letter for any hard drives, optical
letter drives, or flash drives being used by the system. The drive letter for the
partition that Windows is installed on cannot be changed.
Mount a drive Can be used to create a mounted drive or partition, in which the drive is
mapped to an NTFS-formatted folder on the hard drive and is assigned a
folder path name rather than a drive letter.
Extend partitions Can be used to create a container for logical partitions in order to extend the
volume of an existing partition, if more than four partitions are desired.
Split partitions Can be used to shrink or divide a partition on the drive to make room for
another partition to be created. You can reduce the partition volume to a
desired size to make free space for a new partition to be created.
Add a drive Can be used to add a drive/disk to the machine. Once the drive has been
installed and depending on the history of the drive (already partitioned, never
been used, etc.), you can use this utility to initialize the disk or set an offline
disk to online.
Add an array Can be used to create and add an array to the system, including assigning the
drive a drive letter, mounting it to a folder, and formatting the volume. An
array is more than one physical drive on the machine that is combined and
managed as a single logical drive in the Disk Management utility.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Install and Configure Storage Devices.
ACTIVITY 8-4
Installing an Internal Storage Device
Scenario
Try to supply students You have been assigned the task of refurbishing a computer for a client. This computer has a single
with SATA drives. If you functioning hard drive, and the user needs a significant amount of local storage space.
must use older drives
such as PATA or SCSI,
make sure a PATA cable
1. Locate the available bay and the power and data connections for the new hard disk drive.
or a SCSI HBA is
available. a) Power off the system, unplug all the peripherals and power cord, and open the computer case.
b) Locate an available drive bay and determine if the bay is the same form factor as the drive. If you
are using a 5.25-inch drive bay and a 3.5-inch drive, you will need to install the drive using rails to
adapt the drive to the larger bay.
c) Locate an available data connection on the data cable.
d) Locate an available power connector.
If students are installing
PATA or SCSI drives, 2. Install the hard disk drive into the system.
assist them in making a) If necessary, attach rails to the drive to fit in the bay.
the appropriate data and b) Slide the drive into the bay.
power connections.
c) Connect the data cable to the drive.
d) Connect the power cable to the drive.
e) Secure the drive to the bay chassis with screws.
Note: You can leave the case open until the end of the activity.
6
h) Select Next.
i) In the Simple volume size in MB text box, type 20000
j) Select Next.
k) From the Assign the following drive letter drop-down list, select S.
l) Select Next.
m) On the Format Partition page, verify that NTFS is selected and select Next.
Note: To save time during class, you can check the Perform a Quick Format
option.
n) Select Finish.
o) Close the new drive window.
p) Close Computer Management.
q) In the Auto Play dialog window, click Open folder to view files.
r) Close the New Volume (s:) window.
RAID
The Redundant Array of Independent Disks (RAID) standards are a set of vendor-independent
specifications for improvements in performance and/or fault-tolerant configurations on multiple-
disk systems. In a fault-tolerant configuration, if one or more of the disks fails, data may be RAID
recovered from the remaining disks.
Note: The original RAID specifications were titled Redundant Array of Inexpensive Disks. As
the disk cost of RAID implementations has become less of a factor, the term "Independent" Point out that RAID is
disks has been widely adopted instead. typically used in servers,
but that some off-the-
shelf big-box store PCs
now come with RAID
RAID Standards capabilities built in.
RAID can be implemented through operating system software, but hardware-based RAID
implementations are more efficient and are more widely deployed.
Hardware-based RAID requires a card, or controller, to show the different disks to the computer as RAID Standards
a single drive. These cards are usually a PCI or PCIe card, but can also be already built into the
motherboard.
In the Windows 8 family of operating systems, RAID is known as Storage Spaces. Point out that RAID
traditionally used SCSI
drives and controllers.
Common RAID Levels
There are several RAID levels, each of which provides a different combination of features and
efficiencies. RAID levels are identified by number; RAID 0, RAID 1, RAID 5, and RAID 10 are the
most common implementations. Common RAID Levels
RAID 0 RAID level 0 implements striping, which is the process of spreading data across
multiple drives. Striping can dramatically improve read and write performance.
Striping provides no fault tolerance, however; because the data is spread across
multiple drives, if any one of the drives fails, you will lose all of your data. You
must have at least two physical disk drives to implement striping, and the largest
size RAID-0 partition that can be created is equal to the smallest available
individual partition times the number of drives in the set. For instance, combining
a 37 GB drive and a 100 MB drive in a RAID 0 set would result in a 200 MB
partition; the balance of the 37 GB drive could not be included in the set (although
it would remain available for use in other partitions).
Note: For additional information, check out the LearnTO Select the Appropriate RAID
Level presentation in the LearnTOs for this course on your CHOICE Course screen.
You may want to show
the LearnTO Select the
Appropriate RAID Level
presentation from the Access the Checklist tile on your CHOICE Course screen for reference information and
CHOICE Course screen job aids on How to Install and Configure RAID.
or have students
navigate out to the
Course screen and
watch it themselves as a
supplement to your
instruction. If not, please
remind students to visit
the LearnTOs for this
course on their CHOICE
Course screen after
class for supplemental
information and
additional resources.
ACTIVITY 8-5
Installing and Configuring RAID
Scenario
You have had a request from a user to configure RAID 1 on his PC. You already installed a second
hard drive for this purpose.
3. Specify a name, resiliency type, and size for the storage space.
a) In the Create a storage space dialog box, under Name and drive letter, in the Name text box, type
My RAID Storage Space
b) Accept the default drive letter. Based on the size of the
c) Verify that the File system is set to NTFS. drives and other factors
d) Set the size as needed, based on information provided by your instructor. in the course
e) Select Create storage space. environment, let
students know what
sizes they should
4. Open File Explorer and examine the drive.
specify.
TOPIC D
Configure the System Firmware
In the previous topics, you focused on the basic internal storage devices that enable a computer to
run, but what about how the computer communicates with all these devices? In this topic, you will
configure settings in the system firmware.
How does the computer know when to start devices within the computer? Without the system
firmware managing the system components within the computer system, the devices simply would
not be accessible. As an A+ technician, you must fully understand how the system firmware
operates and how to configure it to enable a customized computing environment for users.
System Firmware
Firmware straddles a gray area between hardware and software. Firmware is specialized software
stored in memory chips that store information whether or not power to the computer is on. It is
System Firmware
most often written on an electronically reprogrammable chip so that it can be updated with a special
program to fix any errors that might be discovered after a computer is purchased, or to support
updated hardware components.
Point out that firmware
Traditionally, systems booted up using BIOS (Basic Input/Output System) system firmware.
might be referred to as However, the limitations such as lack of support for large drives and a plain text non-mouseable
BIOS or UEFI. interface, meant a new approach to system firmware was needed. UEFI (Unified Extensible
Firmware Interface) allows support for larger hard drives, provides a GUI interface, supports
remote diagnostic and repair, and paves the way for a more secure system boot.
Most of the functions available in system firmware are available in both BIOS and UEFI. They are
implemented differently and may have limitations. They are both interpreters between system
hardware and the operating system that run at system startup to initialize hardware and launch the
operating system.
• BIOS memory stores information about the computer setup that the system firmware refers to
each time the computer starts. The BIOS information is stored in non-volatile Electrically Erasable
Programmable Read-Only Memory (EEPROM), or flash memory chips. Because you can write new
information to BIOS memory, you can store information about system changes, such as new
components that you add to your system. The computer will look for the component each time
it is turned on.
• When a system boots using BIOS, the first sector of the boot drive is read. This sector of the
drive contains information about the initialization address. The boot device is initialized based
on BIOS settings, and then operation is handed off from the system BIOS firmware to the
operating system code.
• BIOS uses the Master Boot Record (MBR), which is a table of 32-bit entries. MBR supports
up to 4 physical disk partitions, each with a maximum size of 2 TB. The MBR can use only
one bootloader.
• UEFI stores information in a .efi file on the hard drive in the EFI System Partition (ESP). This
partition also contains the bootloader for the OS. UEFI uses a GUID partition table (GPT),
which is a table of 64-bit entries. It supports unlimited partitions (although in practice this is
limited to 128 partitions), each with a maximum size of about 8 to 9 ZB (Microsoft Windows
limits the size to 256 TB). ESP can store multiple bootloaders. This is useful if you have multiple
operating systems that use different bootloaders.
• Many functions are available in the pre-boot environment, including video and storage
services.
• Another advantage UEFI has over BIOS is secure boot. UEFI uses a private key created by
the motherboard manufacturer. This secure boot feature is designed to prevent boot-time
viruses from running. Secure boot also helps ensure that the computer boots using only
trusted firmware.
Note: For additional information, check out the LearnTO Work with System Firmware
presentation in the LearnTOs for this course on your CHOICE Course screen.
You may want to show
the LearnTO Work with
Types of ROM System Firmware
presentation from the
ROM is memory that is non-volatile. The original ROM chips could not be altered after the
CHOICE Course screen
program code was placed on the ROM chip. As time went on, though, users needed the ability to or have students
update the information stored on ROM chips. Over the years, various chips have been created that navigate out to the
perform the function of ROM, but can be updated one way or another. These are referred to as Course screen and
programmable ROM (PROM). watch it themselves as a
EEPROM (electronically erasable PROM) is a chip that can be reprogrammed using software from supplement to your
instruction. If not, please
the BIOS or chip manufacturer using a process called flashing. It is also known as Flash ROM. remind students to visit
the LearnTOs for this
course on their CHOICE
Firmware Upgrades Course screen after
class for supplemental
Updating firmware electronically is called flashing. There are a few reasons why you should consider
information and
upgrading the system firmware, including: additional resources.
• To provide support for new hardware, such as a large hard drive or removable storage device.
• To fix bugs that prevent the operating system from installing or running properly.
• To enable advanced Plug-and-Play or advanced power management features Firmware Upgrades
• To be eligible for vendor support.
The temptation to upgrade the system firmware simply because a newer revision is available should
be avoided. Upgrading the system firmware or other firmware can be damaging to the PC if it is not
done correctly. If you improperly flash the system firmware, or if the flash process is interrupted by
a power failure, or even if you use the wrong BIOS image to flash the system BIOS, you can corrupt
the BIOS chip so that the system will no longer boot. Often, your recovery options will be limited,
but they should be listed on the manufacturer’s support website.
UEFI is updated through package updates. The updates, along with the appropriate updater tool, are
downloaded from the manufacturer.
firmware; however, in most cases, you should be able to configure at least the following—and
possibly much more—by using the system firmware configuration utility.
Configuration Description
Option
Configuration Description
Option
Virtualization If the CPU supports virtualization, then you can use the system firmware
support setup utility to enable or disable the various virtualization settings available.
Virtualization support within the system firmware is dependent on the OEM
model. Most modern systems will support virtualization.
Power Allows you to configure different power options available, such as how the
management system will recover from a power loss and other advanced power options.
Maintenance Allows you to verify and set service and asset tags used when a computer
needs further maintenance from an outside vendor. The asset tag is used to
identify the computer within the system firmware. It is usually a four or five
digit number.
Secure Boot
The UEFI 2.2 feature Secure Boot prevents drivers from loading that haven't been signed with an
appropriate key. This feature is enabled by default and should not be disabled unless absolutely
required. Windows 8 and some Linux distributions make use of the Secure Boot feature. Secure Boot
On Windows 8.1 systems, you might need to disable the Secure Boot feature in order for some
hardware to work, or if you are using another operating system such as a previous version of
Windows or some Linux distributions. Secure Boot cannot be disabled on Windows RT.
Temperature The temperature of the CPU, motherboard, and overall system can
usually be checked within the system BIOS. You can use this option to
check for overheating and to verify that the CPU is running within its
safe temperature range.
Fan speeds Within the BIOS, you can verify the fan speed for your CPU, and any
system fans installed in the computer. Keep in mind that you must
balance the rotations per minute (RPM) speed of the fans with the
temperature of the CPU and motherboard.
Intrusion detection/ Most modern BIOS will have some security functions built in. This
notification includes system intrusion detection. The intrusion detection is
implemented using a sensor that alerts the system BIOS when the case
cover of the system has been removed.
Voltage The system voltage settings are strictly based on the specific hardware you
have installed in the system, such as type of motherboard and CPU. The
BIOS allows you to change the voltage configuration for each device
installed. Once in the BIOS, you will look for:
• Vcore, or VCC, which is the CPU voltage reading.
• Memory voltage, which displays the RAM voltage settings.
• VDD voltage, which displays the motherboard's voltage. This rating is
driven by the Northbridge chip of the board.
• If there is a graphics card installed, then you will see the AGP voltage
setting displayed.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Configure System Firmware Settings.
ACTIVITY 8-6
Exploring and Configuring the System Firmware
Depending on the type
of PCs used, students
may not have all the Scenario
options mentioned in this
topic, or the steps in this In this activity, you will explore the configuration options available to you in the system BIOS or
activity might not reflect UEFI utility.
the order in which the
information appears on
computer screens.
Provide assistance when 1. Explore the system firmware utility.
accessing the system a) Restart your computer system.
firmware on startup, and b) As the computer restarts, press the system firmware access key. You might want to record this key
explain that any for later use.
differences are based on c) Navigate to the System Setup menu option.
what BIOS or UEFI is
installed. Depending on the system firmware installed on your computer, this menu might have a different
name.
d) Browse through the available configuration options.
e) Locate the motherboard settings and record the firmware version.
In step 1b, if participants
cannot press the access This information can be helpful if you ever have to update the system firmware to solve a hardware
key quickly enough, issue.
have them restart the
computer and try again 2. Change the boot order.
until they can access the a) Navigate to the Boot Sequence setting.
system firmware utility.
Depending on the system firmware installed on your computer, this setting might have a slightly
different name.
b) Examine the current boot order.
Before you proceed with In older systems, the floppy drive was often configured as the primary boot device. In newer
each step in the rest of systems, a USB storage device or the internal hard disk might be configured as the primary boot
this activity, ensure that device.
all participants have c) Change the boot order to the following:
successfully completed
step 1. • Optical drive
• Internal hard disk 1
• Internal hard disk 2
• USB storage device
If participants did not
add a second hard drive d) Save the change.
to their computers, only
one hard disk will display 3. Update the system date and time.
in the boot sequence list. a) Navigate to the Date and Time setting.
Assist participants in Depending on the system firmware installed on your computer, this setting might have a slightly
changing the boot order, different name.
if necessary.
b) Examine the current setting. If the date and time appear to be correct, you can skip this and the next
substep. If the date and time are not correct, adjust them to match the current date and time.
c) Save your changes.
If temperature
monitoring is not 4. Examine system monitoring options.
available through the
system firmware, skip a) Navigate to the Hardware Monitoring menu option.
step 4. If it is available, Depending on the BIOS or UEFI installed on your computer, this setting might have a different
assist participants in name, such as PC Health, CPU Temperature, or some other name.
locating the settings in b) Examine the CPU temperature reading.
their system firmware Normal CPU temperatures range from 30 to 60 degrees Celsius.
utilities.
TOPIC E
Troubleshoot Hard Drives and RAID Arrays
So far in this lesson, you've examined the various forms of data storage found in most PCs, and
you've performed troubleshooting on RAM. You'll also need to be well versed in troubleshooting
other types of data storage options. In this topic, you will troubleshoot hard drives and Redundant
Array of Independent Disks (RAID) arrays.
End users rely on the hard drives in their PCs to store important system information and personal
or professional data and files. Without a hard drive that works properly, the computer system is
essentially worthless. As an A+ technician, you will likely be called upon to fix or troubleshoot
common problems with hard drives. In this topic, you will troubleshoot hard drives and RAID
arrays.
Screwdriver In order to repair a faulty hard drive, you will need a screwdriver to remove the
drive from the drive bay within the computer case.
External External enclosures protect the hard drive by providing a strong barrier typically
enclosures made of plastic all the way around the disk. Most enclosures also provide
power to the drive through an external connection, typically through a
universal serial bus (USB) port.
CHKDSK This utility is also referred to as Check Disk. It is used to verify the logical
integrity of a file system. With the /f switch, chkdsk.exe can repair the file
system data. Enter chkdsk "drive letter" /f in the Run dialog box or at
the command line. With the /r switch, chkdsk can locate bad sectors on the
disk and recover any readable information. Entering chkdsk /? displays a list
of all available switches.
BOOTREC Bootrec.exe is run from within the Windows RE. This is the system recovery
done from the Windows Vista or Windows 7 DVD. After booting from the
installation media in the DVD drive, selecting Repair your computer, and
selecting the operating system to repair, you can open a command prompt and
run bootrec.exe. It can be used to fix the master boot record and the boot
sector, to rebuild the BCD store, and to scan for items not in the BCD store.
DISKPART DISKPART is a superset of the commands available in the GUI tool Disk
Management. It should be used with extreme caution as you can easily remove
a partition that contains data.
FORMAT The format utility can be used to format partitions to a selected file system.
You can run the format command right from the command line, or right-click
any drive letter in Windows® Explorer and select the Format option.
FDISK Use to create and manage partitions on a hard disk. You can run the fdisk
command at the command line to open the utility. The tool can be used to not
only create partitions, but also to change, delete, and view current partitions.
Tool Description
File recovery File recovery software is used to recover deleted files from your computer system.
software In many cases, files that were moved to the recycle bin, then emptied, can still
be recovered. Some files may still live on the hard disk. There are a number of
free software programs that will provide recovery functions:
• Recuva
• Glary Undelete
• Pandora Recovery
Failure to boot If you receive an error that says "Not Ready—System Halted," then the drive is
damaged or a data cable is not connected properly. You should check the drive Consider mentioning
for physical damage and verify that the connections are properly attached to the that if you have an older
drive. PATA drive you will
need to verify that it is
POST error POST errors in the 17xx range could indicate several different issues, including: configured to be a
• 1701: Drive not found master or Cable Select
as needed for the
• 1702: Hard drive adapter not found system. You might also
• 1703: Hard drive failure briefly discuss SCSI IDs
• 1704: Hard drive or adapter failure and termination if
• 1780, 1790: Hard drive 0 failed students ask about
configuring or
• 1781, 1791: Hard drive 1 failed troubleshooting SCSI
• 1782: Hard drive controller failed drives.
You should check for damage to the connections and reconnect the drive. You
may need to replace any component that has failed.
Drive not If your hard drive is not recognized by the system when it boots up, then verify
recognized that the system has been set to boot from the hard drive in the system firmware
settings in the boot priority list. You may also need to verify that the correct
drivers for the hard drive are installed.
Drive read/write The drive might have been infected with a virus. Run an antivirus utility to find
failure and remove any infections.
If you suspect that the drive is not writing and reading data properly, then it
could mean that there are bad sectors on the drive, the drive has failed, or the
drive has been infected by a virus. Sometimes, issues that seem to be device-
specific are actually virus infections that can cause physical damage as well, but
in most cases, the damage is limited to the data stored on the device.
Start by running CHKDSK to attempt to recover data from any damaged
sectors of the drive. Use Device Manager to resolve any resource conflicts and
indications of drive failure.
Computer will If the computer will not boot up, then it could be a sign that the drive is
not boot disconnected, is damaged, is not recognized by the system firmware, or is not
configured properly by the system firmware. Start by enabling the drive in the
BIOS or UEFI setup utility and check the startup settings, then visually inspect
the drive for damage and reconnect it to the system.
Controller card Not all SATA controller cards are supported on all operating systems. Check
the vendor specifications for the operating system or software you are using.
Controller driver SATA drives themselves do not require drivers, but the SATA controller does.
Ensure that you are using the latest version.
Drive not If you install a fresh copy of your operating system and the SATA drive is not
detected detected, then restart the setup process and press F6 when prompted to install
the driver.
Drive size If the SATA controller drivers are not loaded during the operating system
limitation installation, then the drive will only report the 137 GB capacity supported
natively by the operating system.
Speed limitation 1.5 gigabytes per second (GBps) SATA cards do not always auto negotiate with
newer 3.0 GBps drives. Use jumper settings on the drive to limit the transfer
rate to 1.5 GBps.
RAID not found If RAID is not found when the computer boots up, it could be a sign that
either RAID is not configured within the system firmware or that the
motherboard does not recognize RAID. You must verify that the
motherboard installed in the system does in fact support RAID. You may
want to refer to the manufacturer's documentation.
RAID stops If RAID stops working suddenly, then that could mean that the settings
working have changed within the system firmware. If you have made other
configurations or replaced a component in the computer, then those
configurations may have conflicted with the RAID settings.
In the system firmware configuration utility, verify that the drive
configuration is set to RAID. Also check the motherboard documentation to
see if RAID is fully supported by the board installed in the computer.
If there is a non-system board RAID controller used, then check the
controller's firmware, and verify that the settings are properly configured.
SMART
Self-Monitoring, Analysis, and Reporting Technology (SMART) is a monitoring system that can help
anticipate storage drive failures. Indicators of failure that SMART monitors for include excess heat,
SMART
excess noise, damaged sectors, or read/write errors. Modern SMART systems also include
functionality for repairing damaged sectors, and can maintain monitoring functionality even when
the drive is not in use.
Most hard drives today run SMART by default. There is no robust program in Windows that allows
you to review your drive’s SMART data, so you’ll need to download a third party program like HD
Tune, CrystalDiskInfo, and SpeedFan in order to see detailed information. This information is
dependent on the drive manufacturer, but often includes:
• Number of reallocated sectors.
• Number of uncorrectable errors.
• Spin up time.
• Throughput performance.
• Temperature in Celsius.
• Numbered of canceled operations due to drive timeout.
The manufacturer specifies a certain threshold for these statistics, and when the threshold is met,
the SMART system will produce an error. If you receive a SMART error, back up your data as soon
as possible. Depending on the nature of the error, you may be able to fix the problem. For example,
if SMART detects excessive heat, you can try and resolve the issue by improving ventilation around
the drive. However, many errors are not easily fixable and will require you to replace the drive.
E
AT
IC
PL
DU
T
NO
6
01
DO
)2
(C
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Troubleshoot Hard Drives and RAID Arrays.
ACTIVITY 8-7
Troubleshooting Hard Drive Problems
Scenario
In this activity, you will troubleshoot different issues relating to hard drives. For this activity, you will
need to dismiss students
from the room so that
1. Problem #1: Grinding Noises you can introduce the
issue in step 2 to all of
A user has reported that there are grinding noises coming from her computer case. Once you take a their PCs. To engage
closer look, you suspect that it is the hard drive. What is the possible cause and solution to this type of remote participants,
issue? consider demonstrating
◉ The hard drive is physically damaged, probably due to a head crash, so the drive must be
the step. Alternatively, if
you have a system with
replaced.
a hard drive problem,
○ A virus has attacked the hard drive, so use antivirus software to mitigate the issues. you can have students
○ Data is corrupt on the drive, and has not been shut down correctly. work as a group to
troubleshoot and resolve
the problem.
2. Problem #2: A Computer Won't Start A user has reported that her computer cannot boot and is getting
an error message at POST. Diagnose and correct the issue.
a) Perform a cold boot.
b) Verify that BIOS lists the correct drive settings.
c) Listen to the drive or touch the drive to determine if it is spinning during POST. To create the issue in
d) Using your multimeter, verify that power connection readings are +12 V for Pin 1 and +5 V for Pin 4. Step 2, you could
Pins 2 and 3 should be grounded. replace the drive with a
e) Verify that the data cable is correctly oriented. non-functioning one or
loosen the cables on the
f) Check the drive settings
drive. If you introduce
g) If nothing else corrects the problem, replace the drive. different causes to
different PCs, you can
3. Problem #3: A Second Hard Drive is Not Recognized have participants
observe as each
You recently installed a second hard drive into a user's system. He is now reporting that the drive is not
symptom is resolved.
showing up or is not recognized. You know that one of the things you forgot to check when you first
performed the installation was system firmware settings for the drive. What in particular do you need to
check in system firmware for this problem?
A: You need to verify that drive is enabled in the BIOS or UEFI, and that the correct device settings
for the hard drive are listed.
Another thing you should check when a second hard drive is not recognized is that the drive was
installed correctly. What exactly should you be checking?
A: Verify that the power cable is connected to the drive, that the power cable voltages are correct,
and that the data cable is connected correctly to the drive and to the controller or host bus adapter
(HBA). For a SATA drive, restart the setup process and press F6 when prompted to install the
driver.
5. Problem #4: The Drive Letter for a Second Hard Drive is Not Accessible
A second hard drive was properly installed, but you cannot access it by its drive letter. What should be
your next step?
A: Use command line or Windows disk utilities to verify that the drive has been properly partitioned
and formatted.
A user is encountering the following problem: Her computer boots fine and everything works until the
user tries to access data on the second hard drive, the D drive. The message "Can't Access This Drive"
is displayed when she tries to access the D drive. The user would also like an explanation about what
the error message means. List some of the steps you might take to resolve this problem.
A: You see the "Can't Access This Drive" message when you attempt to access a drive that is not
readable, or if the drive does not exist. Troubleshooting steps you should take include: determine
if the user actually has a D drive; attempt to copy a file from the D drive to C or from C to D; run
the Windows error-checking option. Open This PC, display the pop-up menu for the drive you
want to check, and select Properties. On the Tools tab, in the Error-checking section, select
Check and then select Start to determine if there are errors; if none of the earlier steps fixed the
problem, verify that there is a recent backup and try reformatting the drive; and if the previous step
does not fix the problem, replace the drive.
When a user tries to access the hard drive containing his data, the system locks up and makes a
clicking sound. From the command prompt, he can change to drive D, but when he tries to access a file
or list the files on the drive, it locks up and begins clicking again. What steps might you take to attempt
to resolve this problem? What is the most likely cause of the problem?
A: You could try running the Windows error-checking option in the Tools pane of the Local Disk
Properties dialog box. You could also try an older version of Scandisk from a removable disk to try
to identify and repair the errors it encounters. Definitely back up the data if you can get to any of it.
You can try using other software utilities to recover the data or take the drive to a data recovery
facility. You will probably need to replace the hard drive. The most likely cause of this problem is a
bad hard drive—some of the sectors on the hard drive are probably damaged.
A user reports that some of his folders have begun disappearing and some folder and file names are
scrambled with strange characters in their names. What steps might you take to attempt to resolve this
problem? What is the most likely cause of the problem?
A: You could try running the Windows error-checking option in the Tools pane of the Local Disk
Properties dialog box. Definitely back up the data if you can get to any of it. You can try using
other software utilities to recover the data or take the drive to a data recovery facility. You will
probably need to replace the hard drive. You should also check the system for viruses because
the result of some infections looks like this problem. If it is not caused by a virus, the most likely
cause of this problem is a bad hard drive.
A user is questioning the difference between the sizes in GB and bytes. Why is there such a big
difference? The disk reports in some places as 9.33 GB and in others as 10,025,000,960 bytes. Why is
it not 10 GB?
A: Hard drive manufacturers usually round 1,024 bytes to 1,000 because it is easier to work with
round numbers. By the time you get up to billions of bytes, those extra 24 bytes really add up.
Summary
In this lesson, you managed a variety of data storage methods. You looked at the temporary storage
provided by RAM as well as the long-term storage provided by storage devices and the various
issues that might arise with these storage solutions. The ability to identify the cause of data storage
issues and quickly resolve them will be an important part of an A+ technician's duties.
Which types of storage devices have you worked with? Have you installed additional hard drives or
replaced hard drives?
Encourage students to
A: Answers will vary. Most systems today use SATA or solid state drives. Additional drives can be use the social
installed to provide more storage space or as part of a RAID array. networking tools
provided on the CHOICE
Which system firmware have you worked with, if any? What types of configuration did you perform? Course screen to follow
A: Answers will vary. BIOS is the traditional system firmware, but current computers are more apt to have up with their peers after
UEFI. Some of the configuration that might be performed includes setting the boot device, performing the course is completed
diagnostics, and flashing the firmware. for further discussion
and resources to support
Note: Check your CHOICE Course screen for opportunities to interact with your classmates, continued learning.
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will install and configure Microsoft Windows. You will:
• Implement client-side virtualization.
• Install the Microsoft Windows operating system.
• Use features of the Windows operating system.
• Configure Microsoft Windows.
• Perform a Windows upgrade.
Lesson Introduction
So far in this course, you have learned in general about hardware and software, and have
installed and configured many of the hardware components required for a computer system.
Now it is time to install the most important software component—the operating system—
so that all the hardware you've assembled so far can function together.
Since so many computers today come with operating system software installed by the
vendor, an ordinary user might never need to install an operating system. As an IT
professional, however, you might be called upon to install and configure operating systems
for a variety of reasons: if the original installation does not meet a user's needs; if the system
needs to be upgraded; if you are redeploying a system from one user to another; or even if
you need to complete a brand new build and construct a computer entirely from scratch. In
all of these cases, you will need to be able to install, configure, and optimize the computer's
operating system.
286 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Implement Client-Side Virtualization
In this lesson, you will install and configure the Windows® operating system. One or more of those
operating systems can be leveraged using virtualization to improve performance or increase
productivity for one or more computers. In this topic, you will implement client-side virtualization.
As organizations grow in size and scope, there is an increased need for more resources, especially
when it comes to computing. Virtualization can help ease the growing pains of an organization by
providing the opportunity to leverage one computer and one operating system for use over many
systems, and save valuable time and resources when it comes to hardware, software, and personnel.
As an A+ technician, you may need to know what is needed to set up a virtualized environment.
Virtualization
Virtualization is the technological process of creating a virtual version of a computing environment
by separating the elements of the computing environment―the applications, operating system,
Virtualization
programs, documents, and more―from each other and from any physical hardware by using an
additional software application. Virtualization can provide flexibility and scalability for organizations
where the costs for hardware and software and the IT infrastructure needed to maintain them both
continue to increase. It can increase resource utilization by allowing those resources to be pooled
and leveraged as part of a virtual infrastructure, and it can provide for centralized administration and
management of all the resources being used throughout the organization.
Although you can virtualize a stand-alone computer, you will reap the greatest benefits by
integrating virtualization into a networked environment.
• Client-side virtualization takes place at the endpoints, the desktop environments themselves. Client-
side virtualization separates the elements of a user's logical desktop environment―the
applications, operating system, configuration settings, and more―and divides them from each
other and from the physical hardware or a physical machine. With desktop virtualization, a single
user can run multiple operating systems on one machine simultaneously and seamlessly; a single
user can interact with their computer and all of their applications remotely from a mobile device;
or numerous users can access and maintain their own individual desktop environments via a
single and centrally managed physical device which can either be co-located to the virtualized
environments or operate from a remote location. This type of virtualization environment allows
multiple virtualized machines to run on a single device with no impact on the host's file system,
registry, and OS.
• Server (or server-side) virtualization takes place centrally at the server or data center. Server
virtualization utilizes one logical device, typically the server, to act as the host machine for the
guest machines that virtually use the applications and programs provided by the host. A software
application is used to divide the single physical device into multiple isolated virtual devices.
Note: For additional information, check out the LearnTO Identify Server-Side vs. Client-Side
Virtualization presentation in the LearnTOs for this course on your CHOICE Course screen.
You may want to show
the LearnTO Identify
Server-Side vs. Client-
Purposes of Virtualization Side Virtualization
presentation from the
Virtualization is a technology through which one or more simulated computers run within a physical CHOICE Course screen
computer. Virtualization offers a range of benefits and is a suitable solution largely because many or have students
user and system functions typically consume far less than the full power of a modern computer. For navigate out to the
example, if a user’s activities on her PC use just 30% of the computer’s capabilities, 70% is being Course screen and
wasted. Through virtualization, potentially three VMs could be run on a single system at this level of watch it themselves as a
utilization, giving similar performance levels. Full resource utilization takes full advantage of the supplement to your
resources you have available. instruction. If not, please
remind students to visit
Some of the reasons you might use virtualization include: the LearnTOs for this
• Test a new operating system or software application. course on their CHOICE
Course screen after
• Run software in isolation from the host operating system. class for supplemental
• Create a snapshot of the image, allowing you to restore the image to the virtual machine. information and
• Create test labs. additional resources.
• Configure and deploy multiple computing environments.
• Set up and deploy systems for training classrooms.
Purposes of
Virtualization
Hypervisors
Currently, the most popular virtualization products fall into two general categories:
• Bare metal hypervisors
• Host-based hypervisors Hypervisors
A hypervisor, or virtual machine manager, is the core virtualization software that enables multiple
virtual computers to run on a single physical host. A bare metal hypervisor is one you install directly
on the server’s hardware—you don’t install an operating system first. Bare-metal hypervisors are Industry documentation
also known as native or Type-1 hypervisors. usually refers to Type 1
and Type 2 hypervisors,
A host-based hypervisor is one that runs within an operating system—you install the OS first and rather than bare metal
then install the hypervisor. This is also known as a Type-2 hypervisor. and host-based.
Linux-based virtualization typically uses either Xen or Kernel-based Virtual Machine (KVM). These
are both free hypervisors. Xen is a bare-metal hypervisor with built-in management tools. KVM is
embedded in the Linux kernel.
Host-based hypervisors such as VirtualBox, Microsoft Virtual PC, and VMWare Workstation, run
on top of an existing OS.
Emulator Requirements
In a client-side virtualization environment, the emulator is the software installed that allows the
computer to virtually run another operating system or another instance of the same operating
Emulator Requirements
system. Each emulator manufacturer will have specific hardware and processor requirements that
the client machine must have in order to be able to run the emulation software.
Client-side virtualization capabilities are still growing to meet consumer needs. Recent advances
include mobile device hypervisors that give the devices the ability to access corporate resources
without having to manage each device individually.
Private VMs can communicate with other VMs on the same physical host.
Internal In addition to communicating between VMs on the same physical host, the VM
can also communicate with the host system.
External In addition to the communication allowed on internal switches, the VMs can also
communicate with external systems, outside of the physical host.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Implement Client-Side Virtualization.
ACTIVITY 9-1
Installing a Hypervisor
Scenario
If students have the Part of your job duties include testing new software, updates to operating systems, and other tasks
standard edition of that you don't want to do on your production system. Your usual test computer no longer works, so
Windows 8, rather than before you request a new computer, you decide to see if using Hyper-V might meet your needs. So,
Pro or Enterprise, they you decide to install Hyper-V on your Windows 8 Pro (or Enterprise) system. You want to be able
won't be able to perform
to connect to the Internet from the virtual environment, so you will also create an external virtual
this activity as written. If
desired, you can have
switch.
them download and
install VirtualBox
instead. 1. Verify that your computer can run Hyper-V.
a) From the Start screen, type pc info then from the results, select PC info.
b) Under Windows, verify that the Edition is Windows 8.1 Pro or Windows 8.1 Enterprise.
c) Close the PC Settings window.
d) Open a web browser to your preferred search page.
e) Search for and download coreinfo.exe
f) Extract the files from coreinfo.exe to the root of the C drive.
g) Open a command prompt window with administrative privileges, then run C:\coreinfo -v
Verify that SLAT support is available.
h) Shut down Windows.
If coreinfo.exe returns i) Restart the computer and access the system firmware configuration.
unexpected results, you j) Verify that virtualization support has been enabled.
can have students use
the built-in systeminfo Note: If your computer does not meet all of the requirements, you will not be
command (at the able to install Hyper-V on your computer. If you want to use virtualization, you
command prompt) to can use another product such as VirtualBox.
check for system type,
k) If necessary, save your changes and exit, or simply exit the system firmware configuration utility if
installed memory, SLAT
no changes were made.
support, and other
prerequisites for l) When the system reboots, log in as username
Windows 8 Hyper-V.
2. Install Hyper-V.
a) Using the Search charm, search for and select turn windows features on or off
b) In the Windows Features dialog box, check Hyper-V. Expand Hyper-V and verify that Hyper-V
Management Tools and Hyper-V Platform are also checked, then select OK.
c) When the message Windows completed the requested changes is displayed, select Restart now to
reboot the computer.
d) After the computer boots, log in.
e) From the Start screen or using the Search charm, type hyper-v and from the search results, select
Hyper-V Manager.
ACTIVITY 9-2
Creating Virtual Machines
TOPIC B
Install Microsoft Windows
In this topic, you will install Windows 7 and Windows 8.1 operating systems. The fundamental
installation method is to install the operating system from scratch. In this topic, you will perform a
fresh installation of Microsoft® Windows®.
Being able to perform a fresh installation of Windows can be important if you have built a custom
computer system from scratch, if the system you purchased from a vendor did not have the correct
system installed, or if you are completely redeploying existing hardware from one system to another.
The skills and information in this topic will help you plan and perform a fresh installation properly,
for whatever your technical and business requirements might be.
Hardware Compatibility
Prior to installing any versions of Windows, you should check to make sure that your system meets
the system requirements and that all your hardware is compatible with the version of Windows you
Hardware Compatibility
plan to install. You can refer to the retail packaging to determine compatibility or search
microsoft.com for information about hardware compatibility for the version of Windows you are
installing.
The CompTIA A+ exam
does not cover Windows Boot Methods
10 and most of the
compatibility tools at The operating system comes loaded onto a boot device, which is connected to the computer and
microsoft.com are can be used to either launch the OS or, in some cases, install the OS files onto the computer. There
targeted for Windows 10 are a number of boot methods that can be used to install the operating system.
upgrades. It might take a
bit of searching and Boot Method Description
research to locate the
older tools and hardware USB The operating system files and all necessary support files are loaded onto a
compatibility lists for USB device, such as a flash drive. The USB is connected to the computer
Windows Vista, 7, and and the operating system is booted and launched via the files on the USB.
8/8.1.
CD-ROM/DVD The operating system files and all necessary support files are loaded onto an
optical disc, such as a CD-ROM or DVD. The disk type used will be
dependent upon the size of the files on the disk: DVDs can hold more files
Boot Methods
and larger files than a CD-ROM. Regardless of the type, the disk is inserted
into the optical drive of the computer and the operating system is booted
and launched via the files on the disk.
ISO An ISO file contains all of the contents from an optical disc in a single file.
ISO files stored on removable media or a host system are often used to
install virtual machine operating systems.
Internal storage An internal HDD or SSD can hold all of the operating system's installation
drive files and can be used to install the OS onto a different drive or a different
partition on the same drive. You can use a dedicated drive or partition for
the purpose of creating multiple operating environments on the same device.
External storage An external HDD or SSD can also be used for OS installation, most
drive commonly over a USB interface. Using an external drive for this purpose
makes it easier to physically install an OS on several different computers.
PXE The operating system files and all necessary support files can be accessed
from a Preboot Execution Environment, or PXE (pronounce as "pixie").
With PXE, the operating system and all necessary supporting files are loaded
onto a server. The operating system is then booted and launched over a
network interface, accessing the operating system files on the server, instead
of using a local drive. This method is often used for booting multiple
computers that are being managed centrally and accessed by more than one
user, such as public computers at a library or school. The network booting
technology used by Apple Macs is called NetBoot.
Factory Configuration
Most computers are factory-configured to boot from CD-ROM or DVD-ROM first, and changing
them to boot from hard disk speeds up the startup process. It also reduces the risk of contracting
viruses by accidentally booting from an infected disk.
Device Priority
The BIOS allows a user to specify disk boot order and to provide device priority. By default, the
computer might look to boot from the hard disk or a DVD-ROM first. If you prefer to boot from
an operating system contained on a USB device, you can instruct the computer to look to that
device first. To change the settings, wait until the computer has performed its POST, press the key
(usually a function key, such as F12) indicated onscreen, and follow the instructions.
Installation Types
There are several methods available for installing a Windows operating system.
Note: If your network environment supports Microsoft Active Directory®, you can use
Microsoft's Windows Deployment Services (WDS) to deploy Windows automatically on multiple
computers. WDS uses disk imaging (the Windows Imaging format). It will now fully automate
the installation of Windows Vista and newer operating systems. WDS is a replacement of the old
Remote Installation Services (RIS).
Partitioning
Partitioning is the process of dividing a single hard disk into multiple isolated sections that function
like separate physical hard drives, known as disk partitions. Partitions enable you to create a logical
disk structure to organize hard drives. You can set up and format one or more disk partitions during Partitioning
installation. If you make an entire disk one partition, you cannot re-partition the disk later without
either reinstalling the operating system or using a third-party disk utility. After you create a partition,
you must format it to be able to store data on that partition.
Partition information has traditionally been stored in a Master Boot Record (MBR). This technology
has several limitations including the inability to work with disks over 2 TB or to have more than
four primary partitions. The newer GUID Partition Table (GPT) enables you to work with drives
greater than 2 TB and to have up to 128 partitions.
There are several types of partitions and disks used to create sections on a hard disk.
Logical A part of a physical disk drive that has been partitioned and allocated as an
independent unit and functions as a separate drive.
Primary A partition that contains only one file system or logical drive.
Extended An extended partition can be subdivided into several file systems or logical
disks/drives. Extended drives can be assigned a new drive letter.
Basic A basic disk contains a primary partition, logical drives, and possibly an
extended partition. These partitions have been formatted with a file system
and are used as a volume for storage. Up to four partitions can be made on a
basic disk. Basic disks are the most commonly used storage type in a
Windows environment.
Dynamic A dynamic disk contains dynamic volumes, which are volumes that can span
multiple disks. On a dynamic disk, up to 2,000 volumes can be created,
though a maximum of 32 volumes is recommended.
NTFS For a typical Windows setup, it is recommended that you choose the NTFS file
system. This file system is used in newer Windows operating systems and can
handle partitions greater than 32 GB. Compared to FAT32, it is more efficient,
provides better security controls, and offers file and folder compression.
FAT32 The FAT file system is a legacy formatting option that should only be used if
running an older operating system such as Windows 95 or 98. The FAT file
system is less secure and has a limit to size of partition it can support. If FAT32 is
chosen, the size of the partition being formatted will determine the FAT file type
used. If the partition is larger than 2 gigabytes, Windows automatically uses the
FAT32 file system; smaller than 2 GB, FAT16 is used. If the partition is larger
than 32 GB, FAT is not an option
exFAT exFAT is useful if you are sharing external drives between Windows and Mac
computers. NTFS partitions are typically read-only on a Mac. When the drive is
formatted on a Windows system with exFAT, it will be read/write when accessed
from a Mac.
CDFS Compact Disc File System (CDFS) CDFS is a very limited file system that was
developed for optical disc media, typically for open source operating systems.
Multiple operating systems support CDFS, including Windows, Apple® OS, and
Unix-based systems. By supporting multiple platforms, CDFS allows for data and
files to be exchanged without compatibility issues between the various operating
systems.
ext2, ext3, ext4 The ext2 file system used to be the native Linux filesystem of some of the
previous releases. It is still supported in the current releases of Linux. ext3 is an
improved version of ext2. In case of an abrupt system shutdown, ext3 is much
faster in recovering data and better ensures data integrity. You can easily upgrade
your filesystem from ext2 to ext3. The newest default filesystem for Linux
distributions is ext4. It is backwards-compatible with the ext2 and ext3
filesystems. Among ext4’s improvements over ext3 are journaling, support of
volumes of up to one exbibyte (EiB), and files up to 16 tebibytes (TiB) in size.
ext4 is the default filesystem for CentOS/RHEL 7 and Ubuntu installations.
NFS NFS file systems are hosted on a server and enable the clients to access
directories and files over the network as if they were stored locally.
Note: Even though a full format replaces all of the content, with the right tools, data is still
recoverable. So, if you need to make sure that the drive content is inaccessible, do a full format
multiple times, or use a third-party disk wipe utility (or physically destroy the drive).
A domain is a Microsoft client/server network model that groups computers together for security
and to centralize administration. Computers that are members of a domain have access to a shared
central user account database, which means that an individual can use a single user account to log on
at any computer within the domain. Administration is centralized because you need to create the
user accounts only once in the domain, not on each computer. Domains require a specially
configured server computer called a domain controller, where the centralized user account database is
stored. Like a workgroup, computers that are members of a domain appear together when you
browse the network.
Option Description
Regional and language The default for a Windows system is the English language, with the
settings location set to the United States. However, these settings can be
customized to reflect region- or language-specific options. You can select
the date and time for a specific location and choose appropriate regional
settings, such as the manner in which numbers or currencies are
displayed.
Computer name During installation, you can provide the computer with a descriptive
name and the organization to which you or the computer belongs.
Date and time If you are within the United States and did not customize the regional and
language settings, you can set the correct date and time, and choose the
appropriate time zone for your region. If desired, you can choose to have
Windows automatically adjust the time for Daylight Savings Time.
Network configuration If Windows detects a network adapter during installation, you can decide
how you want to configure networking settings for the computer. You
can accept a Typical configuration or you can configure Custom settings
that are appropriate to your environment. Otherwise, you can install your
network adapter settings after the installation.
Option Description
Workgroup vs. domain During installation, you can decide if you want the computer to be a
setup member of a domain or a member of a workgroup. If the computer is not
on a network or on a network without a domain, you can select or create
a workgroup for the computer to belong to. If the computer is part of a
network with a domain, you can select the domain to which the computer
will be added as a member.
Note: If you are installing Windows 7 on a computer that is connected to a home network, the
homegroup will be created when you configure the network settings.
Cabinet Files
Windows updates are typically delivered as Cabinet (CAB) files. These files use compression
technology to minimize space, and they can be embedded with security certificates to verify the
integrity of the compressed files. You can use the EXPAND command to expand the files stored
within CAB files.
For individual installations of Windows, you can activate the installation over the Internet. If you do
not have an Internet connection, you can activate over the phone, although this takes a little longer.
If you wish, you can postpone product activation and activate later in the activation grace period.
In large organizations, you can use a Volume License Product Key, which eliminates the need to
individually activate each installation of Windows. You can also activate Windows as part of an
automated installation.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Install Microsoft Windows.
ACTIVITY 9-3
Installing Microsoft Windows 7
Scenario
One of the operating systems you support is Windows 7. You need a test environment in which you
can test software and OS updates. You decide to install Windows 7 on the VM you set up
previously.
4. Configure Windows.
a) In the Set Up Windows dialog box, type Admin## for the user name and VMWin7-## for the
computer name. Select Next.
You are prompted to set a password for the new account.
b) Type and confirm !Pass1234 as the password and as the password hint, and then click Next.
c) Type the product key provided by your instructor, and select Next.
d) On the Help protect your computer and improve Windows automatically screen, select Use
recommended settings.
e) On the Review your date and time settings screen, select the correct Time zone, Date, and Time for
your locale. Select Next.
f) Select Work network.
Windows prepares the desktop.
TOPIC C
Use Microsoft Windows
In the last topic, you installed the Windows operating system. In this topic, you will delve a bit
deeper into using it. You will examine how you can use some of the common features. You will also
use Task Manager to examine processes and performance of the operating system and applications.
File Explorer Up until Windows 8, the utility used to access and manage files and folders
Remind students that was known as Windows Explorer. Windows 8 changed the name to File
Windows Explorer
they discussed many of Explorer.
these features earlier in
the course. UAC User Account Control (UAC) is an enhanced security feature of Windows
Vista and later that limits the privileges of a standard user unless a computer
administrator decides otherwise.
System restore This feature enables you to either non-destructively restore the operating
system without affecting files and applications, or to restore the system to
the factory defaults.
Administrative tools The Administrative Tools are grouped together under Control
Panel→System and Security→Administrative Tools. In some
installations, this is an entry from the Start menu. The tools include
Component Services, Computer Management, Data Sources or ODBC
Data Sources, Disk Cleanup, Event Viewer, iSCSI Initiator,
Performance Monitor, Resource Monitor, Services, System
Configuration, Task Scheduler, Windows Firewall, Windows Memory
Diagnostic, and Windows PowerShell.
Note: More information about each of these Administrative Tools is
covered where the tools are used throughout the course.
Windows Defender Windows Defender is the antispyware software that is included with Windows
Vista and Windows 7 installations. You can configure Defender to scan for
malicious materials at scheduled intervals, automatically remove any spyware
detected during a scan, or even alert you in real time if spyware installs or
runs on the computer.
Windows Firewall A firewall is a device or program that blocks unauthorized data transmissions
and protects the computer from unauthorized access. Windows Firewall is
a software-based firewall, included with almost all Windows installations, that
protects the computer against attacks through the Internet or the network.
Note: In the corporate environment, this utility is usually not
accessible to individual users, as the Windows Firewall settings are
configured and controlled by an administrator in the IT department,
or Windows Firewall is superseded by a dedicated enterprise-level
firewall system.
Feature Description
Action Center and The Action Center Control Panel utility provides information about any
Security Center security software currently deployed on or missing from the system, and
provides access to helpful resources about current security threats, including
a check for the latest Windows Update. Action Center also provides links to
the Backup and Restore, Windows Update, and Windows Program
Compatibility Troubleshooter utilities, where you can manage specific
settings regarding system security and troubleshooting.
In Windows Vista, the Security Center Control Panel included some of the
same information as the Action Center does in Windows 7, but in the
Security Center, links to the Internet Options, Automatic Updates, and
Windows Firewall Control Panels are included.
Event Viewer You can use the Event Viewer to view the contents of event logs, which
contain information about significant incidents that occur on your computer.
Examples of events that might be contained in an event log include a
program starting or stopping and security errors.
Control Panel The Control Panel is a graphical interface that provides access to utilities
that you can use to configure the Windows OS or a computer's hardware.
The specific Control Panel utilities that are available will vary depending on
the version of Windows that you are using.
Control Panel can be displayed in category view or classic view. As the name
implies, category view groups the Control Panel utilities into categories. The
classic view shows each utility separately as its own entry on the Control
Panel window.
In Windows 7, the Control Panel is available from the Start menu, and as a
link in various My Computer views. You can open the Control Panel by
selecting the Open Control Panel button located below the address bar of
the Computer window.
In Windows 8, you can access Control Panel through the Charms bar or by
right-clicking the Start menu button from the Desktop.
Gadgets The Desktop Gadget Gallery is a Windows Vista and Windows 7 feature that
displays different gadgets, which are mini applications that perform different
information-display tasks, including displaying the date and time, CPU usage,
stock information, and user-selected news headlines.
Different editions offer different feature sets. For example, Vista Home Basic does not include
advanced multimedia capabilities or support networking beyond a workgroup, while Home
Premium adds Media Center, HDTV support, and the Windows Aero interface. Vista Business adds
features such as Remote Desktop, the ability to encrypt the file system, and the ability to join a
Windows domain. Windows Vista Enterprise and Ultimate add even more features such as UNIX
application support, BitLocker, and multilingual user interfaces.
Windows 7 Features
Many of the features of previous Windows versions were carried over into Windows 7, including
Aero and gadgets.
Windows 7 Features • Support for multi-touch devices is added, as well as support for Virtual Hard Disk (VHD) file
format.
• The default disk is partitioned into a partition that contains boot files, BitLocker files, and the
Windows Recovery Environment (WinRE) environment files; a second partition is created for
the operating system and for storing user created files.
• Action Center replaces the Windows Security Center.
• The snap feature allows you to drag a window to the edge of the screen and have it snap to take
up half of the screen; snap another window to the other side of the screen to view the two
windows side by side.
• Virtual XP mode is useful if you are still using applications written to take advantage of Windows
XP features. Support for this feature has been discontinued, so if you use it, you are doing so at
your own risk.
• Another feature you can use for older programs that don't run properly under Windows 7 is
Compatibility Mode. You can configure settings to try to make the operating system appear, to
the application, that it is running under the Windows OS version that it expects to run in.
• The Readyboost feature enables you to use a flash memory device to add RAM to your system.
This feature was also available in Windows Vista, but you could only have up to 4 GB of
additional RAM. The device must be at least 256 MB with at least 64 KB of free space. When the
flash memory device is attached to the computer, Windows tests it to see whether it meets the
requirements to use it for Readyboost.
• Shadow Copy is a feature that helps with making sure that files that are in use are backed up. A
snapshot of the data at a particular point in time is created. The snapshot can then be included in
your regular backup of the system.
• Easy Transfer is a utility to help migrate a user's email, data files, and settings from one computer
to another. You will need to install the appropriate version of Easy Transfer on each system
(Windows Vista or Windows 7) to create the backup, then using Easy Transfer on the Windows
7 computer, bring the email, data files, and settings onto the new computer.
Windows 7 is available in several different editions. Windows 7 Home Premium offers basic
functions. Windows 7 Professional adds features that enable users to run programs in XP mode,
connect to domains, and back up data to networks. Windows 7 Enterprise and Ultimate add even
more features such as multilingual support, BitLocker, and compatibility with UNIX applications.
mostly Windows Store apps, it makes sense to boot to the Start screen, and if they use mostly
traditional Windows applications, it makes sense to boot to the Desktop.
Note: You might see some literature and articles refer to the Windows 8 interface as the
Metro UI. This is not an official Microsoft designation for the Windows 8 interface. You
might also see it referred to as the modern interface and modern apps; these also are not
official Microsoft terms.
• Like in Windows 7, you can snap windows side by side. Windows Store apps run in full screen,
and those apps can also be positioned side by side. The Desktop can be side by side with a
Windows Store app. All of the open apps and windows can be viewed as thumbnails down the
left side of the screen. Drag one of the thumbnails onto the screen to either replace the current
app you are viewing, or drag it so that a border appears between the windows and view them
side by side. Depending on the size of the screen you are viewing Windows 8/8.1 on, you can
have up to four apps side by side. Most screens accommodate two or three apps. Items running
on the Desktop can also run side by side on the Desktop, then the Desktop can run side by side
with a Windows Store app.
• Windows Store apps require that you are logged in using a Live ID sign in. This is any email
address registered with Microsoft as your login credentials. Other benefits of using the Live sign
in include being able to obtain updates from Microsoft as they are available. Also, OneDrive, the Point out that OneDrive
Microsoft cloud storage solution, uses your Live sign in. By default, you are given 5 GB of was originally called
storage space on OneDrive. SkyDrive. If they see the
• Booting the OS is faster than in previous versions of Windows. Only the required components SkyDrive on a system's
are loaded into memory when the system is started; additional components are loaded when they Start screen, they will
know that the system
are needed.
needs to be updated.
• The Charms bar is available on the right side of the Start screen or the Desktop. From the They might see
Charms bar, you can use the Search feature, access devices such as printers, share content SkyDrive in the file
through email or social media, or access PC Settings. system even after the
• If you are using multiple monitors, you can have the task bar display on both screens, or just on update has been
the main screen. In addition, you can show just the applications open on each screen on the task performed.
bar for that screen.
Task Manager
Windows Task Manager is a basic system diagnostic and performance monitoring tool included
with Windows Vista, Windows 7, and Windows 8. You can use Task Manager to monitor or
terminate applications and processes, view current CPU and memory usage statistics, monitor Windows Vista and
network connection utilization, set the priority of various processes if programs share resources, and Windows 7 Task
manage logged-on local users. Manager
You can manage the following tasks in Windows Vista and Windows 7 Task Manager.
Applications Displays all of the applications currently running on the system and their
status (running, not responding, etc.). Users can use the Task Manager to
end an application that is running, switch to a different open application, or
start a new application.
Processes Displays all of the processes currently running on the system, including the
CPU and memory usage for all processes. Users can choose to end a process
from the Task Manager.
