Professional Documents
Culture Documents
Revised Volume 1
assessment software
Integrated mapping of all exam objectives
Hundreds of activities and review questions
978-1-4260-2178-7_Axzo_cvr_Vol1.indd 1
12/7/10 10:01 AM
CompTIA A+
Certification:
Comprehensive, 2009
Edition, Revised
Student Manual
Volume One
Jon Winder
Charles G. Blum
Josh Pincus
Dan Quackenbush
Writers:
Copyeditor:
Ken Maher
Keytester:
Cliff Coryea
Trademarks
ILT Series is a trademark of Axzo Press.
Some of the product names and company names used in this book have been used for identification purposes only and
may be trademarks or registered trademarks of their respective manufacturers and sellers.
Disclaimers
We reserve the right to revise this publication and make changes from time to time in its content without notice.
The logo of the CompTIA Approved Quality Content (CAQC) program and the status of this or other training
material as Authorized under the CompTIA Approved Quality Content program signifies that, in CompTIAs
opinion, such training material covers the content of CompTIAs related certification exam.
The contents of this training material were created for the CompTIA A+ Essentials exam, 2009 Edition (220-701),
and the CompTIA A+ Practical Application exam, 2009 Edition (220-702), covering CompTIA certification
objectives that were current as of September 2010.
ISBN 10: 1-4260-2178-X
ISBN 13: 978-1-4260-2178-7
Printed in the United States of America
1 2 3 4 5 GL 06 05 04 03
Contents
Introduction
Troubleshooting methodology
1-1
Operating systems
2-1
3-1
4-1
5-1
Memory systems
6-1
Bus structures
7-1
ii
Expansion cards
8-1
9-1
10-1
11-1
Printers
12-1
Connecting computers
13-1
Networking computers
14-1
Network troubleshooting
15-1
iii
Portable computers
16-1
Windows management
17-1
Windows monitoring
18-1
19-1
Security
20-1
21-1
22-1
A-1
System cases
B-1
C-1
iv
CompTIA A+ acronyms
D-1
E-1
Course summary
S-1
Glossary
G-1
Index
I-1
Introduction
vi
Manual components
The manuals contain these major components:
Table of contents
Introduction
Units
Appendices
Course summary
Glossary
Index
Each element is described below.
Table of contents
The table of contents acts as a learning roadmap.
Introduction
The introduction contains information about our training philosophy and our manual
components, features, and conventions. It contains target student, prerequisite,
objective, and setup information for the specific course.
Units
Units are the largest structural component of the course content. A unit begins with a
title page that lists objectives for each major subdivision, or topic, within the unit.
Within each topic, conceptual and explanatory information alternates with hands-on
activities. Units conclude with a summary comprising one paragraph for each topic, and
an independent practice activity that gives you an opportunity to practice the skills
youve learned.
The conceptual information takes the form of text paragraphs, exhibits, lists, and tables.
The activities are structured in two columns, one telling you what to do, the other
providing explanations, descriptions, and graphics.
Introduction
vii
Appendices
An appendix is similar to a unit in that it contains objectives and conceptual
explanations. However, an appendix does not include a summary or review questions.
In CompTIA courses, there are two additional appendicesone contains a list of
CompTIA acronyms, and the other contains a certification exam objective map.
Course summary
This section provides a text summary of the entire course. It is useful for providing
closure at the end of the course. The course summary also indicates the next course in
this series, if there is one, and lists additional resources you might find useful as you
continue to learn about the software.
Glossary
The glossary provides definitions for all of the key terms used in this course.
Index
The index at the end of this manual makes it easy for you to find information about a
particular software component, feature, or concept.
Manual conventions
Weve tried to keep the number of elements and the types of formatting to a minimum
in the manuals. This aids in clarity and makes the manuals more classically elegant
looking. But there are some conventions and icons you should know about.
Item
Description
Italic text
Bold text
Code font
Longer strings of
code will look
like this.
Keycaps like e
viii
Hands-on activities
The hands-on activities are the most important parts of our manuals. They are divided
into two primary columns. The Heres how column gives short instructions to you
about what to do. The Heres why column provides explanations, graphics, and
clarifications. Heres a sample:
Do it!
A-1:
Heres how
1 Open Sales
Heres why
This is an oversimplified sales compensation
worksheet. It shows sales totals, commissions,
and incentives for five sales reps.
For these activities, we have provided a collection of data files designed to help you
learn each skill in a real-world business context. As you work through the activities, you
will modify and update these files. Of course, you might make a mistake and therefore
want to re-key the activity starting from scratch. To make it easy to start over, you will
rename each data file at the end of the first activity in which the file is modified. Our
convention for renaming files is to add the word My to the beginning of the file name.
In the above activity, for example, a file called Sales is being used for the first time.
At the end of this activity, you would save the file as My sales, thus leaving the
Sales file unchanged. If you make a mistake, you can start over using the original
Sales file.
In some activities, however, it might not be practical to rename the data file. If you want
to retry one of these activities, ask your instructor for a fresh copy of the original data
file.
Introduction
ix
Course prerequisites
This is a fast-paced, comprehensive course designed to present the knowledge and skills
needed for both CompTIA A+ (2009 Edition) certification exams. Before taking this
course, you should be highly proficient with personal computers. Furthermore, this
course assumes that you have advanced user-level skills in Windows 7, Windows Vista,
Windows XP, or Windows 2000 Professional. These skills and knowledge can be
obtained by completing the following courses:
Windows 7: Basic and Windows 7: Advanced
Windows Vista: Basic and Windows Vista: Advanced
Windows XP SP2: Basic and Windows XP SP2: Advanced
Target student
This course will prepare you for the CompTIA A+ Essentials certification exam (2009
objectives, version 2.0) and the CompTIA A+ Practical Application certification exam
(2009 objectives, version 2.0). It is designed for students seeking to become entry-level
IT professionals. You will gain the skills and knowledge necessary to perform the
following tasks on personal computer hardware and operating systems:
Identify PC components
Configure PC network connections
Provide IT support for portable computers
Monitor and manage Windows operating systems
Diagnose basic hardware problems by using a troubleshooting methodology
Install and upgrade Windows operating systems
Complete preventative maintenance tasks
Install, maintain, troubleshoot, and replace computer hardware and peripherals
Maintain and troubleshoot the Windows operating system
Install a small-office/home-office network, and troubleshoot network
connections
Secure personal computers
Course objectives
These overall course objectives will give you an idea about what to expect from the
course. It is also possible that they will help you see that this course is not the right one
for you. If you think you either lack the prerequisite knowledge or already know most of
the subject matter to be covered, you should let your instructor know that you think you
are misplaced in the class.
After completing this course, you will know how to:
Describe the CompTIA A+ troubleshooting methodology.
Provide professional customer service when providing IT support.
Use basic Windows interface tools.
Examine power supplies and connectors, install and troubleshoot power supplies
while following procedures for working safely with electrical components.
Identify, install and troubleshoot various motherboards and CPUs.
Configure the PCs BIOS and boot the computer.
Identify, install and troubleshoot various types of memory, and monitor memory
usage in Windows.
Examine the settings for buses.
Identify, install and troubleshoot various types of expansion cards.
Attach peripheral devices.
Install, use and troubleshoot data storage devices.
Connect video output and image input devices.
Install, configure, maintain and troubleshoot printers.
Identify various network connection types, and implement a SOHO network.
Configure a TCP/IP client.
Troubleshoot client-side connectivity.
Provide IT support for portable computers.
Manage the Windows operating system.
Monitor the Windows operating system.
Troubleshoot system startup problems and the Windows operating system.
Apply various measures to keep computer systems secure and prevent
unauthorized access.
Install and upgrade Windows operating systems.
Maintain a safe computing environment.
Introduction
xi
xii
Skills inventory
Use the following form to gauge your skill level entering the class. For each skill listed,
rate your familiarity from 1 to 5, with five being the most familiar. This is not a test.
Rather, it is intended to provide you with an idea of where youre starting from at the
beginning of class. If youre wholly unfamiliar with all the skills, you might not be
ready for the class. If you think you already understand all of the skills, you might need
to move on to the next course in the series. In either case, you should let your instructor
know as soon as possible.
Skill
Describing the CompTIA A+ troubleshooting model
Interacting professionally with users and achieving customer
satisfaction
Identifying operating system fundamentals
Managing directories and files on a Microsoft Windows computer
Controlling access to files and folders on a Windows computer
Identifying electrostatic discharge and following ESD safe
practices while working with computer components
Describing the purpose and features of PC power supplies
Installing power supplies
Troubleshooting power supplies
Describing the function and features of CPUs, identifying a CPU,
and classifying CPUs according to their specifications
Describing CPU packaging options and related slot and socket
technologies, and describing the techniques used to cool CPUs and
other components in a PC
Installing a CPU
Replacing a cooling fan
Describing motherboards, their components, and their form factors
Installing a motherboard
Accessing the BIOS setup utility, modifying hardware
configuration values, and researching BIOS updates
Explaining the POST and boot processes
Describing the function of memory and differentiating among
various types of memory chips
xiii
Introduction
Skill
Differentiating among the various memory packages
Installing memory
Monitoring memory usage
Troubleshooting memory
Describing the primary types of buses and defining the terms
interrupt, IRQ, I/O address, DMA, and base memory address
Describing the features and functions of the PCI bus
Describing the features and functions of the various graphic
connections
Describing video adapters and standards
Installing an expansion card
Defining sound cards and identifying the components of a sound
card
Describing modem standards and identifying the components of a
modem
Troubleshooting expansion cards
Identifying and connecting serial and parallel ports, cables, and
connectors
Identifying and connecting USB ports, cables, and connectors
Identifying and connecting FireWire (IEEE 1394) ports, cables,
and connectors
Identifying and connecting multimedia ports
Troubleshooting ports, cables, and connectors
Defining the common drive interfaces
Describing hard drives, partitions, and file systems
Installing a hard drive
Describing optical data storage
Installing an optical drive and using optical drives and discs
Installing removable media drives
Using removable drives
xiv
xv
Introduction
Skill
Identifying operating system problems
Configuring basic Windows user authentication
Using Windows file encryption
Discussing biometric and other security devices
Recognizing and mitigating common security threats
Managing the human aspects of computer security
Installing a Windows operating system
Upgrading from one version of Windows to another
Examining safety issues and hazards in the computing environment
Identifying preventative maintenance tasks for personal computers
Identifying ways to avoid injury and strain when working with
computers
Examining proper methods for disposing of computer equipment
xvi
Hardware requirements
Your personal desktop computer should have:
A keyboard and a pointing device such as a mouse
1 GHz or higher 32-bit (x86) or 64-bit (x64) processor
1 GB or higher RAM on 32-bit processor computers or 2 GB or higher RAM on
64-bit processor computers
At least 40 GB of free hard disk space on 32-bit processor computers or at least
50 GB of free hard disk space on 64-bit processor computers
DVD-R ROM drive
Monitor with DirectX 9 graphics support; Windows Display Driver Model
(WDDM) 1.0 or higher
Wired NIC
Modem
A video card with two monitor ports for the independent practice activity in the
Video output ad image input devices unit. If the video adapter cards in your
computers have only one monitor port, students can do all other activities in the
course, but will not be able to complete this independent practice activity.
Activity hardware requirements
In addition to the hardware requirements for your personal desktop computer, you will
need the following hardware to complete various course activities.
Unit 3 (Electricity and power supplies):
Multimeter
Variety of batteries for testing
Extra power supply (If you dont have an extra power supply for students
to install in their computers, you can have them remove and the reinstall
the existing power supply)
Unit 4 (CPUs and motherboards):
Extra CPU (This is for an optional activity. If you dont have an extra CPU
for each computer, you can either skip the activity or have students remove
and reinstall the existing CPU.)
Chip puller
Extra system fan (If you dont have an extra system fan for students to
install in their computers, you can have them remove and the reinstall the
existing system fan)
Extra motherboard (This is for an optional activity. If you dont have an
extra motherboard for each computer, you can either skip the activity or
have students remove and reinstall the existing motherboard.)
Introduction
xvii
xviii
Introduction
xix
Software requirements
You will need the following software:
Windows 7 Professional installation files and product keys for both classroom
setup and an activity in Unit 21, Windows installation and upgrades.
Windows 7 Upgrade Advisor, which can be downloaded from Microsofts
Downloads Web site.
Windows 7 Ultimate installation files and product keys for an activity in
Unit 21.
Windows Vista Business installation files and product keys for the independent
practice activity in Unit 21.
Any Windows 7 and Windows Vista drivers needed for the independent practice
activity in Unit 21.
Any Windows XP application software for an activity in Unit 21.
Note: Because you will need to conduct multiple operating system installations in the
Windows installation and upgrades unit, operating system discs should be
slipstreamed with the latest service packs, if at all possible.
In addition, you will need to install the following software:
Latest service pack for Windows
Sound card drivers
A copy of the avast! antivirus software. An evaluation copy is suitable and is
available at www.avast.com.
Optional software:
DVD decoder software
xx
Network requirements
The following network components and connectivity are also required for rekeying this
course:
Internet access, for the following purposes:
Downloading the latest critical updates and service packs from
www.windowsupdate.com
Completing activities within the units.
Downloading the Student Data files from www.axzopress.com (if
necessary)
Your computer needs to be connected to the network through TCP/IP and
receiving IP addressing information from a DHCP server.
You will need a valid IP address and additional TCP/IP addressing information
so that you can switch to manual configuration in an activity in Unit 14,
Networking computers.
Introduction
xxi
xxii
Introduction
xxiii
Configure the modem to use incorrect connection parameters (stop bits, parity,
etc.).
After the modem is installed, change COM port configurations so that the
modem cant access the ports.
Change the COM port configurations in the BIOS to values that the modem card
doesnt support.
Give students a voice or fax number to dial into instead of another modem line.
Install damaged or nonfunctioning adapter cards, such as video cards, modem
cards, and sound cards.
(Advanced) Put tape over the adapters edge connector or paint some of the
connectors pins with nail polish so that they cannot make contact.
Unit 9: Peripheral connection types
For the Topic F activity entitled Troubleshooting problems with peripheral
connections, you can implement one or more of these problems:
Connect the keyboard to the mouse port and vice versa.
Disable the serial port in the BIOS.
Disable the parallel port in the BIOS.
Within the BIOS, assign nonstandard system resources that are likely to conflict
with other devices in the system.
Cut one of the wires in the serial, parallel, USB, or FireWire cable.
Substitute a null modem cable for a straight-through cable.
Provide students with a USB device that requires external power, but dont give
them the power adapter.
Install too many unpowered devices on the USB bus.
Provide students with a USB 2.0only device to go with their USB 1.1 systems.
Disable the infrared port in the BIOS.
Provide students with a nonfunctioning external modem.
Bend one of the pins in the male serial or parallel connector so that it cannot
make contact.
Provide students with a defective or nonfunctioning mouse or keyboard (for
example, one that has been dropped or had liquid spilled on it).
Configure the external modem to use nonstandard connection parameters, such
as a very slow port speed, mark or space parity, hardware flow control, and so
forth.
Provide students with a printer that supports just one parallel port mode (bidirectional, EPP, and so forth), but configure the BIOS to implement a different
port mode.
Provide students with a nonfunctioning printer.
Tell students to connect to a remote PC with their modems, but give them a
voice number to dial into (such as an automated weather line or some other line
not likely to be answered by a person, who would get annoyed by the data calls).
Cover the infrared window on the PC or device with tape, dirt, or something like
nail polish that will attenuate the infrared signal without being too obviously
present.
xxiv
Introduction
xxv
With an older, slower drive, configure the BIOS to speed the boot process to the
point where the drive cannot spin up and be ready by the time the startup process
accesses it.
Use a scratched CD for the CD or DVD.
Use a burned DVD or CD.
Provide a DVD in place of a CD for use with a CD drive.
Plug the speakers into the MIC jack.
Disconnect or loosely connect the cable from the CD drive to the sound card.
Remove the driver for the CD drive.
Set the SCSI ID on a SCSI CD drive to a duplicate ID used by another SCSI
device.
Remove (or add) termination to the SCSI CD drive.
Change the CD drive to the master drive (or as slave if its already a master) on
an IDE channel.
Disconnect or loosely connect the power or data cable from the CD drive.
For an external CD drive, disconnect or loosely connect the power or data cable.
Use an audio DVD for the audio CD (if it is a CD drive rather than a DVD
drive).
Change or remove the driver for the CD player.
Install a damaged CD drive that no longer works.
If youre using an external CD drive, plug the drive into a power strip, but turn
the power strip off.
Install the CD drive cables connector backward (force the connector backward
into the socket).
Install the CD drive cable backward (connect the motherboard connector to the
drive, and connect the master drive connector to the motherboard).
Install a bad CD drive cable.
Bend one of the pins in the CD drives connector so that the cable cannot make
full contact with all of the conductors.
Warning: Doing this may permanently damage the drive. Bent pins can break,
leaving the drive unusable.
Disable the use of flash drives on the system.
Use a drive that has been damaged.
Password-protect the flash drive, but dont tell students the password (until they
ask later when they figure out that this is the problem).
Use a damaged drive that no longer works.
Use a damaged tape.
Provide the wrong drivers for the drive.
Use a controller card that is incompatible with the tape drive.
Use a damaged power and/or data cable.
Plug the drive into a power strip, but turn the power strip off.
xxvi
Introduction
xxvii
CertBlaster software
CertBlaster pre- and post-assessment software is available for this course. To download
and install this free software, students should complete the following steps:
1 Go to www.axzopress.com.
2 Under Downloads, click CertBlaster.
3 Click one of the following links:
4
5
6
7
8
xxviii
11
Unit 1
Troubleshooting methodology
Unit time: 30 Minutes
Complete this unit, and youll know how to:
A Describe the CompTIA A+ troubleshooting
model.
B Interact professionally with users and
12
Objective
2.1
2.2
Given a scenario, explain and interpret common hardware and operating system symptoms
and their causes
Use documentation and resources
User/installation manuals
Internet/Web based
Training materials
Troubleshooting is the process of determining the cause of, and ultimately the solution
to, a problem. By applying a logical, consistent method to the troubleshooting process,
you make your job easier and shorten the time it takes to discover the root of a problem.
When troubleshooting PC hardware problems, you can follow any of several popular
models. This course focuses on the stages of the CompTIA A+ troubleshooting model.
CompTIAs A+ troubleshooting model
The CompTIA A+ troubleshooting model has you work through stages to apply basic
diagnostic procedures and troubleshooting techniques. CompTIA recommends working
through the stages described in the following table.
Troubleshooting methodology
13
Stage
Description
Identify the problem by questioning the user and determining any changes
the user has made to the computer. Perform a backup before making any
changes on the system.
Establish a theory of
probable cause
Test the theory to determine the actual cause. Test components related to the
problem. This process includes inspecting components for obvious things,
such as connections and power being connected and turned on, proper
hardware and/or software configurations, and indications of conflicts or
problems in Device Manager. Also, consult vendor documentation for
descriptions of status lights and other indicators.
Once youve confirmed your theory, create a plan of action.
If your theory is incorrect, re-establish a new theory or escalate to a higher
level technician.
Create a plan to resolve the problem and then implement the solution in your
plan. You might need to include other professionals, such as your
companys network technician, to get assistance in implementing the
resolution.
Verify the results, and if necessary, take additional steps to correct the
problem. Additional steps might include consulting with other professionals
or the vendor, using alternative resources, and reviewing equipment
manuals. Once youve established full system functionality, you need to
implement applicable preventive measures to prevent the problem from
reoccurring.