Performance Displays the current CPU and physical memory usage statistics for the system
in a graphical format and numerical format for an overall view of the current
system performance.
Performance Displays the current CPU, physical memory, disk, and network usage statistics
for the system in a graphical format and numerical format for an overall view
of the current system performance.
App history Displays resource usage for Windows Store apps for the current user account.
Statistics for each app include:
• CPU time—the amount of time the CPU spent processing instructions.
App history is designed • Network—the amount of network activity used by the app, including
to assist tablet users on downloads and updates.
cellular networks
manage data usage. It • Metered network—the amount of network activity over a metered network
also can help users see connection.
which apps are using • Tile updates—total network usage for tile updates and notifications.
the most battery by
looking at the CPU
statistics.
Users The Users tab displays all of the users currently logged on to the system.
Users can select another user's account and connect to that user's session,
send them a message, or disconnect or log off the user via the Task
Manager. You can see which processes each user is running, which can be
useful to identify whether a process is hogging resources.
Details For all of the processes running on the computer, the following information is
listed:
• PID—the process ID for the file.
• Status—the status, such as Running, for the process. Point out that this tab
• User name—the user that "owns" the process. has similar data to the
Processes tab, but
• CPU usage—the percentage of CPU utilization used by the process. shows more
• Memory usage—the amount of memory reserved for the process. information.
• Description—a short description to help you identify the process since it
isn't always clear from the executable name which program the process is
associated with.
Right-clicking a process provides you with a range of actions you can take
regarding the process. One of the most useful is setting the priority for the
process, which can be used to reduce the priority of a CPU-hungry
background process to give more CPU priority to foreground apps, making
the foreground app function better.
Services This is a duplicate of the services found in the Control Panel Services. This
is just another way of accessing and managing those services.
ACTIVITY 9-4
Using Task Manager
Scenario
In this activity, you will use the Task Manager utility to examine your system's status.
Point out that you can 1. Display the pop-up menu for the taskbar, and select Start Task Manager.
also press Ctrl+Alt+Del
to start Task Manager. 2. Examine the currently running processes.
a) Select More details.
b) Examine any apps and background processes listed on the Processes tab.
c) Select the various column headings to sort the list by each of the categories.
Notice that the list changes order when various items are consuming more resources.
d) Select the Details tab.
e) Compare the information displayed on the Details tab with the information displayed on the
Processes tab for the Task Manager process.
ACTIVITY 9-5
Working with Microsoft Windows Features
Scenario
To be sure you know how to work with Windows features from both Windows 7 and Windows 8,
you decide to try out some of the features you've read about.
Students installed 1. Change from the Aero theme to a classic theme on Windows 7.
Windows 7 in a virtual a) Log in to your Windows 7 computer.
machine in an earlier b) Select the Start menu.
activity. If necessary, c) In the Search text box, type aero
assist students in
d) In the results list, select Change the theme. The Control Panel Personalization window opens.
accessing their Windows
7 computers. e) Observe the look of the Start menu and the window borders. The Start menu is a round button and
the window borders are rounded with subtle shading.
f) Under Change the visuals and sounds on your computer, scroll down and under Basic and High
Contrast Themes, select Windows Classic.
g) Observe that the Start menu is now a square button and that the window borders are square.
h) Under Aero Themes, select Windows 7.
i) Verify that the round Start menu and rounded window borders have been restored.
j) Close all open windows on the Windows 7 VM.
If necessary, assist
4. Access the Windows 8 Charms bar.
students in switching to
their Windows 8.1 a) Switch to your Windows 8.1 computer and verify that you are logged in with Live sign in.
computers and Your Live sign in is tied to the email address assigned to you for the class.
identifying the active
user account.
b) Press the Windows key on your keyboard to switch to the Start screen. You can toggle back and
forth between the Desktop and the Start screen by using the Windows key.
c) Move the mouse to the right side of the screen and move it up or down until the Charms bar is
displayed.
d) Select Search and in the Search text box, type notepad
e) From the results list, select Notepad.
Notepad opens on the Desktop because it is a traditional Windows style application.
f) Display the Charms bar again and select Settings→Change PC settings→Personalization.
g) Observe the theme choices. Notice that there are no longer Aero themes.
TOPIC D
Configure Microsoft Windows
There are many tools you will use to configure Windows. Some of these are GUI and some are
command-line based. You have already seen a little bit of this in configuring display devices and
other hardware where you used the Control Panel. In this topic, you will use the Control Panel as
well as other GUI and command line tools to further configure the Windows operating system
features and functions.
c.
Windows Control Panel
, In
Throughout this section,
Windows 7 screenshots
ns
are used. Because
students are more likely
to encounter Windows 8
tio
systems, and the A+
exam covers Windows 7
and Windows 8, this will ra
give them the
opportunity to compare
pe
the appearance of
utilities in both versions.
lO
ica
og
6L
Setting Description
General • Home page: Defines which web page the browser opens to by default.
• History: Defines how many days the browser will keep a record of visited
pages.
• Colors: Defines the user's preferred colors for text, page backgrounds, and
hyperlinks.
• Fonts: Defines the user's preferred fonts for viewing pages.
• Languages: Defines the user's preferred default language for viewing
pages.
• Accessibility: Defines settings that enable visually impaired or hearing-
impaired users to access web pages.
Security Defines levels of security for different groups of websites, known as zones. By
placing sites in zones and then configuring zone settings, users can enable or
disable features such as the blocking or acceptance of web pages, or whether
web scripts or controls can run automatically, based upon user preference.
Privacy Defines the level of access that third-party cookies have to the browser.
Content Contains various content-related configuration settings, including settings that
relate to using content ratings on websites, implementing Internet security
certificates, and the AutoComplete function in web-based forms.
Connections Determines how Internet Explorer will use the computer’s network
connections to access Internet content.
Programs Determines which programs Internet Explorer will launch by default when the
user selects links that are associated with other types of Internet content, such
as email or newsgroups.
Advanced Defines a wide variety of settings, including how the browser handles external
scripts, whether or not hyperlinks are always underlined, and whether or not
videos can be played within web pages.
User Accounts
User Accounts Control A user account is a collection of credentials and important information about a person who has access
Panel to the system. Most importantly, it defines the rights and privileges assigned to the user, determining
what kinds of actions they can perform on the system. There can be more than one user account
added to a specific system. There may be users with the same permissions or different permissions
assigned to the same computer.
Note: There will typically be at least two user accounts per system: the administrator and the
user who owns or has been assigned the machine.
The User Accounts Control Panel utility lets you view and manage your own account, including
changing your user name and password. If your account has been assigned administrator privileges,
you may also be able to add, remove, or modify other user accounts to allow other users access to
the system.
Folder Options
The Folder Options Control Panel utility lets you configure settings for how files and folders are Folder Options Control
displayed when they are accessed. Folder Options also lets you configure more general settings Panel
such as whether new folders will open in a new window or the existing window, what the layout of
folders opened in the navigation pane will be, what action is used to open a file in a folder, and
which program is the default for opening specific file types.
Using Folder Options, you can also configure the Advanced Settings for files and folders,
including:
• Whether simple file sharing, the feature in Windows that allows users to share files and folders
with other computers on the network without permissions, is enabled or disabled. The default
for the system is that simple file sharing is enabled.
• If you can view hidden files and folders, including protected operating system files. The default is
that hidden files and folders, including the protected operating system files, are not displayed
when accessing a folder that contains the files to protect them from being accidentally deleted or
modified.
• Whether to hide or display extensions for known file types within the folder structure. The
default is to hide file extensions for known file types.
System
System Control Panel The System Control Panel utility lets you view and configure settings for the system.
Windows edition Identifies the edition of Windows installed on the system. If it is not the Pro
or Enterprise edition, a Get more features with a new edition of
Windows link is displayed. Select the link to purchase a license for another
edition or enter the product key if you already purchased a new license.
System Provides information about the system, including:
• Manufacturer
• Model
• Processor
• Installed Memory (RAM)
• System type
• Pen and Touch
Support There might be a support section for the manufacturer, or that information
might be provided through a link in the System section.
Computer name, This section lists the current settings for
domain, and • Computer name
workgroup settings
• Full computer name
• Optional Computer description
• Workgroup or Domain name
The Change settings link in this section is used to change these settings.
Windows Identifies whether Windows is activated and lists the Product ID. There are
activation links to Read the Microsoft Software License Terms and to Change
product key.
Links to other tools are also available in the left pane, including:
• Device Manager
• Remote settings
• System protection
• Advanced system settings
• Action Center
• Windows Update
Windows Firewall
Windows Firewall A firewall is a device or program that blocks unauthorized data transmissions and protects the
computer from unauthorized access. Windows Firewall is a software-based firewall, included with
almost all Windows installations, that protects the computer against attacks through the Internet or
the network. The Windows Firewall utility enables you to:
• Enable or disable Windows Firewall.
• View active networks.
• Configure notifications concerning blocked activity.
• Open blocked ports.
• Add exceptions to blocking rules.
• Configure other firewall settings for both private (home or work) and public networks that the
computer may access.
E
AT
IC
PL
DU
T
NO
6
DO
Note: In the corporate environment, this utility is usually not accessible to individual users, as
the Windows Firewall settings are configured and controlled by an administrator in the IT
department, or Windows Firewall is superseded by a dedicated enterprise-level firewall system.
Power Options
Using the Power Options Control Panel utility, there are a number of power settings that can be Power Options Control
configured for the computer. Panel
Hibernate In Hibernate mode, the computer will store whatever is currently in memory
on the hard disk and shut down; when the computer comes out of
hibernation, it will return to the state it was in upon hibernation.
In the Power Options utility, you can enable or disable hibernation, and you
can view how much disk space is needed and available for hibernation. Once
hibernation is enabled, you can configure the settings for when hibernation
occurs using the Power Plans settings.
Power Plans Power Plans are a set of built-in power configurations that you can use to
manage how the computer uses power. For each Power Plan, there are
default settings for when to turn off the monitor, when to turn off hard
disks, and when to enter system standby, depending on whether the
computer is plugged in or, if it is a laptop, is running on batteries. You can
modify and save these settings for the selected power plan, or you can create
and save a new power plan.
Sleep/Suspend/ The user can determine the amount of time of inactivity after which the
Standby computer is switched into sleep mode. In sleep mode, the computer
conserves as much energy as possible by cutting off power to the parts of the
machine that are not necessary to function, excluding RAM, which is needed
to restore the system to its state once it is woken from sleep mode. These
settings can be configured for when the computer is plugged in or, if it is a
laptop, if it is running on batteries.
Depending on the operating system and version, sleep mode can be called a
variety of things:
• Sleep mode in Windows Vista, Windows 7, Windows Server 2008, and
Apple OSs.
• Suspend mode in Linux.
Standby is another mode that uses less power. In standby mode, the computer
reduces power to the hard drive and peripherals, while storing data in RAM.
Because the data is in RAM, recovery from this mode is quicker than from
sleep mode.
The Program Compatibility Troubleshooter is also found in this utility, by selecting the link Run
programs made for previous versions of Windows. This is a wizard-based tool that will attempt
to find and fix problems related to running older programs with the version of Windows that is
installed.
HomeGroup
HomeGroup Control Found in the Network and Internet category of Control Panel in Windows 7 and Windows 8/8.1,
Panel the HomeGroup utility is, as the name implies, designed to create a network between home
computers. This is not recommended for corporate use. A peer-to-peer network is created as a
homegroup on the network, through which users who join the homegroup can share files and
printers, and stream media to networked devices.
Sound
Sound Control Panel The Sound utility provides an interface for you to configure various sound related aspects of your
system. There are four tabs in this utility.
Tab Description
Playback Configure the playback device, typically speakers, connected to the system. If
there are multiple speaker sets available, you can specify which is the default.
Recording Select the default recording device to use, and configure its settings and
properties.
Sounds Select a Sound Scheme to specify what sounds are created for Windows events
and programs. You can select from preconfigured sound schemes, or modify the
sounds associated with program events. You can also specify whether a sound is
played when Windows starts up.
Communicati This is designed for automatically adjusting the volume of various Windows event
ons sounds when the computer is used to make or receive phone calls. You can have it
automatically reduce the volume of other sounds by 50 or 80 percent, do nothing,
or mute all other sounds.
Troubleshooting
Troubleshooting Control The Troubleshooting utility is used to assist with identifying and automatically fixing common
Panel issues with programs, devices, network and Internet, and system and security.
Device Manager
Device Manager Device Manager displays all devices currently installed on the computer, and you can use it to
modify the properties for these devices. You can use Device Manager to manage and configure
hardware devices.
In Windows, there are several ways to access Device Manager:
Note: The default path in Windows 7 for the prompt is the user profile folder for the current
user (C:\Users\username). In Windows 8, the default path is the same as for Windows 7 unless
you open Command Prompt (Admin), in which case the default path is C:\Windows\System32.
Note: Because you can run DOS-type commands at the command prompt, it is sometimes
casually called the "DOS prompt."
Some command-line commands complete their work in the text-based command window; others
launch a GUI component. An example is MSCONFIG, which opens the System Configuration
Windows Command
window in the GUI environment. You can run commands from the Run dialog box, but in some
Line Tools cases, the command prompt window closes as soon as the command finishes, so you don't see the
results. In most cases, you will want to open an elevated Command Prompt window to run
command-line commands.
Command Description
TASKKILL Typically used to end a task or process identified by PID or image name.
BOOTREC If the Startup Repair option in System Recovery Options cannot repair
system startup problems, use BOOTREC.exe to manually troubleshoot the
problem. This command writes a new boot sector, compatible with the installed
operating system, to the system partition.
In Windows 7, you can access bootrec through the System Recovery Options or
the installation disk. In Windows 8/8.1, you will need to run bootrec at a Safe
mode command prompt.
SHUTDOWN This command is used to shut down, restart, log off, or hibernate a computer.
Specify which state you would like to put the computer in by using options and
parameters with the command. You can also use options to specify whether (and
how long) to wait until the command does what you specified. For example,
shutdown -r -t 0 specifies that you want to restart without waiting (restart 0
seconds from now).
TASKLIST Creates a list of applications and services currently running on the local
computer (or a specified remote computer). The image name, PID, session name
and number, and memory usage are displayed in the task list.
DISKPART The DISKPART command opens the DiskPart command interpreter. DiskPart
can be used to manage computer drives including disks, partitions, volumes, and
virtual hard disks.
SFC The System File Checker (SFC.exe) scans for corrupted Windows system files
and restores those files.
CHKDSK Used to check disk integrity. Adding the /F option fixes any errors that are
found on the disk.
GPUPDATE Updates local and Active Directory group policy settings. Using the /Force
option, you can specify that all policy settings, even those not changed, are
reapplied. You can also specify that only User or Computer group policy settings
are updated by using the /Target option.
GPRESULT Displays group policy settings and Resultant Set of Policy (RSOP) for the
specified user or computer. GPRESULT /R shows a summary of RSOP data for
the current user on the local computer.
EXIT Used to close the Command Prompt window. If you are running another
command interpreter inside the Command Prompt window, it closes the
command prompt interpreter and returns you to the command prompt.
Command Interpreters
Windows provides several different command interpreters. The typical command prompt interface Point out that you can
is the standard Windows command interpreter, available in Windows 7 and Windows 8. To access begin typing a command
the command prompt interface, you can either run cmd.exe or select the Command Prompt at the command prompt
shortcut from the Accessories menu in Windows 7. In Windows 8, from the Desktop, right-click or PowerShell prompt,
the Start button and select Command Prompt or Command Prompt (Admin) if you need then press Tab to
complete the command;
administrator access.
if no other commands
PowerShell is another command interpreter. It is designed as an administrative management and are identical to the part
configuration environment. It is also used to create automated scripts. PowerShell uses cmdlets you typed, the rest of the
(pronounced as command lets). You can use the built-in cmdlets or create your own. PowerShell command is written. You
connects to the .NET Framework-connected environment, accepting and returning .NET might need to finish
Framework objects. typing the command
yourself if there are
other commands that
Windows Administrative Tools are the same except for
the last character or two.
The Administrative Tools folder includes several tools that advanced users and system
administrators can use to help manage the system. You can access the Administrative Tools folder
by opening Control Panel and selecting System and Maintenance (Windows Vista and Windows Windows Administrative
7) or System and Security (Windows 8/8.1). Tools
Tool Description
Computer Computer Management is the primary administrative tool you will use to manage Assure students these
Management and configure a Windows computer. Computer Management combines tools will be used
several administrative utilities into a single console to provide easy access to throughout the course.
the most common system tools, including Event Viewer, Performance They are presented here
Monitor, Disk Management, and more. as a study aid for those
taking the A+ exams.
Local Users and You can use Local Users and Groups to create and manage user and group
Groups accounts on the local system. To access Local Users and Groups, open
Computer Management, and expand System Tools.
Local Security You can use the Local Security Policy to view and edit the security settings for the
Policy local computer.
Performance Performance Monitor is a software tool that monitors the state of services or
Monitor daemons, processes, and resources on a system. Performance Monitor tracks
one or more counters, which are individual statistics about the operation of
different objects on the system, such as software processes or hardware
components.
System You can use System Configuration to identify and manage issues that may be
Configuration causing the system to run improperly at startup.
Task Scheduler You can use theTask Scheduler to create and manage certain system tasks that
will be automatically carried out by your computer at predetermined times.
Component Component Services is the GUI that developers and administrators can use to
Services configure and administer Component Object Model (COM) components.
Data Sources Data Sources uses Open Database Connectivity (ODBC) to move data between
different databases on the system.
Print Management You can use Print Management to view and manage all of the printers and print
servers installed on a network.
Windows Memory You can use theWindows Memory Diagnostic tool to check the RAM on the
Diagnostic system and verify that it is functioning appropriately and efficiently.
Tool Description
Windows Firewall You can use Windows Firewall with Advanced Security to manage advanced firewall
with Advanced settings for the computer and any remote computers that are connected to the
Security network.
Note: You can use the Run line to open programs, folders, documents, Internet resources, or
any other system component if there is an appropriate command to use.
MSConfig
MSConfig is a system utility that is specifically used to troubleshoot issues that can arise during
system startup. You can use it to view and manage which files or programs are processed on startup,
including temporarily disabling and re-enabling software, programs, device drivers, or services that
run automatically upon startup.
Note: MSConfig.exe is called System Configuration in Windows Vista and Windows 7, but
was called the Microsoft System Configuration Utility in earlier versions.
Within the MSConfig utility, there are five areas that can be accessed and modified.
Option Description
General Provides the options to choose from for startup configuration modes:
• Normal startup. Windows will start in the normal manner. This is the default
configuration or is selected once the other two modes have been used to
troubleshoot an issue.
• Diagnostic startup. Use this mode to troubleshoot issues by ruling out
potential problem files. Windows will start running only basic services and
drivers.
• Selective startup. Use this mode to troubleshoot issues by running only the
basic services and drivers at startup, but allowing the user to launch selected
programs after startup. This enables you to begin to rule out each program as
the potential cause of the problem.
Option Description
Boot Provides configuration settings for the boot process and advanced debugging
configurations.
Basic Boot options include:
• Safe boot mode, including Minimal, Alternate shell, Active Directory repair,
or Network modes.
• No GUI boot.
• Boot log.
• Base video.
• OS boot information.
• Make all boot settings permanent.
Advanced options include:
• Number of processors.
• Maximum memory.
• PCI lock.
• Debug.
• Global debug settings.
• Debug port.
• Baud rate.
• Channel.
• USB target name.
Services Displays all of the services that begin running at startup and their current status
(running or stopped) and can be used to temporarily disable or re-enable specific
programs or services to begin to determine which are potentially causing the
problem at startup.
Startup Displays all of the applications that begin running at startup, including the
publisher of the application, the path to the .exe for the application, and the
location of the shortcut or registry key for the application. You can temporarily
disable or re-enable applications upon startup to begin to determine which
application may be causing the startup issue.
Tools Displays all of the diagnostic and advanced troubleshooting tools that are
available on the system to help identify and fix the problem.
The MSConfig tool is frequently used to test various configurations for diagnostic purposes, rather
than to permanently make configuration changes. Following diagnostic testing, permanent changes
would typically be made with more appropriate tools, such as Services, to change the startup
settings of various system services.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Configure Microsoft Windows.
ACTIVITY 9-6
Configuring Microsoft Windows
Scenario
In order to be more proficient in your role as a PC technician, you decide to practice using some of
the configuration tools you recently learned about. It can be difficult to remember the names of
commands to run, so you are excited to see that System Configuration, started by running
MSCONFIG, provides access to many of the tools you will need as a technician.
g) Collapse Components.
h) Expand Software Environment and select System Drivers to view all the drivers installed on your
computer.
i) Select File→Export and save the file to the default location as my_sys_info
j) From the folder where you saved my_sys_info.txt, open the file in Notepad, review the information,
then close Notepad.
k) Collapse Software Environment.
l) Close System Information.
TOPIC E
Upgrade Microsoft Windows
Previously, you installed Microsoft Windows on a PC. Upgrades are one method for installing
Windows, but they are more commonly used to migrate from one version of Windows to a different
or newer version. In this topic, you will perform a Windows upgrade.
Software vendors such as Microsoft are constantly coming out with new operating system versions,
and it can sometimes be more economical to upgrade existing systems when possible, rather than to
purchase new computer hardware with the new version pre-installed. Whether you are upgrading for
an individual user or as part of a company-wide migration plan, the skills in this topic should help
you upgrade from older versions of Windows to the current version successfully.
In-Place Upgrades
An in-place upgrade is the process of installing a newer version of an operating system without first
removing the existing operating system that is currently installed on the computer. In-place upgrades
In-Place Upgrades
also eliminate the need to perform the most tedious tasks involved with a clean install of an
operating system: saving or backing up data that has been saved on the computer, wiping the hard
drive, migrating or transferring saved data back to the machine, and reinstalling any programs that
had been added to the system. In essence, an in-place upgrade can overwrite the existing, older
operating system with the new version without disruption to the end user's environment.
In-place upgrades have been known to cause problems when upgrading to a version of the
operating system that is significantly different from the existing version. In-place upgrades are only
recommended when moving between operating systems that are one version apart, such as from
Windows Vista to Windows 7. When there is a larger gap in the differences between the systems,
such as migrating from Windows Vista to Windows 8, a clean install is recommended instead of an
in-place upgrade.
Compatibility Tools
When upgrading to a different version of Windows, you will need to check to ensure that the
existing hardware is compatible with the new operating system and that your existing software
Compatibility Tools
applications will run properly on the new version of Windows. Applications written for earlier
versions of Windows might not always work with your new OS version, but you may be able to
select an appropriate application compatibility mode for the application after you have upgraded the
operating system.
Note: To access the Upgrade Advisor to see if your system can run Windows 7, you can visit
http://windows.microsoft.com/en-US/windows/downloads/upgrade-advisor.
For Windows 8 and Windows 8.1, download and run the Upgrade Assistant from http://
windows.microsoft.com/en-us/windows-8/upgrade-assistant-download-online-faq. After
the assistant analyzes the computer, a compatibility report lists the apps and devices that are
compatible with Windows 8 or Windows 8.1, any items that need to be reviewed, and information
about reinstalling compatible apps and devices.
Migration Tools
There are some tools available through the Windows operating system to assist in migrating user
information between systems, including files and settings.
Migration Tools
Migration Tool Description
User State The User State Migration Tool (USMT) is a command line utility that copies
Migration Tool files and settings from one Microsoft Windows computer to another,
including user accounts, files, folders, Windows settings, email messages,
and more. USMT can support the transfer of files and settings for Windows
2000, Windows XP, Windows Vista, Windows 7, and Windows 8. Not all
versions of the USMT can support all source or destination operating
systems.
Easy Transfer Easy Transfer is a built-in data-migration utility in Windows Vista and above
that helps transfer files, data, and settings from one personal computer to
another. If the computer isn't running Windows 7 or Windows 8, the user
will need to download and install a version of Easy Transfer for Windows
Vista or Windows XP before beginning the migration process.
Easy Transfer replaced the Files and Settings Transfer Wizard from
Windows XP. It was upgraded with Windows 7 to include a file explorer for
easy selection of files to transfer and provides a report of any files that were
not migrated to the new system.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Perform a Windows Upgrade.
ACTIVITY 9-7
Upgrading a Windows System
Scenario
Your organization is no longer supporting Windows 7 systems. In preparation for upgrading those
users still using Windows 7, you use your VM installation of Windows 7 to upgrade to Windows 8.1.
1. Verify that the Windows 7 system meets the requirements for Windows 8.1.
a) Log in to the Windows 7 system.
b) Open a web browser and access http://go.microsoft.com/fwlink/p/?LinkId=261871.
c) Select Run when prompted as to what action to take on the downloaded file.
The Windows 8.1 Upgrade Assistant starts analyzing your system.
d) Review the information on the Here's what we found page and then select Next.
e) On the Choose what to keep page, examine the choices, and then, with Windows settings, personal
files, and apps selected, select Next.
f) If No compatible offers are available is displayed, select Back and select Just personal files and
select Next.
g) On the Windows 8.1 is for you page, select Close.
You could purchase Windows 8.1 from this page.
Provide students with
2. Begin the Windows 8.1 upgrade. media containing
Windows 8.1 or let them
a) Insert the media containing Windows 8.1 or point your system to the ISO location. know the location of the
ISO for Windows 8.1.
Note: To insert the ISO file in Hyper-V, in the Virtual Machine Connection
window, select Media→DVD Drive→Insert Disk then specify the path to the ISO
image file.
If necessary, assist
b) students in accessing
From the DVD or ISO, run setup.exe.
the setup.exe file.
You might need to navigate a folder structure or perform additional steps to access the setup.exe
file.
c) If prompted to Get important updates select No, thanks and then select Next.
d) If necessary, provide the product key and then select Next. If you have not already
done so, provide
e) On the License terms page, check I accept the license terms and then select Accept.
students with their
f) Confirm what items to keep. Microsoft account
g) On the Ready to install page, select Install. information.
The system will reboot several times as it is analyzed, files are copied, and the installation process
begins.
If a wireless network is
3. Continue the installation
available at your
a) On the Region and language page, make any needed changes, then select Next. location, tell students the
b) On the Personalize page, select a color. name of the wireless
network and the
c) In the PC name text box, type UpGrd## where ## is your student number.
password to use to
d) Select Next. connect to the network.
e) If necessary, on the Wireless page, follow your instructor's directions to select and connect to an
available wireless network, and then select Next.
f) On the Settings page, select Use express settings, and then select Next. You will configure
Windows settings in upcoming activities, so you can accept the default settings for now.
g) On the Sign in to your Microsoft Account page, type the email address associated with your
assigned Microsoft account, and then select Next.
h) On the Help us protect your info page, select I can't do this right now.
i) On the OneDrive is your cloud storage page, select Next. Windows uses your Microsoft account
If you have codes or information to create a computer account and applies any personalized settings to that account.
have an email address j)
When the system reboots, log in.
or cell phone where the
k) Observe the screen as Windows installs apps. Several messages are displayed that are intended to
code could be sent, you
help you use the Windows 8.1 interface. When the Desktop screen is displayed, the Windows
can have students enter
installation process is complete.
the code.
4. Update the name of the VM.
a) In Hyper-V Manager, select the Windows 7 VM.
If students get a b) In the Actions pane, select Rename.
resource error message
after doing the upgrade, c) Rename the VM to Upgrd##
go into the VM settings
for the virtual switch and
change to the desired
NIC.
Summary
In this lesson, you installed and configured operating systems. Whether you are upgrading, installing
from scratch, or redeploying a system, you will need the skills that enable you to install, configure,
and optimize computer operating systems to meet your business needs.
Do you have experience installing operating systems? Do you feel you will be able to perform installations
more efficiently as a result of the information presented in this lesson?
Encourage students to
A: Answers will vary, but might include upgrading an OS on a home PC, or installing an OS on a spare use the social
PC or notebook, or upgrading a work computer. networking tools
provided on the CHOICE
How often do you expect to be able to perform in-place upgrades instead of clean installs at your Course screen to follow
workplace? up with their peers after
A: Answers will vary depending on the operating systems involved. If an environment has a propensity of the course is completed
Windows XP or Windows Vista computers that need to be upgraded to Windows 7 or Windows 8, for further discussion
and resources to support
more clean installs will be required, but if the environment has many Windows Vista computers that
continued learning.
need to be upgraded to Windows 7, or Windows 7 computers that need to be upgraded to Windows
8, more in-place upgrades might be possible.
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will optimize and maintain Microsoft Windows. You will:
• Optimize the Windows operating system.
• Back up and restore system data.
• Perform disk maintenance tasks.
• Update operating system and other system software.
Lesson Introduction
In the last lesson, you installed, configured, and upgraded Microsoft® Windows®. Once you
have installed the OS, you need to maintain it on an ongoing basis and set up some basic
preventive maintenance procedures to keep the device running. You will also want to make
sure it is running the best it possibly can, so being able to optimize the OS is also important.
Maintaining an OS might not seem as exciting or interesting as performing a new
installation or replacing a hard disk, but it is actually one of the most crucial tasks for a
support technician. System maintenance is important for two reasons; first, proper
maintenance can prevent system problems from arising. Second, proper maintenance of the
system, including the creation of appropriate backups, can make recovery or
troubleshooting operations much easier in the event that problems do arise. As an A+
technician, you can use the skills and information in this lesson to perform preventive
maintenance as part of your ongoing job tasks.
342 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Optimize Microsoft Windows
Once you've installed an OS and performed the initial configuration, you've provided a basic level of
functionality. Over time, you might find that performance is lagging or that your specific
requirements are not being met. Just installing and configuring is not the end of the job for an A+
technician. You will also want and need to optimize Windows so that you and your users can get the
most out of the OS.
The Registry
The Registry is the central configuration database where Windows stores and retrieves startup
settings, hardware and software configuration information, and information for local user accounts.
The Registry
Logically, the Registry is divided into five sections called subtrees; each subtree is further divided
into keys that contain individual data items called value entries. The Registry is stored on the disk as
a group of files.
6
Registry Subtrees
The Registry consists of five subtrees, which are sometimes called hives. Some of the subtrees are
temporary pointers to information stored permanently in another Registry location. The following
table lists and describes the subtrees. Registry Subtrees
Note: HKEY is an abbreviation for "handle to Registry key."
Subtree Contains
HKEY_CLASSES_ROOT All the file association information. Windows uses this information
to determine which application it should open whenever you
double-click a file with a specific extension. For example, Windows
automatically opens Notepad whenever you double-click a file with
the extension .txt.
In Windows 95 and later, HKEY_CLASSES_ROOT displays
merged information from other hives such as
HKEY_LOCAL_MACHINE and HKEY_CURRENT_USER. To
gain accurate configuration information, refer to those hives.
Registry Editing
You can view and edit the contents of the Registry directly using the Registry Editor tool,
regedit.exe. However, most changes to the Registry are made automatically by the system, by
hardware devices, and by applications. It is rarely necessary to edit the Registry directly. If you ever Registry Editing
need to do so, use extreme caution and back up the Registry files first, because incorrect changes
can cause irrecoverable problems with Windows.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to View and Edit the Registry.
ACTIVITY 10-1
Viewing and Editing the Registry
Scenario
You have heard that making changes to settings on your computer changes values in the registry file.
You want to experiment with making changes and see if the value changes in the registry.
Virtual memory is not nearly as fast as actual memory. Modern SDRAM DIMMs read/write speeds
are measured in nanoseconds, whereas hard drive seek, read, and write times are measured in
milliseconds. If your computer is frequently exceeding its physical RAM and having to resort to
using a pagefile on disk, adding more physical RAM may be the most economic way of effecting a
noticeable change in performance.
Pagefile Optimization
When you install Windows, the system automatically creates a pagefile named Pagefile.sys at the root
of the drive. The size of the pagefile varies within a range determined by the pagefile's initial size
value and maximum size value. The system sets the size values of the pagefile using an algorithm
that takes into account the amount of physical memory and the space available on the disk. When
the system starts, the pagefile is set to the initial size; if more virtual memory space is needed, the
system adds it to the pagefile until it reaches the maximum size. An administrator can alter the initial
and maximum size values to optimize the pagefile and virtual memory performance. In modern
systems, there is rarely a severe shortage of either physical RAM or disk space, so optimizing the
pagefile might not be an issue, but you can consider the following tips:
• Although Microsoft recommends an initial pagefile size of 1.5 times the amount of RAM, the
more RAM you have, the smaller a pagefile you need.
• If the initial size of the pagefile is too low, the system will waste time as it adds more space to the
pagefile. Adding space to the pagefile after startup also increases disk fragmentation.
Consequently, it is often a good idea to set the initial size to the same value as the maximum size.
If the initial size is too high, however, the pagefile will be mostly empty, which wastes disk space.
• If you get a lot of "low virtual memory" errors, increase the maximum size of the pagefile.
• If you have multiple drives, you can move the pagefile off the drive that contains the Windows
system files, so that the computer can access system files and pagefile information
simultaneously. Put the pagefile on the fastest drive that does not contain Windows.
• If there is not a noticeable speed difference between drives, create additional pagefiles on
multiple drives. This speeds access time because the system can read and write from multiple
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Optimize Virtual Memory.
ACTIVITY 10-2
Optimizing Virtual Memory
Scenario
If students did not install Some users have complained that their systems seem to frequently display messages that there is not
a second physical drive, enough memory available. You want to try adding a paging file to a second hard drive you recently
they can add a second installed to see if this might resolve the issue.
drive to one of their VM
systems.
1. View the current Virtual Memory settings.
a) Open Control Panel, select System, and then in the left pane, select Advanced system settings.
b) On the Advanced tab, in the Performance section, select Settings.
c) In the Performance Options dialog box, select the Advanced tab.
d) In the Virtual memory section, select Change to open the Virtual Memory dialog box. You can see
the current size of the pagefile in the Currently Allocated area at the bottom of the dialog box. By
default, Windows automatically allocates the pagefile size for the primary C drive created at the time
of installation.
TOPIC B
Back Up and Restore System Data
One of the important tasks you will need to perform as an A+ technician is making sure that users'
data and system settings are being backed up in case things go awry. In this topic, you will examine
some of the ways you can back up and restore system data.
Recovery Images
A recovery image is used when you request Windows to refresh your computer. Windows 8 and 8.1
computers come with a recovery image, but if you make changes and receive updates, refreshing the
computer will eliminate those changes. You can create a custom recovery image using Recovery Images
RECIMG.EXE from an elevated command prompt. This custom recovery image contains all of the
desktop applications installed on the computer and the current state of Windows system files.
Make sure to point out to
students that a custom
recovery image can only
be used to refresh a
computer, not to reset a
computer.
The file created is named CustomRefresh.wim. When you create a custom recovery image, you
specify which directory to store it in. If you have multiple custom recovery images, they all have the
name CustomRefresh.wim, each under a different directory or folder.
Recovery images aren't used to store or refresh Windows Store apps, your documents, user profiles,
or your personal settings. This information is preserved when you refresh your computer.
You can have multiple recovery images. When you are ready to refresh your computer, you can
specify which custom recovery image to use as the active recovery image.
System Restore
Windows Vista and Windows 7 use System Restore to assist in restoring system files on your
computer to the way those files were at an earlier point in time. The system image is an exact
duplicate of a drive. The system protection feature is used to create and save restore points that System Restore
contain Registry settings and system information. A restore point represents a stored state of system
files. Windows creates restore points automatically each week or when a new driver or program is
installed. You can also manually create restore points.
System Image
A system image is a copy of Windows, applications, system settings, and data files that is stored in a
separate location from where the originals of these items are stored. The system image can be used
to restore your system if the hard disk or computer fails. The default when creating a system image
is to only include the drives required to run Windows. A system image can only be created from
drives formatted with the NTFS file system. Windows Backup can be used to create a backup of the
files as well as the system image. Although backups can be saved to USB flash drives, CDs, DVDs,
or hard drives, the system image can only be saved to a hard drive.
Scheduled Tasks
Many of the preventive maintenance tools included with the Windows environment also provide
you with the option of scheduling and automating the tasks they perform. Scheduling preventive
Scheduled Tasks
maintenance tasks ensures that your data is safe and your computer is performing optimally.
Different organizations and even different administrators within an organization may have differing
opinions on what preventive tasks should be performed automatically and how often. There are best
practices for any organization or individual user when it comes to performing scheduled tasks.
Backups should be performed systematically and on a regular basis for the best protection against
data loss. For large organizations that have important business data, scheduled backups are likely to
be performed nightly for all users or for specific data housed in specific locations, and will be
planned and scheduled by IT administrators. For smaller businesses or even individual users,
backups can be scheduled to run automatically via the backup utility provided with the version of
Windows. Users can choose what information will be saved, how it is saved (full or incremental),
where it is saved to, and how often the backup will occur.
Backup Schemes
Most large organizations will implement a structured backup scheme that includes a backup
schedule and specifications for which files are backed up, where the backup is stored, and how it can
be retrieved. The backup scheme will specify the backup rotation method, which determines how many
backup tapes or other media sets are needed, and the sequence in which they are used and reused.
Designated administrators will have the responsibility for designing and managing the backup
scheme and for restoring data when needed.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Back Up and Restore System Data.
ACTIVITY 10-3
Scheduling System Backup
Scenario
You do a lot of testing, and sometimes that testing can result in loss of data or in a system that
doesn't work properly any more. You need to set up recurring system backups for your computer.
TOPIC C
Perform Disk Maintenance
In the last topic, you backed up system data to keep it safe. Another way to keep data safe is to
ensure that a PC's disk drives are functioning properly. In this topic, you will perform disk
maintenance tasks.
Disk Maintenance
Disk maintenance is the process of monitoring and adjusting the configuration of HDDs and the file
systems contained on those HDDs. Typically, disks work just fine without a great deal of
Disk Maintenance
maintenance. However, there are some actions and practices that can affect disk health and
performance. By performing some relatively simple disk maintenance tasks, you can avoid or even
solve problems such as:
• File system errors
• Bad sectors on the disk platters
• Corrupted files
• Disk fragmentation
Check Disk You can run a Check Disk (or chkdsk if using a command prompt) to scan
Mention to students that the hard disk for any potential file system errors or bad sectors on the disk.
there are some tools that Using Check Disk, you can:
are used more often
than others. Give some • Scan only for file system errors and view a report of any drive errors.
context to when they are • Scan for file system errors and attempt to automatically fix them.
commonly used.
• Scan for bad sectors and attempt recovery of them.
• Scan for both file system errors and bad sectors, and attempt to
automatically fix both types of problems.
In addition, Check Disk will run if the OS detects changes in the file system,
storage configuration, or volume incompatibility in a multiboot configuration.
See https://support.microsoft.com/en-us/kb/2854570 for more
information.
Disk Cleanup Disk Cleanup is a system utility available in all versions of Windows that frees
up space on the hard disk that is being used to store unnecessary temporary
files, such as Temporary Internet Files. Disk Cleanup scans the hard disk for
these temporary files and will remove them with minimal user input.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Perform Disk Maintenance.
ACTIVITY 10-4
Performing Disk Maintenance
Scenario
Some computers in your organization are already configured with scheduled disk optimization. You
want to verify that your computer has been configured to run disk optimization on a weekly basis.
You also want to see if you can regain any disk space through Disk Cleanup.
2. Configure your system to perform Defragment and Optimize Drives tasks on a weekly basis.
a) Open Control Panel then navigate to System and Security→Administrative Tools→Defragment and
Optimize Drives.
b)
In the Optimize Drives dialog box, select Change settings.
c) Verify that Run on a schedule (recommended) is checked, and that the Frequency is set to Weekly.
If necessary, have d) Select the Choose button and verify that all drives are checked, then select OK or Cancel as
students repeat steps 2a needed.
and 2b until the settings e) Select OK or Cancel as needed.
screen is displayed. f) Select any drive, then select Analyze. If any of the drives show greater than 10% fragmented, select
Optimize.
g) Select Close.
TOPIC D
Update Software
Another facet of optimizing and maintaining your OS is to ensure that its software and any other
software that it uses remains as up-to-date as possible. In this topic, you will update software.
Patch Management
Patch management is the practice of monitoring for, obtaining, evaluating, testing, and deploying
integral fixes and updates for programs or applications, known as patches. As the number of
computer systems in use has grown over recent years, so has the volume of vulnerabilities and Patch Management
corresponding patches and updates intended to address those vulnerabilities. However, not every
computer within an organization will necessarily be compatible with a certain patch, whether it be
because of outdated hardware, different software versions, application dependencies, and so on.
Because of the inconsistencies that may be present within the various systems, the task of managing
and applying patches can become very time-consuming and inefficient without an organized patch
management system. In typical patch management, software updates are evaluated for their
applicability to an environment and then tested in a safe way on non-production systems. If the
patch is validated on all possible configurations without causing more problems, only then will the
valid patch be rolled out to all computers throughout the entire organization.
A patch management program might include:
• An individual responsible for subscribing to and reviewing vendor and security patches and
updating newsletters.
• A review and triage of the updates into urgent, important, and non-critical categories.
• An offline patch-test environment where urgent and important patches can be installed and
tested for functionality and impact.
• Immediate administrative push delivery of approved urgent patches.
• Weekly administrative push delivery of approved important patches.
• A periodic evaluation phase and full rollout for non-critical patches.
Many organizations have taken to creating official patch management policies that define the who,
what, where, when, why, and how of patch management for that organization.
Windows Updates
As you saw earlier in the course, the Windows Update Control Panel enables you to configure
options for checking for and installing Windows updates. There are several types of updates
Windows Updates
Microsoft might offer you when your system is updated. You should always install Important
updates as soon as possible. Other, optional updates can be installed if they seem like they would
enhance or improve user experience and productivity.
Security updates These important updates are installed automatically by default. Even if you have
configured your system to not install updates automatically, you should test and
install them as soon as possible to fix problems attackers might exploit. These
are listed as Important updates in the Windows Update tool.
Optional These recommended updates typically apply fixes to Windows features or add
updates features. You can look through the list of updates listed as Recommended in
the Windows Update tool and decide if they would make sense to be installed.
Service Packs Service Packs roll up all of the above update types and are installed as a single
update. The service packs bring the operating system fixes to a level playing field
for everyone involved: from Microsoft to app developers to help desk and
administrators to end users.
Language Packs The optional language packs can be installed if you need to use the system in
another language. Usually you won't want to install these as they take up time
and space. You can hide them so you aren't continually prompted to install
them.
Windows Defender is built into Windows 8/8.1. It contains an Antimalware Service Executable.
Using the Administrative Tool, Task Scheduler, you can schedule when this runs. Other Microsoft
tools to deal with malware include the Microsoft Safety Scanner and the Microsoft Malicious
Software Removal Tool. These can be used to check your computer for specific malware and
remove it from your system.
Anti-spyware software is specifically designed to protect systems against spyware attacks. Some
antivirus software packages include protection against adware and spyware, but in most cases, it is
necessary to maintain anti-spyware protection in addition to antivirus protection.
Note: If you install another antivirus or antimalware application on your computer, it might
automatically turn off and disable Windows Defender. If no other antivirus or antimalware
software has been installed, then Windows Defender should be running on your Windows
computer.
ACTIVITY 10-5
Checking for Updates
Scenario
You have received several help desk tickets related to a new virus infecting users' computers. You
are using Windows Defender on most of the systems in your organization and want to make sure
that the software has the latest updates.
Summary
In this lesson, you used various tools to optimize and maintain the Windows operating system.
Ensuring that users' computers are working at optimum operating abilities will reduce the number
of dissatisfied users and provide a more secure environment in which users can work.
Which of the tools and concepts presented in this lesson have you used to optimize and maintain Windows
operating systems? Which ones do you think you will use most often in the future?
Encourage students to
use the social A: Answers will vary. At a minimum, technicians should be backing up data and system settings as well
networking tools as making sure that software, both OS and apps, is up to date. Using the other tools presented in this
provided on the CHOICE lesson can improve user experience by optimizing computer performance.
Course screen to follow
up with their peers after Have you ever needed to restore settings from a restore point? If so, what happened that caused you to
the course is completed need to do a restore? Were you able to successfully restore the settings?
for further discussion A: Answers will vary. Restoration might be needed if a setting is corrupted by a virus or other malware.
and resources to support
continued learning. Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will work with other operating systems. You will:
• Identify features and functions of the OS X operating system.
• Identify features and functions of the Linux operating system.
Lesson Introduction
In the last two lessons, you worked with Microsoft Windows. As you know, an A+
technician will probably also be responsible for setting up, maintaining, and troubleshooting
computers and devices that have other operating systems installed. Familiarity with OS X
and Linux will enable you to support more of your user base.
362 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
The OS X Operating System
Mac computers from Apple use the OS X operating system. Mac users tend to be found in art,
music, graphic design, and education because OS X includes apps geared to those audiences. In this
topic, you will examine some of the important features and functions of OS X.
OS X
OS X® is the computer operating system developed by Apple® Inc. OS X is a Linux® derivative,
and consists of UNIX-based operating systems and GUIs. This proprietary operating system is
OS X
included on all Macintosh® computer systems.
El Capitan is the current Mac operating system as of fall 2015. If you need to upgrade from a
previous version, the system requirements for El Capitan are:
If you have one or more • Mac hardware.
Mac systems available, • 2 GB of RAM.
you can demonstrate or
• At least 8 GB of available hard disk space.
have students
experiment with the • Snow Leopard version 10.6.8 or later and the Mac® App Store installed.
systems throughout this • An Apple ID.
topic. • Internet access.
• If you don't have Internet access, some features may be unavailable. You can have your Mac
upgraded at an Apple Retail Store.
Refer to https://
support.apple.com/en- Note: If your Mac is running Leopard, you first need to upgrade to Snow Leopard, then update
us/HT201475 for the to its latest version. Then, you can upgrade to El Capitan.
exact hardware models
required. OS X features include:
• Multiple user support.
• Integrated Mac, Windows, and UNIX server, file, and printer browsing in the Finder.
• The Safari® web browser.
• Native TCP/IP networking.
• Many file- and network-level security features.
• Comprehensive hardware device support with a unique Macintosh computer system design.
disk partition. For more information on Mac OS X technical specifications, see http://
support.apple.com/specs/macos.
OS X User Interface
The OS X GUI user interface is navigated using a mouse or trackpad. You can also use keyboard
equivalences for many tasks. The one-button mouse that comes with a Mac can be configured to
function as a two-button mouse. The trackpad on Mac laptops uses gestures to click, drag, scroll, OS X User Interface
zoom, open, and close items.
Some of the features you use to interact with the content on your Mac are the Finder, Dock, and
Terminal. For users familiar with
Windows, they can think
Feature Description of Finder as the
equivalent of File
Finder Finder is displayed when you turn on your Mac (or when you log in if log in is Explorer and Dock as
enabled). Through Finder, you manage the folders and files on your computer. Icons the equivalent of the
represent the computer, the folders, the files, and a trash can is available for throwing task bar.
away files or ejecting disks. Some people refer to Finder as the desktop.
Dock The row of icons at the bottom of most screens. All open windows and programs are
represented by an icon in the dock. You can also secure items to the dock so that they
are always available from the dock.
Terminal Terminal is the command-line interpreter for OS X. From here, you can enter the
Unix-like commands used in OS X at the command line.
Trackpad Gestures
The trackpad on a Mac laptop can do more than just help you click and drag items. Using
multitouch gestures, you can do much more.
Trackpad Gestures
Gesture Description
Tap to Click When Tap to Click is enabled in the trackpad settings, this allows you to tap the
trackpad rather than the button below the trackpad to click.
Dragging Tap the trackpad twice, then right after the second tap, drag your finger. For
longer dragging movements, slide your finger again after lifting it for no more
than one second.
Drag Lock When Drag Lock is enabled in the trackpad settings, this allows you to lift your
finger for more than one second when dragging.
Secondary click Specify where on the trackpad the secondary click is activated. Usually this is the
lower right corner of the trackpad.
If you have a button below the trackpad, you can use two fingers on the trackpad
and click the button.
Two finger Scrolls like you are using the scrollbar. You can also access the Scrolling Speed
scroll slider using this method.
Gesture Description
Pinch Open/ Using two fingers, spread them apart to enlarge the screen content. Using two
Pinch Close fingers, bring them closer together to reduce the size of screen content.
Screen zoom While pressing the Control key, drag two fingers on the track pad to zoom in the
entire screen.
Three-finger Drag three fingers horizontally on the trackpad to move to the next or previous
swipe to page.
navigate
Four finger • Drag four fingers up to activate the Show desktop feature.
swipe • Drag four fingers down to activate the Show all windows feature.
• Drag four fingers left or right to activate the Program switcher feature.
OS X Features
OS X includes features that make it an easy operating system to work with. Some features will be
new to Windows users and might take a little while to get used to.
OS X Features
Feature Description
Mission Control Mission Control enables you to see all open windows and spaces. The
If you have a Mac desktop area you see is referred to as a space. You can create multiple spaces,
available, demonstrate and switch between the spaces using Mission Control. All of the available
the use of these spaces are shown at the top of the screen when you access Mission Control.
features. Point out the You can access Mission Control by:
equivalent feature in
Windows or Linux as • Using either three or four fingers, swipe up on the trackpad.
appropriate. • Double tap a Magic Mouse surface with two fingers.
• From the Dock or Launchpad, select the Mission Control icon.
• For Apple keyboards with a dedicated key, press the Mission Control
key.
Apps can be dragged from one space to another. Open the space containing
the app you want to move, then in Mission Control, drag it to the desired
space. Apps opened in Full Screen mode become their own space. You can
switch between spaces by:
• Selecting the space in the Mission Control window.
• Using three or four fingers, swipe right or left on the trackpad to move to
the next or previous space.
• On the keyboard, press Control+Left Arrow or Control+Right Arrow
to move to the previous or next space.
You can create spaces through Mission Control. You can either point to the
upper-right corner of the screen after opening Mission Control and select
Add Space or drag the icon for an app to the Add Space button. If you
want to close a space, press Option and select the Close button next to the
space you want to close. If any windows are still in the space that is closed,
they are moved to another open space.
Note: Spaces is the same idea as virtual desktops in Linux.
Feature Description
Keychain Keychain is a password management system built into OS X. It stores
passwords and account information for users. When you access any
password protected resource such as a website, email, or server, you are
provided with the option to save the password. The password is saved in the
keychain.
Keychain Access is the app you use to manage your passwords and account
information. It can also be used to manage digital certificates. You can export
your keychain and import it on another Mac.
Spotlight Spotlight is the OS X search feature. When you perform a search in
Spotlight, the words you enter in the search are searched for in files, websites,
app names, web content, and other locations. Select the magnifying glass icon
to access Spotlight, then enter the words to search for. Spotlight uses auto-
complete, so you don't have to type the full word or phrase if the desired
results are found with the characters you already typed.
iCloud iCloud is a cloud computing service offered by Apple. Mac and iOS users can
use the iWork suite apps Pages, Numbers, and Keynote. Users of other
operating systems can also use iCloud to store and share files, music, and
photos. By default, users are provided with 5 GB of free storage. Additional
storage can be purchased.
To access iCloud, you need to sign up for an Apple ID. This is the same ID
used to purchase items from iTunes, the App Store, and FaceTime.
Gestures Multi-touch gestures can be performed on a Mac multi-touch trackpad, a
Magic Trackpad, or a Magic Mouse. These gestures are performed using one
or more fingers and tapping or swiping the surface of the input device. In the
System Preferences Trackpad or Mouse pane, you can view animations for
each of the available gestures.
Remote Disc Not all Mac computers have an optical drive. This keeps the price as well as
the weight of the device down. If you need to access a CD or DVD, you can
do so using Remote Disc. On a Mac or PC that has an optical drive,
configure it so that the Drive is set up to be shared. On the Mac without the
optical drive, in the Finder sidebar, select the computer on which sharing of
CDs and DVDs has been enabled and then select Connect. If the Mac you
are using has an optical drive, Remote Disc will not appear in Finder.
Not all CDs and DVDs can be shared. The following types of optical discs
cannot be shared:
• Audio CDs or DVDs
• Movies on DVD or Blu-ray
• Copy protected discs
• Windows installation discs
Note: If you are setting up Windows using Boot Camp on a Mac
without an optical drive, create a disk image of the Windows
installation disc and copy it to a flash drive.
Boot Camp Boot Camp is a boot manager for OS X systems that enables users to install
Microsoft Windows in a separate partition. The Boot Camp utility guides
users through repartitioning the drive and installing Windows device drivers.
At system boot, you can select whether to boot to OS X or Windows.
Note: Remember, if an app is not responding, you can use Force Quit from the Apple menu to
open the Force Quit Applications window, then select the non-responsive app and select the
Force Quit button.
OS X Management Tools
OS X includes several tools to help you manage backup and restoration of files, folders, and
settings. It also includes tools for disk maintenance and screen sharing.
OS X Management The following table includes some of the tools you will use most often.
Tools (2 Slides)
Tool/Function Description Accessed From
• Bright red tick marks indicate backups that can be restored right now from either the backup
drive or a local snapshot.
• Dimmed red tick marks indicate backups that can be restored when the backup drive is
available.
• If you are using OS X Mavericks or earlier:
• Gray tick marks indicate backups that can be restored right now from a local snapshot.
• Bright pink tick marks indicate backups that can be restored right now from your backup
drive.
• Dimmed pink tick marks indicate backups that can be restored when the backup drive is
available.
Feature or Description
Function
Partition You can create, rename, reformat, resize, and delete partitions on internal or
drives and external drives, and DMG image files that can be mounted and accessed as if they
format were drives.
partitions
First Aid Assists with fixing disk problems. The Verify Disk button checks for problems
and the Repair Disk button fixes the problems that are found. In addition, there
are buttons to fix permissions issues—Verify Disk Permissions and Repair Disk
Permissions.
Secure Erase This feature should only be used on mechanical drives and can be used to erase an
entire hard disk or partition, or just erase the free space. The Fastest option is the
most secure and writes over the entire disk with zeroes one time.
Note: Do not use Secure Erase on solid state drives as it just wears down
the drive to no security purpose.
Create and Create a new blank disk image or create a disk image from a folder. This
Manage Disk creates .DMG files, which can be mounted as drives. You can write files to the
Images disk image file. The .DMG file can be encrypted and saved to cloud storage or a
removable drive. You can also convert an image file from read/write to read-only.
In addition, you can resize the disk image, making it larger or smaller as needed.
Restore Enables you to copy a volume to another volume, a partition to another partition,
or create a disk image as an exact duplicate of a partition. When you use a disk
image to restore a partition, the contents of the partition are erased and the data
from the disk image is copied on to the partition.
RAID Enables creation of RAID 1 and RAID 0 drives. You can also use concatenation
to combine RAID types to receive the benefits of each type of RAID.
Screen Sharing
Screen sharing can be configured between Macs on the same network, between a Mac and a PC, or
between Macs on two different networks. To share screens between two Macs on the same network,
use the Sharing option from the Apple→System Preferences menu. Here, you can unselect
Remote Management then check Screen Sharing. You can specify whether only specific users or
all users can share your screen.
If you need to control a Mac from a PC, you need to join the Mac to the Windows workgroup.
Request the name of the workgroup from the person with whom you will be sharing your screen.
To share a Mac from a remote location, use Back to My Mac. You need an iCloud Apple ID
account in order to use this feature.
Force Quit
Normally, to close an app, you just select Quit from the app menu. However, if the app is
unresponsive, you might need to use Force Quit. There are several methods of accessing Force
Quit:
• Press Control+Option+Esc.
• From the Apple menu, select Force Quit.
Finder is always open, so there isn't a Quit option for this app. If Finder becomes unresponsive, use
Force Quit and select Relaunch.
OS X Best Practices
There are several tasks you should perform on a regular basis to make sure that the OS X computers
you support remain functional and working their best.
OS X Best Practices
Task Description
Scheduled Using built-in features such as Time Machine, you can perform scheduled
backups backups. You can also use third-party backup utilities to perform scheduled
backups if your backup solution comes with its own applications for scheduling
backups. Even if you have scheduled backups set up, you should manually perform
a backup before making any big changes such as system OS updates or installing or
removing apps.
Scheduled Consider running Disk Utility First Aid monthly or bi-monthly if you often
disk install or uninstall applications. Use the Repair Disk Permissions feature to make
maintenance sure that permissions are set correctly. You should also run Repair Disk to check
for bad blocks or a corrupted drive.
System By default, Software update checks for updates once a week. Running Software
updates Update manually from the Apple menu can be done at any time to check the App
store for any updates.
Patch Checking for system updates is the first part of patch management. You should
management also check for updates for apps that you use. Updates might include bug and
security fixes, and enhanced features. If you are supporting multiple users, be sure
to test the patches first before deploying them to all users.
Driver and Drivers and firmware are typically updated when system updates are received.
firmware However, if you find that for some reason you need to update the drivers or
updates firmware manually, you can access System Information to check the current
information, including model Identifier, boot ROM version, and SMC version. If
you try to install an update that isn't designed for your system, the software will not
be installed and you will see an alert message.
Task Description
Antivirus and Mac systems aren't attacked as often as Windows systems, but you should still be
antimalware running antivirus and antimalware on Macs. Be sure to configure the application to
updates automatically check for updates as they become available. If the app isn't updated,
you are not being fully protected.
ACTIVITY 11-1
Identifying Features and Functions of OS X
Scenario
You are new to supporting Macs, but do have some experience supporting Windows systems. You
want to identify the OS X equivalent of some of the Windows features and functions you are used
to using.
1. What Windows and OS X features enable you to back up data and restore data from a backup? You might suggest to
A: In Windows, you would use the Backup feature, and in OS X, you would use Time Machine. students that they
consider making a chart
2. What Windows and OS X features enable you to manage storage devices? or other job aid from the
results of this activity.
A: In Windows, you would use Disk Management, and in OS X, you would use Disk Utility.
3. What Windows and OS X features enable you to identify which apps are running?
A: In Windows, you would use the taskbar or Task Manager, and in OS X, you would use the Dock.
4. What Windows and OS X features enable you to end the running of a non-responsive program?
A: In Windows Task Manager, select the non-responsive program and select End Process, and in OS
X, you would use the Force Quit feature.
ACTIVITY 11-2
Using OS X (Optional)
Scenario
You want to try out some of the OS X features you recently learned about. You want to make sure
that you can support any Mac users within your organization.
1. Examine Finder.
a) Locate the Dock.
b) Open an app.
c) Examine the file system.
2. Examine Spotlight.
If time permits, have a) In Finder, select the magnifying glass icon.
students use additional b) Type spot
features covered in this Notice that the results auto-completes what it thinks you want to type next.
topic. c) If necessary, continue typing until the results show Spotlight.
d) Observe the various locations and results of the search.
TOPIC B
The Linux Operating System
Operating systems vary greatly from manufacturer to manufacturer. Over the past few years, Linux
has rapidly gained ground in the competitive operating system marketplace. For example, Linux is
now widely preferred for web servers and Internet systems. Many individuals and organizations have
accepted it as a desktop and server alternative because of its high security, low cost, and ease of
licensing. In this topic, you will examine the basics of Linux, so that you can begin to understand
and appreciate its benefits.
Linux Distributions
Linux is a UNIX-like operating system originally developed by Linus Torvalds, starting in 1991
while he was a student at the University of Helsinki. Like all operating systems, Linux enables the
most basic common system operations, such as file management, user account management, and so Linux Distributions
forth. It provides a means for users to interact with their computer’s hardware and software.
Linux is perhaps most notable because it is free and open source. Programmers have made versions
of Linux available for nearly every computer hardware platform in current use. Linux is available for:
• Network servers and enterprise-class computing environments.
• Desktop and end-user computers.
• "Non-computer" devices such as cell phones, automobile control systems, network routers, and
alarm system controllers.
Linus Torvalds wrote the original Linux kernel. The kernel is the software component that provides
the core set of operating system functions. These include features for managing system hardware
and for communicating between software and hardware. Ask students if they
have used Linux, and if
Since its creation, Linux has evolved into hundreds of distributions, also called distros, each tailored so, which distributions
to their designers' needs. If you are a beginner, you will find it easier to choose one of the they have used. Point
mainstream distributions depending on the installations. Some common distributions are: out that the table in this
• CentOS topic includes only the
most popular
• Red Hat® Enterprise Linux (RHEL) distributions and that
• Fedora others are available.
• SUSE Linux Enterprise
• openSUSE
• Debian
• Ubuntu
• Mandriva
• Mint
• Mint: www.linuxmint.com
Note: The site linux.com has a yearly comparison of Linux distributions and commentary on
what they feel are the best distributions to use for various purposes.
Note: To learn more, check out the LearnTO Transition to Linux presentation from the
LearnTO tile on the CHOICE Course screen.
You may want to show
the LearnTO Transition
to Linux presentation
from the CHOICE Linux User Interfaces
Course screen or have
students navigate out to There are a number of ways users interact with Linux. These include using a GUI interface or a shell
the Course screen and interface. There are a variety of GUI interfaces that can be used with each of the Linux
watch it for themselves distributions. The shell interface, also referred to as the command line interface (CLI), is a plain text
as a supplement to your terminal that is used to enter commands. A variety of shells are available and can be used with each
instruction. If not, please Linux distribution.
remind students to visit
the LearnTOs for this GUI
course on their CHOICE
course screen after The Linux Graphical User Interface (GUI) is a collection of icons, windows, and other screen graphical
class for supplemental elements that help users interact with the operating system. The desktop menu provides access to
information and the GUI applications available on the Linux desktop. There are different GUI implementations such
additional resources. as K Desktop Environment (KDE) and GNU Object Model Environment (GNOME).
The following table lists the uses of some common Applications menu categories in the GNOME
GUI.
Accessories Access applications for performing work-related tasks such as creating text
documents and presentations, or using a calculator.
Internet Access applications for performing tasks on the Internet such as web
browsers, email clients, instant messengers, or web editors.
Sound & Video Access applications for viewing movies and listening to sound files or CDs.
System Tools Access options for changing the settings on the Linux system.
Documentation Access help on Linux.
CLI
The Command Line Interface (CLI) is a text-based interface for the operating system, where a user The Linux CLI
typically enters commands at the command prompt to instruct the computer to perform a specific task.
A command line interpreter, or command line shell, is a program that implements the commands
entered in the text interface. The command line interpreter analyzes the input text provided by the
user, interprets the text in the concept given, and then provides the output.
Superuser
The root user, also known as the superuser, is the administrative account on a Linux system. This
user can do anything on the system. You should only use this account when absolutely necessary.
Superuser
For most Linux distributions, you create a regular user when you are installing Linux. This is the
user you should use. Even when you are performing administrative tasks, many of these can be
performed as your regular user. For those instances where more power is needed, you can often use
the su or sudo command to temporarily access the system with administrative privileges.
Linux Features
There are several Linux features that make it appealing to a variety of users. Many websites and
networks are based on a Linux server. End users who want to take advantage of the efficient use of
Linux Features
resources can breathe life back into systems that Microsoft Windows can't run efficiently any longer
by installing one of the Linux distributions. Linux systems can interact with both Windows and Mac
computers on a network or through cloud services.
There is no specific Linux control panel for iCloud, but you can use the web-based access to iCloud
from a Linux system. You can also configure your email client on Linux for an iCloud Mail account.
Refer to the Apple support site for specific mail server settings.
Support for gestures such as those used on Windows touchscreen systems and Mac touchpads is
available in some distributions of Linux. You can also install additional applications that provide
support for touch devices on a Linux system. Refer to the online documentation for your
distribution of Linux to see if gestures are supported.
Virtual Desktops
Virtual Desktops There will be times when a user needs to have multiple windows open on their desktop. Typically,
to help manage the need to go between many different programs running simultaneously, users
would do one of three things:
• Leave all windows open, which may result in a cluttered desktop.
• Minimize those windows that are not needed and use the taskbar or press Alt+Tab to switch
between them. This approach could still be a bit confusing.
• Use virtual desktops.
Using multiple desktops helps keep a user's workspace organized and uncluttered. The default
configuration provides two or four desktops depending on the distribution. For example, Ubuntu®
provides two desktops by default and CentOS provides four. Users can switch between the virtual
desktops by clicking one of the desktop buttons on the panel at the bottom of the desktop screen.
GRUB
Figure 11-3: Virtual desktop buttons on the panel.
GRUB 2 is the newest version of the GRand Unified Bootloader (GRUB). The original version of
GRUB is now referred to as GRUB Legacy and is no longer actively developed. Both versions are in
use in Linux distributions. GRUB is the program that loads operating system kernels. Remote Access/Screen
Sharing
Remote Access
Often, Linux administration is done from a computer other than the machine on which the network For users who have
or web services are running. Remote access can be from another Linux computer, from a Windows experience with older
computer, or from a Mac. Remote access is a type of screen sharing functionality. Depending on systems and Telnet, the
what you need to do and from which platform you are remotely accessing the Linux system, you use Secure Shell (SSH) has
different tools. replaced Telnet (which
sent its authentication
• SSH and session content
• OpenSSH over the network in
• sftp plaintext format) in most
• rdesktop production systems.
SSH allows for fully
Note: Refer to the man pages for the above commands for more details. encrypted sessions with
remote systems,
maintaining privacy for
authentication and
session data.
X forwarding is a mechanism by which programs are run on one machine and the X window output is
displayed on another machine. X forwarding can be enabled or disabled by setting the
X11Forwarding option to yes or no in the /etc/ssh/sshd_config file. This allows X11 tunnelling
over an SSH connection.
Virtual Network Computing (VNC) is a platform-independent system through which a user can
control a remote system. The virtual network is made up of the VNC client, the VNC server, and
the VNC protocol. The client views the output that is displayed by the server through the VNC
protocol. The user can run multiple VNC sessions at any given time. However, the display for each
VNC client may differ from the display of the VNC server.
The vncserver command is used to start a system with VNC. The $HOME/.vnc/xstartup file
allows a user to control applications running on a remote system. You can specify the display
number that the VNC server will use when it is started.
The vncviewer command is used to view the VNC client. Various options are available for
specifying vncviewer parameters.
ACTIVITY 11-3
Identifying Features and Functions of Linux
Scenario
Your organization is considering moving some of the website and network services from Windows
servers to Linux. You want to compare the features and functions of some Linux distributions to
see which ones might best meet your needs. You also have some systems that are no longer capable
of fully supporting the current Windows operating systems, but you have heard that Linux can
possibly take advantage of these older systems and work well on minimal hardware resources.
1. Browse the web for comparisons of Linux distributions. A site that works well for
a) Open a web browser and go to your preferred search website. this is linux.com. They
b) Search for the phrase linux distribution comparison have a yearly
c) Briefly review the information you find. comparison of the Linux
distributions and what
2. Browse the web for comparison of Linux distribution features. they feel are the best
distributions for various
purposes.
3. Based on your research, which distribution would you recommend testing for use as a web and network
services server?
A: Answers will vary, but any of the distributions that are targeted for business use as a server would
work.
4. Based on your research, which distribution would you recommend testing for use on older computers
with limited resources?
A: Answers will vary, but any of the distributions that are targeted for end users could be tested to
see how well they perform.
Linux Installation
The hardware requirements for installing Linux will depend upon the distribution of Linux you
choose. Linux is a portable operating system, which means it can run on a variety of hardware
platforms. There are versions available for many different processor types, including Intel x86 and Linux Installation
Pentium, Itanium, DEC Alpha, Sun Sparc, Motorola, and others. In general, a basic installation of
Linux on a workstation might require as little as 16 or 32 MB of memory and 250 MB of disk space,
but you might need several gigabytes of disk space for a complete installation, including all utilities.
Installation Methods
There are several installation methods you can use to perform a Linux installation. These include
installation:
• From a DVD or CD.
• Via a network.
• By accessing a network installation server.
• From boot media such as an ISO file or a boot USB device.
Some web resources you can use to research general Linux hardware support include:
• The Linux Hardware Compatibility HOWTO website at http://tldp.org/HOWTO/
Hardware-HOWTO/index.html.
• The Linux Questions website's hardware compatibility list at www.linuxquestions.org/hcl/.
• Linux hardware and driver support lists at www.linux-drivers.org.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Install Linux.
ACTIVITY 11-4
Installing Linux
Scenario
A Linux system needs to be allocated for certain tasks. So, you'll install the latest version of the
CentOS distribution and configure it so it's ready to be put to use.
2. Upon starting the installation process, the following CentOS 7 installation menu should appear. Press
Enter to select the default option Test this media & install CentOS 7 and continue with installation.
6
01
)2
(C
3. The CentOS Installer screen loads as follows and initiates a check of the installation media (DVD). To
save time during this activity, you can press the Esc key to skip this step, although it is wise to check
your media at least once when setting up production Linux servers.
4. After the installer has run, a Welcome screen should appear. Select English (United States) as your
Language, and select Continue.
6
5. The next screen prompt is Installation Summary, which contains many options to fully customize your
system. Select Date & Time then change the settings to your local timezone. Select Done to close the
DATE & TIME screen.
6. Select Software Selection to choose which type of environment you want to set up.
6
7. Select Server with GUI, then in the Add-Ons for Selected Environment section, check the KDE option
and select Done.
9. Select the first disk (sda), and select Done. Your installation disk options may differ, but appear similar
to the following.
f) In the IP Address text box, type 192.168.0.## (where ## is the same student number you've used in
prior lessons). In the Netmask text box, type 255.255.255.0 and in the Gateway text box, type
192.168.0.1
If your classroom uses
Note: Your instructor might provide you with different addresses than those different addresses,
provide the appropriate
listed in these steps.
6
IP address, Netmask,
Gateway, and DNS
addresses.
g) In the DNS servers text box, type 192.168.0.1 or enter the appropriate IP address for your
classroom network DNS server. The resulting screen should look similar to the following.
i) In the upper-right corner, verify that the enabled switch is set to ON.
11. Select Begin Installation at the bottom of the prompt. While the installation proceeds in the background,
select Root Password. On the Root Password page, in the Root Password text box, type !Pass1234 and
press Tab.
12. Enter and confirm !Pass1234 as the root password, and select Done. Select Done a second time to
confirm this password, acknowledging the warning that CentOS considers it a weak password.
Point out to students that
this is a useful
enhancement to the
CentOS installation
process recently
introduced, and it allows
you to configure the root
password and create
system users while the
installation progresses in
the background.
6
01
)2
(C
13. Next, select User Creation to create a new, non-root user for your system.
14. For the new user, in the Full name text box, type Joyce Smith. Verify that the Username jsmith is
automatically filled in. Enter and confirm my!Pass1234 as the password, and then select Done.
6
01
)2
(C
15. When installation has completed, the progress bar will be all blue and a Complete status will display
(this may take 10-15 minutes). Select Reboot to reboot the Linux machine.
16. Verify that the following Initial Setup screen is displayed on boot.
The remainder of the
installation process may
take 10-15 minutes
depending on system
capabilities. Now would
be a good time to take a
break or continue on to
the next topic.
6
17. Verify that the following Initial Setup screen is now displayed after your new installation completes the
boot process. Select License Information to accept the license.
18. Under the License Agreement, check the check box labeled I accept the license agreement and select
Done.
6
Linux Management
19. Select Finish Configuration.
Tools
Tool/Function Description
Backup and There are several commands that are used for performing backup of files and
Restore directory structures.
Image recovery Use dd to create a byte-level copy of a disk. You can then use a compression
utility such as tar or gzip to compress the file for storage.
Disk The main tool you will use is fsck and its variants. Different Linux filesystems
maintenance use different fsck commands.
utilities
Screen sharing The main tools used in Linux for screen sharing are vnc and ssh
Your GUI might have additional tools and applications that can be used for
screen sharing.
Force Quit When an application stops responding, you can use the command-line command
kill -9 to force it to stop.
Image Recovery
Creating an image of a hard disk can be a time saver if you need to restore the full contents of a
disk. You can use third-party utilities or the built-in dd command. An example of creating the image
using dd is:
dd if=/dev/hda of=~/hdadisk.img
If something goes wrong with your disk, you can restore the disk using the .img file. Using the
previous example, the dd command would be:
dd if=hdadisk.img of=/dev/hdb
This would restore the image to another hard disk (hdb).
Disk Maintenance
If you are using a GUI Linux interface, there are often tools included for performing disk
maintenance tasks. The tools vary based on the distribution of Linux you are using, the GUI you are
working with, and what applications have been installed. Usually though, you can select the disk, and
options for managing the disk are displayed. You might also be able to access them from an
Applications menu or through system settings.
Partition management is the process of creating, destroying, and manipulating partitions to optimize
system performance. Effective partition management enables you to keep track of the data in the
partitions and avoid data overflow. Various utilities, such as sfdisk, GNU parted, gdisk, and
partprobe, are available for partition management.
If you are working from the command line, you will use several different disk maintenance
commands depending on what you need to do.
• Depending on the partition type you need to manage, you will use different tools. Some files and
commands for partition management include:
• fdisk
• mkfs
• sfdisk
• GNU parted
• gdisk
Note: Refer to the man page for command usage, including options, arguments, and
complete syntax details.
• The fstab file is a configuration file that stores information about storage devices and partitions
and where and how the partitions should be mounted. The fstab file is located in the /etc
directory. It can be edited only by a root user. The fstab file consists of a number of lines—one
for each filesystem.
• The partprobe program is used to update the kernel with changes in the partition tables. The
program first checks the partition table, and if there are any changes, it automatically updates the
kernel with the changes. The syntax of the partprobe utility is partprobe [options]
[device].
• In Linux, a filesystem cannot be accessed directly. It has to be associated with a directory to
make it accessible to users. This association is brought about by loading, or mounting, the
filesystem in a directory by using the mount command. After using the filesystem, it needs to be
disassociated from the directory by unloading, or unmounting, the filesystem using the umount
command.
• The fsck command is used to check the integrity of a filesystem. Filesystem integrity refers to the
correctness and validity of a filesystem. Most systems automatically run the fsck command at
boot time so that errors, if any, are detected and corrected before the system is used. Filesystem
errors are usually caused by power failures, hardware failures, or improper shutdown of the
system.
Note: The fsck command is similar in concept to the chkdsk and scandisk commands
you may be familiar with from DOS and Windows-based systems.
• The dumpe2fs utility is used for managing ext2, ext3, and ext4 (extended) filesystems. It dumps the
status of the extended filesystem onto the standard output device and prints the block group
information for the selected device.
• The debugfs utility allows you to examine and modify ext2, ext3, and ext4 filesystems. When
executed, the debugfs utility opens an interactive shell that can be used to examine and modify
the extended filesystem.
• There are many xfs tools that allow you to work with the XFS filesystem.
• xfs_info: Display details about the XFS filesystem.
• xfs_metadump: Copy the metadata information of the XFS filesystem to a file.
• xfs_grow: Expand the XFS filesystem to fill the disk size.
• xfs_repair: Repair and recover a corrupt XFS filesystem.
• xfs_db: Debug the XFS filesystem.
The shell also contains an interpretive programming language. A terminal window is a shell with a
graphical user interface.
The various shells available in Linux are described in the following table.
Shell Description
Bash This is the default Linux shell. It provides the flexibility of the C shell in a Bourne
shell-type environment. Use the command bash to open the Bash shell.
Bourne This is the original UNIX shell developed by Steve Bourne at Bell Labs and is
available on all Linux systems. Use the command sh to open the Bourne shell.
C shell This was developed by Bill Joy at Berkeley and was designed to support C
language development environments. It was also designed for more interactive
use, providing several ways to reduce the amount of typing needed to complete a
job. Use the command csh to open the C shell.
Korn This shell is a combination of the C and Bourne shells. It uses the features of the
C shell but the syntax of the Bourne shell. Use the command ksh to open the
Korn shell.
Note: To learn more, check out the LearnTO Select a Linux Shell presentation from the
LearnTO tile on the CHOICE Course screen.
You may want to show
the LearnTO Select a
Linux Shell presentation
from the CHOICE
Course screen or have
students navigate out to
the Course screen and
watch it for themselves
as a supplement to your
instruction. If not, please
remind students to visit
the LearnTOs for this Figure 11-4: A blank shell prompt.
course on their CHOICE
course screen after
class for supplemental
information and
additional resources.
Shell Prompts
Linux Commands
The generic format for a shell command is command -option argument. After typing your
command, the shell responds by performing a specific action that is associated with that command.
Linux is case sensitive, so you must enter commands in the required case. Linux Commands
6
01
)2
(C
Figure 11-6: The ls command displays the list of files in the usr directory.
Command Description
ls Displays file listing. You can add options, preceding the list of options with the -
character. Some of the options you will often use include:
• l for a long list format
• a to include hidden files and directories
• d to list directories in the current directory (rather than the content of the
directories)
• r to list entries in reverse order while sorting
• R to list subdirectory content recursively
• S to sort by file size
cd Changes the working directory to the specified directory.
pwd Shows the name of the current directory.
passwd Changes the password for the current user. When logged in with administrative
access, you can also change the password for another user; for example, passwd
ralph would change the password for the user ralph.
mv Moves or renames files. When you specify the destination, if the path to the file is
the same as the current directory (no path is included), then the file will remain in
the current directory, just with a new name. If you specify a path in the destination,
then the file will be moved to the new directory.
cp Copies specified files and/or directories. You can copy a specific file to a specific
destination, or you can copy multiple sources to a directory. There are many options
for this command, but you should at least become familiar with the following:
• i to be prompted before overwriting the destination
• l to link files rather than copy them
• p to preserve attributes if possible
• P to append the source path to the specified directory
• r or R to recursively copy files and directories
• u to copy only if the Source file is newer than the destination file
mkdir Creates the specified directory if it does not already exist.
rm Removes the specified files. By default it does not remove directories, but if you use
the -r or -R option, it will recursively remove directories and their contents, or the -d
option to remove empty directories.
Command Description
chmod The chmod command enables you to modify default permissions of a file or
directory. Only the owner of the file or the system administrator can change the
permissions of the file or directory.
Show an example of
using chmod with
numbers and with
letters. chmod 0755 is
commonly used and
gives the file owner all
permissions, and group
and others read and
execute.
The syntax of the chmod command is chmod [options] {mode} {file name}.
Note: For more details on the chmod command, see The chmod Command
section following this table.
chown The chown command can be used to change the owner, the group, or both for a file
or directory.
6
Command Description
ifconfig and The ifconfig command is used for configuring network interfaces for Linux servers
iwconfig and workstations. It is also used to view the current TCP/IP configuration of a
system, including the IP address and the netmask address.
The iwconfig command is used for configuring wireless network interfaces for Linux
servers and workstations. It is similar to the ifconfig command, except that it is
used to set up and view the parameters of wireless network interfaces.
ps The ps command invokes the process table. When the command is run without any
option, it displays the processes run by the current shell with details such as the
PID, the terminal associated with the process, the accumulated CPU time, and the
command that started the process. However, different options may be used along
with the command to filter the displayed fields or processes.
q The q command is used to exit from many commands including more, less, vi, and
man.
su and sudo The su command is used to change the ownership of a login session without logging
out. It is generally used to switch ownership between an ordinary user and a root
user, to change access permissions for administrative work.
The super user do (sudo) command allows users to run programs with the security
privileges of the root user. It prompts you for your password and confirms your
request to execute a command by checking the /etc/sudoers file, which is
configured by the system administrator. The sudo command allows system
administrators to give certain users or groups access to some or all commands
without users knowing the root password. It also creates a log of all commands and
arguments used, to maintain a record.
apt-get The apt-get command is used to install or upgrade packages through the Internet
or from the distribution CD on Debian, Ubuntu, or related Linux distribution.
While installing or upgrading packages, the apt-get command accesses the website
or the CD-ROM listed in the /etc/apt/sources.list file.
vi The vi command invokes a text editor. Traditionally, this was simply the vi editor.
The vim command invokes the Vim editor. However, the vi command may also be
used for this purpose because it automatically redirects the user to Vim. When
entered without a file name as an argument, the vim command opens a welcome
screen by default. To open a file, the syntax vim {file name} is used. If the file
does not exist, Vim creates a file by the name specified and opens the file for
editing. Vim supports multiple files being opened simultaneously.
dd The dd command copies and converts files to enable them to be transferred from
one type of media to another. The dd command has various options.
• if={file name}
specifies the file from which data will be read.
• of={file name}
specifies the file to which data will be written.
• bs={number of bytes per block}
specifies the number of bytes at which data is read from an input file and written
to an output file.
• count={number of blocks}
specifies the number of blocks to be written to the output file from the input
file.
Command Description
shutdown The command that is used to shutdown or restart a system. This closes files and
performs other tasks necessary to safely shutdown a system.
grep In its simplest form, grep is a search tool. It allows you to perform search actions,
such as finding any instance you are searching for, in a file. For example, entering
grep foo test returns all the lines that have a string matching “foo” in the file
The awk and sed “test.” The grep command can also be used to search a directory for a certain file.
commands are other The ls -l | grep audit command returns a long listing of any files in the
popular Linux current directory whose name contains “audit.”
commands, but they are
not on the exam. Note: The term grep is derived from “Globally search a Regular Expression
and Print”
man The Linux manual pages, or man pages, contain the complete documentation that is
specific to every Linux command; they are presented in simple ASCII text format.
The man page for a specific command is displayed using the man command. The
man pages are available on the system by default. They usually include information
such as the name of the command, its syntax, a description of its purpose, the
options it supports, examples of common usage of the command, and a list of
related commands.
apropos The apropos command is generally used when a user does not know which
command to use to perform a certain action. It can be used with a keyword to
display a list of the manual pages containing the keyword along with their man page
sections. The apropos command searches a regularly updated database called the
whatis database for the specified string and returns all matching entries.
date The date command displays the current date and time set on a system. You can use
the hyphen (-) or the colon (:) between the different fields of the date for a clear
output.
whoami The whoami command is used to display the user name with which you are currently
logged in to the system. Sometimes, you may need to log in to a system and switch
among different users, and you may not be sure with which user you are currently
logged in. In such instances, you can use the whoami command to know your
current user name.
Command Description
rpm The Red Hat Package Manager (RPM), developed by Red Hat®, is a tool for
maintaining packages. By providing a standard software packaging format, RPM
enables easy administration and maintenance of Linux systems and servers. RPM
provides a standard installation mechanism, information about installed packages,
and a method for uninstalling and upgrading existing packages.
Note: RPM is distributed under the GNU General Public License (GPL) and
can be used with many distributions of Linux and even with other UNIX
implementations.
Operator Description
+ Grants permissions.
- Denies permissions.
= Causes the permissions assigned to overwrite other existing
permissions. Assigns permissions similar to those of the reference
file.
Permission attributes define exactly what a user is allowed to do with a particular file. The three
permission attributes are listed in the table.
The permissions of a file or directory can be changed using the character method. The syntax of the
chmod command when using this method is chmod [options] {access categories}
{operators}{permission levels} {file name or directory name}.
Linux systems use octal (base-8) numbers to specify permissions. Each permission (r, w, and x) has
an associated number.
4 read r
2 write w
1 execute x
By adding the octal numbers for the permissions you want to grant, you get the overall permission
number to assign to a directory or file. Full permissions (read, write, and execute) are equivalent to 4
+ 2 + 1, or 7. Read and write permissions are equivalent to 4 + 2, or 6. Complete permissions are
expressed as a three-digit number, where each digit corresponds to the user, the group, and other
permissions, respectively.
The syntax of the number method to change permissions is chmod {number} {file name}.
Commonly used octal permission numbers are listed in the table.
755 u=rwx,g=rx,o=rx
700 u=rwx,g=,o=
644 u=rw,g=r,o=r
600 u=rw,g=,o=
the process table include the PID, the size of the program in memory, the name of the user who
owns the process, and time.
Sometimes you might need to end one of the running processes. It might be because someone left a
process running and you need to perform system maintenance or it might be because the process is
no longer responding.
Different commands are used to send signals to processes to end or kill them.
Command Description
killall Kills all processes by the name specified. The syntax of this
command is killall [options] {command}.
Note: The kill command accepts either the PID or the job number as an argument. So, this
command can also be used as a job control tool.
You can either use the kill signal option or its corresponding numerical value to send a signal to
terminate a process. The following table lists the most frequently used kill signal options and their
description.
Option Used To
Note: Sometimes, even after closing an X session, some of the X applications may not get
terminated properly. In such cases, you need to use the ps command to identify the PID of that
application and then kill the process.
You can use the kill command with the process table to end processes. By entering kill followed
by the PID, you can terminate specific processes.
When you use the kill command with the jobs table, you are working only with the jobs that you
started. However, the process table may display processes that do not belong to you. As a user, you
can use the kill command only with processes that you own. As root, you can kill anyone’s
processes.
There are many options available with the kill command. These options are referred to as kill
signals. Some processes cannot be eliminated by the kill command. To terminate these processes,
use the kill command with the -9 signal. This terminates the processes immediately.
• Scheduling regular backups. Using the backup method best suited to your organization, and on a
schedule best suited to user and administrative needs, perform automated backups of data and
system settings.
• Scheduling disk maintenance. On a regular basis, you should check the integrity of the hard
drives. You also need to keep track of how much space is available, and who is using the space.
If you have specific users that are hogging more than their fair share of disk space, consider
instituting disk quotas and having those users move unneeded files to secondary storage such as
DVD or tape.
• Using the app installation command for your Linux distribution, check for any available updates.
This should be done at least weekly, if not more often depending on your organizational needs.
• Test all patches before deploying the patches throughout the organization.
• If devices are not performing as they should after an OS update, you might need to update
drivers or firmware. Check documentation online to see if there is any indication that driver or
firmware updates are warranted, and if so, download and install the appropriate files using the
method used by your distribution of Linux.
• Linux systems are not often prone to virus or malware attacks, but you should be running some
type of antivirus and antimalware application. Be sure that it is configured to check for updates
as they become available.
ACTIVITY 11-5
Using Linux
Scenario
You have just installed a Linux system. You want to try out some of the commands and features you
have learned about recently.
Note: Whenever the instruction states “enter command”, you are required to type the command
and press Enter. In Linux, commands, command-line options, and file names are case-sensitive.
Note: Activities may vary slightly if the software vendor has issued digital updates. Your
instructor will notify you of any changes.
You may note to
students new to Linux
that the CLI login
1. Log in to the GUI as jsmith and perform the initial system configuration since this is a new system. process typically does
a) To log in to the system, select user Joyce Smith on the GUI login screen. not echo asterisks (*) or
other characters for
b) In the Password text box, type my!Pass1234 and press Enter.
each password
c) On the Welcome screen, verify that English (United States) is selected, and select the Next button. character typed at the
d) On the Select input sources screen, verify that English (US) is selected, and select the Next button. keyboard.
e) On the Connect to your existing data in the cloud screen, select the Next button to continue.
f) On the Thank You screen, verify that the Your computer is ready to use message is displayed, and
select the Start using CentOS Linux button to continue. Notify students of any
g) Note that the GNOME Help application is displayed by default, and select the X button in the upper- changes to activities
right corner to close the window. based on digital software
updates issued by the
2. Switch to the first CLI terminal (the second terminal) and log in as jsmith. software vendor.
a) To switch to the second terminal, press Ctrl+Alt+F2.
b) To log in to the terminal, type jsmith at the login prompt and press Enter.
c) Type my!Pass1234 when prompted for your Password and press Enter.
d) To view the current date and time of the system, at the command line, enter date
Verify that the current date and time of the system is displayed.
Summary
In this lesson, you examined some of the features and functions of the OS X and Linux operating
systems. Being able to support these operating systems is as important in many organizations as
being able to support Windows operating systems. Most of the features and functions in one
operating system are available in the other operating systems, just with different names and
sometimes implemented a little differently. With experience, these will become second nature as to
where they are located and how to use them.
Have you used OS X previously? If so, which edition? Does your organization use OS X?
A: Answers will vary. The editions most commonly seen are Snow Leopard or newer editions. Some
Encourage students to
use the social organizations might use OS X in their media or marketing departments even if the rest of the
networking tools organization uses Linux or Windows systems.
provided on the CHOICE
Course screen to follow Have you used Linux previously? If so, which distribution? Does your organization use Linux?
up with their peers after A: Answers will vary. Some of the more popular distributions include Red Hat, Fedora, Ubuntu, and
the course is completed CentOS. Even if your organization uses Windows systems, Linux is often used for web servers or by
for further discussion engineering departments.
and resources to support
continued learning. Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will identify the hardware and software requirements for client
environment configurations. You will:
• Define requirements for thick clients, thin clients, and virtualization clients.
• Define requirements for graphic and CAD/CAM design workstations, audio/video
editing workstations, gaming PCs, home theater PCs, and home server PCs.
Lesson Introduction
At this point in the course, you have identified the different components that make up a
standard workstation, and the operating systems available for installation. With this
information, you are ready to take a look at the hardware needs and requirements for
different client configurations.
As an A+ technician, you must be knowledgeable in many different areas of information
technology. This may include supporting a wide variety of client configurations, such as
gaming or audio and video workstations. You must be prepared to fully support any type of
environment, including more specialized hardware and software configurations based on job
roles and tasks.
408 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Types of Common Business Clients
Now that you have identified the main components of a personal computer, you can start to take a
look at what requirements are needed to install and configure a standard client. In this topic, you will
identify the hardware and software needs to install a thin client, a thick client, or virtualization
workstation.
When installing and configuring user workstations, it is important to identify what the specific needs
are of the user that will be using the workstation to perform job tasks. Standard clients are a good
starting point for any installation and must be examined to verify that they fit the requirements of
the job function.
Thick Clients
Standard business client computers are end-user computers that are administered and managed
centrally by a server. Clients will typically include various hardware features and applications that suit
Thick Clients
the specific needs of the user. Client machines are generally referred to as either thin or thick,
depending on the requirements. A thick client, also referred to as a fat client, performs most or all
computing functions on its own.
Thick client requirements include:
• The computer must meet the standard requirements for running the selected operating system.
• Full application versions are installed and run directly from the client computer using its own
resources. The applications are installed using traditional methods and are stored on the hard
drive.
• If data is stored locally, then access to storage locations is required with a consistent pathway to
data.
• If data is stored on the network, then a consistent path should be established to the storage
location with proper security implementations.
• Hardware should be robust enough to run all required applications.
Thin Clients
A thin client is a computer that relies heavily on another system, typically a server, to run most of its
programs, processes, and services. Client setup requirements will be specific to a user's needs and
Thin Clients
will most likely be based on a job role.
The system requirements for thin clients include:
• The computer must meet the minimum requirements to run the selected operating system.
• The computer uses basic applications that can be accessed over the Internet. The applications do
not get installed on the computer and do not use up any hard drive space. RAM is used to run
the application from the server.
• The computer must have a fast network connection to access the server that is hosting the
applications.
• The computer might require specialized software in order to access the applications hosted by
the server.
• The computer may require a specific browser in order to run any web-based applications.
Virtualization Workstations
A virtualization workstation is a computer that uses both hardware virtualization and client
virtualization resources to provide a comprehensive virtual environment for users. The virtualized
workstation is configured to use the system's hardware functions such as access to the graphics card, Virtualization
Random Access Memory (RAM), and Network Interface Cards (NICs), as well as run the software Workstations
that provides multiple virtual machines (VMs). Organizations may use virtualization workstations to
reduce the use and cost of hardware and to provide employees with a wide variety of OS specific
applications from a single workstation. Virtualization provides users with a variety of applications
and resources by offering multiple platforms within a single system.
ACTIVITY 12-1
Selecting Components for Common Business
Clients
Scenario
You have been asked by your manager to evaluate the hardware and software needs for all the
clients within the Human Resources (HR) department of your organization. There was a recent
reorganization of the department and some of the job roles and functions have changed. Based on
the recent changes, you need to review the job functions and identify what type of client
workstation will meet those needs.
1. A user needs to be able to access the central employee data repository to run reports, but does not
need access to any local applications used to create, edit, and manage the employee data. The
employee data is managed on a server that can be accessed with a log in. What type of client is best in
this case?
◉ Thin client
○ Virtualization workstation
○ Thick client
2. June has recently been put in charge of making updates to the Human Resource employee benefits
website. She will be publishing a monthly newsletter and posting company wide announcements,
among other small updates and changes, on a regular basis. All changes to the website must be tested
on a number of platforms and web browsers to verify that the changes are correct regardless of the
operating system and browser. What type of client setup would you suggest for her?
A: Answers will vary, but will most likely include a virtualization workstation so that she can switch
from different operating systems and test any website changes quickly.
3. In order to properly support the HR employee benefits website, a new server running client VMs has
been installed so that the environment that the application requires can be strictly administered by IT
staff. Current PCs will be used to access the Client VM environment that is configured on the VM
Server. What needs to be present at all PCs that will be accessing this new server and application?
☑ Appropriately configured VM Client.
☑ Fast network connection to server hosting the VM environment.
☐ Upgrade to video cards.
4. True or False? The HR manager's client computer must meet the recommended requirements to run
Windows 8.1 so that she can access and use all of the HR-related applications used by the
organization. In this case, the best client option is a thick client.
☑ True
☐ False
TOPIC B
Custom Client Environments
The next logical step in examining custom computing environments is to take a closer look at some
of the more specialized environments based on a specific function. In this topic, you will identify the
hardware and software needs for various custom computing environments.
There are a wide variety of job functions within the job force, and you may find yourself having to
support more specialized computer hardware and software installations. This may include media,
audio, and even home entertainment systems. As an A+ technician, you must have the knowledge to
provide support in any computing environment.
Media design workstations require a specific set of requirements. Actual hardware and software
requirements will depend on the user's specific job role and function, but most media design
workstations will require a similar set of tools and components.
Common hardware components include:
• A multicore processor.
• A high-end video/graphics card with integrated Graphics Processing Unit (GPU). Mention to students that
• Large flat panel display, or multiple monitors. the power needed to run
these computers will not
• Maximum RAM supported by the motherboard and CPU. only come from AC
Common software applications include: power, but from digital
power as well, so it's
• Adobe's Creative Cloud. important to check the
• 3D Studio Max. requirements of all the
• Computer aided design (CAD) and manufacturing (CAM) programs. computing components
within the environment.
GPUs
The GPU (graphics processing unit) is an electronic circuitry unit that alters and controls the
memory of a computer to meet the immediate needs of rapidly changing computer graphics and
detailed visual images displayed on the display device. There are a number of ways GPUs are
implemented within a computing device depending on the specific needs of the user and
applications. Most modern PCs, laptops, and some mobile devices come with a GPU already
installed on either the motherboard or the CPU. The most powerful GPUs are considered to be
high-end specialized units that come already installed on the video card and have various output
methods and capturing devices.
CAD Workstations
CAD workstations are unique in that they require both the hardware and the software on a system
to meet certain requirements to produce complex 3D designs. CAD workstations require a high-end
graphics card and monitor, and specialized input devices such as a digitizing tablet and light pen.
Industries that use CAD created design specifications include automotive companies, aerospace, and
architectural firms.
CAM Workstations
Computer aided manufacturing workstations are a type of workstation that is set up with specific
hardware and software that can control machine tools found in manufacturing environments.
Specialized controller cards may be required as well as specialized connections and software. CAM
machines may be installed in harsh environments—such as manufacturing buildings and automotive
factories—so the workstations may need to be hardened machines that will not be aversely affected
by their working environments.
The hardware and software requirements for each individual audio/video editing workstation will
differ depending on what specific tasks the job role will need to do. Most stations will require the
following hardware components:
• A specialized audio and video card to support CGI and 3D post production effects.
• A large fast hard drive.
• A high-end GPU.
• Large flat panel or multiple displays.
Gaming PCs
A gaming PC is a computer that comes equipped with powerful graphics capabilities, fast processing
capabilities, and a large amount of memory. The main difference between a gaming PC and other
consumer workstations is that they are specifically designed and built to support the demanding Gaming PCs
computing requirements by gaming software applications. All gaming PCs will require a high-end
GPU to support the detailed 3D graphics and realistic imagery presented in PC games today.
Gaming platforms are also popular today and provide gamers with a number of application options,
message boards, and file sharing via an online portal, such as SteamTM and OriginTM.
Gaming Peripherals
There are many different peripherals used within the gaming world. The most common ones include
the mouse and keyboard, but there are others that may be used depending on the type of game
played:
• Gaming mice that are wireless and include many buttons and different ergonomic form factors.
• Customized keypads, with moveable keys.
• Steering wheels used for auto racing games.
• 3D glasses.
• Specialized gaming mouse pads.
• Specialized audio system.
• PC video camera.
Note: While you can purchase specialized home theater PCs, it is more likely that you will
purchase a standard PC and add components such as a TV tuner card to make it into a home
theater PC.
HTPCs are built specifically for home theater purposes, so most of the required elements are built
right into the actual system. They generally include:
• A TV tuner card that allows the computer to display high-definition (HD) digital output and
attach the cable provider's cable TV wire directly to the system.
• A cable card that provides authentication and encryption services to connect with the cable set
top box provided by the cable company.
• Optical disc player that supports both DVD and Blu-ray.
• HDMI output for high-definition video and audio.
• Maximum RAM supported by the motherboard.
• Video card with both GPU and HD capabilities.
• Bluetooth® or wireless capabilities when using specialized remotes or input devices.
Movie Players
There are a number of software applications available for playing HD movies on a HTPC, including:
• VLC media player.
• Cyberlink PowerDVD.
• Kodi (formerly known as XBMC).
• Windows Media Center for Windows Vista and Windows 7.
ACTIVITY 12-2
Selecting Components for Custom Client
Systems
Scenario
You are a support technician for a local business that specializes in consulting, purchasing, and
installing home computing solutions for consumers. You are responsible for fulfilling all the orders
that have come in overnight through the business' website.
1. Customer 1 is using a desktop PC to play home movies and to set up slide shows to show his family
their vacation photos and is having difficulty with the computer freezing during the movies. He is looking
for a solution that will allow him to store and play his movies seamlessly through a computer. He also
wants his wife to be able to access the pictures and movies from her laptop within the house. What type
of computer setup would you suggest for this customer? What specific questions might you ask this
customer about additional component needs?
A: Answers may vary, but will most likely include setting up a home server PC for easy file sharing
among the household computing devices and to provide more speed to play movies from the PC.
You may ask if they are in need of additional storage space and if they are looking for redundancy
through a RAID array in the PC.
2. Customer 2 is from a small real estate office who has recently hired a graphic designer to produce
informational pamphlets and other marketing materials for the agency, such as property drop sheets
and circular layout designs. The office manager has asked your company to determine the hardware
and software needs for the designer's workstation so that it can be ordered and set up before their
scheduled start date in two weeks. What hardware and software requirements would you suggest for
the graphic designer's workstation?
A: Answers may vary, but will most likely include a PC with a high-end, multicore processor, a high
end video card, and the maximum RAM that the motherboard can handle. In addition, the
motherboard should contain multiple high-speed ports for peripherals such as external hard drives
or additional video cards. The applications will most likely include Adobe's Creative Cloud or
similar graphic-design software.
3. Customer 3 is looking to make the switch from a traditional TV cable box and DVD player to a home
theater PC, so that she can stream Netflix and record shows and movies from her TV. She already
purchased a computer from a local home entertainment store but cannot figure out why she cannot
connect the cable TV wire into the computer. What would you check for first?
A: She needs to have a TV tuner card installed in the computer. The tuner card provides the port to
connect the cable from the provider to the computer. You would also want to verify that the tuner
card is correctly configured, and that all device drivers are installed and up-to-date.
Summary
In this lesson, you identified all the different components needed to provide a custom computer
setup that is based on specific user needs. There is a wide variety of job functions within the
corporate world today, so identifying specific hardware and software needs based on a user's job
role will only help you in providing the right level of support within your organization.
Have you had any experience with any of the workstation or server setups presented in this lesson?
A: Answers will vary, but may include a thick or thin client setup and configuration, or a home theater PC.
Encourage students to
use the social
What types of custom client setups do you think you will encounter the most in your role as an A+
networking tools
technician?
provided on the CHOICE
Course screen to follow A: Answers will vary, but may include gaming PCs due to the rise in the gaming systems sold to
up with their peers after consumers in the last few years, and also home theater PCs and home server PCs.
the course is completed
for further discussion Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
and resources to support peers, and the larger CHOICE online community about the topics covered in this course or
continued learning. other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will identify network technologies. You will:
• Identify the physical network connections commonly used to connect PCs and mobile
devices to networks.
• Identify the characteristics and properties of TCP/IP.
• Identify resources needed to connect client PCs and devices to the Internet.
• List ports and protocols commonly used in network communications.
• Identify tools commonly used to install, configure, and maintain networks.
Lesson Introduction
In this course, you are learning to support a wide range of computing device features and
functions. A key factor in device communication is how they are connected and how they
transfer data to one another.
Just about every digital device on the planet today is connected to external resources via
some kind of network, whether it is a small office/home office network, a corporate wide
area network (WAN), or directly to the Internet itself. The ability to connect, share, and
communicate using a network is crucial for running a business and staying connected to
everything in the world, so as an A+ support technician, you will need to understand the
technologies that underlie both local and global network communications to ensure that the
organization you support stays connected.
420 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
TCP/IP Properties and Characteristics
In this lesson, you will identify various networking technologies. In order to do so, you will need to
understand a few basic concepts and the connections used to implement computer networks and
their components. In this topic, you will identify the physical network connections that make up
most computer networks.
No matter what types of networks you support in your professional career, they will all share some
fundamental characteristics as well as basic physical components. As a computer support technician,
dealing with these components will need to be as natural to you as handling a scalpel is to a surgeon.
The information in this topic will familiarize you with the physical network connections and
components that you will deal with on a daily basis as a support technician.
Characteristic Description
Network Network adapter cards will have one or more ports that are configured to
connection port connect specifically to a given type of network cable. Some older cards had
several types of ports so that they could connect to several different types of
network cable. Network connections today are standardized and almost all
use one port type.
Characteristic Description
Physical network Each network adapter has a globally unique physical address burned onto the
address card by the card manufacturer. The physical address uniquely identifies every
individual card that connects to the network cable or media. For this reason,
the physical address is also called the Media Access Control (MAC) address.
MAC addresses are six bytes long. A typical MAC address might appear as
00-00-86-47-F6-65, where the first three bytes are the vendor's unique ID
and the next three uniquely identify that card for its vendor.
Status indicator Network adapters, including those built into most network devices, typically
lights have one or more light emitting diode (LED) status lights that can provide
information on the state of the network connection.
• Most adapters have a link light that indicates if there is a signal from the
network. If the link light is not lit, there is generally a problem with the
cable or the physical connection.
• Most adapters also have an activity light that flickers when packets are
received or sent. If the light flickers constantly, the network might be
overused or there might be a device generating network noise.
• Some multi-speed adapters have a speed light to show whether the adapter
is operating at 10 Mbps (Ethernet), 100 Mbps (Fast Ethernet), or 1000
Mbps (Gigabit Ethernet).
• Some types of equipment combine the functions of more than one light
into dual-color LEDs. For example, a green flickering light might indicate
normal activity, while an orange flickering light indicates network traffic
collisions.
Ethernet
An Ethernet network is a popular LAN implementation that uses Ethernet network adapters,
contention-based media access, and twisted pair, coax, or fiber media. Xerox® corporation first
developed Ethernet in the 1970s. Later, the IEEE used Ethernet as the basis of the 802.3 Ethernet
specification, which standardized Ethernet and expanded it to include a wide range of cable media.
The 802.3 family of specifications also determines transmission speed (10 Mbps, 100 Mbps, or 1000
Mbps) and signal method (baseband or broadband).
depending on the type and size of cabling. Twisted pair cabling is typically less expensive and more
flexible than other cable types, but it is susceptible to electromagnetic interference. Shielding can be
added around the bundle of twisted pairs to reduce interference. Another transmission limitation of
twisted pair cabling is that it has low bandwidth compared to other cabling types. Twisted pair is
also susceptible to attenuation, or a reduction in signal strength. Attenuation may intensify when
using a splitter to split the signal, potentially reducing signal quality.
Category Characteristics
CAT 6 • Network Type: Gigabit Ethernet
• Maximum speed: 10 Gbps
• Maximum frequency: 250 MHz
CAT 6 is commonly used for back-end, high capacity networking.
Extended CAT 6 or CAT 6e cables perform better than CAT 6 when they are
installed in an environment with high noise or RF interference.
CAT 6a or • Network Type: Gigabit Ethernet
CAT 6 • Maximum speed: 10 Gbps
Augmented • Maximum frequency: 500 MHz
CAT 6a is expected to replace HDMI for video transmission.
CAT 7 • Network Type: Gigabit Ethernet
• Maximum speed: 10 Gbps+
• Maximum frequency: 600 MHz
CAT 7 supports 10GBASE-T Ethernet over a full 100 meters and offers
improved crosstalk noise reduction.
Note: The RJ in RJ-11 and RJ-45 is an abbreviation for “registered jack.” An RJ-45 connector is
also referred to as an 8P8C connector.
Coaxial Cables
Coaxial cable, or coax, is a type of copper cable that features a central conductor surrounded by
braided or foil shielding. An insulator separates the conductor and shield, and the entire package is
wrapped in an insulating layer called a jacket. The data signal is transmitted over the central Coaxial Cables
conductor. The outer shielding serves to reduce electromagnetic interference.
Note: Coaxial cable is so named because the conductor and shield share the central COmmon
AXis, or are co-axial. This arrangement helps prevent electromagnetic interference from
reaching the conductor.
Like twisted pair cable, coax is susceptible to signal loss or degradation when splitters are used.
RG-58 RG-58/U and RG-58A/U, also known as thinnet, are older types of media used
for networking. The specifications include a maximum transmission speed of 10
Mbps using baseband transmission up to 185 meters in length.
Thinnet connections are made with a twist-lock connector called a Bayonet
Neill-Concelman (BNC) connector. Devices connect to the network with T-
connectors. Each end of the cable must be terminated with a 50-ohm resistor.
Another coax connector type is the F-connector, which is used to connect cable
TV and FM antenna cables. Today, F-connectors are also used to connect cable
modems to the CATV network.
RG-59 RG-59 is used for cable television transmission. It also uses BNC and F
connectors. Transmission distances are:
• Up to 250 meters for 10 Mbps
• Up to 150 meters for 100 Mbps
RG-6 RG-6 and RG-6/U has been replacing RG-59 in recent years as the preferred
cable for CATV networks. Like RG-59, F-connectors are used to connect cable
modems to the CATV network. Transmission distances are:
• Up to 300 meters for 10 Mbps
• Up to 200 meters for 100 Mbps
Termination
Coax network segments typically must be terminated to prevent signal reflections off the end of the
cable. Cables are terminated by installing a resistor of an appropriate rating, typically 50 ohms, on
the end of the cable.
Fiber optic cores are uni-directional. For this reason, they are installed in pairs, one for sending data
and one for receiving data.
• Multimode has a large core that supports multiple modes of light to propagate. This allows the
number of light reflections created as the light passes through the core to increase. More data can
pass through. This cable is typically used for short distances.
Single-mode fiber Carries a single optical signal and has a small core that allows only a single
beam of light to pass. A laser, usually operating in the infrared portion of
the spectrum, is modulated in amplitude (intensity) to transmit the signal
through the fiber.
Step index multimode Contains a core surrounded by cladding, each with its own uniform index
fiber of refraction. When light from the core enters the cladding, a step down
occurs due to the difference in the refractive indices. Step-index fiber uses
total internal reflection to trap light.
Graded index Possesses variations in the core glass to compensate for mode path length
multimode fiber differences. It provides up to 2 GHz of bandwidth, which is significantly
more than step-index fiber.
Connector Description
Straight Tip (ST) Used to connect multimode fiber, ST connectors look like BNC
connectors. They have a straight, ceramic center pin and bayonet lug
lockdown. They are often used in network patch panels. ST connectors are
perhaps the most popular type of fiber connector.
Subscriber Connector or Box-shaped connectors that snap into a receptacle. SC connectors are often
Standard Connector used in a duplex configuration where two fibers are terminated into two SC
(SC) connectors that are molded together. SC is used with single-mode fiber.
Face Contact (FC) Similar to SMA connectors, FC connectors use a heavy duty ferrule in the
center for more mechanical stability than SMA or ST connectors. These
connectors are more popular in industrial settings where greater strength is
required.
Local Connector (LC) The LC is a small form factor ceramic ferrule connector for both single-
mode and multimode fiber. It is about half the size of the SC or ST. The
LC uses an RJ45-type latching and can be used to transition installations
from twisted pair copper cabling to fiber.
Sub Multi Assembly or Similar to ST connectors, SMA connectors use a threaded ferrule on the
Sub Miniature type A outside to lock the connector in place. These are typically used where water
(SMA) or other environmental factors necessitate a waterproof connection, which
is not possible with a bayonet-style connector.
Connector Description
Mechanical Transfer The MT-RJ connector, sometimes called a Fiber Jack connector, is a
Registered Jack (MT- compact snap-to-lock connector used with multimode fiber. The MT-RJ is
RJ) easy to use and similar in size to the RJ45 connector. Two strands of fiber
are attached with one connector.
Wireless Connections
Wireless connections are network connections that transmit signals without using physical network
media. Instead, signals are transmitted as electromagnetic energy, such as radio waves or satellite
Wireless Connections
microwave. Most general office wireless implementations use radio. Wireless communication
enables users to move around while remaining connected to the network.
Note: Wireless communication permits connections between areas where it would be difficult or
As you introduce impossible to install wires, such as in hazardous areas, across long distances, or inside historic
wireless connections, buildings. It is also extremely popular in standard business and home installations because of the
explain that although mobility and flexibility it provides, as well as the simplicity of media-free installation.
infrared is also a
wireless connection
medium, it is less suited
for networking than radio
and satellite are.