Document findings,
actions, and outcomes
Document the actions you took to correct the problem, as well as the
outcomes of those actions.
14
Do it!
A-1:
Heres how
Heres why
1 Hector reports that his computer doesnt work. Using the CompTIA A+
troubleshooting model, describe the first step you would take to fix his problem.
2 What documentation should you record after youve found the solution to
Hectors problem?
3 A user calls the Help desk because her Windows 7 Business computer has
unexpectedly shut down and is now displaying a blue screen with a white STOP
error. After youve identified the problem, what should you do next?
Troubleshooting methodology
15
Information resources
Explanation
When youre troubleshooting, you can use several kinds of resources to research
problems and solutions. Lets take a look at some of the resources you should consider
when resolving issues.
Documentation
Documentation is the key to successful troubleshooting. Such documentation takes two
forms: that which is provided by others and that which you create.
Youll find product user and installation manuals, training materials, manufacturer Web
sites, and technology-related knowledge bases to be invaluable sources of information.
You should consult these references early in the troubleshooting process to determine if
youre dealing with a known problem that has a previously published solution.
Problems that you must solve are often specific to your customers combination of
hardware and software, as well as to how the person uses his system. Your notes are the
best reference for future problems because they apply specifically to your customers
environment
Forums
Forums are online discussion groups. These enable various people to gather at a central
location online to discuss common interests in an open format. Members of the forum
can exchange information and ideas.
A generic forum might be created to discuss general network issues. A forum most
often contains information on problems and solutions. This makes it useful when you
have a problem because you can visit the forum and see if anyone else had a similar
problem and found a resolution. These postings are not usually verified by a vendor or
manufacturer as providing the best solution to a problem; they are just what worked for
a particular person. An example is the Web site at msfn.org; its a site dedicated to
Windows operating systems and desktop applications, but its not a Microsoft-affiliated
site.
Vendor-sponsored forums do have experts on staff to review the postings. They can also
help members by gathering information about the problem and guiding them through
the troubleshooting process. Most vendors then post a summary of the problem and
step-by-step instructions for resolving the problem. An example is
www.microsoft.com/communities/forums, which is a Web site dedicated to
Microsoft products and technologies.
Other sources
Other resources that you should consult include trade magazines and Web sites, fellow
employees, newsgroups, trade shows, vendor group meetings, and independent
consultants. Being open to using a variety of sources to resolve your problem gives you
more flexibility in finding a solution as quickly as possible.
Keeping up-to-date on your knowledge through reading trade magazines and attending
trade shows and vendor group meetings can help you keep abreast of potential
problems. Even if you havent yet encountered a problem being described in the article
or meeting, if it should arise, you will know what to do about it.
16
Troubleshooting methodology
17
18
Do it!
A-2:
2 Discuss the potential drawbacks of using a generic forum for answers to your
problems.
3 Using a variety of sources, find the best solution to the problem assigned by your
instructor.
4 A user tells you that she was attempting to take her laptop running Windows 7
Professional out of sleep mode when the computer shut down. The error recorded
is KERNEL_DATA_INPAGE_ERROR. Where would you go to research the
cause of this problem?
9 Research and determine the cause and resolution of this problem. (You can use
the Advanced Search feature to narrow your results to Windows 7.)
Troubleshooting methodology
Topic B: Professionalism
This topic covers the following CompTIA A+ Essentials (2009 Edition) version 2.0
exam objective.
#
Objective
6.2
19
110
Troubleshooting methodology
111
Keep in mind that most people overstate their understanding or imply they have a higher
level of understanding than they actually possess. Ask clarifying questions to judge
comprehension, and explain your message in various ways to ensure that the customer
understands what youre saying.
Avoid using jargon where plain language suffices. You arent out to impress the user
with all the "techno babble you picked up at the latest conference you attended. You
need to speak clearly about the issue and implement the appropriate solutions. Explain
any acronyms and abbreviations you use.
Many users like to think of themselves as computer-savvy and find it difficult to admit
that there are some situations that they just cant resolve on their own. Other users
refuse to admit that they understand anything about computers and just throw up their
hands when the least little problem occurs. Its up to you as the hardware support
technician to determine at what level the user can understand what the problem is and
give you the information you need about it. Dont talk down to the user, and dont talk
over the head of the user, either.
Speak professionally
Ask clarifying questions until youre sure that both you and the customer agree that you
understand the problem. Often users dont know exactly what the problem is. They
know only that when they try to do X, Y happens. In their descriptions, they might not
accurately explain the problems. A caller also might not directly ask the question; he or
she might dance around it, leaving you to figure it out from the various clues given.
If the user tried to fix the problem on his own and covered up the original problem with
his attempted fixes or made the problem worse, he isnt likely to want to admit this to
you. If he tells you that he already tried a particular fix when you try to perform a step
in your troubleshooting, calmly tell the user that in order to fix the problem, you
yourself need to go through all of the most likely possibilities in an orderly manner. If
you do something that was already tried, then its possible that some step in between
altered the outcome of trying that fix again.
If you discover that the user has created a problem through a misunderstanding of how
things work, be sure to explain how to perform the task, so the problem doesnt recur.
You might recommend an online course or a classroom course that the user should
consider enrolling in to learn more about using the computer.
Respect the customer
Its critical that you respect the customer and her property. One of the easiest things you
can do to show the customer respect is to show up on time. It tells the customers that
you value them and their time.
112
Troubleshooting methodology
113
114
Do it!
B-1:
Maintaining professionalism
Tell him that youre the expert and you will solve the problem.
Tell him that you want to make sure that a problem really exists.
Tell him that youre following a methodical troubleshooting plan, and the
first step is to try printing.
Tell him that before arriving you degaussed the fuser and primed the
piezoelectric elements so that the print device should be operational.
2 List at least three activities that you shouldnt engage in while in a customers
cubicle or office.
3 While troubleshooting Jills computer, you find that she spilled coffee into the
keyboard, causing it to fail. How might you inform Jill of the problem?
A
Sternly tell her that its against corporate policy to consume food or
beverages near company computers and equipment.
Tell her the source of the problem and suggest that she keep food and drinks
more than an arms reach from her computer.
Troubleshooting methodology
115
Effective communication
Explanation
Effective communication involves both verbal and nonverbal techniques. How you use
your voice says a great deal about you. Listeners take note of your vocal characteristics
and form opinions about your sincerity, enthusiasm, and even your knowledge of the
topic being discussed. Your body language also clues listeners into your state of mind.
Your posture, the firmness of your handshake, and your willingness to make eye contact
all tell listeners something about your personality and character. You need to make sure
you're communicating the same message with both your voice and your body language.
Verbal communication
Your voice often indicates whether you are nervous, which might affect how a listener
perceives your credibility. Controlling your voice and communicating in a pleasing way
can help you attract and maintain listeners attention. To become a more effective
speaker, you can work on controlling three vocal characteristics: volume, rate, and pitch.
Volume is a vocal characteristic you need to tailor to the environment. Room
size, number of listeners, and external noise all influence the volume of your
voice. Make sure your listeners can hear everything you say.
Rate is the speed at which you speak. Every person has a different natural rate,
so its important to adapt your rate to the topic and listener. Nervous speakers
tend to speak rapidly. If you feel anxious about the message you are delivering,
you should try to maintain a slow, even rate of speech so that the listener hears
the actual message, instead of being distracted by your nervousness. Conversely,
you shouldnt let your speaking rate drop much below 120 words per minute, or
you risk losing the listeners attention. Stay enthusiastic about your message to
maintain an appropriate rate.
Pitch is the highness or lowness of your voice. When your vocal muscles are
taut, your voice has a high pitch; when your vocal muscles are relaxed, your
voice has a low pitch. If youre nervous, your vocal muscles tighten and your
voice rises above its natural pitch.
Rate and volume also affect your pitch. When you speak rapidly, your muscles are
tense, which causes your pitch to rise. Speaking loudly also causes your pitch to rise.
Although pitch variations might be useful in emphasizing certain points, generally its
best to maintain an even and natural pitch in most situations.
What you say also affects how others see you. Use the following guidelines to make the
best verbal impression with clients.
Use positive language
Negative language can be expressed in a variety of ways, but the main concern with
negative language is the word "no. The word "no delivers a blunt, end-of-conversation
attitude, regardless of the rest of the message. If at all possible, avoid using the word
"no and any other negative language, such as "cant, "wont, and "dont.
Use non-inflammatory language
Inflammatory language is meant to stir intense negative emotions in the listener. Its
often prejudicial against someone because of gender, ethnicity, or physical attributes.
Inflammatory language is always inappropriate in the workplace.
116
Do it!
B-2:
Troubleshooting methodology
117
Nonverbal communication
Explanation
You are constantly communicating with those around you. You express fear, anger,
happiness, sadness, enthusiasm, and many other emotions without even saying a word.
Its important to be aware of the signals you are communicating to those around you.
Its also important to be able to recognize the nonverbal signals that others are
communicating to you.
When two people meet, nonverbal communication gives each of them clues about the
others personality, attitudes, and feelings. Six types of nonverbal communication have
the most impact on your conversations:
Handshakes
Expression and eye contact
Proximity
Touch
Gestures and posture
Physical appearance
Handshakes
A firm handshake is the foundation of any business interaction. Some people carry
firmness to the extreme, but youre not trying to crush the other persons hand. Of
course, you dont want to give a "limp rag handshake, either.
A good, firm handshake starts with a dry palm; carry a handkerchief if you need to wipe
damp palms before entering a meeting where you expect to shake someones hand.
Grasp the other persons palm, not just the fingers. Give a positive squeeze, but not too
firm to cause discomfort. Use one hand; dont clasp both hands around the other
persons hand.
Your handshake should last a couple of seconds, no longer. People are sensitive to being
touched and restrained. A handshake that lasts too long can make the other person feel
caught in a trap. Of course, the handshake should last long enough to appear deliberate
and sincere.
Look the other person in the eye. Introduce yourself with a greeting like "Hi, Im (say
your first and last name). Its nice to meet you. Let go of the persons hand and then
listen intently as he greets you back. Remember the persons name; repeat it to yourself
a couple times if you need to. Then use the "name times three guideline to help
yourself remember the name.
Expression and eye contact
A friendly expression and direct eye contact convey that youre open, honest, and
enthusiastic. When coming into a meeting or interaction, smile and look into the eyes of
the other person as youre introduced. You can show interest in the other person by
maintaining eye contact as she speaks. When you tilt your head toward the speaker, you
give the impression that you are an interested listener. These cues encourage the other
person to relax and help open the lines of communication.
118
Troubleshooting methodology
119
Without judging one look to be better than the other, these two technicians send
different signals with their appearance. Which is appropriate for you depends on your
industry, company dress code, region, and the expectations of your customers.
Technicians working at an insurance company in the Northeast U.S. would probably be
expected to dress like technician A. But a technician who dressed that way at a software
startup in California would probably seem out of place.
Do it!
B-3:
Heres how
Heres why
120
Customer satisfaction
Explanation
A problem isnt resolved until both the technician and the user agree that the problem is
resolved. Keeping a customer satisfied during a long troubleshooting process can be a
difficult task, especially for a technician whos better at dealing with hardware than with
people. Such a technician needs to work on people skills to be successful in the support
role.
Service-level agreements
Many companies develop a service-level agreement (SLA) that specifies how clients and
support personnel are to interact, what to expect from each other, and timeframes for the
resolution of issues. The following table describes some of the important concerns that
an SLA should cover.
Concern
Description
Customers will contact tech support by phone, Web-based application, email, or some other method. The SLA might also specify contact methods
that should not be used. For example, some companies might not accept email requests for assistance or stopping techs in the hallways to ask for
support.
Tech support will usually send an e-mail message to let the user know that
the request has been received and queued up for resolution.
The tech might need to do something behind the scenes to resolve the
problem, might be able to walk the user through the problem over the
phone, or might need to meet with the user in person.
In some companies, the response time is in minutes or hours. In others,
its in days.
This parameter often specifies how much time the tech is allowed to
spend trying to resolve the problem before escalating it.
The SLA might also specify whether the user gets a loaner system (to use
if his or her system is completely down) or whether other workarounds to
the problem are available.
Usually there are three tiers of support. The process often starts with a
help-desk contact (via phone or e-mail), then a desk-side hardware
technician, and finally a backroom technician who works at a bench
making repairs.
The staff for each successive tier of support usually has more experience,
as well as access to additional resources to help resolve the problem.
The course "A Guide to Customer Service Skills for the Help Desk Professional, 2nd
edition is available if youd like more in-depth coverage of this topic.
Troubleshooting methodology
Do it!
B-4:
121
Heres how
1 Working in groups, determine what youd include in your SLA for a small
workgroup that needs support for basic hardware and commercial software.
122
In this topic, you examined the CompTIA A+ troubleshooting model. You also
learned about the various types of documents and resources available to use for
troubleshooting computer problems, such as user and installation manuals, Internet
and Web-based resources, and training materials.
Topic B
In this topic, you learned that being professional, courteous, and respectful is critical
to success as a support technician. You learned that you must stay focused, speak
professionally, respect the customer, and stay up to date. You learned how to
communicate professionally, using both verbal and nonverbal means. You learned
that a problem isnt resolved until both the technician and the user agree that the
problem has been resolved. You also learned about service level agreements, which
specify how clients and support personnel are to interact.
Review questions
1 Match each stage of the CompTIA A+ troubleshooting model on the left with its
correct order on the right.
Stage
Order
A. First stage
B. Second stage
C. Third stage
D. Fourth stage
E. Fifth stage
F. Sixth stage
C Medium
B Small
D Large
Troubleshooting methodology
123
4 What is the name of the Web site containing problem and solution references for the
Microsoft client operating systems, such as Windows 2000 Professional, Windows
XP, Windows Vista, and Windows 7, as well as many other Microsoft applications?
A Microsoft Answers
9 When you match your communication level with your customers abilities, what
guidelines for professional communication are you following?
A Considering the total message
C Speaking professionally
10 You and a colleague respond to a user who is having a problem. As the user is
describing the problem to your colleague, you roll your eyes. Which guidelines for
professional communication are you not following? [Choose all that apply.]
A Considering the total message
C Speaking professionally
11 Effective communication involves both verbal and __________ techniques.
nonverbal
124
14 Whats the name of the document that many companies develop to specify how
clients and support personnel are to interact, what to expect from each other, and
what are acceptable timeframes for the resolution of issues.
A Help desk agreement
C Service-level agreement
D Service report
2 John is unable to access the network from his workstation. What questions might
you ask to narrow the scope of this problem?
Answers will vary and might include:
When was the last time John was able to access the network? Did anything change in that
time?
3 Use Microsofts Web site to investigate the solution to printer error 0x00000006.
Uninstall and reinstall the printer to fix corrupt drivers.
21
Unit 2
Operating systems
Unit time: 75 Minutes
Complete this unit, and youll know how to:
A Identify operating system fundamentals.
B Manage directories on a Microsoft
Windows computer.
C Manage files on a Microsoft Windows
computer.
D Control access to files and folders on a
22
Objective
1.4
3.1
Compare and contrast the different Windows operating systems and their features
Windows 2000, Windows XP 32bit vs. 64bit, Windows Vista 32bit vs. 64bit,
Windows 7 32-bit vs. 64-bit
Side bar, Aero
Terminology (32bit vs. 64bit x86 vs. x64)
User interface, start bar layout
3.2
Operating systems
Explanation
An operating system is a set of software instructions that control the computer and run
other programs on the computer. The operating system makes a computer able to
function, accepting input from devicessuch as the keyboard, mouse, scanner, and
smart card readerand creating output on other devices, such as a monitor, printer, or
speakers. Applications are installed on top of the operating system, and work with the
operating system and the computers hardware.
Microsoft Windows is currently the most popular client operating system in the world,
followed by Macintosh, Linux, and UNIX operating systems.
Operating systems
23
Microsoft Windows
In January of 2010, it was reported that Microsoft Windows was installed on just over
92% of the worlds personal computers (PCs), compared to Macintosh a bit over 5%
and Linux slightly over 1%. Windows can run on just about any PC from any PC
manufacturer, now including an Apple Intel-based computer, if you have the appropriate
utilities.
Windows 3.1 was Microsofts first graphical operating system. A graphical user
interface (GUI) has icons or menus that you can click or select to perform a function or
run a program. Along with a keyboard, a mouse or other pointing device, such as a
touchpad, is used to interact with the screen elements when youre working in a GUI.
In 1995, Microsoft released Windows 95, which introduced the Windows interface
youre familiar with today. As of the time of this writing, Windows 7 is Microsofts
most current client version of Windows. Most applications are written to run under the
Windows operating system.
24
Operating systems
25
26
During your IT support career, you might come across all versions of Windows 7, Vista,
and XP, and perhaps even Windows 2000 Professional, as youre supporting users in
both the home and the office.
Windows 7 editions
Microsofts most recent client operating system is Windows 7. Most features are
included in all Windows 7 editions, but some features are unique to particular editions.
The following features arent available in Windows 7 Home Basic edition:
Aero Glass and advanced window navigation
Easy networking and network sharing
Windows Media Center and improved media format support
Multi-touch
The following features arent available in the two Windows 7 Home editions:
Windows XP mode
Domain Join
Network backup
Encrypting File System (EFS)
Location-aware printing
Remote Desktop Host
Operating systems
27
The following features are available only in Windows 7 Enterprise and Ultimate:
BitLocker Drive Encryption
Multi-Language User Interface (MUI)
Direct Access links to corporate resources without a VPN
AppLocker
Virtual Hard Disk (VHD) disk image booting
BranchCache
Windows Vista editions
Like Windows 7, most Windows Vista features are included in all editions, but some
features are unique to particular editions.
The following features are not available in Windows Vista Home Basic:
Aero desktop GUI with Flip 3D
Windows Mobility Center and Tablet PC support
Scheduled and network-based backup (however, all editions contain SafeDocs
backup and restore)
Windows Meeting Space
PC-to-PC Sync
The following features are not available in either of the Windows Vista Home editions:
Multiprocessor support
Complete PC Backup and Restore
Networking Center
Remote Desktop
Domain Join
Group Policy support
Windows Fax and Scan
Encrypting File System (EFS)
Shadow Copy
P2P Meeting Place
Corporate Roaming
Offline Files and Folders
The following features are available only in Windows Vista Home Premium Edition and
Windows Vista Ultimate Edition:
Windows Media Center and Media Center Extenders
Windows DVD Maker
Windows HD Movie Maker
Windows premium games
The following features are available only in Windows Vista Ultimate Edition:
BitLocker Drive Encryption
28
Operating systems
29
210
In order for a computer to be a 64-bit system, all of the hardware drivers must be 64-bit
compatible and the operating system must be written as 64-bit. Microsoft offers 64-bit
versions of Windows XP Professional and all Windows Vista versions.
The 64-bit versions of Windows can utilize more RAM than 32-bit versions of
Windows, minimizing memory swapping and thus increasing performance.
Youll sometimes hear Microsofts 32-bit versions referred to as x86, which is the
generic name for the series of Intel microprocessors that began with the 80286
microprocessor, as well as compatible processors from other vendors. Although the
80286 processor was 16-bit, the other x86 processorsfrom the 80386 in 1985 until the
introduction of the Athlon 64 processor in 2003were 32-bit. Microsoft refers to its 64bit versions as x64.
Operating systems
Do it!