Wi-Fi
Wireless radio communications following the IEEE 802.11g Wi-Fi standard are the most common
choice for ordinary wireless LAN connectivity for portable computers inside homes, offices, and,
increasingly, public buildings. Choose Wi-Fi when you need to connect portable computer systems
to a wired or wireless Ethernet LAN and enable users to move from place to place freely without a
line of sight to the WAP. Wi-Fi provides good performance within the WAP coverage area, barring
any signal interference.
ACTIVITY 13-1
Identifying Network Cables and Connectors
Scenario
You are working with the rest of the PC technicians team in cleaning up the storage bins and closets
in your area. You have found a variety of cables and connectors thrown all together without any
indication of what they are or what they are used for. You suggest to the team that the items be
sorted and placed in labeled bins before storing in the closets.
5. Are there any LED lights on the cable ports indicating activity?
A: Answers will vary depending on the location of the participant and the level of network activity.
Some participants might see the LED lights lit or blinking, while others might not.
TOPIC B
TCP/IP
Now that you are familiar with the basic components that make up a network, you can start to take
a closer look into how Transmission Control Protocol/Internet Protocol (TCP/IP) addressing and
data delivery methods are used to implement TCP/IP on a network. In this lesson, you will identify
the properties and characteristics of TCP/IP.
As an A+ technician, you must be able to identify the components of a system in order to provide
the right level of support to your organization. Because all networks are different, you still need to
be able to identify the components and how they are connected. Understanding how everything is
connected and functioning within the network will allow you to properly support TCP/IP within
the network.
TCP/IP
Transmission Control Protocol/Internet Protocol (TCP/IP) is a non-proprietary, routable network protocol
that enables computers to communicate over all types of networks. TCP/IP is the native protocol
of the Internet and is required for Internet connectivity. TCP/IP is a suite of related protocols that TCP/IP
work together to provide network addressing and naming, and data delivery. In this suite, IP
provides addressing, TCP provides connection-oriented message transmission, and User Datagram
Protocol (UDP) provides connectionless, best-effort message transmission.
6
IPv4 Addresses
An IPv4 address is a 32-bit number assigned to a computer on a TCP/IP network. Some of the bits in
the address represent the network segment; the other bits represent the computer, or node, itself.
IPv4 Addresses
For readability, the 32-bit IPv4 address is separated into four 8-bit octets, and each octet is
converted to a single decimal value. Each decimal number can range from 0 to 255, but the first
number cannot be 0. In addition, all four numbers in a host address cannot be 0 (0.0.0.0) or 255
(255.255.255.255).
Network Names
Systems on a network are typically assigned a host name, in addition to the numeric address. The
host name is the descriptive name you see assigned to computers on the Internet, but systems on
local networks have them as well. On the Internet, these host names appear to the left of the
domain name. Host names can be up to 63 characters long.
Subnet Masks
A subnet mask is a 32-bit number that is assigned to each system to divide the 32-bit binary IP
address into network and node portions. This makes TCP/IP routable. A subnet mask uses a binary
operation to remove the node ID from the IP address, leaving just the network portion. Subnet Subnet Masks
masks use the value of eight 1s in binary, or 255 in decimal, to mask an entire octet of the IP
address.
Class B Class B subnet masks offer a larger number of network addresses, each with
255.255.0.0 fewer nodes per network:
• Number of nodes per network: 65,534
• Network ID portion: First two octets
• Node ID portion: Last two octets
Most companies leased Class B addresses for use on Internet-connected
networks. In the beginning, there were plenty of Class B addresses to go
around, but soon they were depleted.
Class C Class C subnet masks offer a large number of network addresses for
255.255.255.0 networks with a small number of nodes per network:
• Number of nodes per network: 254
• Network ID portion: First three octets
• Node ID portion: Last octet
Because there can be more Class C networks than any other type, they are
the only addresses still generally available.
Note: CIDR can also be referred to as classless routing or supernetting. Because of its
efficiencies, CIDR has been rapidly adopted, and the Internet today is largely a classless address
space.
IPv6 Addresses
IP version 6, or IPv6, is an Internet standard that increases the available pool of IP addresses by
implementing a 128-bit binary address space. IPv6 also includes new efficiency features, such as
simplified address headers, hierarchical addressing, support for time-sensitive network traffic, and a IPv6 Addresses
new structure for unicast addressing. One of the goals of IPv6 is to keep the IP headers as small as
possible to make access to the address more efficient and quicker. Non-essential information in
IPv6 headers is moved to optional extension headers. In IPv6, address blocks are automatically
assigned hierarchically by routers. Top-level routers have top-level address blocks, which are
automatically divided and assigned as routers and segments are added. This divides the address space
logically instead of randomly, making it easier to manage.
IPv6 is not compatible with IPv4, so now, it is narrowly deployed on a limited number of test and
production networks. Full adoption of the IPv6 standard will require a general conversion of IP
routers to support interoperability. IPv6 makes use of an Institute of Electrical and Electronics
Engineers (IEEE) standard called Extended Unique Identifier (EUI). A host computer implemented
with EUI-64 can assign itself a 64-bit IPv6 interface identifier automatically.
Note: For more information on IPv6, see the IETF's IP Version 6 Working Group charter at
www.ietf.org/html.charters/ipv6-charter.html.
To make the representation easier, some abbreviation techniques are used. For example, one
abbreviation technique used replaces all zero hexadecimal values with a single zero and removes the
leading zeros of all nonzero values.
For example, in the IPv6 address 2001:DB8:0000:0056:0000:ABCD:EF12:1234, the third, fourth,
and fifth bytes contain consecutive zeros and, therefore, they can also be represented as
2001:DB8:0:56:0:ABCD:EF12:1234 without the unnecessary zeros.
Another technique used replaces all consecutive zero values or consecutive leading zeros with a
double colon. However, the double colon can be used only once in an address. This is because when
a computer comes across a simplified address, it replaces the double colon symbol with as many
zeros as required to make it 128 bits long. If an address contains more than one double colon, the
computer cannot determine the number of zeros for each place.
For example, the IPv6 address 2001:DB8:0000:0056:0000:ABCD:EF12:1234 can also be
represented as 2001:DB8::56:0:ABCD:EF12:1234 or 2001:DB8:0:56::ABCD:EF12:1234 after
replacing any one of the consecutive zeros with a double colon.
Addressing Schemes
When assigning addresses to hosts on your network, you must assign an address in the appropriate
scheme based on the type of network and access is given to that host.
Addressing Schemes
Scheme Description
Private Private IP addresses are addresses that organizations use for nodes requiring IP
Ask students which connectivity within enterprise networks, but not requiring external
address scheme they connections to the global Internet. IP addresses in each of the Classes A, B,
use in their organization. and C are reserved as private IPv4 addresses. Because they are not routable,
Also, ask whether they private IP addresses do not cause duplicate IP address conflicts on the
have encountered Internet.
APIPA addresses and if
they know what that In IPv6, these are referred to as site-local addresses.
indicates.
Public Public IP addresses are addresses that get shared on the Internet. To ensure the
uniqueness of each public address, they are distributed in blocks by ICANN.
APIPA/Link Automatic Private IP Addressing (APIPA) is a feature of Windows that enables a
NAT will be covered in Local DHCP client computer to configure itself automatically with a random IPv4
the next lesson. address in the range of 169.254.0.1 to 169.254.255.254 if there is no DHCP
server available. A computer with an APIPA-range address is usually nothing
more than a symptom, to the technician, of a DHCP problem that requires
Point out that a 169.264 resolution.
address can indicate a
connection problem.
In IPv6, link local addresses are required, and always begin with FE80.
Loopback address The block of addresses in the IPv4 127.0.0.0/8 or IPv6 ::1 range are reserved
block for loopback. Information sent out from the device is routed back to the
source without any processing or change. This is designed mainly to use for
testing purposes.
DHCP
Dynamic Host Configuration Protocol (DHCP) is a network service that provides automatic assignment
of IP addresses and other TCP/IP configuration information on network systems that are
configured as DHCP clients. DHCP requires a DHCP server computer configured with at least one DHCP
active DHCP scope. The scope contains a range of IP addresses and a subnet mask, and can contain
other options, such as a default gateway address or Domain Name Server (DNS) server address. When
the service is enabled, it automatically leases TCP/IP configuration information to DHCP clients for
a defined lease period.
DNS
Computers on TCP/IP networks are assigned both a host name and an IP address. Users generally
access systems by their descriptive names, and the network needs to translate, or resolve, those
DNS
names into the relevant systems' IP addresses. The Domain Name System (DNS) is the primary name
resolution service on the Internet as well as private IP networks.
DNS is a hierarchical system of databases that map computer names to their associated IP
addresses. DNS servers store, maintain, and update the databases and respond to DNS client name
resolution requests to translate host names to IP addresses. The DNS servers on the Internet work
together to provide global name resolution for all Internet hosts. For example, the IP address
209.85.165.99 might map to www.google.com.
Client-Side DNS
Client-side DNS can be implemented by running a DNS service on a client computer. The client
can quickly use the client resolver cache to lookup host names for resolution. This enables the client
Client-Side DNS
to perform basic DNS lookups without having to connect to a DNS server. In cases where the
lookup is out of scope for the client resolver, the DNS servers that store, maintain, and update
databases will respond to any resolution requests that may be out of scope for client-side DNS
services to handle. In this case, the client-side DNS service will communicate directly with multiple
DNS servers to resolve name requests made from the client machine.
ACTIVITY 13-2
Examining TCP/IP Information
If time permits and
students are interested,
you can have them
repeat this activity from
within the Windows 8.1
VM. Point out that the
Scenario
protocols and TCP/IP In this activity, you will examine the configuration settings on your host computer that enables it to
information for the VM connect to the network.
mirror the host machine.
Briefly describe the 5. In the Network Connection Details dialog box, examine the information for DNS.
DHCP lease process.
6. How many DNS servers are listed?
A: Answers will vary depending on the configuration of the network.
Briefly explain the
significance of the 7. Return to the network connection properties, and examine the Internet Protocol Version 4 (TCP/IPv4)
information on the properties.
General tab of the a) Select Close.
Internet Protocol Version b) Select Properties to return to the network connection properties.
4 (TCP/IPv4) Properties
dialog box. c) In the This connection uses the following items list, select Internet Protocol Version 4 (TCP/IPv4),
and then select Properties.
d) Select Advanced.
Briefly explain the e) Select the DNS tab.
information displayed on f) Select Cancel three times, and then select Close.
the IP Settings tab. g) Close the Network Connections window.
TOPIC C
Internet Connections
In the previous topics, you identified network communication technologies and the components of
TCP/IP. To complete your understanding of network concepts, you will need to examine the
technologies that connect multiple nodes and networks together. In this topic, you will identify
network connectivity technologies.
Putting together a network is like putting together a huge puzzle. There are physical pieces, such as
network adapters and network clients, and conceptual pieces, such as protocols and addresses.
However, to understand how the pieces all fit together you need to be able to see the overall picture.
Examining the large structures and techniques that provide network connectivity between and
within network locations will help you see the big picture of network implementation and support.
ISPs
An Internet Service Provider (ISP) is a company that provides Internet access to individuals and to
businesses. Most ISPs charge a fee for this connection. Customers receive logon information, access
to servers that provide name resolution and email services, dynamic or static IP configurations, and ISPs
a method for connecting to the ISP. Once connected to the ISP, the customer can access the
Internet.
Method Description
DSL Digital Subscriber Line (DSL) transmits digital signals over existing phone lines. It
has become a popular way to connect small businesses and households to the
Internet because it is affordable and provides a relatively high download speed—
a typical maximum is 1.5 Mbps for basic DSL and 7 Mbps for high-end DSL.
However, distance from the phone company's switching station and the quality
of the lines affect the total bandwidth available to a customer.
Dial-up Dial-up lines are local loop Public Switched Telephone Network (PSTN) connections
that use modems, existing phone lines, and existing long-distance carrier services
to provide low cost, low bandwidth WAN connectivity, and remote network
access. Dial-up lines are generally limited to 56 Kbps and are sometimes used as
backups for higher bandwidth WAN services.
Fiber Fiber is a method used to connect devices to the Internet using fiber optic cable.
Fiber is mostly used in smaller areas to connect computing devices to a router. It
provides a fast data exchange rate over distances of several kilometers.
Satellite Geostationary satellites orbit 22,236 miles above the Earth's equator, or zero
latitude. They orbit in the same direction the Earth rotates (west to east) at the
same speed of the rotation.. One orbit takes 24 hours, the same length of time
the Earth rotates once on its axis, so the satellite appears stationary. This
positioning eliminates the need for satellite antennas, or dishes, to track satellites,
which simplifies data exchange and reduces costs. Set up the satellite dish once,
and barring extreme weather conditions, the dish maintains constant contact
with the satellite. Satellites are used for a variety of purposes, such as television
broadcasts, radio communication, mapping, weather
forecasting,telecommunication, Internet access in rural and remote regions not
serviced by cable broadband or DSL and wide area network connections.
Older satellite Internet providers required people to have a telephone line to use
the Internet. Data downloads were sent through the satellite to a receiver dish,
However, requests for data such as web page, were transmitted over telephone
wires. Most providers now provide the ability to send and receive data using a
satellite Internet dish. Unlike a TV dish that only receives data, an Internet dish
contains a transmitter so it also can send data. A satellite Internet connection
requires a satellite receiver/transmitter dish, a satellite modem and coaxial cable
that connects the modem to the dish. Satellite Internet access speeds depend on
the service package purchased
ISDN Integrated Services Digital Network (ISDN) is a digital transmission technology that
carries both voice and data over digital phone lines or PSTN wires. Connections
are made on demand by dialing another ISDN circuit's telephone number.
ISDN and DSL are very similar technologies because they both use existing
phone lines to transmit digital signals. However, ISDN technology predates DSL
and has largely been superseded by DSL for the home and small business
market. ISDN requires a specialized client adapter called a Terminal Adapter,
which DSL does not. ISDN is also slower than DSL, being limited to a data rate
of approximately 128 Kbps for basic rate ISDN, and thus barely qualifies as
high-speed. (Primary rate ISDN, which was commonly used for network
backbone communications before fiber optic cable, provides more bandwidth
and has higher speeds.)
Method Description
Cellular Cellular technology uses radio signals to transmit network data over the cellular
telephone system. Cellular-enabled computers have a cellular radio built in.
Coverage can be regional, national, or global, depending on the service chosen
and the capabilities of the cellular service provider. Signal fidelity will vary
depending on interference and the distance from a cell tower.
Some of the cellular transmission technologies and standards in use include
Code-Division Multiple Access (CDMA) and the Global System for Mobile
Communications (GSM). CDMA is a spread-spectrum implementation that uses
the full frequency spectrum for each channel rather than assigning specific
frequencies to particular users. It separates the calls using digital encoding. GSM
uses time-division multiplexing (TDM), which transmits multiple calls on the
same frequency by dividing each call into separate time slices.
Use a cellular Wireless WAN (WWAN) when you have users that have no other
way to connect to the Internet, your company's VPN, or both. Cellular WWANs
are typically more expensive than Ethernet WANs. You can also turn mobile
devices into cellular hotspots, or tether them to other devices, in order to
propagate network access.
LOS Line of sight is a wireless connection method in which endpoints can transmit
signals to one another as long as they are unobstructed by physical objects. A
wireless antenna at one endpoint is directly pointed at a wireless endpoint farther
away, without trees, buildings, or other tall structures interfering with the signal.
The antennas themselves are typically affixed to the top of tall buildings in order
to reduce this interference. A line of sight service can cover great distances that
typical wireless signals cannot, while at the same time saving the service provider
from having to install cabling infrastructure. Additionally, the connection in an
LOS service is often low latency.
A disadvantage of LOS is that the actual unobstructed sight line can be difficult
to maintain, especially if the area between the two endpoints is not owned by the
client or the provider. Likewise, LOS services are usually more expensive than
other methods.
ACTIVITY 13-3
Discussing Internet Connections
Scenario
Use these questions as You are moving to a new neighborhood which is closer to your new job. You need to be able to
a basis for guiding the connect to the Internet from your new home. The real estate agent who is helping you locate your
discussion. Encourage new home has provided you with information on the available providers and the types of Internet
participants to share connections they offer. You want to make sure to select one within your budget that is fast enough
their experiences with to watch streaming movies and manage your email, among other online activities.
various connectivity
methods.
1. Which communication method uses existing telephone lines to transmit digital signals?
○ Cable modem
If time permits, have
students compare ISPs
◉ DSL
in your area, including ○ ISDN
their speed, cost,
connection type, and
○ Fiber
any other details you ○ Satellite
feel are important.
2. Which communication method uses the same physical media to provide high-speed transmission of
data and television signals?
◉ Cable modem
○ DSL
○ ISDN
○ Fiber
○ Satellite
4. If you have remote employees that need to connect to the corporate network but they are located in a
remote area with no access to high-speed Internet service, what do you think is the best Internet
connection method to use in this situation?
A: Answers will vary, but will most likely include using either dial-up or satellite. However, because
these employees need to access the corporate network through a VPN connection, satellite will
probably provide the faster connection. In some cases, tethering to a cell phone or connecting to a
wireless network device is an option, but this will all depend on how remote the employees'
location is and whether they can get a strong cellular signal.
TOPIC D
Ports and Protocols
In the previous topics, you explored different network connections, including high-speed Internet
connections. Now you are ready to examine the various ports and protocols that are used to ensure
data transmission is successful and secure. In this topic, you will examine common TCP and UDP
ports and protocols.
Properly configuring the ports of a network device and selecting the right protocol will ensure that
data gets transmitted over the network. As an A+ technician, you must understand how ports and
protocols are implemented within a network and how they function to provide the right level of
data transmission while keeping data secure.
Network Ports
In TCP/IP networks, a port is the endpoint of a logical connection. Client computers connect to
specific server programs through a designated port. All ports are assigned a number in a range from
0 to 65,535. An international agency, the Internet Assigned Numbers Authority (IANA), separates port Network Ports
numbers into three blocks:
• Well-known ports, which are preassigned to system processes by the IANA.
• Registered ports, which are available to user processes and are listed as a convenience by the
IANA.
• Dynamic ports, which are assigned by a client operating system as needed when there is a request
for service.
Port Ranges
There are three recognized blocks of port numbers.
Common Ports
This table lists some of the most common well-known TCP and UDP port numbers. Additional
well-known ports and other port number assignments are available online at www.iana.org/
Common Ports
assignments/port-numbers.
LDAP
Lightweight Directory Access Protocol (LDAP) is a directory service protocol that defines how a client can
access information, perform operations, and share directory data on a directory server. It was
designed for use specifically over TCP/IP networks and on the Internet in particular. In most LDAP
implementations, LDAP relies on the DNS service. First, DNS enables clients to find the servers
that host the LDAP directory, and then the LDAP servers enable clients to find directory objects.
Most common network directories are LDAP-compliant.
Note: LDAP uses port 389.
c.
, In
ns
tio
ra
pe
lO
ca
gi
Lo
SNMP
Simple Network Management Protocol (SNMP) is a protocol used to collect information from network
devices for diagnostic and maintenance purposes. SNMP includes two components, management
systems and agent software, which are installed on network devices such as servers, routers, and SNMP
printers. The agents send information to an SNMP manager. The SNMP manager can then notify
an administrator of problems, run a corrective program or script, store the information for later
review, or query the agent about a specific network device.
Port 161 is the main
Note: SNMP uses ports 161 and 162. SNMP port and port 162
is used for traps.
Figure 13-20: SNMP collects information from network devices for diagnostic purposes.
SMB
The Server Message Block (SMB) is a protocol that helps share resources such as files, printers, and
serial ports among computers. In a TCP/IP network, NetBIOS clients, such as Windows systems,
SMB
use NetBIOS over TCP/IP to connect to servers, and then issue SMB commands to complete tasks
such as accessing shared files and printers.
Note: SMB uses port 445.
CIFS
The Common Internet File System (CIFS) protocol enables users on various computing platforms to
share files without the need to install additional software to do so. CIFS replaces the SMB protocol
to provide Windows users with file and printer access. Using CIFS enables users to open and share CIFS
files over the Internet in native applications rather than just in web browsers. If a user changes a file
opened through CIFS, the changes are saved to both the server and client side simultaneously.
Note: CIFS uses port 445 or 3020. Compare SMB and
CIFS.
Microsoft revised CIFS and named the revision SMB 2.0 or SMB2. SMB2 was introduced with
Windows Vista and has been further revised and enhanced since then.
SSH
Secure Shell (SSH) is a UNIX/Linux-based protocol that enables a user or application to log on to
another computer over a network, execute commands, and manage files. It provides strong
authentication methods and secure communications over insecure channels. It is a more secure SSH
version of remote connection programs that transmit passwords unencrypted, such as Telnet. With
the SSH slogin command, the entire login session, including the password, is encrypted and
protected against attack.
Note: SSH uses port 22.
AFP
The Apple File Protocol (AFP) has been around since the 1980s when it was introduced as part of
the original AppleTalk network system. For Macs communicating with other Macs, this is still often
AFP
used.
Starting with OS X Mavericks, Apple began the migration from AFP to SMB2 to make cross-
platform file sharing easier, faster, and more secure. Macs running OS X 10.9 Mavericks
automatically default to SMB2 when talking to each other. (AFP is used as a fallback when sharing
files with older Macs.)
When communicating with other systems such as Windows systems, Mac users will use SMB2.
Note: AFP uses port 548.
ACTIVITY 13-4
Identifying Network Ports and Protocols
Scenario
You want to learn more about the ports and protocols you recently learned about. You also want to
see which ports and protocols are in use on your computer when you perform different tasks.
2. Select one of the ports from this topic, and using your preferred search site, find out more information
about where, when, and why the protocol is used.
Share your results with the class.
a) Using the google.com search page you opened in the browser, locate and briefly review the RFC for
the port.
b) Determine which apps use the port.
c) Review any security concerns regarding the port.
TOPIC E
Networking Tools
Now that you have covered network connection methods, ports, and protocols, you are ready to
take a closer look at tools used to properly install, configure, and maintain all parts of a network.
Working with networks can be challenging depending on the size, location, and environment. In
order to properly and safely work with networking components, you must understand how
networking tools are used and how they can be used to fix common issues found in networks.
Cable Testers
A cable tester, also called a media tester, is an electrical instrument that verifies if a signal is present on a
network cable. A simple cable tester will determine whether a cable has an end-to-end connection
Cable Tester
and can detect shorts or opens, but it cannot certify the cable for transmission quality.
Consider demonstrating
the use of a cable tester.
Cable Strippers
A cable stripper, also called a wire stripper, is often part of a wire crimper, allowing the user to strip
wires of their protective coating, and then use the crimping tool to attach a media connector.
Cable Strippers
Crimpers
A wire crimper is a tool that attaches media connectors to the ends of cables. You can use it if you
need to make your own network cables or trim the end of a cable. There are different crimpers for
different types of connectors, so select the one that is appropriate for the type of network media you Crimpers
are working with. A wire stripper is often part of a wire crimper, allowing the user to strip wires of
their protective coating, and then use the crimping tool to attach a media connector.
If you have cable
connectors and
crimpers, consider
having students use
them to create cables
they can use. If you
follow this suggestion,
be sure to test the
cables that you make.
Multimeters
A multimeter is an electronic instrument used to measure voltage, current, and resistance. It usually
has two probes with leads, one red and one black, that are plugged into two sockets on the meter.
To switch between measuring volts, ohms, and amps, the leads can be moved to different sockets, Multimeter
or there may be a selector switch. Digital meters have a screen that displays the numeric value of
what you are measuring. Analog meters have a thin needle that swings in an arc and indicates the
value of what you are measuring. Many meters also have specific settings for testing circuit
continuity, diodes, or battery charges. Multimeters are sometimes called volt-ohm meters. Demonstrate the use of
the multimeter.
Note: Use a digital multimeter whenever possible. It is much more difficult to read and interpret
an analog multimeter accurately.
Note: The combination of a tone generator and tone locator is frequently referred to as “fox
and hound.”
Do not confuse tone generators and tone locators with cable testers. Tone generators and tone
locators can only help you differentiate between different UTP cables.
To locate a cable in a group of cables, connect the tone generator to the copper ends of the wires;
then move the tone locator over the group of cables. A soft beeping tone indicates that you are
close to the correct wire set; when the beeping is loudest, you have found the cable.
Caution: Do not connect a tone generator to a cable that is connected to a NIC. The signal sent
by the tone generator can destroy network equipment.
Loopback Plugs
A loopback plug is any tool that causes the device to transmit a signal back to itself. It is typically used
for diagnosing transmission problems that redirect electrical signals back to the transmitting system.
Loopback Plugs
It typically plugs into a port and crosses over the transmit line to the receive line. Many times
technicians will construct their own device based on their specific needs, but it can be used to test
Ethernet network interface cards (NICs).
Wi-Fi Analyzer
Figure 13-29: A punch down tool.
Networking Utilities
Microsoft includes a variety of tools in its Windows operating systems that you can use to
troubleshoot TCP/IP.
Networking Utilities
Tool Use To
ipconfig Verify the configuration of TCP/IP and to release or renew DHCP IP address
leases. (Other operating systems use different commands instead of
ipconfig. For example, Linux uses ifconfig.)
ping Test TCP/IP communications. With the -t switch, you can ping the indicated
host until the request gets interrupted; with the -l [number] switch, you can
send a ping of a specified buffer size.
tracert Determine and test all points along the route the computer uses to send a
packet to a destination. If tracert is unsuccessful, you can use the results
generated to determine at what point communications are failing. (Linux uses
traceroute.)
nslookup Verify that the computer can connect to a DNS server and successfully find
an IP address for a given computer name.
netstat Show the status of each active network connection; netstat will display
statistics for both TCP and UDP, including protocol, local address, foreign
address, and the TCP connection state. Because UDP is connectionless, no
connection information will be shown for UDP packets.
net Manage Microsoft network resources from a command line. With the use
option, you can connect or disconnect the computer from a shared resource.
You can also retrieve information about current network connections. To see
all of the available commands in this suite, type net /? at a command line.
Device connection Depending on whether you are using a wired or wireless network connection,
status the connection status might be called something like Local Area Connection or
Wireless Network Connection. Verify that the device is connected to the network
and able to send and receive data.
Network Walk you through the resolutions to various common network problems.
troubleshooters There are several network-related troubleshooters in the Help and Support
Center that can help.
ipconfig Options
Time permitting, have The ipconfig command provides several options that are helpful for network maintenance and
students display the man troubleshooting.
page for ifconfig on their
Linux virtual machine Command Enables You To
and compare the
functionality with ipconfig ipconfig /all View the computer's host name, DNS domain name, and for each
options shown here. network interface, the physical (MAC) address, the IPv4 and IPv6
addresses, subnet mask and link-local address, default gateway, and DNS
server(s). In addition, you can use this display to determine whether the
computer was configured through DHCP or APIPA. If the computer
obtained its addressing through DHCP, you will also see information
about the DHCP lease and the IP address of the DHCP server.
ipconfig /release Release the IP addressing information assigned to the computer by the
DHCP server or APIPA.
ACTIVITY 13-5
Identifying Networking Tools
Scenario
You recently learned about some of the more powerful and popular networking tools you will
encounter as a PC technician. You decide to try them out to see how they work.
Briefly explain the 1. You need to determine if a cable is carrying a signal. Which networking tools might help you?
various types of
information displayed by
☐ Crimpers
the ipconfig /all ☑ Cable testers
command. If you have
remote participants,
☑ Multimeters
point out where their ☐ Punch down tool
information might differ
from the information 2. You need to connect cable wires to a patch panel. Which networking tool might help you?
shown on the computers
in the physical
○ Crimpers
classroom. ○ Loopback plug
◉ Punch down tool
○ Toner probe
Provide the IP address
or DNS name for the 3. Open a command prompt.
domain controller in step
5a. a) Press Windows Key+R to open the Run dialog box.
b) In the Open text box, enter cmd
4. Display and examine the TCP/IP configuration information for your computer.
Discuss why or why not
participants would a) Enter ipconfig /all
receive a response from b) Scroll through the results of the command as your instructor describes the information that is
the target computer in displayed.
step 5b.
5. Verify network connectivity with the APLUS-DC server.
a) Ping the classroom server by IP address or name.
Briefly describe the
b) Examine the results. Were you able to reach the target computer?
output of the netstat
command.
6. Examine the status of network connections on your computer.
a) Enter netstat
b) Examine the results as your instructor describes them.
Briefly describe the
output of the net /?
and net 7. View help for the net command.
helpcommands. a) Enter net /?
b) Enter net help
c) Examine the results as your instructor describes them.
Encourage participants d) Select at least one of the net help commands (such as net help view) and display detailed
to select different net help information. Share your findings with the rest of the class.
help commands in step
7d so that they can 8. Close the command prompt.
share the information
they discover with the
rest of the class.
Summary
In this lesson, you identified many different network technologies. Networking is at the heart of any
type of business. Without it, a business simply cannot function in today's world. It is your job to
ensure that the networks behind the business are running properly and managed correctly.
What do you think are the most important network concepts covered in this lesson?
A: Answers will vary, depending on the setup of the work or home computing environments the students
Encourage students to
use. For example, if an individual is a gamer, he or she might be drawn more toward issues of LANs use the social
and bandwidth. If a person has interest in one day being a system administrator, he or she might be networking tools
drawn to technologies such as wireless connectivity. provided on the CHOICE
Course screen to follow
What experience do you have with any of the technologies discussed in this lesson? up with their peers after
A: Answers will vary according to the backgrounds of different individuals. Possible experiences include: the course is completed
troubleshooting your own Internet connectivity problems, or setting up a home network for a friend or for further discussion
and resources to support
family member by using a router or switch.
continued learning.
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will install and configure networking capabilities. You will:
• Configure basic Windows networking.
• Configure Windows proxy and firewall settings.
• Use selected Windows networking features.
• Install and configure SOHO networks.
Lesson Introduction
In the last lesson, you identified networking technologies. With that knowledge, you are
now prepared to implement those technologies. In this lesson, you will install and configure
networking capabilities.
As an A+ technician, your duties might include setting up and configuring PCs so that they
can connect to a network. By installing and configuring networking capabilities, you will be
able to provide users with the connectivity they need to be able to perform their job duties.
466 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Configure Basic Windows Networking
In the previous lesson, you focused on the network infrastructure and how it all works together.
Now you can take a look at how the operating system is configured to run on the hardware. In this
topic, you will configure Windows networking.
Once all the hardware and connections are made in a networking environment, you will need to
make sure that the operating system is configured to use the hardware successfully. It is important to
fully understand not only the hardware and the connections within a network, but also how
Windows will need to be setup and configured to accomplish connectivity with the resources of a
network.
Location Description
Home The Home network setting is used for small home networks where devices are Make sure students
trusted. All devices connected in a home network must be part of a workgroup or have a good
part of a homegroup. This allows all devices to recognize and see one another understanding of the
different location settings
within the network using the network discovery function.
before moving on.
Work The Work network setting is used for small private business networks. In this
configuration all devices are part of a workgroup and can see one another as
peers, but cannot join as a homegroup.
Public The Public setting is used when devices connect to a network in a public space.
This setting automatically applies security settings for that location and protects
your device from unauthorized access via the public network.
Property Description
Speed and duplex The speed and duplex of the NIC can determine how efficiently data
settings transmissions are sent. The speed can range from 10 MB/s to 1,000 MB/s
and can run in three different modes:
• Half duplex permits two-way communication, but only in one direction at a
time.
• Full duplex permits simultaneous two-way communication.
• Auto negotiation is used to negotiate a speed and duplex method that is
compatible with the network router or switch. In this process the NIC can
respond quickly with a speed that meets the requirements of the network
device.
Note: In most cases, this will be set to Auto negotiation and this is the
value you will want.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Configure Network Card Properties.
ACTIVITY 14-1
Configuring Network Card Properties
Scenario
In your test lab, you want to see at what speed your VMs are connecting to the network. You also
want to verify that the VMs are configured to use full duplex communication.
Static IP address
Subnet mask
Default gateway
DNS server address
It's a good practice to record these values in case you have issues with connectivity in the future.
d) Select OK.
e) Close the network card properties dialog box.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Configure Alternate IP Addresses.
ACTIVITY 14-2
Configuring Alternate IP Addresses
Scenario
A technician recently configured some network cards to use static IP addresses for several users.
These users also need to be able to communicate with the Linux users whose computers are on
another network, without additional configuration on their parts.
Homegroups, workgroups, and domains are different organizational and security models for
Windows networking.
• Homegroups provide easy file and printer sharing, but are available only for Windows 7, 8, and
8.1 computers.
• Workgroups are unstructured collections of individual named computers and are usually
deployed in homes and small offices.
• Domains require a specially configured Windows Server computer called a domain controller and
are most often used in corporate environments with centralized administration.
• The computer and its users are subject to centralized domain security, configuration, and policy
settings.
• Certain domain accounts automatically become members of local groups on the computer.
Directory Services
A network directory, or directory service, is a centralized database that includes objects such as servers,
clients, computers, user names, and passwords. The directory is stored on one or more servers and
Directory Services
is available throughout the enterprise. The directory provides centralized administration and
centralized authentication.
Note: There are many directory services available from different network vendors. Some
c.
directory services include Microsoft's Active Directory Domain Services, Open LDAP, and
, In
Novell's eDirectory, although eDirectory is now less common.
ns
tio
ra
pe
lO
ica
og
6L
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Join a Computer to a Domain.
ACTIVITY 14-3
Joining a Computer to a Domain
Scenario
In this activity, you will examine the current networking configuration for your computer and for
the VM you created. Then, you will join your computer to the APLUS-CLASS domain, and re-
examine the networking configuration settings to see how they changed.
TOPIC B
Configure Network Perimeters
Through the use of features such as proxy servers and firewalls, you can help prevent unauthorized
access to systems. In this topic, you will examine and configure settings for using proxy servers and
Windows Firewall.
Proxy Settings
In computer networking, a proxy is a system that acts as an intermediary for requests for resources.
Client proxy software can be installed on any client machine to add an additional level of security
Proxy Settings between the client machine and the proxy server. Data requests sent from the client get routed from
the client side proxy through a back channel directly to the proxy server. The key part of this
relationship is the additional metadata attached to the request by the client proxy that aids with
identification once it hits the proxy server. So in essence the client proxy and the server proxy work
together to provide quick identification and access to resources.
When configuring a client computer, use the following settings:
• Set the proxy server settings to the correct IP address.
• Exceptions can be set to include ranges (for example, you can bypass a proxy server if you access
anything in the 192.168.x.y scope).
• Proxy settings can be set so that all HTTP or FTP connections use a proxy server, but no other
connections.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Configure Proxy Settings.
ACTIVITY 14-4
Configuring Proxy Settings
Scenario
You don't currently have a proxy server on the network, but there are plans to put one in place
soon. You want to make sure you know how to configure Internet Explorer to take advantage of
the proxy server once it is up and running.
DMZs
A demilitarized zone (DMZ) is a small section of a private network that is located between two
firewalls and made available for public access. A DMZ enables external clients to access data on
DMZs
private systems, such as web servers, without compromising the security of the internal network as a
whole. The external firewall enables public clients to access the service whereas the internal firewall
prevents them from connecting to protected internal hosts.
In small offices, DMZs are commonly used to protect any client-facing web servers. This security
method prevents any hackers from seeing the private internal IP scheme.
NAT Implementations
In order to keep internal addresses private, Network Address Translation (NAT) is used to conceal
internal private IP addresses from external networks. A router is configured with a single public IP
NAT Implementations
address on its external interface and a private address on its internal interface. A NAT service
running on the router or on another system translates between the two addressing schemes. Packets
sent to the Internet from internal hosts all appear as if they came from a single IP address, thus
preventing external hosts from identifying and connecting directly to internal systems.
Note: A vast internal network can be configured with a single public address, which makes NAT
both secure and cost-efficient.
DNAT
In static NAT, each internal address is mapped to a single specific public address. In dynamic NAT
(DNAT), there is not a one-to-one ratio of internal to external addresses; any number of internal
addresses can share a pool of external addresses. DNAT
6
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Configure Windows Firewall Settings.
ACTIVITY 14-5
Configuring Windows Firewall Settings
Scenario
Some users have been having problems getting to online sites and intranet sites. You want to make
sure that the Windows Firewall settings are not causing the issue. Also, you recently attended a
security seminar where you learned about using Windows Firewall to prevent users from accessing
systems that are not up-to-date.
2. Examine the firewall settings options for Private and Public networks.
a) In the left pane, select Turn Windows Firewall on or Off.
All of the settings should be enabled.
b) Select the Back button next to the address bar.
TOPIC C
Using Windows Networking Features
So far, you have configured Windows networking, including configuring IP addresses, proxy
settings, and firewall settings. Now it's time to test the configuration. In this topic, you will use some
of the most popular features offered on Windows networks.
As an A+ technician, your duties might include supporting users with some basic networking tasks,
as well as helping troubleshoot their PCs' configurations. By configuring and using common
Windows features such as network shares and Remote Desktop, you'll be well-equipped to support
the users in your organization.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Create a Network Share.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Map a Network Share.
ACTIVITY 14-6
Creating a Network Share
Scenario
You have a group of users that need to share some files in a folder on the department server. Before
you set it up for the users, you want to try out network shares on a test folder to make sure you
know how it works.
1. Navigate to the C: drive and create a folder named Share# with the # being your student number. How share permissions
are exposed to the user
2. Share the Share# folder with Everyone, and grant Read/Write share permissions. varies depending on the
a) Select the folder, display its pop-up menu, and select Share with. specific Windows
b) Select Specific people to open the File Sharing wizard. operating system and
c) On the Choose people to share with page, select the down arrow next to the text box and select how it is configured. This
Find people. In the Select Users or Groups dialog box, type everyone. Select Check Names and activity uses the
then select OK. simplified Read and
Read/Write share
d) In the list, select Everyone, and then select the down arrow under Permission Level. Select Read/
permissions. Depending
Write.
on your students, you
e) Select Share. may want to consider
f) In the User Account Control dialog box, in the user name text box, type APLUS-CLASS/ opening the shared
Administrator##. folder's properties and
g) In the Password text box, type !Pass1234 and select Yes. discussing the
h) Select Done. underlying advanced
share permissions: Full
Control, Change, and
Read.
Remote Desktop
Remote Desktop is used to operate a Windows computer from a remote location as if you were in
front of it. Depending on the permissions you define, you will have full access to all resources,
including printers, storage devices, and the network to which the machine is attached. You are even Remote Desktop
capable of accessing multiple machines at once or hopping to multiple machines in a chain, by
running Remote Desktop on each machine on the daisy chain. In other words, Computer01 has a
Remote Desktop connection to Computer02, and Computer02 has a Remote Desktop connection
to Computer03. Computer01 has access to Computer03 through the open window that displays
Computer02's desktop.
The biggest limitation of Remote Desktop on Windows is that only one person can be logged in to
the machine at once, so once you log in using Remote Desktop, the monitor at the local computer
will go to the login screen. If a local user logs in, the remote user will be disconnected. Remote
Desktop is not really a remote diagnostic and troubleshooting tool as much as a management tool.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Configure Remote Desktop.
ACTIVITY 14-7
Configuring and Using Remote Desktop
Scenario
Members of the PC Technician team take turns being on call after hours and weekends. One of the
ways to be efficient at doing this support is to have access to your work computer from home so
that you have access to the information and tools on your work computer. You decide to try using
Remote Desktop Connection to do this.
Note: If the Remote Desktop Connection window is not full screen, the
commands are not visible. Right-click the top of the Remote Desktop
Connection window to display a pop-up menu, then select Remote
Commands to see the options including Charms.
b) Select Settings→PC Info and verify that it is showing information about the remote computer.
c) Open a command prompt window on the remote PC and enter ipconfig to verify that you are viewing
the IP settings for your remote PC.
d) Close the command prompt window.
e) From the Remote Commands menu, select Start to switch between the Start screen and the
Desktop.
f) With the Start screen displayed, from the Remote Commands menu, select App Commands to
display the customization options.
g) Select App Commands again. Notice that a box appears around the first tile on the Start screen.
You can now use the arrow keys to move between tiles on the Start screen.
TOPIC D
Install and Configure SOHO Networks
Previously in this course, you covered basic networking concepts, the Transmission Control
Protocol/Internet Protocol (TCP/IP) addressing scheme, and how networks are connected. In this
topic, you will use that knowledge to install and configure a SOHO network.
SOHO networks are much like the larger corporate networks, just on a much smaller scale. No
matter what the size or location of the network, you are still responsible for understanding how it is
structured and configured. A+ technicians must understand the needs and complexities of SOHO
wired and wireless networks.
SOHO Networks
A SOHO network is a network that provides connectivity and resource sharing for a small office or
home office. Generally limited to fewer than 20 computers or nodes, a SOHO network often
SOHO Networks
facilitates sharing of files and printers, as well as services such as email, faxing, and so forth. A
SOHO network can contain a combination of wired and wireless computer connections, and all of
the computing devices in a SOHO network usually share the same physical location.
Ask students if they
have set up or used a
SOHO network. This will
help you gauge how in-
depth you will need to go
with some of the
concepts in this topic.
Basic QoS
The amount of data being transmitted over networks is rising every day. Also, the type of data being
transferred is changing. Traditional applications such as File Transfer Protocol (FTP) and Telnet are
Basic QoS
now outnumbered by real-time multimedia applications such as IP telephony, multimedia
applications, and videoconferencing. FTP and Telnet are very sensitive to packet loss but are
tolerant to delays in data delivery. The reverse is applicable to multimedia applications; they can
compensate for some amount of packet loss, but are very sensitive toward delays in data delivery.
Therefore, an optimum usage of bandwidth becomes very critical while dealing with multimedia
applications. Low bandwidth may result in a bad quality transmission of real-time applications,
leading to dropouts or hangs. In small offices, this issue can be a major problem due to the small
network and need to access the Internet. To avoid this, certain parameters were developed to
prioritize bandwidth allocation for real-time applications on networks such as the Internet and
guarantee a specific quality of service (QoS).
QoS parameters include the maximum amount of delay, signal loss, and noise that can be
accommodated for a particular type of network traffic; bandwidth priority; and CPU usage for a
specific stream of data. These parameters are agreed upon by the transmitter and the receiver, the
transmitter being the ISP and the receiver being the subscriber. Both the transmitter and receiver
enter into an agreement known as the Service Level Agreement (SLA). In addition to defining QoS
parameters, the SLA describes remedial measures or penalties to be incurred by an ISP in the event
that the ISP fails to provide the QoS promised in the SLA.
Note: Home-based Wi-Fi networks are often susceptible to interference from microwave ovens,
which also operate in the 2.4 GHz frequency range.
Channels
The 802.11b, g, and n specifications define 14 channels within the Industrial, Scientific, and Medical
(ISM) 2.4 GHz band. Each channel is composed of a range of frequencies transmitting at low
Channels
power, rather than a single frequency transmitting at high power. The data from a single transmitting
node is spread across all frequencies in the channel. Because the overall frequency range of the ISM
band is limited, the channels have been implemented with substantial overlap. Special codes
embedded in the signal give each transmitting node a distinguishing pattern, so that several nodes
Consider installing Wi-Fi can share the same channel at once. At some point, however, the channel becomes saturated with
Analyzer on an Android too many nodes sharing not only the frequencies from their own channel, but also portions of
device or using another
adjacent channels.
Wi-Fi analyzer to show
the channels available
around you.
The only three channels that have no overlap with each other are 1, 6, and 11. Nonetheless, they still
have overlap with the other channels. In addition, most wireless access points come configured out
of the box with one of these channels. Because of their popularity, these channels may in practice be
busier than some of the others. You should use a wireless spectrum analyzer such as InSSIDer to
find which channels in your area are actually the least busy. Newer access points will auto-negotiate
their channel.
You can use a Wi-Fi analyzer to see the available channels. Depending on the app you use, you
might see which channels are in use near you, the signal quality of the channel, or other information.
One example for Android devices is the Wi-Fi Analyzer app. On a Linux system, you can use the
command sudo iwlist wlan0 scan | grep \(Channel to identify channels that are
experiencing congestion. On Mac systems, hold Option while selecting the Wi-Fi icon on the menu
bar and selecting Open Wireless Diagnostics then Utilities to see the best 2.4 and 5 GHz
channels that are available. Then, configure your wireless router to use a different channel to
optimize the wireless signal.
Wireless Encryption
Encryption is the process of converting data into a form that is not easily recognized or understood
by anyone who is not authorized to access the data. Only authorized parties with the necessary
decryption information can decode and read the data. Encryption can be one-way, which means the Wireless Encryption
encryption is designed to hide only the cleartext and is never decrypted, or it can be two-way, in
which the encryption can be decrypted back to cleartext and read.
The use of wireless computing devices is rapidly increasing every day. This also increases the risk of
wireless security attacks on devices to gain access to secure data and resources. Wireless encryption
conceals and protects data during transmission so that if the data were accessed during transmission
it cannot be read. There are a number of encryption types available to provide encryption over
wireless data transmissions.
Wireless Description
Encryption Type
WEP Wired Equivalent Privacy (WEP) provides 64-bit, 128-bit, and 256-bit encryption
for wireless communication that uses the 802.11a and 802.11b protocols.
While WEP might sound like a good solution at first, it ironically is not as
secure as it should be. The problem stems from the way WEP produces the
keys that are used to encrypt data. Because of a flaw in the method, attackers
could easily generate their own keys by using a wireless network capture tool
to capture and analyze network data and crack WEP in a short period of time.
WPA Wi-Fi Protected Access (WPA) is a security protocol that was introduced to
address some of the shortcomings in the WEP protocol during the pending
development of the 802.11i IEEE standard. It uses strong authentication and
data encryption mechanisms.
WPA2 provides improved data encryption through the Temporal Key Integrity
Protocol (TKIP), which is a security protocol created by the IEEE 802.11i task
group to replace WEP. It is combined with the existing WEP encryption to
provide a 128-bit encryption key that fixes the key length issues of WEP.
WPA2 or 802.11i 802.11i is a complete wireless standard that adds strong encryption and
authentication security to 802.11 and relies on 802.1x as the authentication
mechanism. 802.11i is sometimes referred to as WPA2.
In addition to TKIP, WPA2 adds Advanced Encryption Standard (AES) cipher-
based Counter Mode with Cipher Block Chaining Message Authentication
Code Protocol (CCMP) encryption for even greater security and to replace
TKIP. It provides a 128-bit encryption key.
WAPs
A Wireless Access Point (WAP) is a device that provides connection between wireless devices and
enables wireless networks to connect to wired networks. A WAP is sometimes called just an AP or a
WAPs
WLAN-AP. WAPs have a network interface to connect to the wired network and a radio antenna or
infrared receiver to receive the wireless signals. Many include security features that enable you to
specify which wireless devices can make connections to the wired network.
Note: These are also referred to as an access point or wireless router.
SSIDs
The Service Set Identifier (SSID) is a 32-bit alphanumeric string that identifies a WAP and all devices
that connect to it. Since a wireless client device must provide the SSID in order to connect to the
SSIDs
WAP, the SSID functions as a sort of password for the wireless network. However, because the
WAP typically broadcasts the SSID in plain text, it does not provide any security. It is more realistic
to think of the SSID as a network name that is applied to the grouping of the WAP and the devices
currently connected to it. The administrator can accept a device's default SSID or specify an SSID
manually to more clearly identify the device.
Note: SSIDs are case-sensitive.
Router Settings
Most routers available today can be configured for wired and wireless networks. Depending on the
router installation, there are a number of settings that can be configured to ensure connectivity,
security, and access. Router Settings
Setting Description
Basics Basic settings apply to both wired and wireless routers and can include the ability
to:
• Secure your router or access point administration interface.
• Change default administrator passwords and user names used to access the
router administration page.
• Disable remote administration.
• Secure/disable the reset switch/function.
• Change the default SNMP parameter.
• Regularly upgrade the Wi-Fi router firmware to ensure you have the latest
security patches and critical fixes.
SSID When installing a wireless router, change the default Service Set Identifier (SSID)
and verify that you are not broadcasting out to the network.
MAC filtering Apply MAC address filtering to both wired and wireless routers. By configuring
a wireless access point (WAP) to filter MAC addresses, you can control which
wireless clients may join your network.
Channels Change the default channel on wireless routers. By changing the router channel,
you can optimize data transmission and reduce interference with other routers in
close proximity. If your router is dual channel, then you can easily change from
the default channel to the other channel available. To help determine what
channel is not being used, there are utilities available that can scan the local area
and display used channels. This can be very helpful in choosing a different less-
used channel for your router.
DHCP Depending on the needs of your network, turn on DHCP on both wired and
wireless routers to automatically connect and assign an IP address, or turn it off
and enter a static IP address.
Router Firmware
As with other devices, you might need to update the firmware in your wireless router or WAP. This
might be to take advantage of new features, fix security holes, or patch problems.
Router Firmware Another upgrade to the firmware that some people do is to upgrade to a firmware that is not
provided by the wireless router manufacturer. These are firmware modifications created by groups
that change the functionality of the wireless router. The OpenWrt open source firmware is
If you have a wireless
customizable, or you can download one of the firmware implementations that are already packaged
router that has DD-WRT and ready to install. One example of firmware based on OpenWrt that is ready to use is DD-WRT.
installed (or some other This works well with Linksys wireless routers.
firmware not from the
router manufacturer), Note: For more information about DD-WRT, visit https://www.dd-wrt.com/site.
consider showing
students. If time permits
and you have a
compatible router,
consider having students
UPnP
change the firmware to Universal Plug and Play (UPnP) is built into many wireless routers to enable computers, printers, and
another version. other Wi-Fi-enabled devices to be easily discoverable by the router. While this might make
connection easy for your users, it also makes it easy for hackers to discover and take advantage of
UPnP discoverability features as well. The hackers might disable devices or even take over your
UPnP
devices and network. You should strongly consider disabling UPnP on your routers or make it
available only inside your LAN and not outside of your network.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Install and Configure SOHO Networks.
ACTIVITY 14-8
Installing and Configuring a SOHO Network
Scenario
You will be helping to set up several SOHO networks for satellite locations. Before you go out into
the various locations, you want to practice configuring the wireless router. You found a simulator
online that uses the same model wireless router you will be installing in the satellite offices.
Note: Because you are using an emulator, you can use all lowercase letters in
the Network Name (SSID) text box.
d) Select Save Settings and, in the Message from webpage message box, select OK.
e) Select Save Settings again, and then select Continue.
f) In the Remote Management Access section, verify that Remote Management is disabled.
g) At the bottom of the web page, select Save Settings.
h) On the Your settings have been successfully saved page, select Continue.
i) Close Internet Explorer.
Summary
In this lesson, you identified many different network technologies. Networking is at the heart of any
type of business. Without it, a business simply cannot function in today's world. It is your job to
ensure that the networks behind the business are running properly and managed correctly.
What experiences do you have in working with any of the networking technologies discussed in this lesson?
A: Answers will vary according to the backgrounds of different individuals. Possible experiences include:
Encourage students to
use the social how do you access library card catalogs from the library, from home, or from the office? How do you
networking tools troubleshoot your own Internet connectivity problems? Have you ever set up a home network using a
provided on the CHOICE router or switch?
Course screen to follow
up with their peers after Do you have any experience working with SOHO networks? What do you expect to support in future job
the course is completed functions?
for further discussion A: Answers will vary, but will likely include connecting and setting up a small home wireless network.
and resources to support
Most technicians will be installing and supporting SOHO wireless networks within their job role.
continued learning.
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will support mobile digital devices. You will:
• Install and configure exterior laptop components.
• Install and configure interior laptop components.
• Explain characteristics of various types of other mobile devices.
• Compare and contrast accessories and ports of other mobile devices.
• Install and configure basic mobile device network connectivity and email.
• Identify methods and best practices for synchronizing mobile devices.
• Troubleshoot and repair common mobile device hardware issues.
Lesson Introduction
In the previous lessons, the focus has been on installing hardware components, operating
systems, and establishing network connectivity. As an A+ technician, you will also require a
robust knowledge of portable computing principles. In this lesson, the focus will be on
laptop, tablet, and smartphone devices and how they differ from desktop systems.
Mobile devices are everywhere today. Because of their portability and powerful computing
capabilities they are prominent in most workplaces. So, as a certified A+ technician, you will
be expected to configure, maintain, and troubleshoot mobile computing devices. With the
proper information and the right skills, you will be ready to support these devices as
efficiently as you support their desktop counterparts.
496 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Install and Configure Exterior Laptop
Components
In this lesson, you will support mobile digital devices. One of the most prevalent mobile devices in
today's workplaces has to be the laptop computer. As an A+ technician, you will be asked to
configure and maintain laptops for yourself and other users. In this topic, you will install and
configure exterior laptop components.
Laptops
A laptop is a complete computer system that is small, compact, lightweight, and portable. All laptops
have specialized hardware designed especially for use in a smaller portable system, use standard
Laptops
operating systems, can run on battery or AC power, and can connect to other devices. Laptops and
their components can vary by the following factors:
• Size of the device. Smaller models are referred to as notebooks or sub-notebooks and typically
have fewer features.
• Display size, quality, and technology.
• Keyboard size, number of keys, and additional options.
• Pointing device used.
• Power supply type.
• Battery type used.
• Length of battery support time.
• How long it takes to recharge the battery.
• Power cord connection and power source options.
• Docking solutions.
• Connections for external peripherals.
• The power button can be located inside or outside of the closed case. It is more often located
inside so that it is not accidentally turned on when it is in the user's briefcase or being
transported in some other bag.
• Bays or connections for additional drives such as optical drives.
Component Description
Touchpad A touchpad is a small, touch-sensitive pad where you run your finger across
the surface to send electronic signals to the computer to control the pointer
on the screen. Touchpads can have buttons like a mouse or trackball, or the
Some laptops might touchpad can be configured to detect finger taps on its surface and process
also include a trackpoint those signals like a mouse button.
or pointing stick located
in the center of the
keyboard that acts like
a small joystick-like
button.
Frames The plastics or aluminum frames are the hard surfaces that cover the internal
components of the laptop. They are typically secured together using small
screws or pressure tabs.
Speaker The speakers are located in a number of locations depending on the style and
manufacturer of the laptop. Newer model laptop speakers are just as powerful
as the desktop versions.
6
Component Description
Battery The battery designed for laptops is rechargeable and can easily be removed or
replaced. Most batteries will last between one and six hours per charge while
extended life batteries have a wide range of limitations based on the
manufacturer and what the user is doing with the laptop. Programs that Point out that the size
require more computing power and screen updates such as multimedia and shape of laptop
applications are likely to deplete the battery faster than working on simple batteries varies greatly
word processing documents. Some laptops offer extra battery packs that can even between laptop
be inserted in place of other removable devices, such as optical drives, models from the same
allowing users to easily reconfigure their laptops for various travel and manufacturer.
working situations. Rechargeable batteries are used in most portable
computing devices. They are usually packaged in a battery pack.
Before replacing a laptop battery you should verify what the system
requirements are. New batteries must be compatible with the system.