A-1:
211
6 You and your spouse own a small landscaping business. You currently have three
networked Windows Me computers in a home office. The three computers share
one Internet connection using Internet Connection Sharing. Microsoft ended
support for Windows Me and you need to upgrade. You have researched
Windows Vista Business and Windows Vista Home Premium Edition. What
would some benefits be of using Windows Vista Home Premium Edition on your
three computers?
212
Operating systems
213
214
Pinned
applications
Taskbar
Notification
area
Desktop
shortcuts
Start
menu
Sidebar with
gadgets
Desktop
Taskbar
Recycle
Bin
Start
menu
Notification
area
Desktop
gadgets
Operating systems
Desktop
Taskbar
215
Notification
area
Recycle
Bin
Start
menu
216
Taskbar
System tray
My Computer
My Network
Places
Recycle
Bin
Start menu
Operating systems
217
218
Description
Aero Peek
When you have multiple windows open on your desktop, you can press and hold
your mouse pointer on the title bar of a single window, then shake the mouse
back and forth. This minimizes all other open windows, leaving just the one you
shook on the desktop.
Aero Snap
Drag the title bar of a window to the top of the screen, and the window
automatically maximizes. Drag the title bar back down, and the window goes
back to its original size and position. Drag the title bar to the left or right of your
screen, and it snaps to one side and takes up half the desktop.
Jump lists
Operating systems
219
220
Toolbar
Files
File type
File size
Drive
Folders/
directories
Exhibit 2-12: The Details view of Windows Explorer in Windows Vista Professional
Menu bar
Toolbar Files
Drive
Folders/
directories
Drive
Operating systems
221
Windows 7 Libraries
Explanation
A Windows library is a collection of related locations that you can see in one contents
pane. Your libraries are listed in the navigation pane of Windows Explorer. The built-in
libraries include Documents, Music, Pictures, and Videos, and you can add new
libraries.
Previous versions of Windows had special-purpose folders for different types of
content, and these folders were all subfolders of a personal folder that was automatically
created for each user. Some of these folders still exist in Windows 7, but they are now
included in the appropriate library.
222
Exhibit 2-15: The Library Locations dialog box for the Documents library
Operating systems
223
A folder can be included in more than one library. For instance, an online auctioneer
might have a library for current items for sale; this library might include a folder for
item descriptions and a folder for item pictures. These same folders might also be
included in the Documents and Pictures libraries.
If you include one library in another library, all of the folders in the first one will be
included in the second, as though you had added them individually. However, the first
library name wont appear in the second library.
Removing folders from a library
Reverse the methods above to remove folders from a library:
In the navigation pane, right-click the folder under the expanded library and
choose Remove location from library.
With the library displayed in the contents pane, click the number-of-locations
link under the library title. Then use the Library Locations dialog box to remove
the folder.
Default saving locations and content order
Every library has a default saving locationthe actual folder where it will save
something that is saved in the library. For instance, if you drag a file to the Documents
library, the file will be saved in the My Documents folder by default. You can change
the default save location from the Library Locations dialog box. Just right-click a folder
and choose Set as default save location.
You can also use the Library Locations dialog box to change the order in which the
locations appear in the librarys contents pane. By default, the folders appear in the
order in which they were added to the library. To change that order from within the
Library Locations dialog box, right-click a folder and choose Move up or Move
down.
224
Do it!
A-2:
Heres how
9 If necessary, log on to Windows 7
as COMPADMIN##
Heres why
The password is !pass1234.
12 Click
Operating systems
13 Click Computer and then
maximize the window
225
Double-click
Click
Click
15 Click Start and choose
All Programs, Accessories,
Windows Explorer
Expand Computer
17 Click
226
System tools
All Windows interfaces contain graphical tools you can use to control the computer and
operating system:
Control Panel
Computer Management console
Network and My Network Places
Command-line utility
Task Manager
The Control Panel
The Control Panel, shown in Exhibit 2-16, is a group of utilities, called applets, that you
can use to control your computers system settings. In Windows 7, Windows Vista,
Windows XP, and Windows 2000 Professional, you can open the Control Panel from
the Start menu. You can also customize the Start menu so that the Control Panel is a
cascading submenu.
You use the Control Panel applets to:
Function
Windows
7/Vista
Windows 2000
Professional
Windows XP
Perform system
configuration and
maintenance tasks
Administrative Tools
Administrative Tools
Administrative Tools
Configure computer
security
Action Center
(Windows 7)
Security Center
Windows Firewall
Security Center
(Vista)
Windows Defender
Windows Firewall
Configure network settings
Add a device
(Windows 7)
Network Connections
Network Setup
Wizard
Phone and Modem
Options
Add/Remove Hardware
Add Hardware
Add/Remove Programs
Add or Remove
Programs
User Accounts
Add Hardware
(Vista)
Programs
(Windows 7)
Programs and
Features (Vista)
User Accounts
Operating systems
227
Function
Windows
7/Vista
Windows 2000
Professional
Windows XP
Personalization
(Windows 7)
Display
Display
Taskbar and Start
Menu
Personalize (Vista)
Taskbar and Start
Menu
Change the clock, your
language, or your region
Regional Options
Regional and
Language Options
Keyboard
Keyboard
Mouse
Mouse
Regional and
Language Options
(Vista)
Change or configure
keyboard or other input
methods
Game Controllers
Mouse (Windows
Vista)
Pen and Input
Devices (Windows
Vista)
Game Controllers
(Windows Vista)
Ease of Access
Center
Accessibility
Accessibility Options
228
Operating systems
229
230
Exhibit 2-18: A sampling of the results returned searching for a Control Panel applet in
Windows 7
Operating systems
231
Console item
Schedule tasks
Event Viewer
Shared Folders
Device Manager
232
Operating systems
233
The Run utility is also available in Windows 7 and Windows Vista. Youll find it on the
Start, All Programs, Accessories menu. You can also add it directly off the Start menu,
by using Start Menu Properties. Note: Windows adds frequently used programs to the
Start menu. Once youve used a program several times, you might find that you dont
need to "dig for it in the All Programs menu; instead, it will be displayed on the Start
menu.
A Command Prompt window is shown in Exhibit 2-21. The default color scheme for the
command-line utility in Windows is white text on a black background. To increase
readability in print, we have customized the color scheme to black text on a white
background for the graphics in this course.
234
Operating systems
235
There are two types of MMCspreconfigured MMCs, like Computer Management, and
custom MMCs that you create yourself and save. A custom MMC containing the Device
Manager and Local Users and Groups utilities for the local computer is shown in
Exhibit 2-23.
236
Do it!
A-3:
Heres how
1 Click Start and choose
Control Panel
Heres why
The Control Panel contains a group of tools you
can use to control your computers system
settings.
Choose Manage
8 Observe the categories listed in
the console pane
Operating systems
237
Choose Properties
Click Cancel
11 In the console pane, under
Storage, select Disk
Management, and observe the
information in the details pane
12 In the console pane, expand
Services and Applications
Select each item and observe the
information in the details pane
13 Close Computer Management
14 Click Start and choose Computer
In the navigation pane, click
Network
238
Command Prompt
Press q
Continue pressing q
until you have viewed the entire
list of commands
Type exit and press e
18 Right-click an empty part of the
taskbar and choose Start
Task Manager
Operating systems
239
Desktop
Click Save
29 Close your custom MMC
30 On the desktop, double-click
My Console
Click Yes
31 Close My Console
240
Objective
3.2
3.3
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
2.1
Select the appropriate commands and options to troubleshoot and resolve problems
DIR
COPY (/a /v /y)
XCOPY
MD / CD / RD
[command name] /?
2.2
Operating systems
241
Directory structure
Explanation
Hard disks are divided into usable storage spaces through partitions. Depending on the
operating system used and the maximum hard disk size it supports, a hard disk can be
configured as a single large partition or as multiple smaller partitions. In Microsoft
operating systems, each partition is assigned a drive letter. The root of the directory
structure (the top of the folder hierarchy) for that partition is denoted by a backslash, for
example C:\.
Underneath the root directory, information is organized through the use of directories
(also called folders). You can use directories to divide your files into logical categories,
as shown in Exhibit 2-24, making information easier to find and use.
242
Windows 2000
Windows XP
Windows 7/Vista
User files
Documents and
Settings
Users
System files
Winnt
Windows
Windows
Winnt\System32
Windows\System32
Windows\System32
Windows\SysWOW64
for 32-bit on 64-bit
Windows
Windows\SysWOW64
for 32-bit on 64-bit
Windows
N/A
Windows\System32
Windows\System32
Fonts
Winnt\Fonts
Windows\Fonts
Windows\Fonts
Temporary files
Winnt\Temp
Windows\Temp
Windows\Temp
Program files**
Program Files
Program Files
Program Files
Winnt\CSC
Windows\CSC
Windows\CSC
* The following system subdirectories are shared by both 32-bit and 64-bit applications:
System32\catroot
System32\catroot2
System32\drivers\etc
System32\logfiles
System32\spool
In Windows Vista, the CSC folder is hidden and protected by default, and it doesnt
contain any editable or readable files. To see the files in the offline-files cache, open the
cache by using Offline Files and Sync Center in the Control Panel.
** 64-bit systems create a Program Files (x86) folder to hold 32-bit application files.
Operating systems
243
To work with files and folders on your hard disk, you can issue commands in the
Windows command interpreter or use the GUI utility, Windows Explorer, in any version
of Windows. Navigating in the Windows GUI
To navigate the directory structure by using Windows Explorer:
1 Open Windows Explorer. As discussed previously, there are many methods for
opening Windows Explorer. In all versions of Windows, you can click Start and
choose All Programs, Accessories, Windows Explorer. In Windows 7, click the
Windows Explorer icon pinned to the taskbar.
The left pane in Windows Explorer is the navigation or folders pane; the right
pane is the details pane. In Windows 7, the navigation pane is divided into
sectionsFavorites, Libraries, Computer, and Network. In Windows Vista, the
navigation pane is divided into two sectionsFavorite Links and Folders.
2 In Windows 7 or Windows Vista, in the Folders pane, click the arrow ( ) next
to a drive or folder to expand the tree and view the subfolders in that drive or
folder.
In Windows XP and Windows 2000, in the navigation pane, click the plus sign
(+) next to a drive or folder to expand the tree and view the subfolders.
3 Select a drive or subfolder in the Folders pane or the navigation pane to view its
contents (subfolders and files) in the details pane.
244
Do it!
B-1:
Heres how
1 From the taskbar click
Heres why
To open Windows Explorer.
Expand WINDOWS
Select Temp
3 Click Continue
Operating systems
245
To use the 16-bit version of the Windows command interpreter, you enter:
command
For the Windows command interpreter included with Windows Vista, optional
parameters and switches include those shown in Exhibit 2-25.
In syntax statements such as this, switches, which provide options for controlling the
execution of a command, are preceded by the "/ symbol.
Exhibit 2-25: Optional parameters and switches for the Windows command interpreter,
cmd
246
Exhibit 2-26: Optional parameters and switches for the dir command
You can use the wildcard characters ? and * to display a subset of directories and files.
For example, dir *.txt displays all files with the .txt extension; dir 200?.txt
displays all files whose names contain "200 with any final character and the .txt
extension, such as 2000.txt, 2001.txt, 2002.txt, and so on.
Chdir (cd)
To use this command, you can enter it in either of two ways:
chdir
cd
Each command displays the name of the current drive and directory. Optional
parameters are shown in Exhibit 2-27.
Operating systems
247
Help
You can get general information about command-line commands by entering the
following at the command line:
help
You can get command-specific help by entering either of the following at the command
line:
cmd /?
help cmd
Substitute the cmd with the name of the command for which you want to get help.
The help utility displays a commands syntax in uppercase and lowercase letters.
Uppercase letters designate required characters. Lowercase letters are used for variable
strings.
248
Do it!
B-2:
Heres how
Heres why
Do it!
B-3:
Heres how
1 What command would you use to
change from the current directory
to the root of drive C:?
Enter the command
2 What command would you use to
change from the root of C: to
C:\Windows\Temp?
Enter the command
3 What command would you use to
navigate to the parent directory?
Enter the command
4 Change the directory to
C:\Users\COMPDMIN##
Heres why
Operating systems
249
B-4:
Heres how
Heres why
Press e
2 Under Local Disk (C:), create a
folder named Marketing
250
Description
drive
path
Specifies the name and location of the new directory. The maximum length
of any single path from the root directory is 63 characters, including
backslashes (\).
Spaces in commands
The Windows operating systems use two different command interpreters to process
commands at a command prompt. When youre entering commands that include
parameters with space characters, theyre processed differently, depending on the
version of the command interpreter youre using:
The 16-bit version, command.com, doesnt allow spaces.
The 32-bit version, cmd.exe, treats the spaces as delimiters and processes the
command by treating each word after the command as a separate parameter.
To force the command interpreter to recognize the spaces, you should enclose in
quotation marks any file or folder names that include spaces.
For example, the command:
md c:\my business files
Operating systems
Do it!
B-5:
251
Heres how
Heres why
252
B-6:
Heres how
Heres why
Choose Copy
2 In the Folders pane, under Computer\Local Disk (C:), right-click Marketing
Choose Paste
Operating systems
253
Description
source
Specifies the location and name of the file you want to copy. The source
can consist of a drive letter and colon, a directory name, a file name, or
any combination of these items.
destination
Specifies the location and name of the file you want to copy to. The
destination can consist of a drive letter and colon, a directory name, a file
name, or any combination of these items.
Optional parameters and switches for the copy command include those shown in
Exhibit 2-28:
Exhibit 2-28: Optional parameters and switches for the copy command
254
Description
source
Specifies the location and names of the files you want to copy. The source
must include either a drive or a path.
destination
Specifies the destination of the files you want to copy. The destination can
consist of a drive letter and colon, a directory name, a file name, or any
combination of these items.
Optional parameters and switches for the xcopy command include those shown in
Exhibit 2-29:
Exhibit 2-29: Optional parameters and switches for the xcopy command
Operating systems
Do it!
B-7:
255
Heres how
Heres why
256
B-8:
Heres how
1 In the Folders pane, under
C:\Marketing, right-click
Heres why
You can also use the details pane.
Business Correspondence
2 Choose Delete
3 Click Yes
4 Minimize Windows Explorer
Operating systems
257
The drive:path parameter specifies the location and name of the directory you want
to delete.
You cant use rmdir (rd) to delete the current directory. You must change to another
directory.
Do it!
B-9:
Heres how
Heres why
258
Objective
3.2
3.3
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
2.1
Select the appropriate commands and options to troubleshoot and resolve problems
EDIT
Computer files come in two types: binary and text. Binary files can be read by the
computer, but not by humans. Text files, typically in ASCII format, can be read by
humans using a text editor, such as Notepad. Program files are binary files; data files are
text files.
ASCII stands for American Standard Code for Information Interchange. ASCII is a code
that represents English characters as numbers, with each letter assigned a number from 0
to 127.
Operating systems
259
File-name extensions
Typically, file names have three-letter extensions. The extension indicates the file type
and is used by the operating system to open the file in the appropriate application.
Windows can hide the file extensions of files shown in Windows Explorer. As a result,
you might not see file extensions when you are working in Windows Explorer.
Some common file extensions are listed in the following table. Additional common file
extensions can be found at www.fileinfo.com/common.php.
Extension
File type
.bat
Batch file
.bin
Binary file
Image file
.com
Command file
.exe
.hlp, .chm
Help file
.htm, .html
.inf
.ini
.msi
.rtf
.sys
System file
.txt
.vbs
In MS-DOS, file names have an eight-character limit. Youll sometimes hear this
referred to as "8.3 (eight characters for the name and three characters for the extension,
separated by a period). Windows has a 255-character limit. This limit is based on the
file system used. Under FAT16, file names can have extensions of 03 characters.
Under FAT32 and NTFS, file names can have extensions of 0255 characters, with the
caveat that the overall name + extension must be 255 characters or less.
260
Text files
You can create a text file by using the edit command or a Windows GUI text-editing
application such as Notepad.
To create a text file in the edit utility:
1 At the command prompt, type edit and press Enter.
2 Enter the desired text.
3 You can use the mouse to choose File, Save As, or press Alt, F, A.
4 To change the current directory, press Alt+D. Use the arrow keys and Enter to
navigate to the desired directory.
5 To move the insertion point to the File Name box, press Alt+N.
6 In the File Name box, type a file name, including the extension.
7 Press Tab several times to highlight the OK button, and then press Enter.
8 Press Alt, F, X to exit the edit utility.
To create a text file by using the Windows GUI text editor, Notepad:
1 Click Start and choose All Programs, Accessories, Notepad.
2 Enter the desired text.
3 Choose File, Save As.
4 From the Save in list, select the desired directory.
5 In the File name box, type a name for your file.
6 Verify that Text Documents (*.txt) is selected in the Save as type box.
7 Click Save.
8 Choose File, Exit.
Operating systems
Do it!
C-1:
261
Heres how
1 Enter edit
Heres why
To start the MS-DOS text editor. Because you
ran the edit command from within a
Command Prompt window, your mouse driver is
loaded and available. However, youll use
keyboard shortcuts to choose menu items in this
activity.
3 Press a
Press F
Press A
4 Press a + D
Press a + N
Press n
OK is highlighted.
Press e
6 Press a, F, X
262
C-2:
Heres how
1 Enter the following command:
Heres why
The text file opens in the MS-DOS text editor.
2 Press n
3 Press q
Type I have edited this file
by using edit.
4 Press a, F, S
5 Press a, F, X
Operating systems
263
Batch files
Batch files are files that contain multiple commands. When you run a batch file, the
operating system runs all of the commands listed in the batch file in the order theyre
listed in. Batch files are extremely useful for administrators (and users) who need to
complete repetitive tasks.
Creating a batch file
You can create a batch file by using a Windows GUI text-editing application such as
Notepad and saving the file with the .bat extension. To create a batch file in Notepad:
1 Click Start and choose All Programs, Accessories, Notepad.
2 Enter the desired commands youd like to run.
3 Choose File, Save As.
4 In Windows 7, you can select the desired directory from the Folders pane. In
Windows 7 and in Windows Vista, in the Address bar, you can type or select the
desired directory. You can also click Browse Folders to browse for and select
the desired directory.
In Windows XP or Windows 2000, select the desired directory from the Save in
list.
5 From the Save as type list, select All Files.
6 In the File name box, type a name for your file. Use the extension .bat.
7 Click Save.
8 Choose File, Exit.
The batch program typically displays (echoes) commands on your screen. Using the
echo command, you can enable or disable this display. The syntax for the echo
command is:
Echo on|off
You can view the current echo status by entering echo in a command prompt window.
The Windows command interpreter is also a helpful tool to use when youre performing
management tasks. You can combine multiple commands into one batch or script file,
which runs all of the commands at once. You can run the commands locally or
remotely.
264
Do it!
C-3:
Heres how
Heres why
3 Press e
4 Type dir "C:\Program Files" > C:\Program_File_List.txt
This command will take the directory listing
from C:\Program Files and export it to a text file.
Click Save
6 Choose File, Exit
To exit Notepad.
If necessary.
8 Navigate to Documents
Operating systems
265
Click OK twice
13 Double-click My Batch File
Shortcut
14 Click Yes
16 Open Program_File_List
To exit Notepad.
266
File attributes
Files can have different attributes assigned to them. File attributes tell the operating
system and applications how files should be used. You can assign the attributes
described in the following table:
Do it!
Attribute
Description
Read-only
Hidden
Hides the file from view in the default list display of the dir command and
in Windows Explorer.
System
Indicates that the file is used by the operating system and shouldnt be altered
or removed.