DC jack The direct current (DC) jack on a laptop provides power through the power
cord. Most laptop DC jacks are specific to the manufacturer and even the
laptop model, so make sure to check the documentation for power
requirements and compatible power cords.
Component Description
Screen The screen is the visual display of a laptop and is typically hinged at the
bottom and swings down to form the cover for the laptop. It latches to the
body of the computer to secure it for transport.
Some laptops have touch screens, allowing users to control onscreen objects
and use onscreen keyboards.
Many laptops no longer include an optical drive, so users will need to either connect through a
network to a shared optical drive, or use an external optical drive that connects to the USB port. In
addition to connecting USB devices, the USB port can be used with adapters to enable connection
to other features that aren't built into a particular laptop. Adapters include:
• USB to RJ-45 dongle
• USB to Wi-Fi dongle
• USB to Bluetooth
Express Cards
ExpressCards are mobile expansion cards designed by the PCMCIA to replace traditional PC Cards.
The ExpressCard slot on mobile devices provides PCI Express and USB connectivity. The two
form factors available for the ExpressCard are the ExpressCard/34 (34 mm wide) and Express Cards
ExpressCard/54 (54 mm wide).
ExpressCard slots are a bit smaller than the PC Card slots and are usually located on the side of the
laptop. ExpressCards can be used to provide many additional functions such as wireless network
access, USB ports, and others.
The ExpressCard technology has many advantages over the PC Card, including reduced voltage
usage, increased bandwidth, and a maximum throughput of 2.0 Gbps through PCI Express and 480
Mbps through USB. Some manufacturers are providing both PC Card slots along with ExpressCard
slots to comply with both standards.
Make sure to point out Docking station For laptops, a docking station is used when a laptop computer replaces a
the differences between desktop computer. This technology is rarely used today and is considered to
a docking station and a be legacy hardware. The laptop is connected to the docking station through
port replicator. Also, you a docking port located on the back or bottom of the laptop. Docking
might want to mention
stations typically extend the capabilities of the laptop by providing
that although port
replicator is no longer on
additional interfaces for the laptop. In addition, there are often slots for
the exam objectives, desktop PCI or ISA expansion cards, drive bays for additional mass storage
they are commonly devices, and possibly additional ports and connectors, such as extra USB or
implemented in many wireless connections.
business and home For other mobile devices such as tablets, docking stations are experiencing a
installations.
resurgence. These docking stations can include HD ports, Gigabit Ethernet
ports, USB 3.0 ports, audio out, and mini-display ports.
Port replicator A port replicator is a scaled-down version of a docking station that presents
the interfaces that the laptop already has. It contains connections for the
standard ports, such as power, keyboard, mouse, and display, but it
generally does not support additional expansion cards or drive bays,
although some port replicators will contain extra USB or wireless
connections.
Media/accessory bay Some portable computing devices offer media/accessory bays to allow a
user to expand the functionality of the device. Such bays often accept
optical drives, secondary hard drives, or secondary batteries. These bays are
typically proprietary and the accessories for the bays must be ordered
directly from the device manufacturer. Most laptops today will utilize
wireless peripherals and USB attached drives, so USB hubs and media bays
are not used as much anymore.
Laptop Locks
Because laptops are so portable, they are easily lost or stolen. Another feature of laptops is the
ability to attach a physical laptop lock or a cable lock. A physical cable lock attaches to the laptop
using one of the compatible slots. The cable is then secured around a permanent object. The lock is Laptop Locks
usually accessed using a combination or a key. Depending on the lock, it may attach to the VGA or
printer port. The locks come with special screws that secure the lock in place. The Kensington lock
is a cable lock that inserts into a specifically designed port on the laptop. After the Kensington cable
was released, laptop manufacturers named the special port the Kensington lock port. Ask students which
objects in the room
would make good
objects to secure a cable
lock to and which would
not.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Install and Configure External Laptop Components.
ACTIVITY 15-1
Working with Exterior Laptop Components
Scenario
In this activity, you will examine a laptop and identify its components.
For this activity, students 1. Examine a laptop and identify the external components such as the keyboard, display, track point, or
will identify the hardware touch pad.
components of a laptop.
If there are not enough 2. What special function keys does the laptop have?
laptops in class for each Try out the various special function keys. Some are used in combination with an Fn key.
student, then have them
form small groups 3. Connect the laptop to a suitable stationary object using a cable lock.
depending on the
number of laptops 4. What expansion options are available on the laptop?
available. Promote
If your instructor has expansion cards available, install one in the appropriate expansion slot.
discussion of the various
features and
components of laptops. 5. If the laptop has a media card reader slot, insert an appropriate media card and read data from or write
If time permits, you may data to the media card.
also have students
identify the ports 6. Connect external peripherals.
available on the laptop. a) Connect an external mouse and keyboard to the laptop.
Note: Users often use wireless mouse and keyboard with a receiver plugged
into USB ports on the laptop.
b) Connect an external display to the laptop.
Depending on the port available on the laptop and the connection options on the monitor, you might
need to use a cable with different connectors on each end, such as a DVI to HDMI or VGA to DVI
cable.
c) Verify that the peripherals work properly.
d) Press Windows+ P and try out the various Project options.
TOPIC B
Install and Configure Interior Laptop
Components
In the last topic, you installed and configured external laptop components. There will be situations
where dealing with external components won't completely address the issues or problems a user is
having with his or her laptop. In this topic, you will install and configure interior laptop
components.
Component Description
Storage drive Portable computer drives are specially designed to fit in portable computers.
Drives can be unique to a manufacturer and sometimes even to the computer
model. All laptop computers have an internal storage drive.
• Hard drives come in three main form factors: 1.8 inch, 2.5 inch, and 3.5 inch.
The 3.5 inch HDD tends to be too big for laptops, so in most laptops the
hard drives are 1.8 or 2.5 inches. The smaller size drives tend to run at slower
speeds than the 3.5 inch desktop HDDs.
• Newer laptops come with SSDs and hybrid drives, typically with the same
form factor as HDD but cooler, faster, and better able to handle rough
movement.
• Laptops may also include a combination of two or three of these different
drive types.
Some internal drives are difficult to remove and require dismantling of the
computer. Others have a slide lock to unlock them from the case, so that you can
slide the drive out. If it is too difficult to remove the internal drive from the
notebook you are working on, then you might consider using alternate storage
drive solutions such as USB or FireWire drives that can be connected externally.
Memory Portable devices use memory that was specifically designed for those devices.
Since it is not produced in as high quantities as desktop memory, it tends to be
more expensive. While some laptops use Small Outline Dual In-line Memory Modules
(SODIMMs), which are about half the size of standard desktop DIMMs, or
MicroDIMMs, many require non-standard proprietary memory that must be
ordered from the manufacturer. Other portable computing devices and some
notebooks use flash memory modules rather than regular RAM.
Be sure to check the documentation for your device so that you purchase the
correct type of memory. Before you replace the memory in a laptop, you must
verify that it is compatible with the system. Always check the manufacturer's
documentation or website to verify the form factor and types of compatible
memory.
Note: Several memory websites provide a small program you can install
that will tell you the type of memory running in a laptop. You also can find
the correct memory by providing information about the manufacturer and
model number at websites like www.crucial.com.
Optical drive Optical drives in laptops are similar in function to the full size desktop models
except that they are small and more compact. When replacing a drive, the first
thing to do is check with the manufacturer to verify that it can be replaced and
with what type of drive. You need to make sure that the drive you install in
compatible with the laptop.
Wireless card In some laptops, the wireless card and video card can be upgraded to improve
performance. However, replacement is dependent on whether the card is an
integrated component of the mobile system board. In this case, you cannot
upgrade or replace the card. If the card is independent of the system board, then
you should refer to the manufacturer's documentation to verify what components
can be replaced and upgraded. Some components may be covered under a
system's warranty, so refer to the manufacturer's policies to determine what can
be upgraded without breaking the warranty guidelines.
Component Description
Webcam Webcams can usually create still images as well as video. Some cameras have
1080p high definition resolution. External cameras are often connected via USB.
Whether they are internal or external, webcams include software that provides
options to manipulate the image/video stream.
Microphone Microphones enable you to participate in Internet-based conversations such as You may want to show
webinars and Skype. Some mics are part of a headset unit while others may be LearnTO Install RAM in
inserted in the audio output port (the microphone extends up from the port and a Laptop and LearnTO
can flex for best position). Also, some mics have a noise-cancelling feature. Replace a Laptop
Battery from the
CHOICE Course screen
Caution: Only open a laptop to access internal components if it is no longer under warranty or or have students
if you are an authorized technician for the laptop brand. navigate out to the
Course screen and
watch it themselves as a
Note: For additional information, check out the LearnTO Install RAM in a Laptop and
supplement to your
LearnTO Replace a Laptop Battery presentations in the LearnTOs for this course on your instruction. If not, please
CHOICE Course screen. remind students to visit
the LearnTOs for this
Laptop Memory Package Specifications course on their CHOICE
Course screen after
The following table lists some of the technical specifications for laptop memory packages. class for supplemental
information and
Memory Package Description additional resources.
Some laptops have removable screens or screens that can be rotated. This allows the laptop to also
function as a tablet. These screens typically are also touch screens so that when they are being used
as a tablet, because the keyboard and touch pad are not available, the user needs a method of Laptop Display
interacting with the displayed content. Components
Component Description
Inverter An inverter is used to convert DC power to AC power for the display. When
an inverter fails, depending on the laptop model, it may be appropriate to
simply replace the display rather than replace the inverter. Replacement of
the inverter requires an exact match, both electrically and mechanically
(connectors, size/shape, and mounting).
Backlight The liquid crystals in the display are unlit and require a light source to make
them visible. This can be edge lighting, but more likely, a backlight is used.
The backlight is typically provided by fluorescent or LED lighting. A backlight
In-depth coverage of is the typical form of illumination used in a full-sized LCD display. Backlights
LED and CCFL differ from frontlights because they illuminate the LCD from the side or
backlight can be found back, where frontlights are in front of the LCD. Frontlights are used in small
at pcmonitors.info/ displays such as on MP3 players to increase readability in low light
articles/the-evolution-of- conditions. Edge lighting is another common method of lighting the LCD
led-backlights/ display.
Wi-Fi antenna The Wi-Fi antenna is typically placed inside the display section of the laptop.
The cables are run along the sides of the display unit and connect to the
network card inside the main unit of the laptop. It sends and receives wireless
signals and transmissions to the WAP.
Webcam Most laptops have a built-in webcam, built into the plastics above the display.
Microphone Most laptops also have a built-in microphone. The location of the
microphone varies between laptops, but is usually located somewhere in the
plastics around the display, often next to the webcam.
Digitizer When a laptop, smartphone, or tablet has a touchscreen display, it uses a
digitizer. The digitizer is sandwiched between a layer of glass and the LCD
display. Analog signals are created when you tap or swipe the surface of the
display. The digitizer is connected to the laptop with a flexible digitizer cable.
A grid of sensors is activated when you tap or swipe the screen. The
information from the sensors is sent through the digitizer cable to a circuit
that converts the analog signal to a digital signal.
Note: On screen keyboards and any other touch action uses the
digitizer.
Mini-PCIe Cards
Mini-PCIe Cards
Laptop systems offer many different options to expand system functionality.
Some portable systems include a PCI Express Mini Card (Mini-PCIe) slot. A Mini-PCIe card is an
Point out the expansion extremely small expansion card, often just a few centimeters in length. Unlike PC Cards, Mini-PCIe
cards in use on any cards are internal and are installed by the computer manufacturer. Mini-PCIe cards are most often
laptops in the classroom. used to increase communication abilities by providing network adapters or modems and support
various connections and buses:
• USB.
Laptop Power Supplies • Diagnostic wiring that provides LED for wireless network connectivity.
and Batteries
• System management Bus (SmBus).
batteries. When the device is used as a desktop computer or peripheral, it can use either batteries or
AC power.
AC power connectors vary from device to device. It is important that a laptop not be used with a
power cord other than the one provided by the manufacturer. When the laptop is not being used as
a portable device, it is usually plugged in using the AC power cord that matches the computer. The
battery is also recharged through this connection.
ACTIVITY 15-2
Installing Interior Laptop Components
(Optional)
Scenario
You have a spare laptop in your work area that is the same model as the laptops you support for the
users in your organization. In order to make sure you know how to access internal laptop
components, you decide to locate, remove, and replace various internal components on the laptop.
For this activity, students 1. Remove and replace the memory module.
will open the case and a) Locate the memory module in the laptop.
identify the internal b) Remove the cover from over the memory.
components of a laptop. c) Remove the memory.
If there are not enough
d) Reinstall the memory.
laptops in class for each
student, then have them e) Replace the cover over the memory.
form small groups
depending on the 2. Remove and replace the hard drive.
number of laptops a) Locate the hard drive in the laptop.
available. Or you might b) Remove the cover from over the hard drive.
decide to perform this c) If necessary, release any locking clips and remove any screws.
activity as a
demonstration, Some laptops locate the hard disk inside a drive attachment bracket or cage.
particularly if the laptops d) Disconnect the cable from the hard drive.
you have available are e) Carefully remove the hard drive.
under a warranty f) Reinstall the hard drive.
situation where opening g) Replace the cover over the hard drive.
the case would violate
the warranty conditions.
3. Following the manufacturer's instructions or your instructor's guidance, remove the outer case from the
Consider having an
laptop.
already disassembled
laptop to show students
the components and 4. Remove and replace the fans.
how they fit together.
5. Disconnect and reconnect the keyboard connector.
TOPIC C
Other Mobile Devices
Up until this point in the course, your primary focus has been on the more traditional system
hardware components and laptop technologies. In this topic, you will dive into the mobile
computing realm and will take a closer look at the capabilities and technologies that they employ to
provide optimal performance.
Not only has mobile technology reached a new level of performance and portability, but also the use
of these devices is on the rise every day. As a certified A+ technician, you will be expected to
understand how these devices work and how they should be deployed within the workplace.
Tablets
Mobile devices that fall into the tablet PC category range from larger tablets that look like a
traditional laptop but have a touch screen to small notebook-sized mobile devices that operate
similarly to a smartphone, but are a bit larger and have more computing power. Operating systems Tablets
found on tablets include:
• iOS
• Android
• Windows 7
• Windows 8
• Windows 8.1
• Windows 8.1 RT
• Windows 10
• Blackberry OS
Repairs The hardware components of a laptop There are few field-serviceable parts in You can use Bootcamp
can be fixed and replaced when issues a tablet. What makes it difficult to on an iPad to run
Windows.
arise. This is still fairly common with repair a tablet is that the parts are
newer laptops as well. soldered and not socketed. When
something breaks, in most cases, the
entire tablet needs to be replaced.
Upgrades The hard drive and central processing Tablets are not typically upgradeable,
unit (CPU) can be upgraded, if needed, unless it is software-related. The storage
to meet OS requirements or to add components cannot be upgraded. What
more functionality to the laptop. makes it difficult to upgrade a tablet is
that the parts are soldered and not
socketed.
You may want to show Note: For additional information, check out the LearnTO Identify Laptops vs. Tablets
the LearnTO Identify presentation in the LearnTOs for this course on your CHOICE Course screen.
Laptops vs. Tablets
presentation from the
CHOICE Course screen
or have students Smartphones
navigate out to the
Course screen and
New smartphones are emerging almost every day. The market is expanding and demand for
watch it themselves as a powerful mobile devices has never been higher. While Android and iOS dominate the smartphone
supplement to your device marketplace, there are many other technologies and devices available. The most popular
instruction. If not, please devices used in the marketplace include:
remind students to visit • iPhones®.
the LearnTOs for this
course on their CHOICE • Android smartphones such as Samsung™ Galaxy S® 6 Edge, MOTOROLA® DROID Turbo,
Course screen after and HTC One™ M9.
class for supplemental • Windows smartphones.
information and
additional resources.
Smartphones
Wearable Devices
A variety of wearable devices have been created that work with smartphones or as standalone
devices. These take mobility one step further than smartphones and tablets by being hands-free
devices. Wearable Devices
Smart watches Smart watches look like large wrist watches. In addition to showing the time like
a traditional wrist watch, they sync with your smartphone or tablet to let you
know when you receive a phone call or text message, alert you with meeting
reminders, and have apps designed for the smart watch. The smart watch
connects to your mobile device using a Bluetooth connection, so must be within
range of the phone or tablet.
The screen is created from strengthened glass that enables it to stand up to dust
and physical contact of every day wear and use. The display might use OLED,
AMOLED, LCD, or black and white screens using E-Ink or E-Paper making
them more visible in bright sunlight. Typically, the smart watch uses a touch
screen, but will probably also have physical buttons.
Some smart watches include features such as:
• A remote shutter control for the camera on the phone or tablet.
• Apps to access the music stored on the smartphone, or enough internal
memory to store music without access to your smart phone.
• An alert when you are out of Bluetooth range with your smartphone or
tablet.
• Voice commands that enable you to search the Internet, perform hands-free
phone calls, create and send or receive text messages, and more.
• Fitness monitor capabilities.
Fitness monitors Fitness monitors are wearable devices that enable the user to track activity and
monitor health and fitness measurements. Fitness monitors might be worn on
the wrist or ankle, or be attached to the user's clothing.
Features of fitness monitors might include:
• Pedometer to count the steps taken during a specified period of time.
• Accelerometer to measure the intensity of the workout.
• A heart rate monitor.
• A blood pressure monitor.
• A calculation of the number of calories burned.
Glasses and Glasses that connect to smartphones or tablets via Bluetooth connections offer
headsets many of the same features as smart watches. Some of these also include the
ability to take and store still and video images within the glasses device.
Smartphone headsets enable a user to make and receive hands-free phone calls.
This is important when driving, as many states fine drivers for the dangerous
practice of using a cell phone while driving. These might connect to the
smartphone through the headphone jack, but more often they connect using
Bluetooth connectivity.
Phablets
A phablet is a cross between a smartphone and a tablet. It is usually simply a very large smartphone.
Phablets
e-Readers
An e-reader is essentially a tablet device, often with many of the same features as a tablet. The
touchscreens are sized to mimic the size of a standard paperback or hardcover book. The screen is
e-Readers
often optimized for reading in bright light. It has internal storage to store book content, and often
allows you to store other files and even games. It connects to networks using Wi-Fi so you can
download additional content. Like most tablets and smartphones, it uses a USB cable to charge the
device. The battery in the device is designed to allow the user to read for several hours before
Point out that e-reader needing to charge the device again.
functionality can be
added to computers, Many e-readers also include a web browser, games, and PDF reader. Some also include the ability to
laptops, tablets, and connect to the Internet over a cellular connection.
smartphones through Users can purchase content from retailers such as Amazon. Many libraries also have eBooks
apps such as Kindle,
Nook, or OverDrive.
available to lend to users.
Smart Cameras
A smart camera is any camera that includes Wi-Fi, NFC, and GPS capabilities. By having Wi-Fi built
into the camera, the user can easily share the photos with social media sites or upload photos to
Smart Cameras
another device such as a computer or smartphone. The GPS feature adds digital data to the image,
tagging the image with the coordinates of the location where the photo was taken.
Other features of smart cameras can include built-in processors to improve the image quality and
Ask students if they
select the appropriate camera settings automatically based on lighting and other factors in the scene.
have used a camera Images are typically saved to a memory card, but also might be saved to internal memory built into
with these features and the camera.
if so, how they used the
features. The GPS
feature can be handy in GPS
helping users down the
road when they have GPS (Global Positioning System) devices use multiple satellites to pinpoint the user's exact location.
forgotten where the Different GPS devices are designed for different functions. Some are designed for use in cars, and
picture was taken. include maps that only allow the user to see roads. Others are designed for hikers, runners, and even
dogs, who are often not on roads.
Smartphones include GPS functionality. This allows the user to use the phone as a navigation
GPS device. It also allows users to use apps on other devices to find a lost phone, or for law enforcement
to try to locate a missing person who is carrying a GPS equipped phone.
For car GPS units, the maps are typically stored in the GPS unit so that you don't need a cellular
Ask students if they connection to the device. Most GPS devices now include lifetime updates to the maps. Newer GPS
have done any units receive current information about road incidents such as construction or accidents so that
geocaching. Ask users might elect to choose another route to avoid the incident. Older GPS devices came with the
students if they have maps stored in the device. The maps could only be updated with corrections and new roads by
used a GPS that gave purchasing new maps.
them incorrect driving
directions. Note: When using a GPS to navigate while driving, make sure to also use common sense and
not just go where the GPS indicates. Some maps might be out-of-date or poorly created, and
send you into a body of water or over train tracks where there is no crossing.
ACTIVITY 15-3
Identifying Mobile Devices and Features
Scenario
The sales team is a very mobile population in your organization. You want to be prepared to assist If possible, provide
those users with the vast array of mobile devices they use. You want to examine how these devices students with an array of
work in order to identify what each device is capable of doing. the devices covered in
this topic, including
tablets, wearable
devices, e-Readers, and
1. Examine an iOS device, and examine an Android device.
GPS devices. If you
don't have a lot of
2. Compare the interfaces and settings, and share your findings with the rest of the class. devices, point out that
many of the features of
3. Examine a GPS device. This might be a portable device, one designed for a car, or a smartphone app. these mobile devices
can be found on most
4. Examine an e-Reader device. This might be a portable device or a smartphone app. smartphones.
5. Examine a tablet and identify the features of the tablet. The tablet might run the Windows, Android, or
iOS operating system. Because of the
differences in the
6. Examine a wearable device and identify the features and functions of the device. various mobile products
available, you might
need to guide
participants in finding the
settings that you want to
discuss.
TOPIC D
Mobile Device Accessories and Ports
Mobile devices gain much of their functionality by being able to connect to the user's regular
computer. By making the files available on the mobile device, they can continue working on the files
from a mobile device. Being able to connect the mobile device back to the computer might require
additional accessories. In this topic, you will examine the connection types and accessories used for
mobile devices.
Connection Types
Mobile devices have a variety of connection types. Some are physical ports and some are logical
ports. Some of the connection types you might encounter on mobile devices include:
Connection Types • NFC (near field communication).
• Proprietary, vendor-specific ports for power and communication between the mobile device and
other computers and mobile devices.
If possible, demonstrate • Micro USB or Mini USB ports.
different mobile • Lightning port on Apple products.
connection solutions. • Bluetooth connections.
• Infrared connections.
• Hotspot or tethering to enable devices to connect to the Internet through another cellphone's or
other mobile device's Internet connection.
Accessories
Mobile device accessories often take up a larger space in retail stores than the mobile devices
themselves. The following table includes some of the accessories users like to use with their mobile
Accessories
devices.
Accessory Description
Ask students if they Headsets Mobile device headsets can be simple earphones with a microphone boom, or
have used any of these they might be Bluetooth enabled devices that clip to one ear. The headset usually
accessories with mobile has a method of answering calls for mobile phones built into the headset.
devices.
Speakers Speakers for mobile devices might use a headphone jack built into the device, or
they might use Bluetooth connections.
Game pads Game pads that can connect wirelessly to the mobile device might be used to play
games or navigate through apps.
Docking Mobile devices need to have their batteries charged. Many users use a docking
stations station that also has speakers built into it and acts as a music player and an alarm
clock. Some docking stations also enable a mobile device to connect to a home
theater system, so music and movies stored on the mobile device can be displayed
on a large screen and heard through the home theater speakers. This device is
usually specific to the mobile device, such as an iPod dock.
Accessory Description
Extra battery Mobile devices often have battery life of several hours of use, but if you are
packs and traveling, you might end up using your mobile device more than you usually
chargers would. Having an extra battery pack that has been charged enables the user to
switch out the depleted battery pack with the fully charged battery pack. When
the user reaches a destination where the depleted battery pack can be recharged,
it can be plugged in to the charger and begin re-energizing.
Protective Many smartphone users like to personalize their phone by placing it in a
covers and protective cover. These might be simple plastic cases for looks only, or they
water proofing might be cases with extra thick padding. Some covers also provide water proof
protection for the device. Screen protectors applied directly to the surface of the
device help prevent scratches and might improve readability of the device in
bright sunlight.
Credit card For devices with the appropriate port, a credit card reader can be added to a
readers tablet or smartphone. This enables mobile vendors, such as those at festivals or
street vendors, to take credit card payments without having a network cable or
phone line connected to the credit card reader.
ACTIVITY 15-4
Comparing Mobile Device Accessories and Ports
Scenario
You have a variety of mobile device accessories and cables. You need to determine which
accessories and cables work with which of the mobile devices you have.
Provide students with a 1. Examine the ports available on the mobile devices you have.
variety of mobile device a) Compare the ports between the mobile devices.
accessories and cables b) Determine which ports are common between the devices and which appear to be proprietary to the
that will work with the device.
mobile devices they
have. Consider also 2. Examine the accessories available for mobile devices.
including some cables or
a) Determine which accessories will work with which of the mobile devices you have been given.
accessories that will not
work with the devices b) Determine if the accessories will work with multiple, different types of mobile devices, or if they work
they have. Consider only with one specific mobile device.
providing containers
labeled with the various
mobile devices and have
students place the
accessories and cables
in the appropriate
container after they
verify that the accessory
or cable works with the
device they have.
TOPIC E
Mobile Device Connectivity
You have worked with various mobile devices so far in this course. In this topic, you will examine
some of the features and methods those mobile devices use to connect to networks.
Radio Firmware
Radio firmware in a mobile device contains an operating system that is separate from the end-user
operating system (for example, Android or iOS). This other operating system controls all of the low-
level timing-dependent functions of the mobile device, including USB, network, and GPS. The radio Radio Firmware
firmware is also referred to as the baseband runtime operating system (baseband RTOS).
Bluetooth Connectivity
Consider demonstrating Bluetooth® is a wireless radio protocol that is used to communicate from one device to another in a
connecting devices over small area, usually less than 30 feet. Bluetooth is commonly used to enable communication between
Bluetooth connections.
small personal electronic devices, such as between a cellular phone and a wireless earpiece or
between an electronic organizer and a personal computer.
Bluetooth enables mobile devices to connect wirelessly to various devices such as headsets,
carputers, laptops, MP3 players, and gaming consoles. Newer computers come with a Bluetooth
radio built right into the system, while older computers require an adapter, such as a USB-enabled
Bluetooth adapter. Devices in discovery mode will transmit their Bluetooth-friendly name, which in
most cases is the manufacturer's name. Once the name has been transmitted, the device can be
paired with another device also transmitting a signal. Using Bluetooth technology, mobile devices
can establish a connection through a process called pairing. When two devices pair, they share a
secret key in order to establish a wireless connection.
Bluetooth uses the 2.4 GHz spectrum to communicate a 1 Mbps connection between two devices
for both a 232 Kbps voice channel and a 768 Kbps data channel (technically, Bluetooth detects
other devices in the 2.4 GHz spectrum and avoids the frequencies they use by "hopping" to an
available frequency).
Version History
The first Bluetooth specifications were released in 1999, and there have been several important
revisions since then.
• Bluetooth 2.0 is an improved version of Bluetooth, has a range up to 100 meters, offers faster Briefly discuss the
data transfer speeds (up to 3 Mbps), and also uses less power to extend battery life. Bluetooth 2.0 evolution of the
is backwards-compatible with earlier versions of Bluetooth, but the connection between devices Bluetooth specifications.
is governed by the slowest device; in other words, connecting a Bluetooth 1.2 device to a
Bluetooth 2.0 device means the data transfer is at the rate of Bluetooth 1.2.
• Bluetooth 3.0 launched in 2009. Bluetooth 3.0/3.1 provides transfer speeds up to 24 Mbit/s by
using 802.11 wireless protocols to carry the data while Bluetooth is used to establish the
connection.
• Bluetooth 4.0 was released in 2010. It provides lower power consumption, is more secure, and is
faster than prior versions.
• Bluetooth Low Energy (LE), also called Bluetooth Smart or Version 4.0+ is a low-power,
standardized application development architecture that provides tight security, native support on
every major OS, and connectivity to the cloud. It was built for the Internet of things.
Bluetooth Pairs
Most Bluetooth devices require you to establish a trusted relationship between two devices (referred
to as pairing). This trusted relationship is established through the use of an encrypted shared secret
or passkey. After the relationship is established, the pair of devices can encrypt the data
transmissions they exchange. However, most Bluetooth printers permit all devices to use their
services without requiring pairing.
Server Description
Email Server and
Information Configuration Settings
Protocol Your email server will be configured to support either POP3 or IMAP.
Post Office Protocol version 3 (POP3) is a protocol that enables an email client
application to retrieve email messages from a mailbox on a mail server. With
POP3, the email messages wait in the mailbox on the server until the client
retrieves them, either on a schedule or manually. Once the messages are
retrieved and downloaded to the client, they are generally deleted from the
server. The client then stores and works with the email messages locally.
Internet Mail Access Protocol version 4 (IMAP4) is a protocol that enables a client to
retrieve messages from a mail server. With IMAP4, messages generally remain
on the server while the client works with them as if they were local. IMAP4
enables users to search through messages by keywords and to choose which
messages to download locally. Messages in the user's mailbox can be marked
with different status flags that denote states such as "deleted" or "replied to."
The messages and their status flags stay in the mailbox until explicitly removed
by the user. Unlike POP3, IMAP4 enables users to access folders other than
their mailbox.
POP3 and IMAP are used for ISP and web email setup. These protocols are not
used with a mail management server such as Exchange, but servers like
Microsoft Exchange provide support for both protocols.
Security In order to establish secure authentication to and from an email server, a
security protocol should be used. Security protocols used in email
communications are SSL/TLS, S/MIME, and PGP.
Ports Email servers use different ports for incoming and outgoing mail depending on
the protocols used. Before you can configure email settings, you will need to
determine the specific port numbers that are used.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Configure Mobile Devices.
ACTIVITY 15-5
Configuring Mobile Devices
Scenario
You want to practice configuring features on mobile devices so that if users need your help in
configuring features, you will have some familiarity with doing so.
1. Determine the mobile device IMEI and IMSI numbers. Provide students with
two Bluetooth devices,
2. Examine or configure the mobile device to use the email address provided for your use during class. such as a laptop with
Depending on the device you are configuring, and the type of email address you are using, the steps Bluetooth capability and
will vary. If you need help with the procedure, search online or ask your instructor for assistance. a smartphone, a
smartphone and a
3. Create a Bluetooth connection between two Bluetooth capable devices. Bluetooth headset or
speaker, or have
a) Enable Bluetooth on the mobile device through system settings. students pair up to
b) Enable pairing on the device. connect their mobile
c) On your mobile device, find a device for pairing. devices.
d) Once the device is found, it will ask for a PIN code. Depending on the type of device, the PIN code
will be sent via a text, or will be a standard code, such as “0000” used for wireless headsets.
e) Verify that a connection message has been displayed. Be prepared to assist
f) Test the connection by using the two devices together to either transfer data, answer or make a call, students in setting up
or play music. their student email
address on their mobile
4. Investigate the VPN options available on the mobile device. device.
TOPIC F
Mobile Device Synchronization
Now that you've configured mobile devices so that they can connect with and communicate with
networks and other devices, you can configure those devices to contain the same information as
other devices contain. In this topic, you will identify methods and best practices for synchronizing
mobile devices.
Some people have a computer and a cell phone, while others might have a smartphone, a tablet, and
multiple computers. In situations where data is kept on multiple devices, it's a good idea to try and
keep the information accurate and up-to-date on each device to alleviate confusion.
Data Synchronization
Data synchronization is the process of automatically merging and updating common data that is stored
on multiple devices. For example, a user can access his email contacts list from both his mobile
Data Synchronization
device and his laptop computer. Synchronization is established when the devices are either
connected via a cable or wirelessly, or over a network connection. In some cases, you may need to
install synchronization software on the devices you choose to synchronize. The synchronization rate
can be controlled and limited to allowing and restricting push and pull notifications from the cloud
over the Internet.
If you have access to a cloud service such as iCloud or OneDrive®, a subscription service such as
Dropbox, or another online storage service, you can use the built-in features of the service to
synchronize data between devices. You might need to install an app on your mobile device to access
the online storage. Data is often automatically synchronized whenever a network is available. You
can configure services so that data synchronization only occurs over a Wi-Fi network so that you
don't use up your monthly allotment of data in synchronizing data.
Some services, such as iTunes, synchronizes data whenever the mobile device is connected to a
computer. This keeps the apps, music, and videos you purchased on one device synchronized with
the other computing device.
ACTIVITY 15-6
Discussing Mobile Device Synchronization
Scenario
You want to do a little research to make sure you know how to synchronize data between various
mobile devices and a user's computer. You and the other technicians in your department each were
assigned a different scenario at your last team meeting to research.
Try to have each student 1. Based on the mobile device you are using, the email account you are using, any cloud storage you are
or group of students using, and whether you are connecting to the other device over Wi-Fi, a data cable, or cellular, search
research a different online for the most appropriate method of synchronizing your data.
mobile device type, a) Determine which method is most efficient for syncing data between the mobile device you are using
account type, and and a computer.
connection type. b) Determine if any settings need to be changed on your mobile device to prevent cellular connections
for large data transfers.
c) Determine if any additional apps need to be installed to sync data.
TOPIC G
Troubleshoot Mobile Device Hardware
In this lesson, you have installed, configured, and managed several types of mobile device hardware.
As with desktop PCs, part of your duties as an A+ technician will be helping users when they
encounter problems with their mobile devices. In this topic, you will troubleshoot issues with
mobile device hardware.
Issue Techniques
Cooling systems Because laptops do not have the air circulation that desktop PCs do, it is Reiterate how important
it is to not void the
important to keep the device air ducts clean. Dust trapped in cooling passages
warranty by opening
acts as an insulator and can prevent proper cooling, possibly resulting in devices that are still
overheating. Excessive heat should be avoided in such devices as it can shorten under warranty.
the life of components. In servicing laptops, it is a good practice to regularly
blow dust from the cooling passages using compressed air or vacuum it with an
electronics vacuum. When using the compressed air to clean the inside of the
laptop, you must be extremely cautious of the internal components. It is easy to
damage other components inside the laptop while cleaning.
The bottom surface of the laptop gets quite hot when improperly ventilated.
This can easily happen when laptops are put on soft surfaces (i.e., tables with
coverings such as table cloths), on people's laps, or in places where there is not
enough room between the vents and a wall. Sometimes people will get careless
and unwittingly cover the vents with books, mouse pads, etc.
Issue Techniques
Batteries Properly caring for the battery in a mobile device not only prolongs battery life,
but also diminishes health and safety concerns. Using an incorrect battery
charging cable or exposing a battery to harsh environmental conditions, such as
extreme heat, can result in an explosion. Some simple guidelines for acceptable
battery maintenance include:
• Follow manufacturer instructions on the proper charging and discharging of
the battery.
• Use the battery charger provided by the manufacturer or an approved
replacement charger.
• Never expose the battery to fire or water.
• Do not drop, throw, or jolt the battery.
• Only use the recommended battery for your device.
• Make use of power management features included with your device/OS to
prolong battery life.
Transportation Because mobile devices are carried from place to place, they are exposed to
and handling hazardous environments far more frequently than desktop computers. Careless
handling can substantially reduce the life expectancy of such devices.
Whether storing, shipping, or just transporting a laptop, it is important to
choose an appropriate enclosure for the device. Such enclosures should protect
the device from moisture, heat and cold, and dust and debris. The enclosure
should shield the device from objects that could scratch or scrape, and also
withstand the impact of a drop.
When carrying a laptop or other mobile device, be careful not to hold on to it
by a corner. This can cause the device to bend slightly and short out the system
board.
High temperature Exposure to high temperatures can cause expansion within portable
computing devices and compromise circuitry. High temperature can also
lead to the failure of cooling systems to maintain adequate operating
temperatures, leading to the overheating and failure of internal components
such as the processor, video processor, and hard drive.
Rapid change in Rapid changes in temperature, such as those seen when transporting a
temperature device from one climate to another, could result in condensation within the
device. Devices should be allowed to come to room temperature before
being powered on after a temperature change.
High humidity Avoid operating in high humidity as condensation within the device may
occur and promote corrosion. All manufacturers specify operating
humidity levels. It is important to follow manufacturer operating
procedures/guidelines at all times. Most systems can operate at high
humidity without a problem, as long as there is no condensation (5 to 95
percent relative humidity, non-condensing).
Low humidity Be extra cautious as ESD is more likely to occur in low-humidity
environments (those under 35 percent relative humidity).
Symptom Description
Battery issues There are usually three main issues with mobile device batteries, the first
being that the battery does not stay charged long enough. Battery life can
be maximized using the power management features of your device. Many
devices also offer extended life batteries. To extend battery life, disable
devices not being used, such as wireless (Wi-Fi, Bluetooth®, and infrared
[IR]). If not on a network, you can also disable the network interface card
(NIC). These devices have their own power management options that need
to be set.
The second is that the battery is not charging. This could be because of a
bad AC adapter or cable. Nickel cadmium (Ni-Cad) batteries have battery
memory, which means that they can lose most of their rechargeability if
you repeatedly recharge them without draining the batteries first. The only
solution to this problem is to use a conditioning charger, which is designed
to first drain the Ni-Cd batteries before recharging them. Battery memory
can sometimes affect nickel-metal hydride (NiMH) batteries, too. Try
replacing the cable and see if that fixes the issue. If it does not, then you
will most likely have to replace the battery.
The third issue is battery swelling. A swollen battery may expand beyond
its container and cause issues with the device’s casing, and it can also lead
to the battery malfunctioning. Swollen batteries may also leak harmful
chemicals. Batteries can become swollen through age, misuse, or
manufacturing defects, and are typically caused by the batteries’ cells
overcharging. Most swollen batteries will need to be replaced. To avoid this
effect, make sure to store the device in a cool, dry place, and make sure
you’re using the right power charger.
Replacing batteries is not uncommon and will need to be done periodically.
Device gets hot Because mobile devices have very little space in between their internal
components, you can have problems with them overheating, which leads to
system lockups and even hardware failures. Strategies you can use to help
reduce the heat within mobile devices include:
• Use the power management features even when the mobile device is
connected to a power outlet, especially if you are using it in a warm
room.
• Try to keep the bottom of laptops ventilated. (For example, do not rest
a laptop on a pillow in your lap.)
• Be aware of the fan in a laptop. If you hear it running very fast on a
regular basis, take steps to minimize heat in the laptop.
Mobile device is not This can be an indication that the battery contacts are dirty. You can clean
working properly them by using alcohol preps or even just a dry cloth.
when on battery
power
Symptom Description
No power when The power cord or AC adapter might have failed, the outlet to which you
connected to AC are attempting to connect the mobile device is bad, or the power supply in
power the mobile device has failed. Start by checking the power outlet and
plugging in a known good electrical device and verifying whether you can
turn it on. If the problem persists, then try using a known good power cord
and then an AC adapter to determine if either is the source of the problem.
You might also test both AC and DC power by using a multimeter. For
devices with a two-component charger, such as a USB cable into a USB-to-
electrical-outlet adapter, or a laptop power cord with a separate cable from
the transformer to the power outlet, make sure that the connections are
firmly mated together.
Ghost cursor and Laptops commonly have touch pads or pointing sticks. Touch pads can
pointer drift suffer from dirt and hand grease contamination that can make the touch
pad behave erratically; make sure to clean with alcohol preps. Pointing stick
heads can wear out and become slippery, making them very difficult to use;
order replacements from the manufacturer or vendor. In some laptop Also point out that if the
models, you can actually recalibrate the touch pad to try and fix the issue. user has a messy desk,
A ghost cursor is a cursor that jumps around on the screen randomly, or an external mouse
connected to the mobile
moves too slow, or opens windows and menus on its own. Causes of this
device might have
problem include a corrupt driver, driver incompatibilities after an upgrade books or other objects
to a newer operating system, and a hardware failure. Steps to take to sitting on it that are
resolve this problem include reinstalling or upgrading the driver. If this activating the mouse.
does not resolve the problem, many portable devices allow users to
connect an external mouse as a substitute for the touch pad or other
integrated pointing devices.
Pointer drift is when the mouse pointer moves across the screen without the
user touching the touchpad or mouse. This can often be resolved by
uninstalling and reinstalling the drivers. The other reason this might occur
is if the user is using the mobile device keyboard and their hands rest on
the case near the touch pad, the touch pad might register their hands as
touching the touch pad if the case flexes a bit from the user's hands. You
also might need to recalibrate the touch pad or pointing stick.
Issue Description
Common Mobile Device
6
Nonstandard key Due to size constraints, mobile device manufacturers often rearrange Keypad Issues
placement function keys to make them all fit.
Function keys Some keys on a standard desktop keyboard would not fit on a mobile
Point out that objects
device keyboard and have instead been added as function keys. Several keys
laying on the internal
on a mobile device keypad are shared. For an explanation of key functions, keyboard might affect
consult the device manual. how an external
Numeric keypad Most mobile computers do not have the numeric keypad like desktop keyboard registers key
presses. If a book is
keyboards. Instead, many manufacturers place numbers on letter keys to be
pressing down the
used when NumLock is on. NumLock indicator lights are displayed on spacebar, the user will
the laptop to indicate that the NumLock function has been turned on. have a hard time typing!
Issue Description
Sticking keys On occasion, a key will remain in the depressed position due to debris
buildup or a malfunction in the mechanism. These issues can often be
resolved by removing the key, cleaning it, and replacing the key. Methods
for removing keys vary from model to model. Removing a key on a laptop
keyboard can be a risky proposition. They are typically not the type of key
where the key cap is in a peg, which you find on full-sized keyboards.
Laptop keys are usually floating on a dual-hinge mechanism, usually plastic,
that will easily break if you attempt to remove it forcefully. Refer to the
manufacturer's instructions when attempting to fix a key on the keyboard.
Keyboard too small The strain of typing on a small or non-ergonomic keyboard may bother
some users.
Keyboard not For mobile devices with detachable keyboards, ensure that the keyboard is
responsive properly connected to the computing device. If the mobile device has an
operating system function to select between using internal, external, or on-
screen keyboards, ensure the appropriate keyboard option is selected.
Can't see the Device is being used in bright • Check device settings to adjust for
screen sunlight. sunlight conditions.
• Apply anti-glare screen cover.
User is wearing • Cold weather necessitating need • Obtain and use gloves with
gloves for gloves. capacitive finger tips that will work
• Work with chemicals or other with the device.
materials that requires the user to • Use a stylus designed for the
wear gloves. device.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Troubleshoot Mobile Device Hardware Issues.
ACTIVITY 15-7
Troubleshooting Mobile Device Hardware Issues
Scenario
You are assisting users with some mobile device hardware issues today.
1. You received a user complaint about a laptop being extremely hot to the touch. What actions should If you have mobile
you take in response to this issue? devices with problems
A: Overheating can be a sign that dust and dirt is restricting the necessary airflow within the device, that students can
so start by cleaning the ventilation duct with compressed air and then make sure that the device is troubleshoot, consider
getting proper air circulation around the outside of the case. having students work as
a team to troubleshoot
2. A user reports that when they plug in anything to the USB port on the laptop, that it is not recognized by and resolve the issues.
the system. Is this something you can easily repair?
A: Typically, the processor, the AC port, and USB ports are attached directly on the board and cannot
be replaced without replacing the whole laptop motherboard.
3. Several laptops need to be replaced in the next fiscal cycle, but that doesn't begin for several more
months. You want to improve functionality as much as possible by upgrading or replacing components
in some of the laptops that are having problems. Which items are easily replaced in a laptop?
A: Generally, you can replace the hard drive, RAM, the fan, the screen, the battery, and the
keyboard.
4. Your organization has several tablet devices that are loaned out as needed when employees are
traveling. Some users have reported problems getting the Bluetooth keyboard to work with the tablet.
What should you do?
A: There are a number of issues that can cause Bluetooth connectivity problems. The drivers might
need to be updated. The devices might not have been set to discoverable mode. For security
purposes, only enable discovery mode on your mobile device when want a Bluetooth device to
find your device; otherwise, keep that setting disabled. The Bluetooth settings must be configured
to allow devices to connect to the mobile device. This is also referred to as pairing.
5. A user reports that the touchscreen on their mobile device is not responding properly. What questions
should you ask, and what steps might you take to resolve the issue?
A: You should ask if the touch screen appears to be scratched, cracked, or otherwise damaged. If so,
make arrangements to have the touch screen replaced. If it is not damaged, ask if the user has
cleaned the touchscreen surface. If they have not, remind them to use only a soft cloth moistened
with eye glass cleaner to gently wipe the screen. If it still doesn't work properly, recalibrate the
screen for the user, check for updates, or remove and reinstall drivers.
Summary
In this lesson, you worked with mobile computing devices. You examined mobile device
technologies including laptops, smartphones, and tablets. As an A+ technician, you will need to be
able to expertly support and troubleshoot mobile devices.
In your professional experience, have you supported mobile devices? If not, what kind of experience do you
have with them?
Encourage students to
use the social A: Answers will vary, and experience levels can range from no experience at all to power users that are
networking tools very comfortable with mobile devices.
provided on the CHOICE
Course screen to follow What type of technical support do you think will be expected of an A+ technician as mobile devices become
up with their peers after even more prominent within the workplace?
the course is completed A: Answers will vary, but will most likely include implementing security methods and synchronizing
for further discussion organizational data with mobile devices.
and resources to support
continued learning. Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will support printers and multifunction devices. You will:
• Compare various printer technologies and the associated imaging processes.
• Install and configure printers.
• Perform printer maintenance.
• Troubleshoot printers using appropriate tools.
Lesson Introduction
In previous lessons, you have installed, configured, and managed system hardware for
desktops, laptops, and mobile devices, as well as the basic operating software and
networking components on all three systems. The next logical step is to examine some of
the most common external devices in use on personal computer systems: printers. In this
lesson, you will support printers and multifunction devices.
Despite predictions that computers would bring about a paperless office environment, the
need to transfer digital information to paper or back again remains as strong as ever.
Therefore, printing and scanning are among the most common tasks for users in almost
every home or business environment. As an A+ certified professional, you will often be
called upon to set up, configure, and troubleshoot printing environments, so you will need
to understand printer technologies as well as to perform common printer support tasks.
540 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Printer and Multifunction Technologies
In this lesson, you will support printers. Before you can provide the right level of support, you must
fully understand how these systems are used in a production environment. You need to understand
how the various components work within a printer to provide the desired outputs. In this topic, you
will identify printer technologies.
As a professional support technician, you might be supporting the latest cutting-edge technology, or
you might be responsible for ensuring that legacy systems continue to function adequately. So, you
must be prepared for either situation and be able to provide the right level of support to users and
clients. Having a working knowledge of the many printer technologies and components will help
you to support users' needs in any technical environment.
Printers
A printer is a device that produces text and images from electronic content onto physical media such
as paper, photo paper, and labels. A printer is one of the most popular peripheral devices in use in
Printers
most computing environments. Printers employ a range of technologies; the quality of the print
output varies with the printer type and generally in proportion to the printer cost. A printer output
of electronic documents is often referred to as hard copy. Printers can connect to computers using a
variety of connection types, with the most popular methods being USB, networked, and wireless.
E
AT
IC
PL
DU
T
NO
6
DO
sometimes also uses the word "printer" as in common usage, to mean the physical print device. Be
aware of the context usage of the terms.
Printer Components
There are many types of printers. Each type of printer, and each printer from different
manufacturers implements the printing process slightly differently. All of the printers will have the
following common components. Printer Components
Mechanism for creating Impact printers typically use an ink coated ribbon. Low volume printers
text and images often use ink cartridges. High volume printers typically use toner. Store
receipt printers might use ink or thermal process.
Paper feed mechanism Printers need some method of moving the paper through the printer so
that the ink or toner can be applied to the paper. Impact printers often
use sprockets that engage holes on the edge of special continuous feed
paper. Ink jet printers typically use wheels that pull the top sheet from a
stack of cut sheets of paper, typically 8.5" x 11" or 14". Laser printers use
pickup rollers to move cut sheets through the printing mechanism.
Specialized printers might use these or other methods of moving the
paper.
Connection to A printer is not all that useful if it cannot communicate with the devices
computing devices that contain documents to be printed. Printers might connect through a
USB cable, a wired network card, or a wireless card. Some printers also
include card readers so users can save files to the memory card and print
from the memory card directly onto the printer.
Paper input and output Printers that use cut-sheet paper have a tray or opening for a stack of
paper. There will also be a tray or opening where the printed pages are
stacked after printing. Printers that use continuous feed paper might or
might not have input and output trays. Thermal printers often use paper
on a roll that is placed inside the printer device and the output is pulled
across a serrated edge to remove the printed output from the roll.
Printer types can vary, but there are many common technical components that are used to provide a
number of common functions within the printer.
Component Description
Printer memory Printers typically come with their own installed memory to store
information about the current device settings as well as the print jobs in
the queue. Different devices will have a different amount of memory
installed by default; you may be able to upgrade the memory. Upgrading
the memory can enable a printer to handle higher-resolution jobs and to
buffer more of each print job to increase throughput.
Printers store current print jobs in volatile Random Access Memory
(RAM); they typically store device settings in flash-based non-volatile
RAM. Consult your device documentation for the memory amounts and
types your device supports, as well as procedures for installing or
upgrading device memory.
Component Description
Printer drivers Like all hardware devices, printers require appropriate software drivers in
order to enable the device to communicate with the computer system and
function correctly. The driver controls all device-specific functions,
including print resolution and quality choices, color rendition, contrast
and brightness, and finishing options such as two-sided printing,
collation, stapling, and so on. If you open a device's property sheet, you
can see the driver functions on the Advanced page and on any custom
pages the driver adds. Printers might also include management software
that is separate from the low-level driver interface and provides
sophisticated control over device settings and functions.
Printer firmware Many printers include built-in firmware that provides the on-board device
management interface. This enables you to configure printer functions,
monitor and manage print jobs, select output options, and run diagnostic
tests from a console on the device itself, rather than indirectly through a
computer operating system. The firmware type and the functions
provided by the firmware will vary depending upon your device. Check
with your device vendor for any available firmware updates.
Printer interfaces Most printers and multifunction devices used today use USB and wireless
technologies, or are directly connected to the network via a network
cable. Older printers connected to computers using parallel or sometimes
serial cables and ports; those connection methods are considered
obsolete.
MFDs
A multi-function device (MFD) is a piece of office equipment that performs the functions of a number
of other specialized devices. MFDs typically include the functions of a printer, scanner, fax machine,
MFDs
and copier. However, there are MFDs that do not include fax functions. Although the multi-
function device might not equal the performance or feature sets of the dedicated devices it replaces,
multi-function devices are very powerful and can perform most tasks adequately and are an
economical and popular choice for most home or small-office needs.
Ask participants what
types of MFDs they have
experience with, and
what capabilities were
available on the devices.
Types of MFDs
MFDs can be broadly classified into three types, based on their size, cost, and functions.
All-in-one (AIO These MFDs are small in size and include basic features of printing,
MFD) scanning, and copying that are required for home users. Interestingly, some
of them include features such as PictBridge and smart card readers that are not
available on high-end MFDs. Some have limited or no fax features and do
not support networking. Many can be connected using USB to a single
computer, or to multiple computers through a Wi-Fi connection to the
wireless router.
SOHO MFD These MFDs are medium sized and are designed specifically for small and
home offices. They can be connected to a network and can perform tasks at
a faster pace than AIOs. They usually have enhanced faxing capabilities and
some high-end models are loaded with additional time-saving features, such
as an automatic document feeder, duplex printing, duplex scanning, extra paper
trays, and stapling.
Heavy-duty MFD As the name suggests, these MFDs are large, network-enabled machines that
can cater to the documentation needs of an entire office. They may or may
not include a fax. They are built to handle large volumes of printing,
scanning, and copying. Additional features such as automatic document
feeder, duplex printing and scanning, and enhanced storage space are
available by default.
Laser Printers
A laser printer is a printer that uses a laser beam to project (or "draw") a document onto an electrically
charged drum; toner adheres to the charged image and is transferred onto the paper as the paper
Laser Printers
moves through the mechanism at the same speed the drum rotates.
LED Printers
LED printers are similar to laser printers but use the latest printing technology, namely Light
Emitting Diodes (LEDs), to replace the laser beam. Some LED printers can print 420 pages per
minute.
1. Processing The computer encodes the page in a printer language and sends it to the
printer. The printer's firmware processes the data to create a bitmap of the
page and stores it in the printer's RAM.
2. Charging The imaging drum is conditioned by a charging roller powered by a high-
(conditioning) voltage power supply assembly. The roller applies an electrical charge of -600
V across the drum's surface. Slightly older printers use a primary corona wire
charged by a high-voltage power supply to apply the negative charge to the
drum.
Inkjet Printers
An inkjet printer is a printer that forms images by firing microscopic droplets of liquid ink out of
microscopic ink jet nozzles mounted together on a carriage assembly that moves back and forth
Inkjet Printers
across the paper. The nozzles are mounted approximately one multimeter from the paper and aimed
precisely on the printer. Inkjet printers have a self-cleaning cycle and will park the printhead when
not in use. The printer can use heat or vibrations to release the ink.
Show examples of
different print cartridges
from different printers so
students can see how
much they vary.
1. Preparation When the print process is initiated, a motor and belt mechanism moves a
printhead across the printer. Another stepper motor along with gears
advance the paper into the printer.
2. Ink dispersion As the printhead moves across the paper, images are formed by heat or
vibration forcing liquid ink out of carefully aimed nozzles onto the paper.
The printhead does not touch the paper. If the printer has double-sided
printing capabilities, then the duplexing assembly will move the paper or
other printing media through the printer twice.
3. Ink deposit The printhead moves back and forth across the paper, printing one row of
the image at a time. The amount of ink shot onto the page is determined by
the driver software that controls where and when each nozzle deposits ink.
The printhead typically produces at least 300 distinct DPI. Some printers can
print at up to 1,200 DPI or more.
4. Paper advance The paper advances using rollers and feeders after every row until the page is
covered.
2. Once the ink is heated, bubbles are formed in the cartridge that burst and shoot ink onto the
media.
3. The heat is turned off and the element cools.
4. More ink is sucked into the nozzle when the bubble collapses. Each thermal printhead has
hundreds or thousands of nozzles that shoot spheres of ink that can create dots about 60
microns in diameter.
Thermal Printers
A thermal printer is a general term for any printer that uses a heating element to create the image on
the paper with dye, ink from ribbons, or directly with pins while the feed assembly moves the media
through the printer. There are several types of thermal printers that use significantly different Thermal Printers
technologies and are intended for different uses. The most sophisticated types of thermal printers
can produce professional photo-quality images. There are also thermal printers for everyday office
use and for special-purpose applications. Most thermal printers will require special thermal paper that
contain chemicals designed to react and change color as it is heated by the heating element within
the printer to create images. These printers are commonly used with cash registers to print receipts.