Archive
Index
C-4:
Heres how
Heres why
7 Click OK
8 Minimize Windows Explorer
Operating systems
267
Attrib.exe
You can use the attrib command to remove or assign file attributes. If a file has a
system or hidden attribute assigned, you must remove that attribute before you can
change any other attribute for the file. The system attribute can be changed only at the
command prompt. You cant change it using the GUI. The attrib command
recognizes wildcards (? and *) in file names.
The syntax for the attrib command is:
attrib
Exhibit 2-30: Optional parameters and switches for the attrib command in Windows
Vista
268
Do it!
C-5:
Heres how
Heres why
1 Click Start
In the Search box, type cmd and
press e
2 Type cd documents
Operating systems
269
Objective
3.2
3.3
Permissions
In Windows 7, Vista, XP, and 2000, each user has a personal folder. By default, no
one other than you and a computers administrator can access the documents in your
personal folder. In Windows 7 and Vista, your personal folder is the folder you open
when you click Start and choose your user name. By default, your personal folder in
Windows 7 (and Windows Vista) contains your Contacts, Desktop, Downloads,
Favorites, Links, My Documents (Documents), My Music (Music), My Pictures
(Pictures), My Videos (Videos) Saved Games, and Searches folders, as shown in
Exhibit 2-31 and Exhibit 2-32.
In Windows XP and Windows 2000, you access your personal folder by clicking
Start and choosing My Documents. In Windows XP and Windows 2000, by default,
your personal folder contains My Music and My Pictures, as shown in Exhibit 2-33,
Additional folders, such as My Videos or Downloads, might display.
270
Operating systems
271
Windows XP uses the Shared Documents folder, shown in Exhibit 2-35, in the manner
that Windows Vista uses Public folder sharing. By default, the Shared Documents folder
contains the Shared Music, Shared Pictures, and Shared Video folders.
D-1:
Heres how
1 Click Start and select your
COMPADMIN## user name
Heres why
To open your personal folder.
Text Document
272
Click Continue
Click No
Operating systems
273
19 Attempt to access
COMPUSER##s
COMPUSER##_Private file
20 Open the COMPUSER##_Private
file
21 Add text to the document
274
HomeGroups in Windows 7
Windows 7 provides a feature called homegroups that allows computers to share
pictures, music, videos, documents, and printers with other computers in the same
homegroup. By default, people can view these files but they cant modify them in any
way unless you give them specific permission to do so.
To create a homegroup, you must be running Windows 7 Home Premium, Professional,
Ultimate, or Enterprise, and you must be on a home network (which you designate
during installation or using Network and Sharing Center at any time after installation).
Homegroups are not available on networks that have been designated Work or Public.
To join a homegroup, you can use any version of Windows 7.
Operating systems
Do it!
D-2:
Exploring homegroups
Heres how
1 Click Start, and choose Control
Panel
Heres why
275
276
Permissions
Permissions are settings that control what users can or cannot do with a file or folder.
For example, a user might be permitted only to read a file. He or she might not be
permitted to save any changes in the file. In Windows, permissions come in two basic
varieties: share and NTFS permissions.
Share permissions
Share permissions are permissions that you (or an administrator) assign to a specific
shared resource. The standard share permissions in Windows 7 are:
Read
Read/Write
The standard share permissions in Windows Vista are:
Reader
Contributor
Owner
Co-owner
In Windows 2000 and Windows XP, the share permissions are:
Read
Change
Full Control
Although the names of these permissions differ in the different versions of Windows,
their functionality does not. Users with Reader or Read permissions can view files and
subdirectories and execute applications, but they arent allowed to make any changes.
Users with Read/Write, Contributor or Change permissions have the capabilities of the
Read permission, plus they can add, delete, or change files or subdirectories. Users with
Co-owner or Full Control permissions can perform any and all functions on all files and
folders within the share.
You assign these permissions to individual users when you create a share. Alternatively,
you can modify a share to assign a different permission to a user than he or she was
originally assigned.
NTFS permissions
MS-DOS wasnt intended to be a multi-user, networked operating system and thus
doesnt include file security features. For Windows clients, only those operating systems
that support NTFSWindows NT Workstation, Windows 2000 Professional, all
Windows XP editions, and all Windows 7 and Vista editionsprovide file security.
NTFS (Windows NT File System) permissions are permissions associated with the files
and folders themselves. NTFS permissions are more specific and varied than share
permissions, and they affect users who log onto the computer and access the folder, and
users who access the folder from across the network.
Using the classic file sharing and security interface, you can apply permissions to
folders or individual files in an NTFS partition. The permissions allow users with the
proper credentialsa valid user account and passwordto complete the allowed tasks.
The NTFS file and folder permissions are described in the following two tables.
Operating systems
277
Allows user to
Full control
Modify
Run applications.
Complete tasks allowed by the Read file permission.
Read
Write
278
Allows user to
Full control
Modify
Navigate through the folder structure, even if the user doesnt have the
permissions to do other tasks in some of the subfolders.
Complete tasks allowed by the List folder contents and Read folder
permissions.
Navigate through the folder structure, even if the user doesnt have the
permissions to do other tasks in some of the subfolders. View the names of
files and subfolders within a folder.
The List Folder Contents and the Read & Execute folder permissions are
inherited differently. List Folder Contents is inherited by folders but not
files. Read & Execute is inherited by both files and folders.
Read
Write
Operating systems
279
280
Do it!
D-3:
Heres how
Heres why
5 Select Users
(Computer##\Users) and
6 Click Cancel
7 Click Advanced
Operating systems
9 Clear Include inheritable
permissions from this
objects parent
10 Click Add
281
11 Click OK twice
12 Click Edit
13 Select Users
(Computer##\Users)
282
In this topic, you learned about some of the differences between the Windows, Mac
OS, Linux, and UNIX client operating systems. Then you learned about the differences
between various versions of Windows. You also learned how to use this information to
select the appropriate client operating system for a given situation. Finally, you
identified the major components that make up the Windows graphical user interface
(GUI).
Topic B
In this topic, you managed directories (folders) in Windows by creating, copying, and
deleting a directory. You used both the directory management tools in the Windows
Graphical User Interface and Windows command interpreter utility.
Topic C
In this topic, you created and edited a text file and changed file attributes. You used
both the file management tools available in the Windows Graphical User Interface and
Windows command interpreter utility.
Topic D
In this topic, you controlled access to files in Windows 7 and Windows Vista by using
private and public folders. You also learned how to control access to files and folders
by assigning NTFS and share permissions to individual users and groups.
Review questions
1 Which of the following types of software is responsible for accepting input from
devices such as a keyboard, mouse, scanner, or smart card reader, and creating
output on devices such as a monitor, printer, or speakers?
A Applet
C Operating system
B Application
D Snap-in
2 What software component has icons or menus that you can select to perform a
function or run a program?
A Desktop
C Linux
D Windows
Operating systems
283
A Linux
C Windows Vista
B Mac
D Windows XP
4 Which Windows Vista edition is intended for large, global organizations with
complex IT infrastructures?
A Windows Vista Business
5 Unless you work in an emerging technology market, which Windows Vista edition
are you least likely to support?
A Windows Vista Business
D Windows XP Professional
284
B Windows 7 Enterprise
E Windows 7 Starter
F Windows 7 Ultimate
9 Unless you work in an emerging technology market, which Windows 7 edition are
you least likely to support?
A Windows 7 Professional
B Windows 7 Enterprise
E Windows 7 Starter
F Windows 7 Ultimate
10 Which features arent available in either of the Windows Vista Home editions?
[Choose all that apply.]
A BitLocker Drive Encryption
C Windows XP Professional
D Windows XP Professional
B Windows XP Home
D Taskbar
B Desktop
E System tray
C GUI
Operating systems
285
14 True or false? All of the components shown in the following graphic are common to
Windows Vista and Windows XP.
Sidebar with gadgets
Desktop
Taskbar
Notification area
Recycle
Bin
Start
menu
15 What components are part of the notification area? [Choose all that apply.]
A Clock
D Taskbar
B Gadgets
E Volume
C Recycle Bin
16 Whats the minimum system memory requirement for the new Aero user interface?
A 1 GB
C 3 GB
B 2 GB
D 4 GB
D Network utility
E Task Manager
C Control Panel
286
B Computer Management
console
D Task Manager
19 Hard disks are divided into usable storage spaces through ____________.
A Files
C Directories
B Folders
D Partitions
20 You organize information under the root of a hard disk partition by using which of
the following?
A Files
C Partitions
B Folders or directories
21 When youre creating a directory in Windows Explorer, whats the maximum depth
of the folder structure?
A 63 characters
C 255 characters
B 254 characters
D Unlimited
22 What dir command would you use to view all hidden files in
C:\Windows\System32 in alphabetical order, by extension, across multiple
columns?
dir c:\windows\system32 /w /a:h /o:e
Operating systems
287
24 Which operating system uses Public folders, as shown in the following graphic, to
share files with other users?
C Windows XP Professional
B Windows XP Home
D Windows Vista
25 Which operating systems use the Shared Documents folder, as shown in the
following graphic, to share files with other users? [Choose all that apply.]
C Windows XP Professional
B Windows XP Home
D Windows Vista
26 If you want a colleague to be able to change a file, but not delete it, which NTFS
file permission should you assign?
A Full Control
B Modify
D Write
288
Operating systems
289
290
31
Unit 3
Electricity and power supplies
Unit time: 75 Minutes
Complete this unit, and youll know how to:
A Identify electrostatic discharge, and follow
32
Objective
1.3
6.1
Outline the purpose of appropriate safety and environmental procedures, and given a
scenario, apply them
ESD
Electrical safety
Power supply
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
1.4
Characteristics of electricity
Explanation
Electricity is the flow of electrons, which are one of the fundamental building blocks of
all matter. In some materials, electrons flow easily, while in others, electrons are tightly
bound to their atoms and hardly flow at all.