6
Thermal dye transfer A thermal dye transfer printer, also called a dye sublimation printer, is a
printer sophisticated type of color printer that uses heat to diffuse dye from color
ribbons onto special paper or transparency stock. The resulting
continuous-tone image is similar in quality to photographic printing, and
professional photographers employ them to produce prints quickly
without having to send them to a photographic lab. However, the printers
themselves are expensive and slow, and the special media is also
expensive. Newer and less-expensive snapshot printers produce snapshot-
sized images of acceptable photographic quality.
Thermal wax transfer Thermal wax transfer printers have a thermal printhead that melts wax-based
printer ink from a transfer ribbon onto the paper. These printers can be used in
typical office settings as an economical way to produce color copies or
color prints at an acceptable quality but at lower cost than dye
sublimation printers. They are also used for standard text-based printing.
Direct thermal printer Direct thermal printers use heated pins to form an image directly onto
specially coated thermal paper. Early personal computer printers, such as
Apple’s first printer, the SilenType, were thermal printers. However,
Point out direct thermal today's direct thermal printers are more commonly found in special-
is the most common. purpose printing devices such as cash registers and some fax machines.
Impact Printers
An impact printer is any type of printer that strikes a component directly against the ink ribbon to
create characters on impact paper. The strike can be made with a group of pins or with a preformed
type character. Impact printers tend to be noisy and slow compared to other printers and have Impact Printers
largely been superseded by other printer technologies. The most common use is for printing carbon
or carbonless multi-part forms such as receipts or invoices.
Ask students if they
have encountered any
impact printers, and if
so, what they were used
for.
6
Dot-matrix A dot-matrix printer is a type of impact printer that uses a set of pins to strike the
printer ribbon. Dot-matrix printers create printed characters by using various
combinations of dots. The printhead contains a vertical column of small pins
that are controlled by an electromagnet. Because it uses an array of pins to
form images, this type of printer can produce graphics as well as text.
Formed-character A formed-character printer is any type of impact printer that functions like a
printer typewriter, by pressing preformed characters against the ink ribbon to deposit
the ink on the page.
The printhead might be shaped like a golf ball, with the type distributed around
the ball, or it might be in the form of a wheel with the characters around the
perimeter of the wheel. Because of this type of printhead's resemblance to
flower petals, they are referred to as daisy-wheel printers.
Line printer A line printer is any type of impact printer that can print a full line of text at a
time, rather than printing character by character. These are the fastest type of
impact printers.
Pin strike The printhead has a vertical column of small pins that are controlled by an
electromagnet. The pins shoot out of the printhead and strike an ink-coated
ribbon. The dots created on the page become the printed text or graphics. More,
smaller pins create better quality images. Printers come in 9-pin or 24-pin
varieties.
Ink transfer The impact of the pin transfers ink from the ribbon to the printed page. This
physical impact is responsible for the printer's ability to print multiple-layer
forms.
Printhead move After a set of pins has fired, an electromagnet pulls them back in, the printhead
moves a fraction of an inch across the page, and another set of pins is fired.
Letter quality Near Letter Quality (NLQ) printers usually use two or more passes over a line of
pass text to increase the number of dots used per letter. This connects the dots to
form sharper and clearer letters.
Virtual Printers
A virtual printer simulates a printer; however, there is no physical printer. Software is installed, or
Microsoft Windows includes a virtual printer, and the virtual printer shows up in the Printer dialog
box when you select to print something from your computer, tablet, or other device. Virtual Printers
Some of the reasons users might need to print to a virtual printer include:
• Sending a document from their computer to a fax server.
• Creating a document that cannot be purposely or inadvertently changed. Find out whether any
• Making the document content available outside of the application which originally created the students use virtual
printers and if so, what
document.
they use them for. If they
• Useful feature for sharing the document with others who don't have an application which can don't currently use them,
open the native file format. see if they can think of
• Combining multiple documents into a single document. reasons why they might
recommend them to
• Testing how the document will appear when printed on paper from a physical printer. users.
• Useful feature to save on printer supplies.
• If the document is not printing properly from the native application, sometimes it will print
properly from a file created using a virtual printer.
Virtual printers typically print to a file of some type such as PDF, XPS, or an image file. The virtual
printer might instead send the output to a fax queue on a fax server.
Examples of virtual printers include:
• Adobe Acrobat
• Nitro PDF Creator
• Microsoft XPS Document Writer
• Cute PDF
• GhostWriter
• Send To OneNote
The process for printing using a virtual printer is very similar to printing to a physical printer.
1. Install the virtual printer, if necessary.
2. From the application you wish to print from, open the document. The Virtual Print Process
3. Using the application's Print option, select the virtual printer.
4. Configure any options provided in the Print dialog box as needed.
5. Select the Print button.
6. If necessary, specify the location and file name for the output.
ACTIVITY 16-1
Compare and Contrast Printers and Print
Processes
Scenario
There are several printers that are currently not deployed in your organization that are being stored
in the IT department inventory cages. In order to determine which ones you will need when the
time comes to replace currently deployed printers, you want to examine these printers to identify the
features of each printer. You will then fill out the chart to identify which printers have which
features.
Make sure you have a 1. Examine the printers available to you, then fill out the table below. (Use the space on the bottom half of
variety of printer types, the page if necessary.)
so students can examine
the printers to identify Printer Type Creates Images Using Connection Method Paper Handling
the similarities and Mechanism
differences between the
printers.
2. Using the table you created, identify the similarities between the printer types. Identify the differences.
TOPIC B
Install and Configure Printers
In the previous topic, you examined printer technologies, components, and processes. You can use
this basic understanding when you install and configure printers. In this topic, you will install and
configure printers.
Because printers are such a fundamental component of almost every computing environment, it is
almost a guarantee that you will be called upon to set up and configure printing on devices no
matter what professional environment you are working in. The skills you will learn in this topic
should prepare you to install and configure a wide range of printer types efficiently and correctly.
Printer Connections
Printers can be connected to a local printer or to the network through a wired connection or
wireless connection. Wired connections use USB, serial, or Ethernet ports and cables. Wireless
connections use Wi-Fi or Bluetooth connections. Wireless printers can be installed as part of the
infrastructure of the local computer environment or the network environment. Alternatively, they
can be part of an ad hoc network which is created for the current print session.
If you have a
smartphone, tablet, or Cloud Print Services
laptop configured to print Using cloud print services, you can access printers. These are often public printers located in office
offsite to a service such
as those provided by
supply stores or other specialty print shops. Accessing these public, shared printers can be
FedEx Office, Staples, accomplished using special apps available from the provider of the service. The app typically uses
or other retail stores, TCP, Bonjour, or AirPrint from your operating system along with print drivers and an app for the
consider demonstrating user to select where to print to.
how to print using these Some reasons you might use cloud print services include:
services.
Method Description
Wired With the increased use of USB and Ethernet cables over the years, parallel and Explain how printer
serial cables and ports are just about obsolete. Most wired printers and MFDs sharing differs from
found today will connect to devices using a USB port or are directly connected setting up and using
to a network via an Ethernet cable. network printer
mappings. You might
Wireless Wireless printers offer many capabilities such as flexible printer locations. want to demonstrate
Printers can be connected to a wireless network using: creating a network
• Bluetooth® printer and than
connecting/mapping to
• 802.11x it.
• Infrared (IR) technology
Print server Print servers hold the print queue for a number of printers connected to the
same network. The server manages print jobs that come from client computers
or devices, and sends the jobs on to the desired printer. You may also come
across occasions when the print server is built into a printer, or is a component
of an appliance that also provides additional functions, such as a firewall.
Operating Printers can be shared with other devices on the network by assigning print
system permissions that apply to local users and to users of a shared network printer.
Permissions can be allowed or denied within the operating system settings, but
if you deny a user the print permission, the user will have no access to the
printer. Available permissions include:
• The print permission, which enables you to print to the shared printer.
Assigned by default to Everyone.
• Manage this printer, which enables you to print to the printer and fully
administer the printer. Assigned by default to administrators.
• Manage documents, which enables you to manage other users' documents.
This permission includes the ability to manage all the jobs in the print queue.
• Special permissions, which is generally only used by the system administrator
to manage printer owner settings.
AirPrint
iOS and OS X include AirPrint. The AirPrint technology allows users to connect to a wireless
printer that is located on the same network as the device from which you wish to print. Users select
the AirPrint printer as the printer to which their document will be printed. By default, AirPrint only
works over Wi-Fi, but following the documentation included with an AirPrint capable printer, you
can also connect the printer via USB or Ethernet.
Bonjour
Bonjour was created by Apple to provide zero-configuration networking. Through Bonjour, users
can locate printers and file servers. It uses DNS service records to locate the devices offering print
and file sharing services. The Bonjour software is part of OS X and iOS operating systems, and can
be added to Microsoft Windows systems.
Various browsers have been created that enable users to graphically locate devices that can be found
through Bonjour. These include the Bonjour Browser, jBonjourBrowser, Bonjour Browser for
Windows, and mDNSBrowser.
TCP
Networked printers on an Ethernet network will need an IP address. Users can then add the printer
through the operating system's add printer method, using the IP address.
Duplex The printer might have a built-in duplexing feature that enables the user to
automatically print on both sides of a page. For other printers, the user will need
to manually remove the printed pages from the output tray and reload them in the
proper orientation to print on the other side of the paper. Most printers with
manual duplexing provide on-screen instructions for how to orient the paper for
printing the second side.
Collate If you are printing multiple copies of a file, the collate feature keeps all of the pages
for each copy together. This prevents the user from needing to manually sort
through the stack of output pages and assembling each copy by hand.
Orientation The orientation option allows users to specify whether the document will be printed
in landscape or portrait. For example, landscape on an 8.5 x 11 inch page would have
the top and bottom of the page on the 11 inch sides of the paper, and portrait
orientation would have the top and bottom of the page on the 8.5 inch sides of the
paper.
Print quality The print quality option enables users to specify whether they want to print draft,
normal, or high quality output. Draft prints quickly and uses less ink or toner,
while high quality takes longer and uses more ink or toner. Instead of generic
terms like draft or high quality, some printers provide the DPI (dots per inch) of
the output.
Items in the table are Other options you might need to configure include:
mentioned in the exam • Device calibration
objectives; items in the
bullet list are not
• Tray assignments
mentioned. • Tray switching
Note: For additional information, check out the LearnTO Install and Configure a Printer
presentation in the LearnTOs for this course on your CHOICE Course screen.
You may want to show
the LearnTO Install and
Configure a Printer
Cloud and Remote Printing presentation from the
CHOICE Course screen
With so many users being mobile and using mobile devices, the ability to print from those devices is or have students
becoming more and more important. Being able to print to the printer back at the office, or to a navigate out to the
printer in another office, can be accomplished through remote printing. Printing from a device that Course screen and
doesn’t normally have print capabilities can be accomplished by installing an app on the device and watch it themselves as a
using cloud printing. Or, you might need to print handouts to a printer at the hotel or conference supplement to your
center; this can also be accomplished through cloud printing many times. instruction. If not, please
remind students to visit
Printer manufacturers have created print servers which can be accessed through their app on your the LearnTOs for this
mobile device. Examples include Epson and HP. The print job is sent to the manufacturer's print course on their CHOICE
server, then printed at a printer detected by the app. The printer might be in a hotel, an office store, Course screen after
or a copy shop. You will pay a per-page fee for using the printer. class for supplemental
information and
Chances are, you don't want anyone but you or your intended audience to see the printed output. additional resources.
You should wait to print until you are near the public printer. Some apps provide you with a code
that will hold the print job on the print server until the user enters a code they were emailed. The
code is entered directly on the physical printer to release the job from the print queue to the printer.
Cloud and Remote
One cloud printing solution is Google Cloud Print. This works with both newer and older printers. Printing
It allows you to make your printers available to you or the users you specify. Users can print from
any web-connected device that has the ability to print. The user does not need to install the print
driver for the selected printer in order to print when using this service.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Install and Configure Printers.
ACTIVITY 16-2
Installing and Sharing a Local Printer
Scenario
One of users in the HR department has just asked you to install a printer that he purchased for the
department. He would like to use this printer on his Windows 8 computer as his default printer. He
has also asked that you make the printer available to other users in the department. Even though he
has not yet received the printer, he would like you to configure his computer so that all he will need
to do is plug in the printer when it arrives.
TOPIC C
Maintain Printers
Proper printer maintenance will extend the life of a printer and will help prevent mechanical issues
in the future. Printer maintenance should become a routine part of your job as an A+ technician.
Each type of printer has specific tasks you should perform to keep it in operating condition. In this
topic, you will examine the maintenance required for various types of printers.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Perform Printer Maintenance.
ACTIVITY 16-3
Performing Printer Maintenance
Scenario
It has been determined that in your organization, some maintenance tasks must be performed on a
daily basis. Others need to be performed weekly, and others on an as-needed basis. It is your turn to
take on printer maintenance today.
1. Review the documentation for your printer to determine the recommended printer maintenance.
a) Obtain the documentation, either in print form or by searching online for your printer model.
b) Briefly review the documentation and determine what maintenance tasks should be performed, and
how often they should be performed.
2. Following the documentation you obtained in the previous step, perform any recommended
maintenance on your printer.
a) Clean the exterior of the printer.
b) Clean the interior of the printer of any bits of paper, dust, or other foreign objects.
c) Verify that the ink or toner levels are adequate.
d) Verify that paper has been loaded in the printer, and that it is loaded correctly.
e) Determine if a maintenance kit should be used on your printer.
TOPIC D
Troubleshoot Printers
Earlier in the course, you employed troubleshooting tools and techniques for hardware components
within the computer or mobile device. There are other peripheral devices that users may frequently
use with their computer or mobile device, like printers, that will experience problems or
malfunctions that require your assistance. In this topic, you will troubleshoot printers.
As a support professional, you are well aware that one of the most unpleasant problems for users is
being unable to print. If users need hard copies of documents and the systems do not work, it can
be very frustrating. Users will look to you to identify and resolve their problems quickly, so you will
need to perform proper maintenance to prevent problems, to recognize common issues, and to
correct them efficiently when they occur.
Maintenance kit Printer maintenance kits for laser printers are made up of printer
components that get worn out with regular everyday use. Most printers are
designed to notify users when they have reached their predetermined page
count and maintenance schedule. Usually, the printer will display a message
such as "Perform Printer Maintenance." This means that the printer
manufacturer recommends installing a printer maintenance kit at this time.
Once the kit is installed, you must reset the page count on the printer to
keep an accurate schedule for maintenance.
Common components included in the kit are:
• Transfer rollers and pickup rollers.
• Corona assembly.
• Fan assembly.
• Fuser assembly.
• Cloths and gloves for handling printer components.
For newer printers, you also can purchase individual cartridges as needed.
For example, fusing is done inside the fuser cartridge. It's possible to lower
the cost of maintaining a laser printer by replacing only the appropriate
cartridge.
Toner vacuum When you suspect that the printer needs to be cleaned due to toner build up
within the printer, then make sure to use a toner vacuum. Toner vacuums
are specifically designed to clean up toner within a printer. The vacuum is
able to reserve the particles within the tool so that it is not dispersed back
into the air. Never use a conventional vacuum to clean up toner because the
particles are so small that there is risk of them getting blown back into the
air surrounding the printer. This can be harmful to your health.
Compressed air Compressed air is sometimes used to clean out the dust and debris from
inside the printer. Refer to your manufacturer's documentation for any
guidelines on using compressed air to clean the printer. Some manufacturers
advise against using the air, because it can actually cause moisture build up
within the printer.
Tool Description
Extension magnet A telescoping wand with a magnet attached to the end is used to pick up
screws or other metal pieces that may fall into the printer or scanner. For
inkjet printers and dot matrix printers, it can come in handy to retrieve paper
clips people have dropped into the paper-feed mechanism. But for laser
printers, reaching inside the printer can be hazardous. If you need to reach
inside a laser printer, take extreme caution as there are fragile components
and high-voltage electronics inside laser printers.
Test patterns Depending upon your printer, you might be able to run test patterns to
check the clarity and print quality of your printer. It allows you to determine
what settings need to be adjusted or what ink colors need to be refilled. Test
patterns are either built in or external to the printer and are used to test for
calibration and alignment of the printhead and to check the color/grayscale
tone.
Printer spooler The printer spooler can be a useful tool when determining where a print job
is faulting. If the job is getting through the spooler then it may indicate a
hardware issue, but if its not, then it could be an issue with the application
that the job was sent from or a connection issue.
Power cycling Power cycling a device refers to turning the device off and letting it rest for
10 to 30 seconds before powering it back up. This can give the printer some
time to clear the memory and start up again.
General diagnostic Many printers come with other self-diagnostic programs that can resolve
utilities basic hardware issues. Refer to the printer's manual on the specific steps
required to perform the diagnostics.
Windows and other operating systems often provide help for
troubleshooting general problems as well as for problems specific to that
system. In particular, each version of Windows provides a troubleshooter
that can walk you through the diagnosis and resolution of common printer
problems or problems with other devices.
In Windows 7, common printer problems can be resolved by displaying the
pop-up menu from the Printer icon and selecting Troubleshoot.
There are other generic utilities you can use, such as capturing a printer with
the net use command, or redirecting output to a printer with the prn
command.
Device For device-specific problems, consult the documentation that came with
documentation your printer or scanner.
Manufacturers' Most device manufacturers will maintain technical information on their
websites websites that can help with printer troubleshooting and ongoing
maintenance. You can also download updated printer or scanner drivers or
diagnostic software tools from the manufacturer, or use web-based utilities
to help you diagnose the problem.
Troubleshooting Description
Resource
Software vendors' Microsoft and other operating system vendors maintain libraries of technical
websites information on their websites that can help with troubleshooting known
problems with specific devices, or general issues related to the printing
function in the specific operating system.
Error codes and Review any error messages at the printer and at the computer. This might
reports involve checking computer event logs. Some printers may have an out of
memory error displayed when the printer memory is beyond capacity.
Service logs and Check prior service records for the system to try to identify recurring
reports problems. Check for previous user reports of similar issues to see how the
issues were resolved.
Troubleshooting As with all troubleshooting, follow a structured process:
principles 1. Gather information and identify the symptoms.
2. Review the data and establish a possible cause.
3. Identify and test a solution.
Backed up print There are several issues that can cause a printer's queue to back up or not
queue or printer will print at all:
not print • If you suspect that the printer is out of toner, ink, or paper, then add
what is necessary. Verify the printer's status and press the Test button on
the printer.
• If you suspect that there is a paper jam, or the printer is displaying an
error code indicating a paper jam, then clear the jam. If the paper jams
are frequent, then the printer may need to be serviced to clean or replace
old or worn components such as rollers.
• In Windows, there are several settings that will cause issues. The printer
may be paused. In this case, right-click the printer and disable the pause
printing option. The print spooler service may be stalled, so stop and
start the service. Or, the Use Printer Offline option has been enabled.
• If the printer has been configured to be available on a specified schedule,
then you may need to verify and adjust the availability schedule.
• An incompatible print driver will prevent sending print jobs to the
printer. You may need to delete the driver and reinstall the updated one
using the manufacturer's installation instructions, if available.
Note: In Windows 7, Windows 8, and Windows 8.1, you can troubleshoot a printer by right-
clicking the printer and selecting Troubleshoot.
Smeared output, Fuser temperature is too low: if the Follow the manufacturer's instructions
or output rubs off fuser is not hot enough, the toner is to set fuser mode for the paper; adjust
the paper not fused to the paper; fuser roller is the fuser roller; clear the paper path;
uneven; problem in paper path; paper use good-quality paper.
not smooth enough.
Low-quality image Poor-quality paper does not accept Use good-quality paper; follow the
charge and transfer toner; transfer manufacturer's instructions to clean
corona is dirty or faulty; there's a the transfer corona; follow the
transfer corona power supply manufacturer's instructions to
problem; a faulty primary corona or troubleshoot other faulty components.
power supply does not charge print
drum.
Poor print quality Clogged nozzles; incorrect paper; Clean the interior of the printer;
empty or defective cartridge. perform one or more print cartridge
cleaning cycles; switch to a paper
specifically designed for inkjet
printers.
Replace the cartridge. If you are using
a refilled cartridge, replace with a new
cartridge.
No output; paper Empty ink cartridges; clogged nozzles; Replace empty or incorrect ink
passes through tape sealing ink cartridge; incorrect cartridges; clean the printer and print
printer but is cartridge or cartridge improperly cartridge; remove the tape seal from
blank seated. ink cartridge; align the cartridge; check
the manufacturer's website for other
troubleshooting procedures.
Feathering/ink Clogged nozzles; low ink in cartridge; Perform several cleaning cycles;
bleed faulty printhead; low-quality refilled replace ink cartridge with a new one
cartridge. (not refilled); replace the printhead;
switch to a paper specifically designed
for inkjet printers.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Troubleshoot Printers.
ACTIVITY 16-4
Troubleshooting Common Printer Issues
Scenario
The printers in your office are a mix of types, brands, technologies, and reliability. You have been
doing regular maintenance on them, but there are still some issues that users have encountered.
1. The user reports that the printed output is not up to the usual standards for their printer. You will need to Replace the print
resolve this issue so she can print their report. medium with worn out
a) Print out a test page to see if you can reproduce the problem the user reported. ink cartridge, toner
b) If you see the same problem as reported by the user, take the appropriate steps, based on the type cartridge, or ribbon.
of printer, to resolve the problem.
c) Document the steps you took to resolve the problem.
2. The user reports that they can see their job in the print queue, but that the job never comes out of the
printer.
Remove the paper from
a) Send a print job from Notepad or another application. the print tray, disconnect
b) Verify that it shows up in the print queue for the printer in question. the cable, remove the
c) Take steps to resolve the problem. power cord, or another
d) Document the steps you took to resolve the problem. sabotage of your
choosing.
3. Resolve any other problems that are preventing getting good output from the printer.
a) Document what you think the problem might be.
b) Test your theory. Introduce any problems
you feel the students
c) Document the steps you took to resolve the problem.
would be able to resolve.
These might include
pausing the printer,
stopping the print
spooler, or installing the
wrong print driver.
Summary
In this lesson, you supported printers. Because printers enable users to transfer digital information
to paper, they are among the most commonly used devices in almost every type of computing
environment. As an A+ certified professional, you can use the skills and knowledge from this lesson
when you are called upon to install, configure, or troubleshoot printers
When would you recommend to users that they user laser printers? Inkjet printers? Impact printers?
Thermal printers?
Encourage students to
use the social A: Answers will vary, but will likely include recommending laser printers for high volume needs, inkjet
networking tools printers for casual low volume use, impact printers when speed rather than quality or the ability to
provided on the CHOICE print multi-part forms is needed, and thermal printers for POS terminals.
Course screen to follow
up with their peers after Which printer maintenance tasks have you performed, on which types of printers? Which maintenance
the course is completed tasks are most important in your organization? Why are they so important?
for further discussion A: Answers will vary, but may include replacing toner cartridges, cleaning inside and outside of printers,
and resources to support
printing a test page, and replacing paper.
continued learning.
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will identify security threats, vulnerabilities, and controls. You will:
• Identify common security threats and vulnerabilities.
• Compare and contrast common threat prevention methods.
• Identify common security controls for mobile devices.
• Identify appropriate data destruction and disposal methods.
Lesson Introduction
So far in this course, you have installed and configured hardware and software on PCs and
other devices. Another facet of an A+ technician's duties involves protecting organizational
computing assets from attacks. In this lesson, you will identify security threats,
vulnerabilities, and controls.
In today's work environment, cybersecurity is everyone's responsibility. As an A+
technician, you are in the position to identify potential security issues before they become
big problems. By identifying security threats and vulnerabilities, as well as some of the
controls that can counteract them, you can help keep your organization's computing
resources safe from unauthorized access.
576 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Common Security Threats and Vulnerabilities
In this lesson, you will identify security threats, vulnerabilities, and controls. To begin, you will
identify common security threats and vulnerabilities.
By identifying common security threats and vulnerabilities, you will be better equipped to suggest or
implement the most effective counteractive measures.
Types of Malware
There are a few malicious code attacks you should be aware of that fall into the general malware
category.
Types of Malware (2
Slides) Malware Type Description
Virus A piece of code that spreads from one device to another by attaching itself
to other files. The code in a virus executes when the file it is attached to is
Explain that, in most opened. Frequently, viruses are intended to enable further attacks, send data
cases, malware types back to the attacker, or even corrupt or destroy data.
are not mutually
exclusive and that they Worm A piece of code that spreads from one device to another on its own, not by
are usually built and attaching itself to another file. Like a virus, a worm can enable further
delivered as a attacks, transmit data, or corrupt or erase files.
combination of attacks.
Trojan horse An insidious type of malware that is itself a software attack and can pave the
way for a number of other types of attacks. There is a social engineering
component to a Trojan horse attack since the user has to be fooled into
Ask students to provide executing it.
their own examples and
anecdotes. Logic bomb A piece of code that sits dormant on a target computer until it is triggered by
a specific event, such as a specific date. Once the code is triggered, the logic
bomb "detonates," and performs whatever actions it was programed to do.
Often, this includes erasing and corrupting data on the target system.
Spyware Surreptitiously installed malicious software that is intended to track and
report the usage of a target system, or to collect other data the author wishes
to obtain. Data collected can include web browsing history, personal
information, banking and other financial information, and user names and
passwords.
Adware Software that automatically displays or downloads advertisements when it is
used. While not all adware is malicious, many adware programs have been
associated with spyware and other types of malicious software. Also, it can
reduce user productivity by slowing down systems and simply by creating
annoyances.
Rootkit Code that is intended to take full or partial control of a system at the lowest
levels. Rootkits often attempt to hide themselves from monitoring or
detection, and modify low-level system files when integrating themselves
into a system. Rootkits can be used for non-malicious purposes such as
virtualization; however, most rootkit infections install backdoors, spyware,
or other malicious code once they have control of the target system.
Social Engineering
A social engineering attack is a type of attack that uses deception and trickery to convince unsuspecting
users to provide sensitive data or to violate security guidelines. Social engineering is often a
precursor to another type of attack. Because these attacks depend on human factors rather than on Social Engineering
technology, their symptoms can be vague and hard to identify. Social engineering attacks can come
in a variety of methods: in person, through email, or over the phone. Social engineering typically
takes advantage of users who are not technically knowledgeable, but it can also be directed against
technical support staff if the attacker pretends to be a user who needs help. Social engineering Ask students if they
attacks can be prevented with effective user education. have experienced social
engineering attacks or
attempts, and ask them
Types of Social Engineering to give examples.
There are various types of social engineering attacks.
Types of Attacks
In the realm of information security, an attack is a technique that is used to exploit a vulnerability in
any application on a device without the authorization to do so. Attacks on devices include those
Types of Attacks
described in the following table.
Zero day attack A zero day attack is an attack that exploits a previously unknown vulnerability in
an application or operating system. In such a situation, developers have not had
time to address the vulnerability and patch it. It is called a "zero day" because
the developer has had zero days to fix the flaw.
Man-in-the-middle attacks are used to gain access to authentication and network infrastructure
information for future attacks, or to gain direct access to packet contents. Generally, there will be no
signs that a man-in-the-middle attack is in progress or has just taken place.
A botnet is a set of devices that have been infected by a control program called a bot that enables
attackers to exploit them and mount attacks. Typically, black hats use botnets for Distributed Denial
of Service, or DDoS attacks, sending spam email, and mining for personal information or
passwords.
Non-Compliant Systems
If systems try to connect to your organization's network, and those systems don't meet your
minimum requirements, those systems are considered to be non-compliant systems. You can prevent
non-compliant systems from connecting to your network through Windows security policies. Windows Security
For example, your organization might require that at least certain updates and patches be installed Policies
on the operating system, that the virus software be installed and the data definitions be current, and
no viruses or malware be present on the system. If any of these requirements are not met, the
system is deemed non-compliant, and is not allows to connect to the network. Poll students to see if
any of them are aware of
Windows Security Policies their organization
Windows security policies are Windows configuration settings that control the overall security behavior implementing security
policies to prevent non-
of the system. The security policy consists of hierarchical groupings of related policy nodes, which compliant systems from
contain individual policy entries you can enable, configure, or disable. The Local Security Policy is connecting to the
a subset of the comprehensive local policy object used to configure the general behavior of each network.
Windows system.
Steps Description
6
Manage user • Change the default user name and password on each device.
authentication • Require all users to create strong passwords and to protect the
passwords from others.
• In high-security environments, implement multi-factor authentication
that can include smart cards or biometric authentication systems.
Install updates and • Install the latest operating system service packs and security update
patches patches.
• Install the latest application patches for utilities that are included in the
operating system as well as for web browsers and third-party application
software.
Steps Description
Manage user accounts • Use policy settings to disable or delete guest accounts or other
unnecessary accounts, and rename default accounts, so attackers cannot
use known account names to access the system.
• Restrict user permissions so that only those users who absolutely need
access are allowed into the system.
• Disable any guest account on all devices to prevent unauthorized access
to any shared files and folders on the device or system.
Educate users • Educate users to follow best security practices, such as recognizing and
avoiding hoaxes, phishing attacks, and potential malicious software
sources.
Apply device security • Implement antivirus software to protect against malicious software.
measures • Block pop-ups in your web browser.
• Install a firewall and configure the appropriate open and closed ports
and the program filtering settings.
• Implement warning messages or banners displayed at user login to warn
users that only authorized use is allowed. These banners could be
important in future civil litigation or criminal prosecution, and they can
put all users on notice that their activities might be monitored. All
warning banners should comply with the legal requirements of your
jurisdiction.
• Disable autorun to prevent malware and other viruses from being
loaded automatically with a device, such as a USB drive. Disabling the
autorun features will restrict any infected files from automatically
loading.
• Enable screen saver and password functionality to lock systems when
idle.
• Enable automatic operating system updates on the device.
• Limit the number of shared resources on a system. Use share and file
system permissions to restrict access to file and print resources.
ACTIVITY 17-1
Identifying Common Security Threats and
Vulnerabilities
Scenario
You are on IT help desk phone duty today. The following are some of the calls you take.
1. Early in the day a user called the help desk saying that his computer is running slowly and freezing up.
Shortly after this user called, other help desk technicians who overheard your call also received calls
from users who report similar symptoms. What type of attack might have occurred?
A: This is some type of malware. It might be a virus or worm.
2. John brought in the new tablet he just purchased and attempted to connect to the network. He knows
the SSID of the wireless network and the password used to access the wireless network. He was
denied access, and a warning message was displayed that he must contact the IT Department
immediately. What happened and why did he receive the message?
A: John's new tablet probably does not meet the compliance requirements for network access. Being
a new device, it might not have had updates and patches applied, it might not have appropriate
virus protection installed, or it does not meet some other compliance requirement. This caused the
system to appear as a non-compliant system to the network and network access was denied.
3.
The contract ended recently for several workers who were hired for a specific project. The IT
department has not yet removed all of those employees' login accounts. It appears that one of the
accounts has been used to access the network, and a rootkit was installed on a server. You Lead students through a
immediately contact the agency the employee was hired through and learn that the employee is out of discussion of the bigger
the country, so it is unlikely that this person caused the problem. What actions do you need to take? issue described here. It's
A: You will need to create an incident report, remove or disable the login accounts, isolate the a major security flaw that
infected server and possibly any user computers that communicate with the server, and remove the temporary accounts
the rootkit from the server. were not disabled at the
end of the contract
period. In most cases,
the IT personnel
responsible for disabling
inactive user accounts
might face disciplinary
action.
TOPIC B
General Security Controls
In the last topic, you identified common threats and vulnerabilities. Once you identify threats and
vulnerabilities, you can then decide how to prevent and counteract them. In this topic, you will
compare and contrast common threat prevention methods.
Security Controls
Security controls are safeguards or prevention methods to avoid, counteract, or minimize security risks
relating to personal or company property. For example, a firewall is a type of security control
Security Controls
because it controls traffic by allowing only traffic that has specifically been permitted by a system
administrator. Security controls can be classified by several criteria, such as by the time that they act
relative to a security incident, according to their nature, or by people, technology, and operations/
processes. In this course, we will categorize the security controls by their nature:
• Physical controls such as fences, doors, locks, and fire extinguishers.
• Procedural controls such as incident response processes, management oversight, security
awareness, and training.
• Digital controls such as user authentication (login) and logical access controls, antivirus software,
and firewalls.
• Legal and regulatory or compliance controls such as privacy laws, policies, and clauses.
Physical Security
Physical security refers to the implementation and practice of various security control methods that are
intended to restrict physical access to facilities. One case where physical security is important is
Physical Security
when there is a need to control access to physical documents, password records, and sensitive
documents and equipment. One successful unauthorized access attempt can lead to financial losses,
credibility issues, and legalities. In addition, physical security involves increasing or assuring the
reliability of certain critical infrastructure elements such as electrical power, data networks, and fire
suppression systems. Physical security may be challenged by a wide variety of events or situations,
including:
• Facilities intrusions.
• Electrical grid failures.
• Fire.
• Personnel illnesses.
• Data network interruptions.
Locking doors There are many locks that can be used to restrict unauthorized access to
information resources:
• Bolting door locks are a traditional lock-and-key method that requires
a non-duplicate policy for keys to access a door.
• Combination door locks, or cipher locks, use a keypad or dial system
with a code or numeric combination to access a door.
• Electronic door locks use an access ID card with an electronic chip or
token that is read by the electronic sensor attached to a door.
• Biometric door locks are commonly used in highly secure
environments. This method uses an individual's unique body features
to scan and identify the access permissions for a particular door. For
example, retinal scanners are used to read the unique patterns of a
person's eye to authorize access.
• Hardware locks can be attached to a laptop, hard drive, or file cabinet
to secure it from being opened or turned on.
Mantraps A mantrap is two sets of interlocking doors inside a small space, where the
first set of doors must close before the second set opens. If the mantrap
is manual, a guard locks and unlocks each door in sequence. In this case,
an intercom or video camera is typically used to allow the guard to
control the trap from a remote location. If the mantrap is automatic,
identification or a key of some kind may be required for each door, and
sometimes different measures may be required for each door. Metal
detectors are often built in to prevent entrance of people carrying
weapons. Such use is particularly frequent in banks and jewelry shops.
6
Digital Security
There are several prevention methods used to manage and control security issues surrounding digital
data. These include:
• Antivirus software.
• Anti-spyware software.
• Firewalls.
• User authentication and strong passwords.
• Directory permissions.
Firewalls
A firewall is a software program or hardware device that protects networks from unauthorized
access by blocking outgoing and incoming unsolicited traffic. Firewalls allow incoming or outgoing
Firewalls
traffic that has specifically been permitted by a system administrator and incoming traffic that is sent
in response to requests from internal systems. Firewalls use complex filtering algorithms that analyze
incoming network data based on destination and source addresses, port numbers, and data types.
There are two common firewall types:
• Host or personal firewalls are installed on a single computer and are used to secure most home
computers.
• Network-based firewalls are dedicated hardware/software combinations that protect all the
computers on a network behind the firewall.
Software Firewalls
Software firewalls can be useful for small home offices and businesses. The firewall provides many
features that can be configured to suit various computing needs. Some features include:
• Enabling or disabling port security on certain ports.
• Inbound and outbound filtering. The user can set up rules or exceptions in the firewall settings
to limit access to the web.
Hardware Firewalls
A hardware firewall is a hardware device, either stand-alone or built into most routers, that protects
computers on a private network from unauthorized traffic. They are placed between the private
network and the public network to manage inbound and outbound traffic and network access.
Password Strength
A strong password meets the complexity requirements that are set forth by a system administrator
and documented in a security policy or password policy. Strong passwords increase the security of
systems that use password-based authentication by protecting against password guessing and other Password Strength
password attacks.
Strong password policies often specify:
• The minimum and maximum length of the password. Remind students of the
• Required characters, such as a combination of letters, numbers, and symbols. drawbacks of requiring a
strong password. Users
• Forbidden character strings, such as the user account name, personal identification information,
can easily forget
or words found in a dictionary. passwords if they are
• The frequency for changing passwords. too complex, but security
• Whether or not passwords can be reused. breaches can occur if
passwords are too weak.
Directory Permissions
A permission is a security setting that determines the level of access a user or group account has to a
particular resource. Permissions can be associated with a variety of resources, such as files, printers,
shared folders, and network directory databases. Permissions can typically be configured to allow
different levels of privileges, or to deny privileges to users who should not access a resource.
• File-level permissions allow users to set access control to individual files and folders. File-level
permissions will prevent any unauthorized access to a file or folder both across the network and
locally by prompting all users, including the user who created the file, to enter the correct user
name and password for access. In Windows operating systems, file-level permissions can be
implemented only on those hard disks or partitions that use NTFS file systems.
• Share-level permissions are permissions set for network shares. A network share is a folder on a
computer that can be remotely accessed from other computers through a local area network as if
it were a resource in the local machine. By setting up a share-level permission, a user can prevent
the remote users from accessing or modifying the files in the user's network share. Although
share-level permissions work well across a network, they offer no protection against a user who's
logged on locally to the computer or server containing the shared resource.
A downside to share-level security is that the server may eventually contain so many shares that it's
hard for users to remember their folders. If users want to search for information and they don't
know which share it is contained in, they will have to find the server and search each share on the
server for the desired information.
Separate permissions at the share level and file level is unique to Windows environments. In Linux,
the same set of read, write, and delete permissions are valid at both the local level and across the
network.
UNIX Permissions
Because UNIX and related systems are multiuser by nature, there is a series of permissions
associated with all files and directories. There are three types of permissions.
VPNs
With a VPN, TCP/IP communications are encrypted and then packaged within another TCP/IP
packet stream. The VPN hardware or software can encrypt just the underlying data in a packet or
the entire packet itself before wrapping it in another IP packet for delivery. If a packet on the public
network is intercepted along the way, the encrypted contents cannot be read by a hacker. Such
encryption of data or packets is typically implemented by using a protocol suite called Internet
Protocol Security (IPSec).
IPSec was initially developed for IPv6, but many current IPv4 devices support it as well. IPSec
enables two types of encryption. With transport encryption, the underlying data in a packet is
encrypted and placed within a new packet on the public network. With tunnel encryption, the entire
packet, including its header, is encrypted and then placed in the public network’s packet.
With IPSec in place, a VPN can virtually eliminate packet sniffing and identity spoofing. Only the
sending and receiving computers hold the keys to encrypt and decrypt the packets being sent across
the public network. Anyone sniffing the packets would have no idea of their content and might not
even be able to determine the source and destination of the request.
DLP
Data loss prevention (DLP) is typically software or a software suite that helps protect data from being
stolen while the data is moving across the network. It uses a variety of techniques to detect the data
and ensure that it is not lost, stolen, or compromised in any way as it travels from its point of origin
to its destination.
Port filtering is most often used in firewalls and for device hardening. Normally, in organizations,
administrators disable/block ports above 1024 as a security measure. They selectively enable ports
above 1024 during the installation of the associated services that use the port number.
ACLs
ACLs An Access Control List (ACL) is a set of data (user names, passwords, time and date, IP addresses,
MAC addresses, etc.) that is used to control access to a resource such as a computer, file, or
network. ACLs are commonly implemented as MAC address filtering on wireless routers and access
points. When a wireless client attempts to access the network, that client's MAC address is
compared to the list of authorized MACs and access is granted or restricted based on the result.
Smart Cards
Smart cards have a built in processor or smart memory chip. The data in the credit-card sized card
holds information. The information can be about the person assigned to the smart card, or other
information. They can be used with proximity card readers to allow the user to have access to a Smart Cards
building, room, or device. They can also be used with a hard drive by connecting a reader via a data
cable to the drive; a slot for the smart card is connected to the other end of the cable. In order to
access the drive, the user needs to insert the smart card. The user might also need to enter other
information such as a PIN or passcode to access the drive. Ask students if they
have experience using
smart cards.
Email Filtering
Most users get a lot of email messages every day. Email providers and email servers are getting
better at recognizing spam or junk messages, and not delivering them to users' Inboxes. However,
some messages that should get to users get caught up in the filtering process and are not delivered. Email Filtering
In most email applications, the users can further filter their email messages, defining what
constitutes junk or spam messages, and what should be delivered. Again, some messages might get
marked as junk or spam when they shouldn't be. Other filtering users can perform is to have Inquire as to whether
messages delivered to specific folders they have created. This might be based on the sender, message students adjust junk
content, or subject. filters in their email. Also
By adding a sender's email address to the contacts list, users can usually prevent messages from that ask if they use other
sender from being sent to junk or spam folders. email filtering such as
sending messages to
Note: Users should periodically check their junk or spam folder to ensure that no messages have specific folders.
been sent to those folders that should have been delivered to their Inbox.
Also make sure, usually by doing research and using antimalware applications, that the software does
not contain malicious or backdoor software.
Obtaining your software from a well-known source, getting it from the app store for your device,
and researching the software and vendor are all ways to make sure that you can trust the software. If
your antimalware software feels that the software you are installing is untrusted, it will likely prevent
you from installing the software. If you know that the software should be trusted, you might need to
temporarily disable the antimalware application to install the software.
Linux prompts when you attempt to install untrusted software. Software is signed with a
cryptographic key. Packages need the public key for the repository in order to install the software.
When prompted that you are installing untrusted software, you can either respond that you want to
install it anyway or cancel the installation. If you want to permanently trust previously untrusted
software, from the command line add the sudo apt-get-repository command to add the
untrusted source to the repository.
Programmers can digitally sign software. Users must manually authorize untrusted software.
ACTIVITY 17-2
Suggested answers
Identifying Security Protection Methods might include verifying
employees have IDs
showing, that building
access is limited or
Scenario monitored, and that
locks are used as
The IT department security team has invited members from various departments, including PC needed.
Support, HR, Marketing, and Software Development, to join them in reviewing and updating the
security documents for the organization. You were selected to represent the PC Support team on
the committee.
Suggested answers
You received an email outlining the topics for the next meeting. You want to write down some ideas might include ensuring
you think are important to include, and write down your justification for including the items. that users have only the
access needed to files
and folders, and that
1. Fill in the table with the information you feel is important to discuss during a meeting about security passwords are secure
protection methods. and changed regularly.
Suggested answers
might include verifying
that only strong
passwords can be used
on the network, and that
users don't make their
password available to
others.
Suggested answers
might include setting up
filtering to allow only
business related
messages to get
through into user's
mailboxes.
TOPIC C
Mobile Security Controls
Now that you are more familiar with the different mobile device technologies available, you are
ready to learn how they can be configured for optimal performance while maintaining an acceptable
level of security. In this topic, you will configure mobile device security.
Mobile devices can be used for a number of functions within the professional workplace. Knowing
that, you must be able to provide basic level support to your users, including configuring security
settings.
Mobile Security
Mobile devices today can do just about anything a laptop or desktop computer can do when it
comes to end-user productivity such as making and receiving phone calls, emailing, capturing and
Mobile Security
editing photos and videos, accessing the Internet, and in some cases, remotely accessing data and
resources on a private or public network. With all these functions, you can assume all the same
threats related to desktop computers and laptops will apply. For example, viruses and spam can
infect mobile devices as they would desktop and wireless devices by email or downloaded
applications and due to the portability, small size, and always-connected state, threats such as loss,
theft, and damage due to dropping are prominent.
Enable screen lock The screen lock option on all mobile devices should be enabled with a
and passcode passcode, and strict requirements on when the device will be locked. You
settings can specify how long the device is active before it locks, which typically
ranges from 1 minute to 5 minutes. Once the device is locked, it can only be
accessed by entering the passcode that has been set up by the user. This
security control prevents access to the device if it is misplaced or stolen.
On some devices, you can configure the passcode settings to erase all data
stored on the device after a certain number of failed logon attempts.
Often, enabling screen lock can be a requirement in an organizational
security policy, no matter if the mobile device is provided by the employer
or the individual.
Be aware of pattern passcodes that require a user to complete a specific
action on the touch screen to activate the device. Most of the time, the
smudge pattern is visible on the surface and can be re-created to gain access
to the device. Using a numeric pin or a password is considered more secure.
Other secure screen lock methods include fingerprint locks and face locks.
Both of these use biometrics to authenticate the user to their device. An
insecure screen lock method is the swipe lock, which simply requires that
the user swipe as indicated on the screen. Although this is faster and more
convenient than other locking methods, it should be avoided.
Configure device When available, all mobile devices should be configured to use data
encryption encryption to protect company-specific and personal data that may be
stored and accessed on the device. This method is effective as long as the
hardware cannot be accessed to steal the data. Along with device
encryption, data encryption should also be used so when data is accessed by
physically taking the device apart, the data remains secured.
Device encryption can also be a requirement in an organizational security
policy.
Require remote Data wiping is a method used to remove any sensitive data from a mobile
wipes device and permanently delete it.
Remote wiping is also available for some devices, so you can perform these
functions remotely in case the phone is lost or stolen. Wipe and sanitization
guidelines and requirements might be included in an organization's security
policy if mobile devices are issued to employees for professional use. In
some cases, Admins will have rights to remote in to any device that is
supported by the organization.
Enable location GPS tracking service functionality is available on a number of mobile
services and devices and can be added in most cases when required for business reasons.
applications This feature is used as a security measure to protect and track mobile
devices that may be lost or stolen.
If a mobile device does not have the locating functionality built in, then you
can download a locator application that can track and locate a lost or stolen
device.
Note: For additional information, check out the LearnTO Secure a Mobile Device
presentation in the LearnTOs for this course on your CHOICE Course screen.
You may want to show
the LearnTO Secure a
Mobile Device
presentation from the
CHOICE Course screen
or have students
navigate out to the
Course screen and
watch it themselves as a
supplement to your
instruction. If not, please
remind students to visit
the LearnTOs for this
course on their CHOICE
Course screen after
class for supplemental
information and
additional resources.
ACTIVITY 17-3
Examining Mobile Security
Scenario
In this activity, you will examine mobile security components and measures.
1. How can the use of mobile devices by employees affect the security of an organization as a whole? For this activity, have the
A: Mobile devices can function much like a regular computer; therefore, when they are used to send students use their own
and receive corporate emails, and to access systems and data within the corporate network, they mobile devices to
are a vulnerability. If lost or stolen, the devices can be used to access sensitive data or launch explore the different
attacks. Mobile devices should be secured just as any other system on the corporate network. security features and
how they can be
2. Examine some of the security features on a mobile device. Using the main menu, open the security configured. Students can
settings for your device. What specific security settings are available? also work in groups
when needed, and can
A: Answers will vary, but may include a screen lock setting, device encryption options, and GPS
share mobile devices.
tracking features.
Alternatively, you can
demonstrate this activity.
3. Now, pair up with a partner who has a different mobile device and examine the security features on that
device. Use the main menu to open the security settings. Are the security settings similar? Are there
different options available?
If time permits, install an
4. Tap to open the various options and check out the security settings that can be customized, such as the app scanner, for
screen lock feature, device encryption options, and GPS tracking features. Compare the available example Bluebox
settings on a couple of different devices. Security Scanner, so
students can see the
kinds of information such
a scanner can provide.
TOPIC D
Data Destruction and Disposal Methods
Most computing storage devices have a limited life span due to mechanical wear, technological
obsolescence, or slow access speeds. Instead of just sending these to the land fill or for recycling,
you need to first make sure that the data that was stored on the storage device is no longer
accessible. In this topic, you will examine methods for data destruction and disposal.
Physical Destruction
Physical destruction of computer media components ensures that the data is unrecoverable.
Effective methods include using a shredder, incinerator, drill, or smashing the platters completely to
Physical Destruction
change the physical makeup of the component so that it cannot be reassembled or recognized.
Other methods include using a degausser to demagnetize the internal components of the device so
that they are unreadable or using electromagnetic waves to alter the magnetic components inside the
device so that they are unreadable and unrecoverable.
Third parties that offer data destruction services often present their clients with a certificate of
destruction upon completion. This certificate is meant to be an auditable record of the data’s
destruction. The certificate may include information such as the date of destruction, the model and
serial number of the destroyed drive, the method of destruction used, and more.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Physically Destroy Information.
Recycling or Repurposing
Disk formatting is the process of deleting file systems from a computing device in order to clean the
computing device for reuse. Proper formatting should be conducted to prevent any data remnants
Recycling or
from being accessed on the device. This process can be done in two ways:
Repurposing • Low level formatting is the process of writing track sector markings on a hard disk. This level of
formatting is performed when the hard disk is manufactured.
• Standard formatting, also called high-level formatting, is an operating system function that builds file
systems on drives and partitions. It tests disk sectors to verify that they can be reliably used to
hold data. It marks any unreliable sectors as bad sectors that cannot be used.
As a security best practice, standard formatting should be done to ensure that most data is removed
from a device. However, some forensic tools may be able to recover data even after it has been
formatted. To truly ensure that all data has been removed from a drive, while keeping the drive
reusable, you need to securely wipe it. Wiping a drive most commonly involves overwriting the
existing data with either random data, or with all zero bits. This ensures that your sensitive data is
not recoverable.
• Install remote wiping software on portable devices so the information can be wiped if the device
is lost or stolen.
• Check the storage media after using any sanitation method and ensure that none of the data is
readable or recoverable.
Note: A data wipe gets rid of all data. Data sanitization only gets rid of sensitive data.
ACTIVITY 17-4
Identify Data Destruction and Disposal Methods
Scenario
For your test lab, you were provided with a variety of older equipment that had been
decommissioned by other departments within your organization. Some of the equipment is too
outdated for your use, so you need to prepare it for disposal. A computer disposal company your
organization has contracted with will be coming to pick up the devices next week, so you need to
make sure that all of the storage media has been properly sanitized before then.
You also have several applications that were developed in-house that you tested. Final versions of
the applications have been released and your manager wants to make sure that these preliminary
versions are not deployed by mistake. These were provided to you on various storage media
including DVD, USB drives, and portable hard drives. The USB drives and portable hard drives
could come in handy for other purposes, so you want to make sure that the data is removed, but the
devices are still functional.
In addition, your manager has asked you to research applications that can be deployed to users with
portable devices so that in the case of loss or theft, the devices can be remotely wiped. There are a
variety of smartphones, laptops, and tablets, running a variety of operating systems, deployed
throughout the organization.
1. What steps will you take to make sure that the storage devices in the equipment being sent for disposal
will be properly sanitized?
A: Answers will vary, but should include zeroing out the drive with disk wiping software, possibly
physically destroying the platters inside the hard drive, and verifying that the data is unreadable
and unrecoverable.
2. What steps will you take to make sure that the software you were given cannot be accessed?
A: Answers will vary, but might include physically destroying DVDs. For any device that you might
potentially reuse, you can use disk wiping software to destroy the data and preserve use of the
drive.
3. Search for remote wipe applications that might be deployed to users with portable devices. If possible,
find applications that can be used on multiple operating systems so that you have fewer applications to
support.
Summary
In this lesson, you implemented and described many concepts and techniques that can be used to
establish the desired level of security within an organization. Every organization will have different
security requirements based on the type of business they conduct. It is your job to understand those
requirements and know how security controls should be implemented to directly support those
needs.
What physical security controls have been employed at organizations where you have worked?
A: Answers will vary, but may include door access controls such as keypad or proximity card reader,
Encourage students to
video monitoring such as video cameras, emergency procedures in case of fire. use the social
networking tools
What steps has your organization taken to ensure the security of mobile devices? Have you planned ahead
provided on the CHOICE
in case the devices are lost or stolen? If so, how? Course screen to follow
A: Answers will vary, but may include installing antimalware apps, ensuring users enable screen lock and up with their peers after
passcode settings, configuring device encryption, requiring remote wipe capability in case of loss, the course is completed
enabling location services and applications, requiring that users back up their data, and ensuring that for further discussion
and resources to support
all patches and updates are applied.
continued learning.
Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will implement security controls. You will:
• Secure Windows and other operating systems.
• Deploy and enforce security best practices to secure a workstation.
• Secure SOHO wireless and wired networks.
• Identify methods for securing mobile devices.
Lesson Introduction
In the last lesson, you identified security threats, vulnerabilities, and controls. Now, you can
put that information to practical use in protecting your organization's hardware and data. In
this lesson, you will implement security controls.
608 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Secure Operating Systems
In this lesson, you will implement various types of security controls. In this topic, you will secure
operating systems.
Types of Users
Windows includes several built-in user accounts to provide you with initial access to a computer.
Permissions
You already know that a permission is a security setting that determines the level of access a user or
group account has to a particular resource. Permissions can be associated with a variety of resources,
Permissions
such as files, printers, shared folders, and network directory databases. Permissions can typically be
configured to allow different levels of privileges, or to deny privileges to users who should not
access a resource.
Rights and permissions can be assigned to individual user accounts. However, this is an inefficient
security practice, because so many permission assignments must be duplicated for users with similar
roles and because individual users' roles and needs can change frequently. It is more efficient to
create groups of users with common needs, and assign the rights and permissions to the user
groups. As the needs of individual users change, the users can be placed in groups with the
appropriate security configuration.
Read Read the file and view file attributes, ownership, and permissions.
Write Overwrite the file and change file attributes.
Read & Run applications and perform Read tasks.
Execute
Modify Modify and delete the file.
Full Control Change permissions, take ownership, and perform all other tasks.
There are six standard NTFS permissions that you can assign to folders or to drives.
List Folder View the names, attributes, and permissions of subfolders in the folder, but only
Contents see the names of files within the folder.
Read View names, attributes, permissions, and contents of files and subfolders in the
folder.
Write Create new files and subfolders in the folder, and change their attributes.
Special Permissions
Each of the standard NTFS file permissions is made up of several more granular permissions called
special permissions. Standard permissions are the most frequently assigned groups of permissions;
special permissions provide you with a finer degree of control.
For example, the standard Read permission is made up of the following special permissions:
• List Folder/Read Data.
• Read Attributes.
• Read Extended Attributes.
• Read Permissions.
ACTIVITY 18-1
Exploring NTFS Permissions
Data Files
C:\LocalData\New Text Document
Scenario
In order to check your understanding of NTFS permissions, you previously created a new folder
named LocalData and then created an empty file named New Text Document. You have a few
free minutes, so you decide to examine the permissions for the Administrators and Users groups
to the folder and file.
6. How were the permissions in the LocalData folder different from the permissions on the C drive?
○ Administrators did not have Full Control to the LocalData folder.
○ Users could not read files in the LocalData folder.
◉ The permissions on the C drive were set explicitly; the permissions on the LocalData folder were
inherited from the C drive.
○ The available permissions were not different.
8. True or False? The permissions in the New Text Document file were inherited from the LocalData folder
permissions.
☑ True
☐ False
ACTIVITY 18-2
Exploring Share Permissions
Scenario
In this activity, you will create a network share and assign share-level permissions.
How share permissions 1. Navigate to the C: drive and create a folder named Share# with the # being your student number.
are exposed to the user
varies depending on the 2. Share the Share# folder.
specific Windows a) Select the folder, display its pop-up menu, and select Share with.
operating system and b) Select Advanced Sharing.
how it is configured. c) If necessary, in the User Account Control dialog box, in the user name text box, type APLUS-
CLASS/Admin##.
d) Check Share this folder, and then select OK.
Consideration Description
Allow vs. Deny When choosing whether to allow or deny an action using permissions, you
need to choose carefully between the two. Deny is more restrictive than
Allow. If the Deny property is applied on either a file or a folder, it will
override any Allow permissions that may have been granted to the user.
Therefore, use of the Deny permission should be done sparingly. You
should deny permissions (using explicit Deny) only to a specific user when it
is necessary to override permissions that are otherwise allowed for the group
to which this user belongs.
When establishing permissions, administrators can specify whether the entry
being added should have access (Allow) or not have access (not Allow) to
the resource. It is more practical to clear all the Allow check boxes for a
group or a user, in effect denying them access to the resource without using
the absolute Deny option. “Not-Allow” access in this way is easier to
troubleshoot, manage and configure.
Moving vs. copying When permissions have been applied, moving a file or folder and copying
files and folders that file or folder will have different results. It is important to consider those
results when choosing whether to move or to copy your files or folders.
When you move a file or folder from one folder to another on the same
partition, it retains the permissions that were applied to it in its original
location. When you copy a file or folder from one directory to another, it
inherits the permissions of the folder or directory to which it has been
copied.
When you move a file or folder between partitions, the result is similar to
copying the file or folder: it will inherit the target folder's permissions.
File attributes You can set file attributes on files and folders, and these attributes can affect
the actions a user can have on that specific file or folder, regardless of the
permissions that have already been set. If a file or folder has the Read-Only
attribute, the attribute will override the permissions applied to users who are
accessing that file or folder.
Permissions Inheritance
Permissions that you assign to a folder are inherited by files and folders within that folder. It is
generally most efficient to group similar files together in a folder and assign permissions to the
folder, rather than to the individual files. Inherited permissions are indicated by gray background
check marks in the file or folder's security properties.
Permissions Propagation
If you modify the permissions for a parent folder, you can choose whether or not to propagate the
changes downwards, which means to apply those permissions changes to all of the subfolders within
the folder.
User Authentication
User authentication is a network security measure in which a computer user or some other network
component proves its identity in order to gain access to network resources. There are many possible
User Authentication
authentication methods; one of the most common is a combination of a user name and a password.
Most authentication schemes are based on the use of one or more authentication factors. The
factors include:
• Something you know, such as a password.
• Something you have, such as a key or an ID card.
• Something you are, including physical characteristics, such as fingerprints.
SSO
Single sign-on (SSO) is an access control property that you can use to provide users with one-time
authentication to multiple resources, servers, or sites. Users log in once with a single user name and
password to gain access to a number of different systems, without being asked to log in at each
access point. Different systems may use different mechanisms for user authentication, so SSO has to
use different credentials to perform authentication. With the widespread use of SSO, it is important
to ensure that user authentication is strong for the login; with one potential user name and password
providing access to a host of systems, it is critical that this single access point is being properly
secured.
Run as Administrator
You should log in as a regular user most of the time. You will protect the system by not making it as
easy to accidentally modify or delete files or folders, will know how other users will experience the
Run as Administrator
system, and not give attackers as large a footprint to exploit. When you are logged in as a regular
user and need to run an application or perform an action as an administrator, use the Run as
Administrator command from the item's shortcut menu.
BitLocker
Windows BitLocker® is a security feature of Windows Vista, Windows 7, Windows 8/8.1, Windows
Server® 2008, and Windows Server 2012. This security feature provides full disk-encryption
protection for the operating system, as well as all the data stored on the operating system volume. BitLocker
BitLocker encrypts all data stored on the operating system volume and is configured by default to
use a Trusted Platform Module (TPM). This feature ensures the protection of early startup
components and locks any BitLocker-secured volumes in order to prevent access or tampering
when the operating system is not running.
To use a TPM, you must have compatible system firmware and have TPM enabled in the firmware's
settings. You can also configure BitLocker to operate without a TPM.
BitLocker To Go is used to encrypt removable storage devices such as USB flash drives or portable
hard drives. These removable devices are locked and protected by default. You will need to specify
how you will unlock the drive when you enable BitLocker To Go. Typically, the removable storage
device is unlocked by using a password.
When you enable BitLocker or BitLocker To Go, you are prompted to save a recovery key backup.
This is used to recover the password if it is lost or forgotten. If you lose the recovery key and don't
know the password, the drive will remain inaccessible. The only way to use the drive would be to
reformat it, thus losing all data on the drive.
Windows 8 encrypts drives more quickly than in previous versions of BitLocker and BitLocker To
Go. Only the portion of the disk that is currently in use is encrypted. However, any additional data
stored to the disk later will also be encrypted automatically.
Note: The OS X equivalent to BitLocker is FileVault.
EFS
The Encrypting File System (EFS) is a file-encryption tool available on Windows systems that have
partitions formatted with NTFS. EFS encrypts file data by using digital certificates. If a certificate
authority is not available to issue a file-encryption certificate, the local system can issue a self-signed EFS
encryption certificate to users who want to encrypt files. Unlike NTFS permissions, which control
access to the file, EFS protects the contents of the file. With EFS, you can keep data secure even if
NTFS security is breached—for example, if an attacker steals a laptop computer and moves the
laptop's hard drive to another system to bypass the NTFS security implementations.
1. On your Windows 8.1 host computer, create a user named tester Point out that this is a
a) Open PC Settings, and select Accounts. simplified example of
b) Select Other accounts. using Run as
c) Select Add an account. administrator. If you
have time, initiate a
d) Because you are using this account to test the security of the local computer, select Sign in without
discussion of when it
a Microsoft account (not recommended).
would be practical to use
e) Select Local account. Run as administrator,
f) For User name, type tester such as for opening an
g) For Password and Reenter password, type !Pass1234 elevated Command
h) For Password hint, type same as admin account Prompt.)
i) Select Next.
j) Select Finish.
k) On the Manage other accounts page, select tester and select Edit. Consider discussing
l) Verify that the Account type is set to Standard user, and then select Cancel. these situations with the
class and asking them
2. Log on as tester, and open WordPad as a standard user. what needs to be done
to complete the
a) Select Start, and select the arrow next to Shut Down, and then select Switch User. assignment. Then, use
b) At the login screen, select tester and enter !Pass1234 as the password. the AD users and groups
c) Select Start, and if necessary, select a menu type and select OK. provided during course
d) In the search box, type wordpad and select WordPad in the flyout menu. setup to implement their
suggestions. Be sure to
WordPad opens automatically to a new, blank document.
assist them in defining
e) Close WordPad. the correct approach if
they are having trouble.
3. Open WordPad with administrative privileges, and switch back to your admin## account.
a) Select Start, right-click WordPad, and select Run as administrator.
UAC prompts you to provide administrator credentials. Use this question to
b) Select your admin## account, type your password, and select Yes. emphasize that NTFS
WordPad now opens with a new, blank document. permissions are
cumulative.
c) Close WordPad.
d) Log off tester, and log back on as admin##.
4. You’ve been assigned to assist with securing certain Windows folders against unauthorized access.
Only members of the Finance group should be able to view, access, and change files in the Finance
folder that is stored on the server. How could you ensure that other employees cannot access the
Finance folder?
A: Answers might include: disabling any inherited permissions for other users, and explicitly
assigning permissions to the Finance group.
5. If Ali Lund is a member of the Finance group and she is also given explicit permissions of Read &
Execute for the Finance folder, what are her effective permissions?
A: Her effective permissions will be the combination of the permissions she gets from the group and
the explicit permissions assigned to her user object.
6. Consider what would happen if share permissions were also assigned to the Finance folder. How might
Finance users be affected?
A: If the share permissions are more restrictive than the NTFS permissions, they will take
precedence and could cause access issues for the Finance group members.
7. The sales representatives’ laptops contain a lot of company confidential information. They want to keep
this information secure as they travel. What recommendations would you make to help protect this
data?
A: Answers might include implementing multifactor authentication. Many laptops now ship with
fingerprint scanners, so you might be able to easily implement two-factor authentication (user
name/password and biometrics). Or, you might implement virtual smart cards through Windows
8.1.
TOPIC B
Secure Workstations
In the last topic, you secured operating systems. There are additional tasks you can use to be sure
workstations are protected from unauthorized access. In this topic, you will secure workstations.
Setting password In most organizations, changing the password every two to three months is
expiration. sufficient. In other organizations, changing it more frequently might be
required. Remember that if it is changed too often, users will have more
trouble remembering their password and might be tempted to write it
down.
Changing default user Some devices come with default user names and passwords. One example
names and is wireless routers. Use the options built into the device to change the
passwords. default user name and password so that unauthorized users cannot easily
access the device. The default user name and password for wireless routers
can easily be found in an Internet search.
Note: Organizations often create users with a default password that
must be changed when the user logs on for the first time.
Require screensaver When a user steps away from the computer, they should lock the
passwords. computer. If they forget to do so, having a screensaver that comes on after
one minute and requires a password to unlock the system is a good backup
to locking the computer.
Require BIOS or Setting a BIOS or UEFI password will help prevent unauthorized users
UEFI passwords. from accessing the BIOS or UEFI settings. If users make unauthorized
changes to these settings, it might make their system stop working, make it
work less efficiently, or make it out of compliance with organizational
policies.
Require passwords. On most modern systems, you have to set a password in order to set up
the computer. If you are working with older systems, or other devices that
don't have passwords by default, you should configure the device to use a
password. Smartphones and tablets might not be configured to require a
password. Printers and routers might also not require a password to change
settings. All of these devices should require passwords whenever possible.
Account Management
There are several account management techniques you can use to make your users and their data
more secure. The items in the following table are just some of the most common; this is by no
means a complete listing of the account management tasks you will need to perform. Account Management
Account Description
Management Task
Restrict user Follow the principle of least privilege: Provide users with software with
permissions. only the minimal level of access that is necessary for them to perform the
duties required of them.
Configure login time You can configure the hours during which users can log in. You can also
restrictions. configure the account to allow the user access to the system for only a set
number of hours during that time period.
Disable the guest By default, the Guest account is disabled when you install Windows
account. operating systems. Enable this account only if you want to permit users to
log on as a guest.
Configure failed You can configure Account lockout threshold values. Most organizations
attempts lockout. set the value between three and five attempts, which allows users who
mistype their passwords the chance to re-enter them before their accounts
are locked. You can also configure how long the account will be locked.
Many organizations set this interval to between 5 and 30 minutes; other
organizations require that an administrator unlock the account.
Configure a timeout Most devices, including desktop computers, laptops, smartphones, and
screen lock. tablets, lock the screen after a certain period of time. This timeout value can
be changed based on user needs. The user will need to enter a password or
use another security unlock method to access the device again after it has
been locked.
Autorun
Disable autorun to prevent malware and other viruses from being loaded automatically with a
device, such as a USB drive. Disabling the autorun feature will restrict any infected files from
Autorun
automatically loading.
Data Encryption
Encryption is a cryptographic technique that converts data from plain, or cleartext form, into coded, or
ciphertext form. Only authorized parties with the necessary decryption information can decode and
read the data. Encryption can be one-way, which means the encryption is designed to hide only the Data Encryption
cleartext and is never decrypted. Encryption can also be two-way, in which ciphertext can be
decrypted back to cleartext and read.
6
A cipher is a specific set of actions used to encrypt data. Plaintext is the original, unencoded data.
Once the cipher is applied via enciphering, the obscured data is known as ciphertext. The reverse
process of translating ciphertext to cleartext is known as deciphering.
It is becoming common to encrypt many forms of communications and data streams, as well as
entire hard disks. Some operating systems support whole-disk encryption, while some other
commercially available open-source tools are capable of encrypting all or part of the data on a disk
or drive.
An encryption algorithm is the rule, system, or mechanism used to encrypt data. Algorithms can be
simple mechanical substitutions, but in electronic cryptography, they are generally complex
mathematical functions. The stronger the mathematical function, the more difficult it is to break the
encryption. A letter-substitution cipher, in which each letter of the alphabet is systematically
replaced by another letter, is an example of a simple encryption algorithm.
Patch Management
Patch management is the practice of monitoring for, obtaining, evaluating, testing, and deploying
integral fixes and updates for programs or applications, known as patches. As the number of
Patch Management
computer systems in use has grown over recent years, so has the volume of vulnerabilities and
corresponding patches and updates intended to address those vulnerabilities. However, not every
computer within an organization will necessarily be compatible with a certain patch, whether it be
because of outdated hardware, different software versions, application dependencies, and so on.
Because of the inconsistencies that may be present within the various systems, the task of managing
and applying patches can become very time-consuming and inefficient without an organized patch
management system. In typical patch management, software updates are evaluated for their
applicability to an environment and then tested in a safe way on non-production systems. If the
patch is validated on all possible configurations without causing more problems, only then will the
valid patch be rolled out to all computers throughout the entire organization.
A patch management program might include:
• An individual responsible for subscribing to and reviewing vendor and security patches and
updating newsletters.
• A review and triage of the updates into urgent, important, and non-critical categories.
• An offline patch-test environment where urgent and important patches can be installed and
tested for functionality and impact.
• Immediate administrative push delivery of approved urgent patches.
• Weekly administrative push delivery of approved important patches.
• A periodic evaluation phase and full rollout for non-critical patches.
• Install the latest operating system service packs and security update patches.
• Install the latest application patches for utilities that are included in the operating system as
well as for web browsers and third-party application software.
• Manage user accounts.
• Use policy settings to disable or delete guest accounts or other unnecessary accounts, and
rename default accounts, so attackers cannot use known account names to access the system.
• Restrict user permissions so that only those users who absolutely need access are allowed into
the system.
• Disable the guest account on all machines to prevent unauthorized access to any shared files
and folders on the workstation.
• Educate users to follow best security practices, such as recognizing and avoiding hoaxes,
phishing attacks, and potential malicious software sources.
• Apply workstation security measures.
• Implement antivirus software to protect against malicious software.
• Block pop-ups in your web browser.
• Install a firewall and configure the appropriate open and closed ports and the program
filtering settings.
• Implement warning messages or banners displayed at user login to warn users that only
authorized use is allowed. These banners could be important in future civil litigation or
criminal prosecution, and they can put all users on notice that their activities might be
monitored. All warning banners should comply with the legal requirements of your
jurisdiction.
• Disable autorun to prevent malware and other viruses from being loaded automatically with a
device, such as a USB drive. Disabling the autorun features will restrict any infected files from
automatically loading.
• Enable the screensaver and password functionality to lock systems when idle.
• Enable automatic operating system updates through the Control Panel.
• Limit the number of shared resources on a system. Use share and file system permissions to
restrict access to file and print resources.
ACTIVITY 18-4
Securing a Workstation
Data Files
C:\Encrypt
Scenario
A user recently received a new computer and has asked you to implement some of the security
features provided in Windows 8.1 Pro. You decide to encrypt a folder that contains sensitive data
and add more restrictive User Account Control settings.
2. Adjust the User Account Control settings to always notify the user when administrative-level changes
are made to the computer.
a) Open Control Panel, and enter uac in the Search Control Panel text box.
b) Select Change User Account Control settings.
c) If prompted, by UAC Credentials, type Admin## with a password !Pass1234
d) Move the slider bar to Always Notify.
e) Select OK.
f) Select Yes.
g) Close Control Panel.
TOPIC C
Secure SOHO Networks
Earlier in the course, you installed and configured a SOHO network. As with any other computer
network, SOHO networks need to be secured to prevent unauthorized access and other threats. In
this topic, you will examine how security controls are implemented to secure both wired and
wireless SOHO networks.
Securing your network is critical to keeping data, systems, and resources safe from unauthorized
access. You must understand what the security implications are when a network is improperly
secured. Security controls and implementations restrict access to sensitive data and system resources.
As the A+ technician, it's your job to make sure that the right security controls are implemented and
functioning as expected.
Change default user Change the default user name and password for all devices connected to the
name and password network. Use strong password guidelines when assigning the new passwords.
Enable MAC MAC address filtering provides a simple method of securing a network.
filtering Typically, an administrator configures a list of client MAC addresses that are
allowed to join the network. Those pre-approved clients are granted access if
the MAC address is known by the network.
Assign static IP When implementing a small network, you can assign each device on the
addresses network a static IP address. When each device has a designated IP address,
you remove the plug-in-and-go capability that DHCP provides, so only
those devices with IP addresses that are in the same range as the static
addresses will be able to connect to the network.
Disable ports Disabling unused network ports can prevent unauthorized access to your
network. Attackers look for open ports on networks to launch an attack.
Method Description
Firewall settings Windows client firewalls can be configured for networking to ensure that
they are secure against unauthorized access attempts and attacks. Consider
the following settings when setting up the firewall:
• Enabling or disabling port security on certain ports.
• Inbound and outbound filtering. The user can set up rules or exceptions
in the firewall settings to limit access to the web.
• Reporting and logging activity.
• Malware and spyware protection.
• Pop-up blocking.
• Port assigning, forwarding, and triggering.
• Enabling or disabling the Windows Firewall when necessary.
Windows Firewall is a software-based firewall that is included with Windows
Vista and later operating systems. Once an operating system is installed,
Windows Firewall is automatically installed and enabled. By default, the
firewall blocks unsolicited incoming traffic on all ports. You can open
blocked ports and configure other firewall settings by using the Windows
Firewall program in the Control Panel or through Windows Security Policy
Settings. Windows Firewall can be configured to drop outgoing traffic as
well as incoming traffic.
Port forwarding/ NAT (network address translation) is used on most SOHO routers to
mapping redirect communication requests from one IP address and port number to
another through port forwarding or mapping. This allows one IP address
outside the network to be used by multiple devices and systems inside the
network.
Content filtering Through operating system features or third-party apps, you can filter
and parental content. You can filter based on age ranges, adult content, or other specific
controls terms. Parental control filtering can be configured to send a report to a
specified email address on a regular basis to let you know where the user has
gone while online, the amount of time spent online, and other configurable
control settings.
Firmware updates As with other devices, SOHO computers, printers, routers, and other
devices need to have firmware updates applied as needed.
Apply physical Depending on the location of the network, you may need to ensure that the
security controls devices and network components cannot be accessed by unauthorized users.
This may be as simple as making sure that all the entrances have proper
security controls installed. This could be anything from locked doors,
surveillance systems, to installing a biometric identification system.
Perform Perform regular security assessments to determine if current controls are
assessments meeting the needs of the organization.
Consider using tools
such as Kali Linux Live
CD to perform Wireless Security
assessments of the
network security. Also, Wireless security is any method of securing a wireless local area network (LAN) to prevent
suggest students take unauthorized network access and network data theft. You need to ensure that authorized users can
the CASP course for connect to the network without any hindrances. Wireless networks are more vulnerable to attacks
more information on than any other network system. For one thing, most wireless devices such as laptops, mobile
this. phones, and other mobile devices search and connect automatically to the access point offering the
best signal, which can be coming from an attacker. Wireless transmissions can also be scanned or
sniffed out of the air, with no need to access physical network media. Such attacks can be avoided
Wireless Security by using relevant security protocols.
Method Description
Setting encryption • Enable WPA2 encryption.
• Change the default encryption keys.
• Avoid using pre-shared keys (PSK).
Note: If you need to share keys, use asymmetric key sharing.
Properly place the antenna Position the router or access point and antenna safely. The radio
and access point frequency range of each access point should not extend beyond the
physical boundaries and layout of the organization's facilities.
Secure the wireless access Specific procedures for implementing security options on wireless
point devices, as well as the options your devices support, will vary. Always
check the documentation from your wireless device manufacturer
before implementing any security configurations. Common methods
include:
• Implementing some form of user authentication.
• Implementing a security protocol that requires over-the-air data
encryption.
• Updating firmware on the device to implement any manufacturer
security patches and enhancements.
• Restricting unauthorized devices from connecting to the WAP by
filtering out unauthorized MAC addresses.
• Implementing a firewall. For a small office or home office, enable
a firewall on the WAP, and then also on the host computer to
further secure your network.
• Configuring vendor-recommended security settings on your
wireless router or access point.
Radio power levels Adjust the radio power level controls on routers and access points as
needed to help minimize power consumption within the wireless
network. It can be difficult to manage the radio power of wireless to
reduce the power used, while providing the right level of radio power
to operate the network.
Note: This is also known as antenna power.
WPS The Wi-Fi-Protected Setup (WPS) standard was released by the Wi-
Fi Alliance to enable an easy yet secure setup of small home
networks. The goal of the standard was to ease the setup and
complicated configuration settings of wireless routers designed for
use in SOHO networks. The standard can easily be cracked by brute
force attacks and has been reported to be less secure. If you
encounter a router with WPS enabled by default, you may need to
turn it off once the router is connected.
Configure the workstation • Do not auto-connect to open Wi-Fi networks.
• Enable firewalls on each computer and the router.
• Assign static IP addresses to devices to prevent inadvertent
broadcasting of IP addresses to unauthorized parties.
ACTIVITY 18-5
Securing a SOHO Wireless Network
Scenario
Remind students that You will soon be setting up several SOHO wireless networks. Before you do so, you want to
the website linked in this practice. You found an online simulator for the model of wireless router that you will be installing
activity emulates a for the SOHO networks.
common wireless router
configuration interface, Note: Activities may vary slightly if the software vendor has issued digital updates. Your
and that they are not instructor will notify you of any changes.
actually connected to a
wireless router.
Note: Because you are using an emulator, you can use all lowercase letters in
the Network Name (SSID) text box.
d) Select Save Settings and, in the Message from webpage message box, select OK.
e) Select Save Settings again, and then select Continue.
d) In the Local Management Access section, clear the HTTP check box and check the HTTPS check
box.
e) In the Local Management Access section, for the Access via Wireless option, select Disabled.
f) In the Remote Management Access section, verify that Remote Management is disabled.
g) At the bottom of the web page, select Save Settings.
h) On the Your settings have been successfully saved page, select Continue.
i) Close Internet Explorer.
TOPIC D
Secure Mobile Devices
So far in this lesson, you have secured OSs, workstations, and SOHO networks. To fully protect
your computing environment, there is one more category of devices that you need to secure. In this
topic, you will identify methods for securing mobile devices.
Screen Locks
The screen lock option on all mobile devices should be enabled with a locking option, and strict
requirements on when the device will be locked. You can specify how long the device is active
Screen Locks
before it locks, which typically ranges from 1 minute to 5 minutes. Once the device is locked, it can
only be accessed by entering the required input that has been set up by the user. This security
control prevents access to the device if it is misplaced or stolen.
Locking options include:
• Passcode locks
• Fingerprint locks
• Face locks
• Swipe locks
On some devices, you can configure the passcode settings to erase all data stored on the device after
a certain number of failed logon attempts.
Often, enabling screen lock can be a requirement in an organizational security policy, no matter if
the mobile device is provided by the employer or the individual.
Be aware of pattern swipe locks that require a user to complete a specific action on the touch screen
to activate the device. Most of the time, the smudge pattern is visible on the surface and can be re-
created to gain access to the device. Using a numeric pin or an alphanumeric password is considered
more secure.
Remote Wipe
Data wiping is a method used to remove any sensitive data from a mobile device and permanently
Remote Wipe
delete it.
Remote wiping is also available for some devices, so you can perform these functions remotely in
case the phone is lost or stolen. Wipe and sanitization guidelines and requirements might be
Ask students if they
included in an organization's security policy if mobile devices are issued to employees for
have experience with professional use. In some cases, Admins will have rights to remote in to any device that is supported
any remote wipe apps by the organization.
for mobile devices.
Locator Applications
Locator Applications GPS tracking service functionality is available on a number of mobile devices and can be added in
most cases when required for business reasons. This feature is used as a security measure to protect
and track mobile devices that may be lost or stolen.
Share any stories from If a mobile device does not have the locating functionality built in, then you can download a locator
the news, your life, or application that can track and locate a lost or stolen device.
ask students to share
stories about how If a mobile device has a locator app installed and the device is lost or stolen, some apps allow the
locator apps have user to remotely enable features in the app. One feature that can be quite useful is enabling the
helped locate and camera on the phone. It has been reported that sometimes the thief has been captured using the
recover mobile devices. photos taken in this manner.
Biometric Authentication
Biometric Authentication
Some mobile devices can be accessed using biometric authentication. The device might use the
built-in camera to do facial recognition. It also might have a fingerprint scanner. Both of these
options need to be configured and multiple scans of the face or fingerprint will need to be
completed to set up the device to use these features. Consider demonstrating
using biometric
authentication on a
Full Device Encryption mobile device.
When available, all mobile devices should be configured to use data encryption to protect company-
specific and personal data that may be stored and accessed on the device. This method is effective as Full Device Encryption
long as the hardware cannot be accessed to steal the data. Along with device encryption, data
encryption should also be used so when data is accessed by physically taking the device apart, the
data remains secured.
Device encryption can also be a requirement in an organizational security policy.
Multifactor Authentication
Like computers, mobile devices can be configured to use multifactor authentication. This might
include entering a PIN in addition to entering a swipe pattern, or using biometric authentication
Multifactor
with a knowledge-based authentication factor.
Authentication Another multifactor authentication process has the user enter a passcode using any of the previously
mentioned authentication methods, then enter a security code. The security code is sent to the user's
email, as an SMS text message, or via a phone call. On a Microsoft account, using the two-step
For more information verification through the authenticator app will apply to all services and devices that support the two-
about Google step verification process. This includes services such as the Windows 8/8.1 operating systems,
Authenticator, refer to outlook.com, Microsoft Office applications, and OneDrive.
https:// Google Authenticator is an authenticator app that can be configured for Android, Blackberry, and
support.google.com/
accounts/answer/
iOS devices. This enables you to set up two-step verification by using text messages or phone calls
1066447?hl=en. as well as by generating codes that can be received even without an Internet connection or mobile
service.
Firewalls
Some mobile devices include firewall hardware and software built into the device. This helps protect
from unauthorized connections from other devices that are attempting to connect to and
Firewalls
communicate with or through the mobile device. The firewall can be configured to block apps on
the device from connecting and communicating with services outside of the device. It provides
protection against most common types of attacks.
• Baselines outline the minimum level of security required for a system, device, network, or
premises. For instance, all visitors must agree to allow searches of bags or briefcases upon
request.
• Guidelines are documents that outline best practices and recommendations to help conform to
policies.
Bring Your Own Device (BYOD) and Corporate Owned, Personally Enabled (COPE) policies define how
user-owned or organization-owned mobile devices are to be used when the device is used for
organizational communication and data storage. This BYOD movement provides user satisfaction, Ask students if their
but sometimes at a cost to the organization. Having users purchase their own devices and contracts organizations have
saves organizations money initially, but might end up costing more in lost data and the introduction BYOD or COPE policies.
of malware on the corporate network if policies and procedures to protect the data are not created
and adhered to. Organizations created COPE to address some of the concerns created by BYOD.
Some examples of BYOD and COPE policies can be found at https://www.whitehouse.gov/
digitalgov/bring-your-own-device. As the document states, implementing these policies is an
iterative process. Technologies evolve, new threats are identified, and new devices and services
become available. Policies need to be updated to address these changes and improvements.
ACTIVITY 18-6
Securing Mobile Devices
Scenario
The number of mobile devices has grown substantially throughout the organization in the past few
months. You want to make sure you are familiar with various ways to make mobile devices more
secure.
Be prepared to assist 1. Examine the Security settings for your mobile device.
students with securing a) Examine the lock screen options.
the mobile devices you b) Determine if a locator app is installed.
have available. If no c) Examine the encryption settings.
mobile devices are
d) Examine installed certificates.
available, you might use
the Visual Studio e) Examine any other security settings available on your device.
Emulator for Android,
Eclipse Android 2. Verify that antivirus and antimalware apps are installed.
Emulator, or Xamarin
Android or IOS Note: If no antivirus or antimalware app is installed, your instructor might have
emulators. you install an app.
If no antivirus or
antimalware app is
installed and time
permits it, have students
install one, or at least
search the appropriate
app store to locate
available antivirus or
antimalware apps.
Summary
In this lesson, you implemented and described many concepts and techniques that can be used to
establish the desired level of security within an organization. Every organization will have different
security requirements based on the type of business they conduct. It is your job to understand those
requirements and know how security controls should be implemented to directly support those
needs.
Which security measures do you feel are the most important? Which are the minimum measures that
should be taken? Does your organization implement good security practices?
Encourage students to
A: Answers will vary, but may include following a company's security policy or entering a password that use the social
meets strong password requirements and installing antivirus software on workstations. networking tools
provided on the CHOICE
What physical security controls have you had experience with? What controls do you think are the most Course screen to follow
common? up with their peers after
A: Answers will vary, but may include using security badges, or fobs, to enter buildings, or having to sign the course is completed
in at a company's entryway. for further discussion
and resources to support
Note: Check your CHOICE Course screen for opportunities to interact with your classmates, continued learning.
peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Lesson Objectives
In this lesson, you will troubleshoot system-wide issues. You will:
• Troubleshoot PC operating system problems with appropriate tools.
• Troubleshoot common mobile operating system and application issues.
• Troubleshoot wired and wireless networks using appropriate tools.
• Troubleshoot common PC and mobile security issues using appropriate tools and best
practices.
Lesson Introduction
Throughout the course so far, you focused on troubleshooting the hardware components
that physically make up a personal computer or mobile device. You are well aware that there
are other essential components needed for the PC or mobile device to work properly; the
OS, the network, and security are all integral parts of the computing environment. In this
lesson, you will troubleshoot system-wide issues.
You can have all of the components of a PC or mobile device properly installed and
configured, and still not be able to perform the tasks that you need to perform. Software,
network, and security issues can present their own sets of problems for you to troubleshoot
and resolve.
642 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
TOPIC A
Troubleshoot PC Operating Systems
In this lesson, you will troubleshoot system issues. The operating system is an essential component
in the computer environment, managing all the resources that make up the system and providing the
interface for users to interact with these resources. If the OS is not functioning properly, the
computer will not be able to perform as needed. In this topic, you will troubleshoot PC operating
systems.
As a computer support professional, you will be the first line of response to help users when
problems arise with their PCs. You will need the knowledge to recognize and diagnose problem
conditions, and you will need to respond to those problems with the appropriate corrective action.
The information, utilities, and skills in this topic should provide you with the diagnostic and
troubleshooting toolkit you will need to identify and correct a range of possible PC problems.
Pre-boot sequence The pre-boot sequence begins when the power is turned on. The
computer runs Power-On Self Test (POST) routines to determine the
amount of physical memory and to identify and check the other hardware
components present. If the computer has a PnP BIOS, the hardware is
recognized and configured. The computer BIOS locates the boot device,
and then loads and runs the Master Boot Record (MBR). The MBR scans
the partition table to locate the active partition, loads the boot sector on
the active partition into memory, and then executes it.
Boot sequence The boot sequence is when the operating system is selected, and the
hardware configuration is detected and loaded. It has four subphases:
initial boot loader, operating system selection, hardware detection, and
If you have a dual-boot configuration selection. In Windows Vista and later, this is accomplished
system, consider by the winload.exe and Windows Boot Manager components. (In
demonstrating how to Windows XP and earlier operating systems that use the NT kernel, this
display the system was done with NTLDR (NT Loader) and the boot.ini file.)
startup settings and
point out the options for Kernel load sequence During the kernel load sequence, the operating system components are
changing the default OS loaded into memory.
and how long the list of Kernel initiation In the kernel initiation sequence, the Windows kernel takes control of the
available OSs is
sequence system. At this point, the Microsoft Windows logo appears, along with a
displayed before the
default OS is loaded. status bar.
Sequence Description
Logon sequence During the logon sequence, Winlogon.exe starts the Local Security
Authority (LSA), and the Logon screen or Logon dialog box appears.
Users can now log on, while Windows continues to load low-level drivers
and services in the background. The boot process is considered complete
when a user successfully logs on. The Clone control set built is copied to
a new control set called LastKnownGood, thus preserving a copy of the
settings in the successful boot sequence.
Feature Description
Secure Boot Newer computers equipped with UEFI and TPM are configured by default to
only load trusted bootloaders. If you need to boot from another bootloader that
is not trusted, you can configure Secure Boot to allow booting from the
untrusted bootloader.
Trusted Boot The integrity of all components of the startup process are checked by the
operating system before the components are loaded.
Early Launch Before loading any drivers, they are tested by ELAM. Any drivers that are not
Anti-Malware approved are prevented from being loaded.
(ELAM)
Measured Boot The boot process is logged by the system firmware. This information can be
sent by Windows to a trusted server. The server checks the health of the system
and allows access to the network only if the health of the system meets the
criteria set on the server. If the health parameters are not met, the server might
be configured to allow the client access to a limited-access, quarantined network
where remediation can be performed to bring the system into compliance with
the health requirements.
5. The boot loader determines the kernel and locates the corresponding kernel binary. It then
uploads the respective initrd image into memory and transfers control of the boot process to
the kernel.
6. The kernel configures the available hardware, including processors, I/O subsystems, and storage
devices. It decompresses the initrd image and mounts it to load the necessary drivers. If the
system implemented any virtual devices, such as LVM or software RAID, then they are
initialized. The components configured by the kernel will be displayed one by one on the screen.
7. The kernel mounts the root partition and releases unused memory. To set up the user
environment, the init program is executed.
8. The init program searches for the inittab file, which contains details of the runlevel that has
to be started. It sets the environment path, checks the filesystem, initializes the serial ports, and
runs background processes for the runlevel.
9. If graphical mode is selected, then xdm or kdm is started and the login window is displayed on the
screen.
10. The user enters the user name and password to log in to the system.
11. The system authenticates the user. If the user is valid, then the profile, the .login,
the .bash_login, and the .bash_profile files are executed. The shell is started and the system
is ready for the user to work on.
Note: xdm refers to the X Window Desktop Manager. Users who utilize GNOME or KDE,
use either gdm or kdm, respectively. In CentOS 7, the GNOME Display Manager gdm is the
default desktop manager.
Note: In some cases, when system directories cannot be mounted on the /mnt/sysimage
directory, the prompt will be available for troubleshooting.
The chroot mode shifts the root (/) directory to a different location for recovery. It is also known
as jail mode because it can be used in production scenarios to ensure a user will not be able to access
any other file or directory except this directory and its subdirectories.
The following table can help you troubleshoot the boot process.
Cause Solution
If the boot loader screen does not appear, then Reconfigure the /boot/grub2/grub.cfg file
GRUB (GRand Unified Bootloader) may not be and/or reinstall GRUB in rescue mode.
properly configured.
If Linux does not boot on a Windows/Linux Use the Linux distribution install disk to reinstall
dual boot system, then GRUB or LILO (LInux GRUB or LILO to the MBR.
LOader) may not be installed.
If the grub> prompt appears, then GRUB may Install GRUB again in rescue mode.
be corrupted.
If the kernel does not load, then the kernel Install a new kernel in rescue mode.
image may be corrupted.
If the kernel does not load, then the parameter Specify the correct parameter by editing GRUB
passed during the system startup may be wrong. on the boot loader screen.
If there is a kernel panic, then: Use the applicable solution:
1. The boot loader may have been 1. In rescue mode, configure the boot loader
misconfigured. configuration.
2. The /etc/inittab file is misconfigured, or 2. In rescue mode, define parameters in
Systemd configuration is incorrect or the /etc/inittab or Systemd config files
incomplete. correctly.
3. The root filesystem is misconfigured. 3. In rescue mode, run a filesystem check using
the fsck command on the filesystem.
If the kernel loads, but /etc/rc.d (or systemd In rescue mode, fix the /etc/fstab file.
settings) causes an issue, then the /etc/fstab
file may have an error.
If the kernel loads, but /etc/rc.d (or systemd In rescue mode, run the fsck command
settings) causes an issue, then the fsck utility manually.
may have failed.
If the services do not start correctly, then they Configure the services properly.
may not have been configured properly.
Screen Description
Question mark The local or network startup disk could not be found. The disk it is looking for
folder instead of is specified in System Preferences in the Startup Disk pane. This might just
Apple logo be displayed because it is taking longer than normal to locate the startup disk. If
it remains, use Startup Manager to start the Mac and reselect the startup disk
in System Preferences.
Prohibitory The "Not" symbol (a circle with a slash through it) indicates that the system
symbol instead of was unable to find a valid System Folder from which to start up. It might be
Apple logo because the Mac is attempting to start from the wrong OS X version or you
might need to use OS X Recovery to reinstall the OS.
Lock icon The lock icon is displayed if a firmware password has been set and you are
attempting to boot the Mac from an external drive or through OS X Recovery.
Spinning globe The spinning globe indicates that the Mac is being started from a network
startup disk.
Battery icon The battery icon is displayed when a notebook doesn't have enough power left
in the battery to start up. You will need to connect the power adapter before
attempting to start up again.
PIN code The PIN lock screen is displayed if the Mac has been locked with Find My
Mac. The user will need to enter the four or six digit PIN that was configured
in order to start up.
Operating System
Troubleshooting Tools (2
Slides)
Tool Description
Tool Description
Refresh If you have attempted to resolve a Windows 8/8.1 problem and have had no
success, you can refresh the system. You have three options when you select
Settings→Change PC Settings→Update and recovery→Recovery from the
Charms bar:
• Refresh your PC without affecting your files. Apps that came with the PC
and any apps you installed using the Windows Store will be reinstalled. A list of
apps installed from other sources such as downloads from the web and from
DVD is created as these will need to be reinstalled. Also, if the system was
upgraded from Windows 8 to 8.1, you will need to perform the upgrade again
after performing the refresh. All of your data files will remain untouched.
• Remove everything and reinstall Windows. This option is useful if the PC is
being recycled or redeployed to another user.
• Advanced startup. This option enables you to recover by starting up from a
device or disk such as a USB drive or DVD. This option enables you to change
the PC firmware settings, change Windows startup settings, or restore
Windows from a system image.
MSCONFIG The MSCONFIG utility is a system configuration tool available in the Tools group
from the Help and Support Center. This tool is frequently used to test various
configurations for diagnostic purposes, rather than to permanently make
configuration changes. Following diagnostic testing, permanent changes would
typically be made with more appropriate tools, such as Services to change the
startup settings of various system services. When troubleshooting system issues,
you can use this tool to:
• Determine what files are initiated on startup.
• Manage services that launch on startup.
DEFRAG When systems are running slow and performance is suffering, then you may want
to run the DEFRAG utility. This utility is used to reduce fragmentation on the
hard disk by reorganizing stored data. This can affect disk performance. The tool
can be launched from Computer Management.
REGSVR32 The REGSVR32 utility is used to register Object Linking and Embedding (OLE)
controls that are self-registerable. If you are having issues with Windows or
Internet Explorer®, then you can launch this tool and unregister these controls,
then re-register them. Common controls managed with this tool are Dynamic Link
Library (DLL) and ActiveX files.
REGEDIT Use the REGEDIT utility to make changes to infected or corrupted files within
the Registry. Use caution when viewing or modifying these files in the Registry.
EXPAND The EXPAND tool pulls one or more update files from a compressed product
update package. If operating system files are damaged, you can pull their
equivalent files from a fresh system image to replace the damaged ones.
Event Viewer Use the Event Viewer to look at a system's event logs, which may contain specific
information about system errors or significant events on the computer. This can
be helpful in troubleshooting various system issues.
Safe Mode Safe Mode is a Windows system startup method that loads only a minimal set of
drivers and services. If a non-critical driver or service on your system is causing a
severe error, you can use Safe Mode to omit all non-critical drivers and services
from the boot sequence; start the system; load additional drivers, services, and
applications as needed; and correct the problem.
Tool Description
Command Command prompt can be used when troubleshooting a number of different
prompt issues. Windows provides several different command interpreters. The typical
command prompt interface is the standard Windows command interpreter. To
access the command prompt interface, you can either run cmd.exe or select
Command Prompt from the Accessories menu.
Remote Remote Desktop can be used to access a user's computer to provide assistance
Desktop/ with various types of issues. The problem with Remote Desktop for
Remote troubleshooting an end user's computer is that it must be enabled and a user must
Assistance be granted privileges to log in with network access. If a user does not have a
password set up to log in to his or her computer, Remote Desktop will not allow
that user name to be used to log in. If no other user name exists, there is no
opportunity for Remote Desktop to work.
Remote Assistance similarly requires an option to be enabled on the end user’s
computer, but it does not require that the connecting computer have a user name
and password on the system. The end user invites the connecting user to view
their screen. The end user can also grant limited control to the connecting user.
BSOD
Blue screen of death (BSOD) errors, or system stop errors, can be a symptom of file system errors,
viruses, hard disk corruption, or controller driver problems. Stop errors are rare in Windows Vista
and later, but when they occur, they are normally preceded by a blue error screen containing a BSOD
summary statement about the error condition and also hexadecimal memory data.
Although applications might occasionally hang without indicating any serious problem, repeated
system lockups or stop errors are a sign of trouble, and you should investigate them to see if there is
an underlying hardware problem or if they could be caused by malicious software, such as a
computer virus. In addition to hardware or malicious software, they could also be caused by
unstable/incompatible drivers, applications conflicting with each other, resource allocation issues
(multiple video-intensive applications trying to access the same resource), memory limitations (not
enough memory or too many applications running at the same time), and so on.
You can also configure output settings from within Windows. Open the Display Properties dialog
box from within the Control Panel, or by right-clicking the desktop and choosing Display. For
example, the screen resolution might make items too small for some users to view comfortably. In
this case, you can decrease the screen resolution, which will solve the problem, but a better solution
is to increase the font dots per inch (DPI) setting. Also, the monitor might not display properly if
advanced settings, such as the color quality or screen refresh rate, are set to a value that is not
appropriate for the display device. You can reconfigure settings manually or use the Video Display
Troubleshooter in the Windows Help and Support Center to walk through common problem
scenarios.
Application Errors
There are some common error messages that indicate problems with applications.
Boot Issues
There are several errors that can occur during the boot process or Windows startup.
Issue Description
Boot Issues
POST errors If there are errors during the Power On Self-Test (POST), the system might
display a numeric error message. Typically, you can press F1 to acknowledge
the error and continue booting.
For other POST errors, a series of audible beeps will tell you if a problem has
been detected. The sequence of beeps is a code that indicates the type of
problem.
Issue Description
Invalid boot disk The most common cause of this is a non-bootable disk in a drive. If your
system has floppy-disk drives, or bootable CD-ROM or thumb drives, check to
see if you need to remove a disk from the drive. However, there could be a
hardware problem with the hard disk. Also verify that the complementary metal
oxide semiconductor (CMOS) is set to boot from the hard drive. Most BIOSs
allow for the configuration of four or more boot devices as first, second, third,
etc. If one fails, it will automatically try the next in line. The only way this
process will fail is if the boot devices are set to "None" or all the same (which
many do not allow). Also, it cannot be assumed that the user will want the
CMOS to be set to "boot from the hard drive," since many times there is a
need to boot from CD, or even boot through the network.
Failure to boot There might be a hardware problem with the hard disk or hard disk controller.
Check hard drive and hard drive controller connections. You may also have a
missing Boot.ini file. In this case, you need to use the Bootcfg.exe to rebuild the
file.
Missing operating If you receive an error message on boot up that states the operating system is
system missing, then this could be a sign that the hard disk is damaged. You should try
connecting the disk to another machine to see if it boots up; if not, then you
will need to replace the hard drive.
Missing NTLDR The NT loader (NTLDR) file might be missing or corrupt, in which case you
might need to copy it from the Windows CD-ROM. However, the most
common problem is that there is a non-bootable disk in the drive.
Missing dll On startup, if the device displays a "missing dll" message, then this can indicate
message an issue with one of the system files. A file may be disabled, damaged, or
deleted completely. You should first boot to Safe Mode and run a virus scan on
the computer to find any viruses that may have infected the system and remove
them. The next step is to determine what files are missing. This can be a
tedious task and in most cases a third party dll finder utility can be used. Once
you determine the specific files needed, you can download them from the
appropriate website or manufacturer and install them on the system.
System files fail If NTOSKRNL.EXE is missing, you can copy it from the Windows installation
to open or are CD-ROM. This error can also indicate a problem in the Advanced RISC
missing Computing (ARC) path specifications in the Boot.ini file.
If Bootsect.dos is missing on a dual-boot system, you will have to restore it
from a backup file, as its contents are specific to a particular system.
System files should not be deleted or become corrupt during normal system
operation, so these errors are rare. They might indicate an underlying hardware
problem, a disk error, or the presence of a computer virus.
Device or service There might be a problem with a missing or corrupted device driver, or there
fails to start could be hardware resource conflicts (although this is rare on a Plug and Play
[PnP] system).
Boots to safe There may be a drive problem, if the computer continues to only boot into Safe
mode Mode. Use the system BIOS utility to check drives and verify the boot order.
Device or A device driver or related file might be missing or damaged. You might need to
program in reinstall the device.
Registry not
found
02# Power
01## System board
0104 Interrupt controller
Note: For more troubleshooting and support information for Windows 7, visit http://
support.microsoft.com/ph/14019 and for Windows 8, visit http://
windows.microsoft.com/en-us/windows/windows-help#windows=windows-8.
Note: The ultimate solution to some performance problems might be upgrading the system
hardware by adding more memory or a larger hard disk. As a support technician, you might or
might not be able to request this type of upgrade.
Note: Not everything reported with the level or Error is a problem. There are Errors that are
normal for the system.
WER
The Windows Error Reporting (WER) node in the software environment category in System
Information contains data about the faults generated by Event Viewer. When there is a severe
error, Windows will also display an Error Reporting dialog box and generate report data. The
Error Reporting dialog box gives you the option to send the report data to Microsoft for analysis.
ACTIVITY 19-1
Identifying System Errors
Scenario
Today you are working at the help desk. Below are some of the calls you received.
1. A user calls saying that her screen occasionally goes blue and the system shuts down. What should you If time permits, introduce
advise her to do? some of these types of
○ Call the help desk the next time the shutdown is in progress. errors in student
○ Reboot manually after the automatic restart.
systems and have them
diagnose and resolve
◉ Record as much information from the top of the blue screen as she can so that you can research the errors. Alternatively,
the particular error. assign each student a
○ Run the system in Safe Mode. different system error to
research online, then
® have them share what
2. A user reports that his Microsoft Word window has gone blank and he cannot type text. What are
they found about
possible approaches to resolving his problem?
possible causes and
☐ Reboot the computer. resolutions to the error.
☐ Run another copy of Microsoft Word.
☑ Wait a few minutes to see if the application returns to normal.
☑ Use Task Manager to shut down the application if it has a status of "Not Responding."
3. A user reports that her monitor display is fuzzy and hard to look at. What is a possible cause of this
problem?
◉ Display settings for the monitor are incorrectly configured.
○ The power cord is unplugged.
○ The monitor cable is not properly seated.
○ The monitor device is disabled in Windows.
4. A user reports that while she is editing a document, she receives an "invalid working directory" message
from her application. What is the best diagnostic question to ask in response to this error?
○ Did the application work yesterday?
○ Is anyone else having this problem?
○ Who installed the application?
◉ Have you deleted any files or folders lately?
5. Share any experiences you have had with diagnosing and resolving system errors in your personal,
school, or work life.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Troubleshoot PC Operating Systems.
ACTIVITY 19-2
Troubleshooting a Remote Computer with
Remote Desktop
Scenario
You will be assisting a user located in another city. The technician assigned to their building is on
vacation, so rather than making the user wait until the technician returns, you will attempt to assist
them remotely.
Note: You are going to work with a partner to complete this activity. You will take turns playing
the role of the helper and the user needing assistance. First, the user needing assistance will
enable Remote Desktop. Then, the helper will connect to that computer using Remote Desktop
Connection and the administrator user account.
Assign students to work 1. Configure the first computer to support Remote Desktop connections.
in pairs. If you have an a) Open the Control Panel and select System and Security.
odd number of students, b) Select the System link
work with one of the c) In the left pane, select Remote settings.
students to complete this
d) In the Remote Desktop section, select Allow remote connections to this computer.
activity.
e) Select OK twice and close the System window.
2. At the second computer, connect to the other computer using Remote Desktop Connection.
If a connection can't be a) On the second computer, use search to locate and open Remote Desktop Connection.
established because b) In the Computer text box, type the name of your partner's computer.
user accounts need c) Select Connect.
elevation, then add the d) Log on as Admin## (where the ## is your partner's number) with a password of !Pass1234 and
AD account to each PC select Enter.
with administrator rights.
e) If necessary, select Yes at the security prompt.
f) If necessary, press the arrow button.
3. From the second computer, change the desktop theme of your partner's computer, and then log off the
remote session.
a) Display the pop-up menu for the Desktop and select Personalize.
b) Select a theme from the available options.
c) In the Client## bar at the top of the screen, select the Close button, and select OK to exit the
Remote Desktop session.
TOPIC B
Troubleshoot Mobile Device Operating Systems
and Applications
You have used good troubleshooting practices to diagnose and repair PC operating system issues.
The same practices can be used on mobile device operating systems and applications. In this topic,
you will troubleshoot mobile device operating system and application problems.
Symptom Description
Cannot broadcast Display content from a smartphone, tablet, or laptop can be viewed on an
to external monitor external monitor or TV. You will need either an app that enables
broadcasting to the external source or an HDMI cable. If the broadcast is
not being received by a wireless connection, you might be too far from the
source, or you might need to change settings in the app you are using. If you
are using a wired connection, verify that it is within the length limits specified
by the cable type.
Slow performance There are a variety of reasons your mobile device has slower performance
than it did when it first came out of the box. These include:
• OS updates that were installed might not be optimized for your particular
device.
• Apps running in the background. Make sure you are only running the
apps you need to run.
• Live wallpaper. Disable live wallpaper and remove unnecessary widgets.
• Full or nearly full storage device. Clear the cache, remove unneeded data
files (especially videos and photos), and uninstall unneeded apps.
• Slow solid-state drives on Android devices. If you have an older Android
device that doesn't use TRIM on solid-state drives, update to Android 4.3
or newer, or gain root access and run the LabFix app.
• Small, slow, or full SD card. Consider moving files off the SD card,
reformatting it or replacing it, then moving only the needed files back
onto it.
Extremely short Power drain can be impacted by several factors. These include:
battery life • Using the mobile device to watch streaming video or play games. These
activities use the display and the CPU which both will consume large
quantities of your available power.
• No cellular or intermittent cellular service. The device will use a lot of
resources to search for a signal and try to connect to a cell tower. Switch
to Airplane mode or, if a wireless network is available, to Wi-Fi, if you
know you will be out of range of any cell towers.
• Bright displays use more power than more dimly backlit displays.
• Disable background data on services that you don't need to instantly
know when new data is available. This can also help prevent data
overages if you wait until you are connected to a Wi-Fi network to send
or retrieve the data. Services you might want to disable background data
for include email, social networking, or data backup apps.
• Location services and geotagging, which use your GPS, will cause a
power drain. Disable the location services and geotagging for some of the
apps on your mobile device.
• Disable Bluetooth, NFC, and Wi-Fi services unless you are actively using
them to help prolong battery life. This has the added benefit of helping to
prevent unauthorized connections over these networks to your mobile
device.
Frozen system For a mobile device that will not start (and you have verified that enough
power is available to start the device), that repeatedly stops responding, or
gets stuck (and you have verified that the updates have been applied and the
issue is not caused by a particular app), you might need to perform a factory
reset on the device. Refer to the device documentation for how to perform a
reset on your particular device.
Symptom Description
System lockout Entering the wrong credentials to unlock a mobile device can result in
system lockout for a predetermined period of time. You can also configure
mobile devices that have not been manually locked to lock after a set amount
of idle time. Be more diligent about protecting the device from unauthorized
physical access. Also be more diligent about remembering user names and
passwords, or cleaning biometric fingerprint scanning surfaces. If your device
is compromised due to login failures or the device becomes locked or wiped,
you will need to do a factory reset in most cases.
Application Issues
The following table details common app issues.
Symptom Description
Apps not loading The app does not seem to be present, does not seem to install, or does not
function as expected. Data Call Failure (Error code 128) could be caused by
your cell carrier pushing apps down to you. Updating your profile or
resetting your browser to default often fixes this. Also, Google Play could
give you an error "Installation Unsuccessful." This typically happens when
your cache is full or your SD card has a problem. Clear the cache and/or
swap out the SD card. Make sure your MDM (mobile device manager) is
pushing apps as expected.
Unable to decrypt The email client reports that sending or receiving email failed. Try using
email other email clients, including a webmail browser, to access the Inbox. Make
sure there is nothing wrong with the user name, password, server names,
ports, or other security settings.
Overheating When you use an app that makes intense use of resources, such as watching a
video, it can cause the mobile device to become very hot. This can lead to
overheating of the device, causing it to turn off without warning.
No sound from Make sure that the sound on your mobile device is not muted. Also, check
speakers within the app you are using to verify that the sounds have not been disabled
within the app. Go to the Settings page for your device and test the sounds
for ring tone, text messages, and so forth; if no sounds are heard, you might
need to take the device in for servicing.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on Guidelines for Troubleshooting Mobile Device OSs and Applications.
ACTIVITY 19-3
Troubleshooting Mobile Device OSs and
Applications
Scenario
In this activity, students "All of these new technologies will require whole new skill sets for my team. I need to make sure
will research websites to that my department is ramped up to handle what is sure to be a huge influx of calls from the users."
find interesting
troubleshooting tips for —Sally Waters, Help Desk Manager
the most common The organization's mobile network has been up and running for some time now. The organization
Android and iPhone has recently implemented a BYOD policy for Android and iPhone devices. The help desk wants to
problems. Assign each be completely ready for known issues. As the technical liaison, the help desk manager has asked you
student a different
to present a summary of some of the most common problems the team will encounter when
website from the list in
the scenario. If supporting BYOD. You have prepared the following list of websites that have published common
necessary, allow troubleshooting tips and tricks:
students to perform their • www.littlegreenrobot.co.uk/tips/53-common-android-problems-solved/
own Google or Bing
• www.digitaltrends.com/mobile/iphone-5-problems/
searches. Give the class
5 minutes to conduct • www.digitaltrends.com/mobile/iphone-6-problems/
their research. Ask each • www.dummies.com/how-to/content/common-android-problem-troubleshooting.html
student to find at least • www.theatlanticwire.com/technology/2012/10/most-common-iphone-5-glitches-and-
one problem that would their-fixes/57474/
be interesting to share
with the class. Give each • www.inlovewithandroid.com/android-problems-troubleshooting.html
student 2 minutes to • www.etradesupply.com/blog/iphone-5-issues-dont-5s/
present their findings to • http://www.etradesupply.com/blog/
the group. If you have a • www.guidingtech.com/13028/solutions-android-wi-fi-problems-common/
very large group, you
may randomly ask
volunteers to share their
discoveries until time is 1. Spend 5 minutes finding an interesting mobile device problem and resolution that you would like to
up. share with the class. Be prepared to present a summary of your findings to the group.
2. What interesting troubleshooting tips did you find that you would like to share with the group, and where
did you find them?
Remind students that
A: Answers will vary. Some will demonstrate how to deal with a battery that drains quickly. Others will
some of the procedures
talk about locking the screen. Still others will demonstrate how to resolve Wi-Fi problems.
they find may be device-
specific, and will not
3. Having heard the various problems and their resolutions, what mobile device issues do you think you
work with all devices,
will most likely encounter in your own environments?
including their Android
simulators. A: Answers will vary. Some students may not use one platform or another in their own environments.
Others may already have a sense of the most common problems. Some may say that the most
common problems are user-related.
TOPIC C
Troubleshoot Wired and Wireless Networks
In the previous topics, you examined troubleshooting for PC and mobile device operating systems.
In most organizations, those operating systems will be running on a machine that is also running on
a network to access the Internet and other important databases or servers. Just as the operating
system is essential for the system to function, the network is essential for most organizations to
function on a daily basis. In this topic, you will troubleshoot networks.
Every network will run into problems at some point. However, there is a lot you can do to minimize
the problems you encounter. Regular, preventative maintenance will not only keep your network
working at its peak, but it will also reduce the risk of network corruption. Difficulties will arise,
though, and good troubleshooting skills will enable you to identify, assess, and repair any network
issues quickly and efficiently.
• IPCONFIG
• PING
• NSLOOKUP
• TRACERT
• NETSTAT
• NBTSTAT
• NET
• NETDOM
Note: NETDOM is only available on Windows Server operating systems running Active
Directory Domain Services.
Access the Checklist tile on your CHOICE Course screen for reference information and
job aids on How to Troubleshoot Wired and Wireless Networks.
ACTIVITY 19-4
Troubleshooting Network Issues
Scenario
You recently received a lot of trouble tickets, all of which are related to network connections. You
need to check the cause of these network issues and troubleshoot them.
1. You receive a call from a client who reports that she is unable to access any websites in Internet Time-permitting, you
Explorer. While talking with this user, you verify that she can ping the server's IP address on her may want to introduce a
network segment, the IP address of the default gateway, and the IP address of a computer on another problem in the
network segment. You also determine that none of the other users on her network can connect to classroom network and
websites in Internet Explorer. What might be the problem? have students attempt to
A: The problem is most likely that her network's DNS server is down. troubleshoot and
resolve.
2. One of your clients reports that he is unable to see computers when he opens the Network window.
Which step should you take first?
◉ Determine if any of the other users on the network are experiencing problems.
○ Ask the client to ping another computer on his network.
○ Ask the client to verify that the DHCP server is running.
○ Ask the client to run ipconfig /release and ipconfig /renew.
3. A user is trying to reach a website and is experiencing problems. How can you examine the path of the
transmissions?
A: Use the tracert command to trace the routes of packets between various source and destination
hosts. This can help you locate a packet looping between routers or the point at which a route
fails.
4. A client reports that he is unable to connect to any computers on the network or the Internet. You have
him run the ipconfig command, and all his TCP/IP addressing parameters are correct. When you have
him ping other computers on the network, his computer is unable to reach them. This computer is the
only one that is experiencing a problem. What should you check next?
○ That the DHCP server is on and functioning properly.
○ That the default gateway is on and functioning properly.
○ That the DNS server is on and functioning properly.
◉ That his computer's network cable is plugged into both the network card and the wall jack.
5. One of your network users is unable to connect to the SSH service, which is located on a different
network. The error message indicates that the other network is unreachable. You verified that the
network cable is intact and that the SSH service is up. What could be the probable cause of the error?
(Select all that apply.)
☑ The network service is not up.
☐ The resolv.conf file does not contain entries for the name server.
☑ Network parameters, such as the IP address, the subnet mask, or the default gateway, are not set
correctly.
☐ The firewall is disabled.
6. You verified that the network service is running and that the network parameters are properly set.
However, the user is still unable to connect to the network. What will be your first step to troubleshoot
the network issue?
○ Verify that the hostname is set.
◉ Verify that the DNS entries are correct.
○ Verify that IP forwarding is enabled.
○ Verify that the ports of the service you are trying to access are open at the destination host.
7. True or False? To set the hostname permanently, you need to modify the /etc/hostname file.
☑ True
☐ False
TOPIC D
Troubleshoot Common Security Issues
In the previous topics, you have examined troubleshooting for the operating systems, software, and
network components of a computer system. As important as it is to maintain these more concrete
components of a system, it is equally important to make sure that the computer system is secure and
that all security measures are functioning properly; if problems arise with security, you must be ready
to address them. In this topic, you will troubleshoot common security issues.
As with many areas of computer support, your responsibility for computer security does not end as
soon as the security measures are implemented. As with printing, networking, hardware, and
software, it is your responsibility to your users and clients to ensure proper security functions on an
ongoing basis as well as to correct security problems that might compromise your systems or
prevent users from accessing the resources that they need. The information and skills in this topic
should help you troubleshoot any security issues that arise and restore your organization's security
functions.
Pop-ups Pop-ups are windows or frames that load and appear automatically when a user
connects to a particular web page. They can sometimes contain buttons or links
that include infected files. As you discuss these
symptoms, ask
Browser If users are complaining that browser links are taking them to an unwanted web participants to share
redirection page, then it probably means that the computer has been infected by a browser their experiences with
redirect virus. To remediate the issue, you need to remove the virus and verify security issues.
that the browser functions properly.
Security alerts In some cases, security alerts can be a sign that the computer has been infected
with malware. Malware created today is complex and can be designed to look
just like an actual security warning generated by the operating system so that you
click on the rogue link and install the needed update that actually contains
malware.
Internet Internet connectivity issues can be a sign that a computer has been infected by
connectivity malware. If a security breach has occurred, then an attacker gained access and
issues changed IP configurations and reconfigured network interface cards (NICs) or
DNS redirectors. Check any other network-connected devices for similar issues,
and if none are found, then the issues are due to an infected device.
Slow A system that is performing slowly may have too many applications or services
performance installed and running simultaneously. This can make opening, using, and closing
applications frustratingly slow for users. Another common culprit of slow
performance is malware: infections like adware and spyware can run constantly
in the background, taking up a great deal of the system’s resources.
PC locks up Slow performance can lead to a PC locking up. This can be an indication that
there is a problem with the system files, malware services were installed, or too
many programs have been loaded into memory. This can also be a symptom of a
virus. Make sure to run antivirus software to identify and remove any infections.
Symptom Description
Application It can be difficult to diagnose the cause of application crashes, as there are many
crash potential reasons why they happen. For example, applications may occasionally
run out of memory. However, sometimes repeated crashes of multiple
applications may signal a corrupt or infected system file.
Windows If Windows updates fail, it could be a sign that the state of the machine has
update failures changed. This can be due to a virus. Scan the computer for infections and
remove them.
Rogue antivirus Rogue antivirus is a very sneaky attack that can cause major damage to a system
if the user carries out the actions expected by the attacker. The method involves
designing a rogue antivirus application window that looks like a legitimate
antivirus solution. If users follow the instructions, then they are at risk for
downloading a slew of malware.
Email issues If there are noticeable changes to an email account, such as an excess amount of
spam or you find that there have been emails sent from the account that the
email account owner was unaware of, then the computer's security has been
jeopardized.
Email-specific issues to be aware of include:
• Spam is an email-based threat where the user's inbox is flooded with emails
which act as vehicles that carry advertising material for products or
promotions for get-rich-quick schemes and can sometimes deliver viruses or
malware. Spam can harbor malicious code in addition to filling up your
inbox. Spam can also be utilized within social networking sites such as
Facebook and Twitter.
• Hijacked email is an account that has been accessed by an attacker and is
being used by the attacker to send and receive emails. This means that an
attacker can read, edit, an send emails from an account. In a corporate
environment, a hijacked email account can result in unauthorized data access.
Access denied Access may be denied if systems are unavailable or corrupted. The most
common cause is when a user forgets a password or credentials. Have systems in
place to reset passwords for users, when appropriate.
Repeated patterns of access denial can be a sign of attempted security breaches.
Malicious Once malicious software has penetrated your system, numerous security issues
software can arise. The best solution to these problems is to prevent infections in the first
place, but if your systems are infected, they must be isolated from the network
and cleaned using various antivirus and security scanning tools.
If your antivirus, anti-spyware, and pop-up blocker's protections are configured
to be too restrictive, it is possible that users might not be able to load and run
legitimate software. However, it is best to keep security tight in this area and deal
with exceptions on a case-by-case basis.
Symptom Description
File system Changes in system files can indicate that there has been a breach in security.
issues Common file system security symptoms include:
• Renamed system files.
• Files disappearing.
• File permission changes.
If permissions are set too tightly, users will not be able to access data. If they are
too loose, there will be inappropriate access. Also, because permissions are
cumulative, users may obtain permissions from a number of different groups of
which they are members. If a user cannot access a resource, you might need to
check the permissions assigned to all the relevant groups.
Invalid If a user’s browser is displaying a warning that the website’s certificate is invalid,
certificate it may be a maliciously spoofed address of a legitimate site. Most browsers will
warn the user that this connection is untrusted and that they should not proceed.
A user who ignores this warning may expose their computer to malware, or a
malicious website might capture unencrypted credentials that they enter into a
web form. A browser might also indicate that a certificate is invalid if the
computer’s clock is wrong, or if that particular certificate was removed from the
browser’s list of trusted certificates.
Data access Data access across the network depends upon share permissions which, like file
issues system permissions, might be set too high or too low. Also, like file system
permissions, the user's effective permissions might be derived from several
group memberships that you might need to examine.
A special issue for Windows is the interaction of share and file system
permissions—since both sets are evaluated for network file access, the user will
have only the most restrictive of the two permission sets.
If you have used policies to restrict accounts from accessing systems locally or
across the network, make sure the policies are not so strict that legitimate users
cannot gain access.
Backup security Set system policies so that only legitimate users can restore data. However, if
policies are too restrictive, you might not have enough users available to do
backup restorations in an emergency. Verify that all legitimate backup
administrators have the necessary rights. Do not forget to verify that the
appropriate users have physical access to the backup storage location, especially
if the backup tapes are maintained by a third party who has responsibility for
controlling access.
Security Troubleshooting
Tools (2 Slides)
Tool Description
Anti-malware/antivirus This software scans a potentially infected system for malware and
software identifies any file signatures it recognizes as malicious. Most anti-
malware solutions also provide quarantine and deletion functionality.
Quarantining an infected file moves it into a protected container so that
it cannot interact with the larger operating system. Deletion outright
removes the malware from the system. Note that anti-malware software
is vulnerable to false positives and false negatives, and even if it
accurately detects malware, its removal functionality may not be
thorough enough to truly purge the infection from the system.
Recovery console An operating system’s recovery console provides an interface with
which you can execute a limited set of actions that may help you resolve
boot issues. Common recovery options include repairing master boot
records, formatting drive volumes, and repairing disk corruption.
MSCONFIG/safe boot MSCONFIG is a System Configuration utility that can also help you
option troubleshoot boot and system startup issues. The utility allows you to
select and deselect certain services and device drivers you do or do not
want to boot with. This can help you narrow down an issue to a
particular process. Likewise, safe boot loads the operating system with
only non-essential functionality, making it easier to isolate and remove a
malware infection.
Refresh/restore options Newer versions of Windows offer certain recovery scenarios that may
resolve system slowness or corruption. Recovery scenarios include
reinstalling the operating system but keeping all other files; rolling back
to a previous build of the operating system; and full recovery from an
operating system image.
Terminal A PC’s terminal or command-line interface will provide you with direct
access to the operating system’s available commands. This can be useful
as configuration GUIs like the Control Panel don’t offer access to every
single diagnostic or troubleshooting command. Some of these
commands, like CHKDSK, are more commonly initiated through a
terminal.
System restore/snapshot Operating systems like Windows can take a “snapshot” of your PC at a
certain point in time. If you encounter a complex issue that isn’t easily
remedied, you can restore the previous snapshot and return your PC to
its state before the issue appeared. This may be more ideal than a typical
recovery operation as it affords minimal disruption to the system.
Pre-installation Most operating systems offer some sort of configuration options as part
environments of the installation process. For example, when you install Windows, you
can format your computer’s disk volumes without even needing an
operating system. If you have installation media available, the pre-
installation environment can help you ensure that a computer is
completely wiped clean.
Event Viewer The operating system’s Event Viewer keeps a log of all recorded system
and application events. This includes sign on attempts, shutdown
signals, system crashes, device driver errors, and many more scenarios
that can help you identify where problems exist.
Tool Description
Tool Description
Uninstall/reinstall Sometimes apps get out of sync with their desktop or web-based
apps counterparts. Other times apps are damaged by a virus or other malicious
attack. You might need to uninstall and then reinstall some apps in order to
get them working properly again.
Wi-Fi analyzer If users are experiencing connectivity problems or decreased bandwidth on
your wireless network, use a Wi-Fi analyzer to try to locate a channel the
access point can use that will be less crowded than the channel that is
currently being used.
Cell tower analyzer If users are experiencing call reception problems or data transfer issues over
a cellular network, use a cell tower analyzer to identify locations where
connection strength is limited.
Backup/restore There are many cloud-based services that back up a mobile device’s
configurations or data. If the device is lost or its data erased locally, you can
restore the data from the cloud service with minimal to no loss. Examples of
backup services include iCloud, Google Sync, and OneDrive.
Force stop If a mobile device app becomes unresponsive, you might need to force the
app to close. The method used varies based on the mobile OS you are using.
• If the user cannot access network resources, check share permissions on folders and print
permissions on printers for the user and any group the user belongs to. Check the local NT
File System (NTFS) permissions for files and folders as well; when share and file system
permissions combine, the most restrictive permission applies.
• If a user cannot log on using a biometric device, you might need assistance from the system
vendor to resolve the problem.
• Train users to recognize possible social engineering attacks and hoaxes so that they can
deflect these attacks in progress and report them for further investigation.
• If a user cannot access data outside the company, you might need to open ports on a firewall.
ACTIVITY 19-5
Troubleshooting Common Security Issues
Scenario
You have been assigned to resolve several security issues raised by users.
1. John has reported that a pop-up security alert keeps coming up when he switches application windows
on his laptop. What do you suspect is going on with his computer?
A: Often, malware is delivered through legitimate-looking methods, such as a Windows security alert.
In this case, his laptop was likely infected with a virus.
2. You have been asked to provide a list of common malware symptoms for users to be aware of in order
to prevent security breaches within your organization. What common symptoms would you provide?
A: Answers will vary, but should include: keeping an eye out for unusual email messages that may be
a hoax or social engineering attempt. Do not open or forward unrecognized email attachments.
Avoid downloading any software from the Internet that has not been approved by the IT
department.
3. True or False? The safest way to deal with unsolicited email is to delete it without opening it.
☑ True
☐ False
4. Alex reports that in the midst of composing an email at work, an unfamiliar pop-up appeared on his
screen, indicating that his email connection has been dropped and that he should log on again by using
the pop-up screen. What do you suggest he do in this situation?
A: First, you let him know that he was right to report the incident without entering the information in
the pop-up window. Next, you should run an antivirus scan to identify if the computer is infected
and remove any viruses until the system is clean.
Summary
In this lesson, you used many different troubleshooting methods to resolve common issues related
to operating systems, network connectivity, and security. In your role as an A+ technician, you will
be advising and supporting users in a number of areas surrounding computing devices, so using the
guidelines and procedures provided in this lesson will enable you to provide the required level of
support to users.
In what system-wide area do you think you will provide the most support to users?
A: Answers will vary, but will likely include troubleshooting various operating system or network issues,
Encourage students to
use the social which can often end up being a symptom of a more severe security problem.
networking tools
Have you ever recovered a severely compromised computer system? If so, then describe your experience.
provided on the CHOICE
Course screen to follow A: Answers will vary, but may include having to use Last Known Good Configuration or Safe Mode to
up with their peers after identify issues and recover systems. You might need to resort to performing a factory reset if the
the course is completed damage is too severe.
for further discussion
and resources to support Note: Check your CHOICE Course screen for opportunities to interact with your classmates,
continued learning. peers, and the larger CHOICE online community about the topics covered in this course or
other topics you are interested in. From the Course screen you can also access available
resources for a more continuous learning experience.
Course Follow-Up
Congratulations! You have completed the CompTIA® A+®: A Comprehensive Approach (Exams
220-901 and 220-902) course. You have acquired the essential skills and information you will need to
install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on
PCs, digital devices, and operating systems. If you are getting ready for a career as an entry-level IT
professional or PC service technician, and if your job duties will include any type of PC service tasks
or technical support for end users, this course has provided you with the background knowledge
and skills you will require to be successful. Completing this course is also an important part of your
preparation for the CompTIA A+ certification examinations (220-901 and 220-902) that you must
pass in order to become a CompTIA A+ Certified Professional.
What's Next?
If you want to learn more about networking technologies and supporting network users, you might
want to attend the Logical Operations CompTIA® Network+® (Exam N10-006) course. If you want
to learn more about security and helping users use safe computing practices, you might want to
attend the Logical Operations CompTIA® Security+® (Exam SY0-401) course.
You are encouraged to explore PC and network support further by actively participating in any of
the social media forums set up by your instructor or training administrator through the Social
Media tile on the CHOICE Course screen.
Course Follow up
A Mapping Course Content
to CompTIA A+
Certification Exam
220-901
Obtaining CompTIA A+ certification requires candidates to pass two examinations. This
table describes where the objectives for CompTIA exam 220-901 are covered in this course.
1.0 Hardware
1.1 Given a scenario, configure settings and use BIOS/
UEFI tools on a PC.
• Firmware upgrades – flash BIOS Lesson 8, Topic C
• RAM configurations (single channel vs. dual channel vs. Lesson 8, Topic A
triple channel)
• Single sided vs. double sided Lesson 8, Topic A
2.0 Networking
2.1 Identify the various types of network cables and connectors.
• Fiber Lesson 13, Topic A
• Connectors: SC, ST and LC
• Twisted Pair Lesson 1, Topic A; Lesson
13, Topic A
• Connectors: RJ-11, RJ-45
• Wiring standards: T568A, T568B
• Coaxial Lesson 13, Topic A
• Connectors: BNC, F-connector
2.2 Compare and contrast the characteristics of connectors and
cabling.
• Fiber Lesson 13, Topic A
• Types (single-mode vs. multi-mode)
• Speed and transmission limitations
• Twisted pair Lesson 13, Topic A
• Types: STP, UTP, CAT3, CAT5, CAT5e, CAT6, CAT6e,
CAT7, plenum, PVC
• Speed and transmission limitations
• Splitters and effects on signal quality
• Wearable technology devices (Smart watches, Fitness monitors, Lesson 15, Topic C
Glasses and headsets)
• Phablets Lesson 15, Topic C
• Properly formatted boot drive with the correct partitions/ Lesson 9, Topic B
format
• MD Lesson 2, Topic B
• RD Lesson 2, Topic B
• CD Lesson 2, Topic B
• Home vs. Work vs. Public network settings Lesson 14, Topic A
3.0 Security
3.1 Identify common security threats and vulnerabilities.
• Malware Lesson 17, Topic A
• Spyware
• Viruses
• Worms
• Trojans
• Rootkits
• Ransomware
• Phishing Lesson 17, Topic A
• Follow corporate end-user policies and security best practices Lesson 4, Topic E
5.4 Demonstrate proper communication techniques and
professionalism.
• Use proper language – avoid jargon, acronyms, slang when Lesson 4, Topic D
applicable
• Maintain a positive attitude / Project confidence Lesson 4, Topic D
• Actively listen (taking notes) and avoid interrupting the customer Lesson 4, Topic D
command/? Syntax:
command /?
Description: Displays the same information as help command_name.
md /?
help Syntax:
help [command]
Description: The help command by itself lists the available commands.
To get information on a specific command, enter help
command_name.
Example: help md /?
MD Syntax:
MD [drive:]path
Description: Create a directory with the specified name.
Example: md c:\MyNewDirectory
RD Syntax:
RD [/S] [/Q] [drive:]path
6
TASKLIST Syntax:
TASKLIST [/S system [/U username [/P [password]]]] [/M
[module] | /SVC | /V] [/FI filter] [/FO format] [/NH]
Description: Displays a list of processes that are running on local or
remote systems. In addition to the name of the command, the resulting
list also displays the PID, or process ID, or the process.
Example: TASKLIST /APPS /FI "STATUS eq RUNNING"
In this example, Store Apps and their associated processes, filtered to
show the apps that are running, are listed.
TASKKILL Syntax:
TASKKILL [/S system [/U username [/P [password]]]]
{ [/FI filter] [/PID processid | /IM imagename] } [/T]
[/F]
Description: Terminates the specified tasks identified by image name or
PID.
taskkill /im cal*.exe
In this example, any task name that begins with "cal" and is an exe file,
will be terminated.
Computer This tool gathers several frequently used From the Start menu
Management tools into one application for easy
access, including:
• System Tools
• Task Scheduler
• Event Viewer
• Shared Folders
• Performance
• Device Manager
• Storage
• Disk Management
• Services and Applications
• Services
• WMI Control
Device View and configure properties for From the Start menu, Computer
Manager hardware devices installed on the Management, search for devmgmt.msc
computer. and select it from the results, or from
the Run dialog box, enter
devmgmt.msc
Local Users Manage users and groups stored on the From the Start menu, add the Local
and Groups computer. Users and Groups snap-in to the
MMC console, or from Search or Run,
run lusrmgr.msc
Local Security Configure settings for local system, From Search or Run, run secpol.msc
Policy user, and security settings for the local
computer. For the Windows 8 family of
operating systems, this tool is only
available on the Pro and Enterprise
editions.
Performance View performance data from log files or From the Start menu, from Search or
Monitor in real time. Run, run perfmon.msc, or add the
Performance Monitor snap-in to the
MMC console
Services Configure Windows services as well as From the Start menu, from Search or
start and stop services. Run, run services.msc, add the
Services snap-in to the MMC console
or run msconfig.exe and in the
System Configuration dialog box,
select the Services tab.
System Configure what is run at system startup, From the Start menu, or search for
Configuration/ troubleshoot system problems, manage msconfig.exe and select it from the
MSCONFIG services, configure boot options, and results.
launch other tools.
Linux Commands
The following table describes the Linux commands used throughout this course. For a complete
description of the command with its related options and arguments, refer to the man page for the
command.
Note: Most of the Linux commands can also be used at the command line in OS X since it is a
Linux derivative.
ls Syntax:
ls [OPTION]... [FILE]...
Description: Lists information about the files in the current directory (by
default) or the specified directory. You can also specify a file to show just
information for that file.
Example:ls -laR
In this example, a recursive listing of all files in the current folder, the subfolders
and their contents, including empty or hidden folders.
cd Syntax:
cd [dir]
Description:Change the working directory to the specified directory.
Example: cd /data/finance
pwd Syntax:
pwd
Description:Shows the name of the current directory.
OS X GUI Tools
The following table describes the OS X tools used throughout this course.
Time Machine A backup utility that backs files From the Apple menu, select System
and folders up to a separate hard Preferences→Time Machine.
drive (not removable media) that
has been formatted as a Mac file
system. Files and folders can be
restored from the Time Machine
drive.
The Abacus
The abacus is usually listed as the first mechanical computation device. Developed 2,000 or
more years ago in India or the Far East, an abacus consists of columns of beads that can
slide up and down on rods that are held together in a frame. The position of the beads
represents a number. Skilled users could perform calculations more quickly than early
electronic computers could.
6
Scotsman, carved a set of multiplication tables on ivory sticks that could slide back and forth to
indicate certain results. The use of logarithms on Napier's Bones in 1617 led to the development of
the slide rule. Today's mature engineers can still remember using slide rules in their college days.
Calculating Machines
The Frenchman Blaise Pascal is usually given credit for the first calculating machine. In 1642, to
help his father—a tax collector—with his work, Pascal invented a machine with eight metal dials
that could be turned to add and subtract numbers. Leonardo da Vinci and Wilhelm Schickard, a
German, designed calculating machines before Pascal, but Pascal receives the recognition because he
produced 50 models of his Pascaline machine, not just a prototype or description. In 1673,
Gottfried von Leibniz, a German mathematician, improved on Pascal's design to create a Stepped
Reckoner that could do addition, subtraction, multiplication, and division. Only two prototypes
were produced.
A Frenchman, Thomas de Colmar, created an Arithmometer in 1820 that was produced in large
numbers over the ensuing 100 years. The Swedish inventor Willgodt T. Odhner improved on the
Arithmometer, and his calculating mechanism was used by dozens of companies in the calculating
machines they produced.
Punchcard Technologies
Punched cards first appeared in 1801. Joseph Marie Jacquard used the holes placed in the card to
control the patterns woven into cloth by power looms. In 1832, Charles Babbage was working on a
Difference Engine when he realized Jacquard's punched cards could be used in computations. The
Analytical Engine, which is the machine Babbage designed but never manufactured, introduced the
idea of using memory for storing results and the idea of printed output. His drawings described a
general-purpose, fully program-controlled, automatic mechanical digital computer. Lady Ada
Augusta Lovelace worked with Babbage on his machine. She became the first computer
programmer when she wrote out a series of instructions for the Analytical Engine.
Note: Charles Babbage's Difference Engine No. 1 was the first successful automatic calculator.
Although the 12,000 parts were never assembled into a finished engine, the parts that were
completed functioned perfectly.
Punched cards were used in the United States census of 1890, and a data-processing machine
created by Herman Hollerith tabulated the census results in only 2.5 years—much shorter than the
predicted 10 years. Punched cards provided input, memory, and output on an unlimited scale for
business calculating machines for the next 50 years. The company Hollerith founded to manufacture
his card-operated data processors, which used electrical contacts to detect the pattern of holes in
each card, eventually became IBM®.
Perhaps the most important and influential figure from this time was Alan Turing, an English
mathematician who is now generally credited with being the father of computer science. Spending
his time working in mathematics, logic, and cryptanalysis, Turing was heavily involved in Britain's
codebreaking effort during World War II before he moved on to the University of Manchester.
While at the University, he began work on the Manchester Mark I, one of the earliest computers. He
is also credited with inventing the Turing Test, which has had profound implications in the
development of Artificial Intelligence. The Turing Test was a low-tech test for the presence of
Artificial Intelligence: if a person were to remotely converse by text with a human and a machine,
and could not tell the difference between the two, then the machine would be said to pass the
Turing Test.
ENIAC to UNIVAC
Dr. Mauchly and J. Presper Eckert were at the University of Pennsylvania in 1942 when they built
the Electronic Numerical Integrator And Computer (ENIAC) to aid the United States military
during World War II. ENIAC used 18,000 vacuum tubes, had 500,000 hand-soldered connections,
was 1,000 times faster than the Mark I, and had to be rewired to change its program. ENIAC was
used from 1946 to 1955, and because of its reliability, it is commonly accepted as the first successful
high-speed electronic digital computer. Eckert and Mauchly also designed the Electronic Discrete
Variable Automatic Computer (EDVAC), which contained 4,000 vacuum tubes and 10,000 crystal
diodes. After their success with ENIAC, Eckert and Mauchly proposed to build a Universal
Automatic Computer (UNIVAC) machine to help the Census Bureau handle all its data. After four
years of delays and cost overruns, Remington Rand Inc. worked with the Eckert-Mauchly Computer
Corporation to develop UNIVAC, the first commercially successful computer. The computer used
magnetic tape to store data, a major change from IBM's punched cards, and introduced many other
features that are common today. Starting in 1951, 46 UNIVAC I computers were made for the
government and businesses, although some experts at the time thought that five computers would
be enough to handle all the computational needs of the world.
high), red-hot to touch, and unreliable. Transistor technologies were the next great technical step
forward in the development of computing power.
Transistors
In the 1940s and early 1950s, Dr. William Shockley worked at Bell Telephone Laboratories as co-
head of a solid-state research group that developed the transistor. Transistors performed the same
function as vacuum tubes, but were the size of a pencil eraser, generated almost no heat, and were
extremely reliable. The replacement of vacuum tubes with transistors opened up new possibilities.
Integrated Circuits
Combining several transistors and the resistors needed to connect them on a single semiconductor
chip in an integrated circuit was a tremendous technical advance. In 1958, Jack Kilby at Texas
Instruments made several components on a single-piece semiconductor. By 1961, Fairchild and
Texas Instruments were mass-producing integrated circuits on a single chip. In 1967, Fairchild
introduced the Micromosaic, which contained a few hundred transistors. The transistors could be
connected into specific circuits for an application using computer-aided design. The Micromosaic
was an Application-Specific Integrated Circuit (ASIC).
Note: Now usually called just a chip, the first integrated circuit was fabricated in 1958 by Texas
Instruments inventor Jack Kilby.
General-Purpose Microprocessors
A major breakthrough occurred in 1974 when Intel presented the 8080, the first general-purpose
microprocessor. The 8080 microprocessor had a single chip that contained an entire programmable
computing device on it. The 8080 was an 8-bit device that contained around 4,500 transistors and
could perform 200,000 operations per second. Other companies besides Intel designed and
produced microprocessors in the mid-1970s, including Motorola (6800), Rockwell (6502), and Zilog
(Z80). As more chips appeared and the prices dropped, personal desktop computers became a
possibility.
Personal Computers
These developments led to the personal computer that is ubiquitous in homes and businesses today.
In 1975, MOS Technology announced its 6502-based KIM-1 desktop computer, and Sphere
Corporation introduced its Sphere 1 kit. Both kits were strictly for computer fanatics.
Today's PCs
Today there are several types of PCs, including desktop, minitower, laptop, notebook, tablet PC, and
handheld PDA. Most mobile devices have many of the functions of a small computer and the
distinction between computer and communications device is blurring.
adoption of easy-to-use personal computers has been the development of the graphical user
interface (GUI).
Douglas Engelbart, a researcher at the Stanford Research Institute (SRI), is widely credited with
developing the first GUI. Engelbart's research borrowed heavily from ideas spelled out by Vannevar
Bush's 1945 essay titled "As We May Think." In this essay, Bush proposed a machine called a
memex, which was a hypothetical way of navigating through large amounts of information using
hypertext. The memex was based on how adults actually learn, store, and process information, and
had increased relevance in an age where information was rapidly changing. While the memex was
never created, Engelbart borrowed heavily from Bush's ideas when it came time to work on his own
hypertext-based visual computer called the On-Line System, or NLS. The NLS debuted in 1968, and
featured the first uses of a GUI, hypertext, a mouse, windows for organizing and displaying
information, the use of a computer to deliver a presentation, and many other now-common
computer features.
Note: Vannevar Bush's 1945 essay "As We May Think" can be read online at
www.theatlantic.com/doc/194507/bush.
Note: A full-length video of Doug Engelbart's demo of the NLS can be found online at www.
1968demo.org/.
After the SRI's introduction of the NLS, work continued on graphical user interface design at Xerox
PARC (Palo Alto Research Center). Xerox PARC created what many now consider the first
personal computer that used a GUI, along with the now-familiar desktop metaphor. Dubbed the
Xerox Alto, it was the first small-scale computer where a graphical tool could be used to create,
delete, and manage local files—the Alto was not merely a terminal.
Apple founder Steve Jobs visited Xerox PARC, and during his visit became very interested in the
mouse. The Alto was not available commercially for home use, but Apple was targeting a larger
market. He incorporated what he liked about the Alto into Apple's design, and so the first two GUI
computers from Apple—the Lisa and the MacIntosh—featured both a GUI and a mouse. Apple's
GUIs also continued the Alto's use of the desktop metaphor, with icons of documents and folders
representing files and directories. This proved to be an enormously popular way to use a personal
computer. Shortly after Apple debuted their GUI, Microsoft released their first operating system
that had a graphical interface. Windows 1.0 was a GUI that ran on top of the existing MS-DOS
operating system, which was purely text-based up until that point.
Windows greatly changed the look and feel of their GUI with the release of Windows® 95 (the first
32-bit version of Windows), and subsequent Windows operating systems have stayed fairly true to
that design: this was the first use in Windows of the Start menu and taskbar, which have been
mainstays for more than a decade. Most operating system GUIs since then have shared this basic
layout, though the complexity of the graphics may have evolved.
Graphical interface design today has gotten both grander and smaller. With the exploding popularity
of handheld multimedia devices, GUIs are no longer limited just to PCs. Thanks to cell phones and
smartphones, MP3 players, mobile Internet devices, ebook readers, and more, interfaces have the
added challenge of needing to operate on very small screens, drawing far less power, and using
weaker processors. On top of this, interface development has had to straddle the line between
graphical appeal (such as with 3D desktops) and usability (where the drive for a more user-friendly
interface outweighs any flashier graphical features).
posted the first website in 1991, the growth of the Internet has exploded to the point where virtually
all computers on the planet are interconnected. Ordinary users can now communicate sophisticated
information with each other instantaneously around the globe. The ongoing vision of Web 2.0 may
soon create a global society in which all types of information and all means of communication will
be created and maintained cooperatively by ordinary individuals throughout the world. There is even
a drive toward turning computers into little more than bootable machines with web browsers on
them. In this system of cloud computing, all computing power is provided through remote
computers that function, essentially, as application servers. Microsoft's Office 365™ is a prime
example of cloud computing, and all reports indicate that cloud computing is here to stay.
The ubiquity of computing power and the omnipresence of the Internet: these two factors have
changed our world to an unimaginable extent in an extraordinarily short period of time. Society as a
whole can look forward eagerly to the equally unimaginable and extraordinary changes technology
will bring us in the years and decades just ahead.
802.11g adware
A specification for wireless data Unwanted software loaded onto a system
throughput at the rate of up to 54 Mbps in for the purposes of presenting commercial
the 2.4 GHz band that is a potential advertisements to the user.
replacement for 802.11b.
Aero
802.11i A color scheme available in Windows Vista
See WPA2. and Windows 7 that provides a visually
rich experience, with a glossy and
802.11n transparent interface and dynamic visual
A specification for wireless data effects.
throughput at a rate of up to 600 Mbps in
750 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
AES argument
(Advanced Encryption Standard) A A file name or directory name that
symmetric 128-, 192-, or 256-bit block indicates the files on which a command
cipher based on the Rijndael algorithm will operate.
developed by Belgian cryptographers Joan
Daemen and Vincent Rijmen and adopted ARP
by the U.S. government as its encryption (Address Resolution Protocol) A protocol
standard to replace DES. that maps IP addresses to MAC addresses.
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 751
badge BitLocker
Also called a security card, an identification A security feature in Windows 7 and Windows
card or token that can be used to swipe Server 2008 that provides full disk encryption
through an identification system or can be protection for your operating system as well as
configured as a proximity card and activated all the data stored on the operating system
automatically when the card is within a volume.
specified distance from the system.
BitLocker To Go
baseband A Windows security feature that encrypts
A transmission scheme where a single signal removable storage devices such as USB flash
sends data using the entire bandwidth of the drives or portable hard drives.
transmission media. Compare with broadband.
blackout
baseband RTOS A complete loss of electrical power.
(baseband real time operating system) See radio
firmware. Bluetooth
A wireless radio technology that facilitates
baseline short-range (usually less than 30 feet) wireless
A subset of a security profile, and a document communication between devices such as
that outlines the minimum level of security personal computers, laptop, mobile phones,
required for a system, device, network, or wireless headsets, and gaming consoles, thus
premises. creating a wireless personal area network.
Glossary
752 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
BYOD CIDR
(Bring Your Own Device) An organizational (Classless Inter Domain Routing) A subnetting
policy that enables employees to use their method that selects a subnet mask that meets
personal devices for work purposes. an individual network's networking and node
requirements and then treats the mask like a
cable 32-bit binary word.
Transmissions that use a cable television
connection and a specialized interface device CIFS
known as a cable modem to provide high- (Common Internet File System) A file and
speed Internet access to homes and small resource sharing protocol that is related to
businesses. SMB.
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 753
cleartext collate
The unencrypted form of data. Also called When printing multiple copies of a mulitpage
plaintext. document, the collection and combination of
pages in the proper order.
CLI
(command line interface) A text-based command line interpreter
interface for an operating system. A program that implements the commands
entered in the text interface.
client
A computer that makes use of the services and command prompt
resources of other computers. In a CLI, the area of the screen where users
enter commands to interact with the OS.
client-side virtualization
Takes place at the endpoints and separates the Component Services
elements of a user's logical desktop An administrative tool that is used to deploy
environment—the applications, operating component applications and configure the
system, programs, etc.—and divides them behaviors of components and applications on
from each other and from the physical the system.
hardware or a physical machine.
component/RGB
client/server network A type of analog video information that is
A network in which some computers act as transmitted or stored as two or more separate
servers to provide special services for other signals.
client computers.
composite video
cmdlet The format of an analog (picture only) signal
A lightweight command that runs in the before it is combined with a sound signal and
Windows PowerShell environment. modulated onto a radio frequency carrier.
Glossary
754 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
corona DB-15
An assembly within a laser printer that contains See VGA.
a wire (the corona wire), which is responsible
for charging the paper. dd
A Linux command that copies and converts
CPU files to enable them to be transferred from one
(central processing unit) The main chip on the type of media to another.
system board, the CPU performs software
instructions and mathematical and logical DDoS attack
calculations. Also referred to as the (Distributed Denial of Service) A type of denial
microprocessor or processor. of service (DoS) attack that uses multiple
devices on disparate networks to launch the
cryptographic coordinated attack from many simultaneous
See cryptography. sources.
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 755
directory distribution
A component in a file system hierarchy that See distro.
provides a container to organize files and other
directories (folders). Also called a folder. distro
A complete Linux implementation, including
kernel, shell, applications, and utilities, that is
Glossary
756 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 757
Glossary
758 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 759
Finder fsck
The file and folder management app that is A Linux command that checks the integrity of
included with OS X. a filesystem.
firewall fstab
A software program or hardware device that A configuration file that stores information
protects networks from unauthorized data by about storage devices and partitions and where
blocking unsolicited traffic. and how the partitions should be mounted.
Glossary
760 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
GPU Hibernate
(graphics processing unit) An electronic circuit A power option available in Windows
designed to rapidly manipulate and alter environments in which the computer will store
memory to accelerate the creation of images whatever is currently in memory on the hard
intended for display output. disk and shut down, and then return to the
state it was in upon hibernation when it is
GRUB2 awakened.
(GRand Unified Bootloader 2) A program used
in Linux distributions that loads operating high-level formatting
system kernels. See standard formatting.
GUI hoax
(graphical user interface) A collection of icons, Any message containing incorrect or
windows, and other screen elements that help misleading information that is disseminated to
users interact with an operating system. multiple users through unofficial channels.
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 761
IANA impersonation
(Internet Assigned Numbers Authority) An An approach in which an attacker pretends to
international agency that manages port be someone they are not, typically an average
assignments. user in distress, or a help-desk representative.
IEEE in-rush
(Institute of Electrical and Electronic A surge or spike that is caused when a device
Engineers) Pronounced "I-triple-E." An that uses a large amount of current is started.
organization of scientists, engineers, and
students of electronics and related fields whose incident management
technical and standards committees develop, A set of practices and procedures that govern
publish, and revise computing and how an organization will respond to an
telecommunications standards. incident in progress.
inverter
A laptop component that converts DC power
to AC power for the display.
Glossary
762 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
iOS iwconfig
The operating system designed for Apple A Linux command for configuring wireless
devices. It is the base software that allows all network interfaces for Linux servers and
other applications to run on an iPhone, iPod workstations.
touch, or iPad.
JFS
IP A 64-bit journaling filesystem that is fast and
(Internet Protocol) A group of rules for reliable.
sending data across a network. Communication
on the Internet is based on the IP protocol. key fob
A security device small enough to attach to a
IPS key chain that contains identification
(in-plane switching) An LCD panel technology information used to gain access to a physical
designed to resolve the quality issues inherent entryway.
in TN panel technology, including strong
viewing angle dependence and low-quality Keychain
color reproduction. A password management system included with
OS X.
IPv4 address
A 32-bit binary number assigned to a computer KVM switch
on a TCP/IP network. (keyboard, video, mouse) A device that enables
a computer user to control multiple computers
IPv6 with a single keyboard and mouse, with the
An Internet standard that increases the display sent to a single monitor.
available pool of IP addresses by implementing
a 128-bit binary address space. LAN
(local area network) A self-contained network
IPv6 address that spans a small area, such as a single
The unique 128 bit identification assigned to building, floor, or room.
an interface on the IPv6 Internet.
landscape
IR In printing, a page orientation that is wider
(infrared) A form of wireless transmission in than it is tall.
which signals are sent via pulses of infrared
light. laptop
A complete computer system that is small,
IR waves compact, lightweight, and portable.
(infrared waves) Electromagnetic waves with
frequencies ranging from 300 GHz to 400 laser printer
THz. A type of printer that forms high-quality
images on one page of paper at a time, by
ISDN using a laser beam, toner, and an
A digital transmission technology that carries electrophotographic drum.
both voice and data over digital phone lines or
PSTN wires. LC
(Local Connector) A small form factor ceramic
ISO 9660 ferrule connector for both single-mode and
A filesystem found on CDs and DVDs. multimode fiber.
ISP LCD
(Internet Service Provider) A company that (Liquid Crystal Display) A type of flat-panel
provides access to the Internet. display that uses Cold Cathode Fluorescent
Lamps as the source of backlight and that
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 763
Glossary
764 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
malware MFD
Any unwanted software that has the potential (multi-function device) A piece of office
to damage a system, impede performance, or equipment that performs the functions of a
create a nuisance condition. number of other specialized devices.
MAN microATX
(metropolitan area network) A network that Introduced in late 1997, and is often referred
covers an area equivalent to a city or other to as μATX, and has a maximum size of 9.6
municipality. inches by 9.6 inches.
mantrap Mini-BNC
Two sets of interlocking doors inside a small A bayonet-style connector using the traditional
space, where the first set of doors must close BNC connection method.
before the second set opens.
Mini-HDMI
(Mini High-Definition Multimedia Interface) A
smaller version of the full size HDMI
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 765
connector, except that it is specified for use procedures of storage and handling of a
with portable devices. hazardous substance.
mini-ITX MT-RJ
A small compact board that fit the same form (Mechanical Transfer Registered Jack) Also
factor as the ATX, and the micro-ATX boards. called a Fiber Jack connector, is a compact
They have a maximum size of 6.7 inches by 6.6 snap-to-lock connector used with multimode
inches. fiber.
motherboard NAT
The main circuit board in a computer that acts (Network Address Translation) A simple form
as the backbone for the entire computer of Internet connection and security that
system. Also referred to as the system board. conceals internal addressing schemes from the
public Internet.
MSCONFIG
A system utility that is specifically used to native resolution
troubleshoot any issues with the system startup The fixed resolution for LCD or other flat
process. panel display devices.
MSDS network
(Material Safety Data Sheet) A technical A group of computers that are connected
bulletin designed to give users and emergency together to communicate and share resources.
personnel information about the proper
Glossary
766 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 767
pairing PCIe
The process two devices use to establish a (Peripheral Component Interconnect Express)
wireless connection through Bluetooth. See PCI Express.
partitioning permissions
The process of dividing a single hard disk into In Windows, security settings that control
isolated sections that function as separate access to individual objects, such as files.
physical hard drives, called partitions.
personal firewall
partprobe See host firewall
A Linux program that updates the kernel with
partition table changes. phablet
A mobile digital device that is larger than a
patch standard sized smartphone and smaller than a
A fix or update for a software program or tablet.
application, designed to eliminate known bugs
or vulnerabilities and improve performance. pharming
Similar to phishing, this type of social
patch management engineering attack redirects a request for a
The practice of monitoring for, evaluating, website, typically an e-commerce site, to a
testing, and installing software patches and similar-looking, but fake, website.
updates.
phishing
PCI A type of email-based social engineering attack
(Peripheral Component Interconnect) See PCI in which the attacker sends email from a
bus. spoofed source, such as a bank, to try to elicit
private information from the victim.
PCI bus
(Peripheral Component Interconnect bus) A physical address
peripheral bus commonly used in PCs that For network adapter cards, a globally unique
provides a high-speed data path between the hexadecimal number burned into every adapter
CPU and peripheral devices. by the manufacturer.
Glossary
768 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 769
Glossary
770 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
RCA RF
(Radio Corporation of America) A cable and (radio frequency) Any of the electromagnetic
connector that is used to carry audio and video wave frequencies that lie in the range extending
transmissions to and from a variety of devices from around 3 kHz to 300 GHz, which include
such as TVs, digital cameras, and gaming those frequencies used for communications or
systems. radar signals. Commonly used as a synonym
for wireless communication.
ReadyBoost
A performance enhancer, available on RF
Windows Vista and Windows 7, that allows the (radio frequency) A frequency in which
user to supplement the computer's memory network or other communications take place
with an external storage device like a flash using radio waves in the 10 KHz to 1 GHz
drive. range.
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 771
ROM SATA
(Read-Only Memory) Memory that saves and (Serial Advanced Technology Attachment) A
stores system data without a constant power type of hard drive that requires a serial data
source. channel to connect the drive controller and the
disk drives.
rootkit
Malicious code that is designed to hide the SATA connection
existence of processes or programs from (Serial Advanced Technology Attachment
normal detection methods and to gain connection) A drive connection standard that
continuous privileged access to a computer provides a serial data channel between the
system. drive controller and the disk drives.
router SC
A networking device that connects multiple (Subscriber Connector or Standard
networks that use the same protocol. Connector ) Box-shaped connectors that snap
into a receptacle. SC connectors are often used
RPM in a duplex configuration where two fibers are
(Red Hat Package Manager) A tool that terminated into two SC connectors that are
provides a standard software installation molded together.
mechanism, information about installed
software packages, and a method for SCSI ID
uninstalling and upgrading existing software Identifiers assigned to each SCSI device
packages. connected to the bus. The ID numbers range
from 1 to 15.
RSA token
A small device that includes cryptographic
keys, a digital signature, or even biometric
Glossary
772 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 773
Glossary
774 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Southbridge spyware
A component of the chipset that controls Unwanted software that collects personal user
input/output functions, the system clock, data from a system and transmits it to a third
drives and buses, APM power management, party.
and various other devices.
SSD
space (solid state drive) A personal computer storage
In OS X, a virtual desktop consisting of a device that stores data in non-volatile special
collection of related windows, as created and memory instead of on disks or tape.
managed by Mission Control.
SSH
spam (Secure Shell) A protocol that enables a user or
Originally, frequent and repetitive postings in application to log on to another computer over
electronic bulletin boards; more commonly, a network, execute commands, and manage
unsolicited or distasteful commercial email files.
from anonymous sources.
SSHD
SPDIF (solid state hybrid drive) A personal computer
(Sony Phillips Digital Interconnect Format) A storage device that offers the best features of
digital format signal used to connect audio solid state and magnetic data storage by
devices to output audio signals over a short combining the traditional rotating platters of a
distance. magnetic HDD and a small amount of high-
speed flash memory on a single drive.
spear phishing
See whaling. SSID
(Service Set Identifier) A 32-bit alphanumeric
speed light string that identifies a wireless access point and
An indicator on a network adapter that shows all devices that connect to it.
whether the adapter is operating at 10 Mbps,
100 Mbps, or 1,000 Mbps. SSL
(Secure Sockets Layer) A security protocol that
spike uses certificates for authentication and
A very short increase in the electrical supply encryption to protect web communication.
voltage or current carried on any wire such as a
power line, phone lines, and network lines. ST
Usually lasts only a few miliseconds. (Straight Tip) Connects multimode fiber. ST
connectors look like BNC connectors.
spim
An IM-based attack similar to spam that is standard
propagated through instant messaging instead A subset of a security profile, and a tactical
of through email. document that specifies processes to follow to
meet policy requirements.
spoofing
A human-based or software-based attack standard formatting
where the goal is to pretend to be someone An operating system function that builds file
else for the purpose of identity concealment. systems on drives and partitions.
Spoofing can occur in IP addresses, MAC
addresses, and email.
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 775
standby sudo
A power-saving mode where the computer (super user do) A Linux command that enables
cuts power to the hard drive and peripherals users to run programs with the security
while storing current data in RAM. privileges of the root user.
striping switch
A disk-performance-enhancement feature in A smart network hardware device that joins
which data is spread across multiple drives to multiple network segments together.
improve read and write access speeds.
system BIOS
strong password The BIOS that sets the computer’s
A password that meets the complexity configuration and environment when the
requirements that are set by a system system is powered on.
administrator and documented in a security
policy or a password policy. system board
The same as motherboard.
stuck pixels
Pixels that only show one color of light, so system bus
they appear out of place when the display is on. The primary communication pathway between
a CPU and other parts of the chipset. The
subnet mask system bus enables data transfer between the
A 32-bit number that is assigned to each host CPU, BIOS, memory, and the other buses in
to divide the 32-bit binary IP address into the computer. Also referred to as frontside bus
network and node portions. or local bus.
Glossary
776 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 777
TIA traces
(Telecommunication Industry Association) A Wires etched on to the motherboard to
standards and trades organization that provide electrical pathways.
develops industry standards for technologies
such as network cabling. trackpoint
A small button found on some laptops that
Time Machine enables you to move the mouse pointer when
An OS X application that provides automated no mouse is connected to the computer.
file backups.
transistors
TKIP Switches that are etched on one sliver of a
(Temporal Key Integrity Protocol ) A security semiconductor that can be opened or closed
protocol created by the IEEE 802.11i task when conducting electricity.
group to replace WEP.
triboelectric generation
TLS The use of friction to create a static charge.
(Transport Layer Security) A security protocol
that protects sensitive communication from Trojan horse
eavesdropping and tampering by using a Malicious code that masquerades as a harmless
secure, encrypted, and authenticated channel file. When a user executes it, thinking it is a
over a TCP/IP connection. harmless application, it destroys and corrupts
data on the user's hard drive.
Glossary
778 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 779
Glossary
780 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
WinPE workgroup
(Windows pre-installation environment) A A peer-to-peer Microsoft network model that
lightweight version of Windows or Windows groups computers together for organizational
Server that can be used for deployment of the purposes, often deployed in homes and small
full version of the OS or for troubleshooting offices.
OS problems.
worm
wire crimper A piece of code that spreads from one
A tool that attaches media connectors to the computer to another on its own, not by
ends of cables. attaching itself to another file.
Glossary
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 781
X forwarding
A mechanism by which programs are run on
one machine and the X window output is
displayed on another machine.
XFS
A 64-bit, high-performance journaling
filesystem that provides fast recovery and can
handle large files efficiently.
XP mode
A downloadable add-on for Windows 7 that
allows users running Windows 7 to access and
use Windows XP-compatible software and
programs directly on their desktops.
zombie
Unauthorized software that directs the devices
to launch a DDoS attack.
Glossary
Index
Index
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 785
Index
786 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Index
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 787
Index
788 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Index
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 789
Index
790 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Index
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 791
Media Access Control addresses, See MAC common security symptoms 676
addresses email 522
media design workstation policies and procedures 637
requirements 411 security controls 598
media tester, See cable tester security tools 678
memory synchronization 527
configurations 253 trusted sources 636
ECC 253 untrusted sources 636
form factors 214 vulnerabilities 598
non-volatile 5 mobile digital device 25
overview 5 mobile memory specifications 507
ROM 269 mobile operating systems 63
settings 218 Mobile OS
volatile 5 issues 661
memory dump 650 tools 663
memory module 252 modems 93
metropolitan area network, See MAN motherboard
MFD form factors 202
types 543 MSConfig
microATX 205 options 331
MicroDIMM 506 utility 648
microprocessor 745 vs. Services 332
Microsoft Product Activation 304 MSDS
Microsoft Windows required information 134
activation methods 305 MT-RJ connector 432
common features 308 multiboot 296
compatibility 294, 334 multicast transmissions 436
features 55 multi-CPU motherboards 227
file sharing 479 multi-factor authentication 106
gadgets 56 multi-function device, See MFD
installation types 295 multimedia devices
maintenance tools 352 common devices 176
migrating data between systems 335 multimeter 457
networking 471 multitouch 62, 512
remote computing 481 mutual authentication 106
system requirements 293 My Computer, See Computer folder
Upgrade OS Advisor 336
upgrading 334 N
versions 54, 293
Windows 7 editions 58, 310 Napier's Bones 741
Windows 8 editions 57, 310 NAT
Windows Vista 309 dynamic NAT 477
Windows Vista editions 58 implementations 476
mini-ATX 204 native resolution 162
mini-HDMI 156 NET 460
mini-ITX 206 NETSTAT 460
MiniPCI 213 network
Mini-PCIe cards 508 security measures 592
mirroring, RAID 1 266 Network Address Translation, See NAT
mobile carrier 520 network-based firewall 590
mobile devices network-based printer 556
network cables
Index
792 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
coaxial 425 OS X
fiber optic 428 best practices 369
FireWire 433 Boot Camp 61
termination 428 Dock 61
twisted pair 422 features 364
network-connected printer 556 file sharing 480
network connections Finder 61
configuration options 460 Gestures 61
types 433, 466 hardware compatibility 362
network connectivity iCloud 61
issues 665 keychain 61
network devices management tools 366
legacy devices 90 Mission Control 61, 364
network directory, See directory services operating system 61, 362
Network File Sharing, See NFS protocol space 364
networking utilities 460 Spot Light 61
network interface card, See NIC system requirements 362
network locations 467 user interface 363
network models 84 versions 61
network settings 466 output devices 188
network types overclocking 240
SOHO 484 overvoltage 245
NFS protocol 480
NIC P
characteristics 420
configuring 467 pagefile 344
status lights 420 PAN 86
nodes 84 parity 253, 254
non-compliant systems 581 partitioning 297
Northbridge chipset 216 partition management 392
NSLOOKUP 460 partprobe program 393
NTFS 299, 617 Pascaline machine 742
password
authentication 678
O best practices 621
OLED 153 patches 304, 355, 600, 624, 635
operating system patch management
32-bit vs. 64-bit 227 example 355, 624
boot methods 294 policies 355, 624
upgrade methods 334 patch panel 94
optical discs 20 PC 745
optical drive PCI 210
overview 21 PCIe
types 21 and DisplayPort 157
organic light emitting diode, See OLED overview 212
organizational policies PCI Express, See PCIe
prohibited content 140 PCI eXtended, See PCI-X
scope 140 PCI-X 211
orientation peer-to-peer networks 85
landscape 558 Performance Monitor 329
portrait 558 Peripheral Component Interconnect, See PCI
OSHA 118
Index
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 793
Index
794 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Index
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 795
Index
796 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Index
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 797
Index
798 | CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
Index
CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902) | 799
WinPE 647
WinRE 647
Wired Equivalent Privacy, See WEP
Wireless Access Point, See WAP
wireless channels 486
wireless communication
signal strength 432
wireless connectivity issues 535
wireless device connections 47
wireless encryption types 487
Wireless Network Connection status 460
Wireless Personal Area Network, See WPAN
wireless security 628, 631
wireless tester 459
Wireless WAN, See WWAN
wire stripper 456
WOL 468
workgroups 300, 471
workstations
audio/video editing 412, 413
media design 411
standard client 408
worm 576
WPA 487
WPA2, See 802.11i
WPAN 86
WPS 630
WWAN 447
X
X forwarding 378
xfs tools 393
XP mode 57
Z
zero day attack 578
zombie 580
Index