A conductor is a material that permits the flow of electricity. An insulator is a material
that inhibits the flow of electricity. Most metals, some plastics, and some liquids are
conductors. Most ceramics, plastics, and gases are insulators.
Voltage
Voltage is the force of electricity caused by a difference in charge, or electrical
potential, at two locations. This value, measured in volts, is also called the potential or
potential difference. The abbreviation for volts is officially an uppercase V, though a
lowercase v is commonly used.
Electricity flows to equalize potential. More electricity flows when theres a greater
difference in potential than when theres a smaller difference in potential. Thus, more
energy can be drawn from a high-voltage system than from a low-voltage system.
Current
Current is a measure of the flow of electrons past a given pointessentially measuring
the speed of the electrons through the conductor. It is measured in amps, or amperes.
For current to flow, there must be a complete circuit, or path, from the source, through
any intervening devices, and back to ground. A complete circuit is called closed; an
incomplete circuit is called open.
33
Any interruption in the circuit causes the current to stop. This is the principle behind a
switch, which is simply a device with which you can open a circuit to stop the flow of
current.
Alternating and direct current
Current that flows in a single direction at a constant voltage through a circuit is called
direct current (DC). Batteries provide this sort of current, and its the type required by
most electronic components. (Especially in non-technical usage, component is
sometimes used to mean a whole device, such as an MP3 player, monitor, and so forth.
However, in this context, components are circuit boards, chips, and other internal
devices.)
Current that flows repeatedly back and forth through the circuit at a constantly varying
voltage level is called alternating current (AC). A buildings electrical service is an AC
system, and most household devices require AC to operate.
AC systems complete a full cyclevoltage change from zero, through maximum
voltage, back to zero, to minimum voltage, and back to zeromany times a second. In
North America and Japan, AC operates at 60 cycles per second (60 hertz, or Hz).
Europe and other countries use 50 Hz AC electricity.
AC electrical systems in the Americas and Japan operate at 110 volts (actually, within a
range of 90135 V). Europe and most other countries in the world use a voltage twice
that amountbetween 220 and 240 volts. Household devices, such as light bulbs, are
designed to work at the countrys power level. Sensitive electronics inside computers,
televisions, and other devices use a much lower voltage. Computer components use DC
at either 5 V or 12 V.
Resistance and impedance
Resistance is a force that opposes the flow of DC through a conductor. Impedance is
like resistance, but applies to AC instead. When resistance (or impedance) is present,
electrical energy is converted to heat or some other form of energy. All conductors
possess some resistance (or impedance), though considerably less than that possessed by
insulators.
Resistance and impedance are measured in ohms. This quantity is written using the
Greek letter omega (). One ohm (1) is defined as the resistance of a system in which
1 volt maintains a current of 1 amp.
Electrical power and energy
Electrical power, measured in watts (W), is a derived quantity that you can calculate by
multiplying the voltage by the current. Its a measure of the energy delivered by the
flow of electricity. When calculating electrical power, always use absolute values
(change any negative values to positive for your calculation).
Power supplies are rated according to the watts of electrical power they can supply. A
power supply rated at 450 W promises to deliver 450 watts of power (though, in
practice, it might deliver a bit more or less than that value).
Electrical energy is electrical power delivered over time. For example, one kilowatthour (kWh) is the flow of one kilowatt (1000 W) delivered for a one-hour period. The
average home in the U.S. consumes about 800 kWh of electrical energy per month.
34
Do it!
A-1:
2 Why might you be concerned about the output power rating of a power supply?
4 Given what youve learned about electricity (particularly voltage and current),
speculate on the purpose of a PCs power supply.
35
Electricity
Explanation
In this formula, V is voltage in volts, i is the current in amps, and r is the resistance in
ohms (). At a given voltage, current increases as resistance drops. A dangerous level
of current can be reached if resistance is reduced sufficiently.
Resistance of the human body
The human body has a resistance of about 500 K (500,000 ). This value is a
somewhat ideal figure for contact with a small area of dry skin. Moisture and sweat on
your skin lower the resistance to a value nearer 5000 . Contact with a greater area of
skinfor example, gripping a wire between your fingers or grasping a pipefurther
reduces resistance. If you were to immerse your hand or foot, or puncture the skin so the
electrical connection were made with your more-conductive blood and tissue, the
resistance could be as low as 100 .
Death isnt likely if electricity passes from finger to finger through your body, along
your arm, and so forth. However, your heart and brain are considerably more sensitive.
Current that passes from hand to hand or through your head is much more likely to
cause death. Electricity passing elsewhere through your body could cause an electrical
burn.
Visit www.allaboutcircuits.com/vol_1/chpt_3/4.html for more detailed
information about the resistance of the human body and dangers from electricity.
36
Do it!
A-2:
2 Could you feel the current generated if you were to wet your fingers and touch
both leads of a 9 V battery?
3 Is a shock from an electrical outlet sufficient to cause pain, contract your muscles,
or kill you?
37
Electrostatic discharge
Explanation
Static dangers
Electrostatic discharges (the current flow) arent dangerous to humans, even though the
voltage in the system can measure in the range of thousands of volts. However, such
discharges are potentially harmful to electronics.
The microscopic wires and components that make up chips and other devices are very
sensitive to even small amounts of current. A static spark can melt such components,
rendering them useless. Smaller discharges can alter the data stored in chips or
otherwise upset their operation, without causing physical damage.
Discharge voltages
To feel a static shock, you must experience a discharge of approximately 3,000 volts or
more. Discharges of more than roughly 8,000 volts might generate a visible spark.
Walking across a carpet on a dry day can generate a charge of up to 35,000 volts. Yet
electronics can be damaged by a 30-volt discharge or lessmuch less than the
minimum discharge you can feel.
38
ESD toolkits
An ESD toolkit includes tools that you can use to prevent the buildup of charge
differentials and to equalize them safely. You should purchase and use a good ESD
toolkit. An antistatic wrist strap is a common component of such a kit. Two antistatic
wrist straps, one wired and one wireless, are pictured in Exhibit 3-1,
39
310
CD-ROM drive
Floppy drive
Hard drive
Adapter
Motherboard
311
Exhibit 3-4: Typically, you open the side opposite the port connectors
312
Alignment posts
Alignment
holes
Spring catche
Alignment
posts
A-3:
313
Heres how
1 Follow safety precautions to avoid
electrical shock and use the tools
in your ESD toolkit
Heres why
Place your antistatic mat under the area you are
working in and wear your antistatic wrist strap.
314
Objective
1.3
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
1.1
PC power supplies
Explanation
A PC power supply, shown in Exhibit 3-6, is the internal component that converts AC
wall voltage (110 VAC or 220 VAC) to the various DC voltages used by the computers
other components. Power supplies have a fan to cool their components and to help cool
the other components inside the PC. Typically, a power supply provides some
conditioning functions and can maintain DC supplies during very brief drops in and
outages of supply voltage.
315
Motherboard
30 W, not including the power for the CPU chip and memory. This is for
full power mode. Sleeping states use less.
Memory
10 W per 2 GB module.*
CPU chip
Hard drive
515 W. Some manufacturers will print the power requirement right on the
drive.
Optical drive
Newer CD or DVD drives can use as little as 5 W. Older optical drives may
require 1020 W.
Floppy drive
510 W.
Adapter card
Standard outputs
Most power supplies provide three output voltage levels at various amperage ratings to
supply power to the internal components: +/-5 V, +/- 12 V, and 3.3 V. More devices
draw power at the +12 V level than at any of the other ranges.
316
Power connectors
Standard connectors are used to connect the power supplys output to the various
devices. Separate standards exist for the following connectors:
Drive power connectors
Motherboard power connectors
Standards for drive power connectors
Hard drives, CD and DVD drives, and floppy drives use power connectors that are
standardized in size and shape, as well as in the placement and voltage carried by the
wires connected through them. There are three common power connectors: the
peripheral, floppy, and serial ATA (SATA) power connectors.
The peripheral connector is sometimes called a Molex connector, after one of the
manufacturers of this style of connector. Peripheral connectors are typically used
to connect hard drives and CD or DVD drives to the power supply.
The floppy connector is a 4-pin Berg connector. The 4-pin Berg connector is
smaller than a Molex connector and is used to connect the floppy drive to the
computers power supply unit.
New serial ATA drives use the third type of power connector.
Peripheral, floppy, and serial ATA connectors are shown in Exhibit 3-7 and Exhibit 3-8.
Exhibit 3-7: A peripheral power (Molex) connector, left; and a floppy power (Berg)
connector, right
317
Due to their shapes, these connectors can be inserted into drives in only one orientation.
They are said to be keyed, which ensures that you connect the appropriate power
input wires to the correct point on the device.
Wire color
Molex pin
numbers
Berg pin
numbers
SATA pin
numbers
Voltage
Yellow
13, 14, 15
+12 V
Red
1 (optional)
7, 8, 9
+5 V
Black
2 and 3
2 (optional) and 3
4, 5, 6
10, 11, 12
Ground
1, 2, 3
+3.3 V
Orange
Power
connector
318
Dual power
connectors (P8/P9)
Form factors
The form factor of a power supply refers to its size and shape. The two most common
form factors for desktop computers is AT and ATX. The form factor you use must not
only fit into the case you use; it must also fit in relation to the motherboard and other
components. The names of power-supply form factors match those given to system
cases, because together these components form a matched set.
Do it!
B-1:
Heres how
Heres why
319
320
Exhibit 3-11: Voltage selection switch near the electrical cord port
If the voltage selection switch is not set properly for your country, it can prevent your
computer from turning on, keep it from operating properly, or cause serious damage to
the computer. Some power supplies have an auto-switching feature that senses the
incoming voltage and switches itself accordingly. Most laptop power supplies are autoswitching. A directory of foreign electrical information can be found at:
www.voltagevalet.com/elec_guide.html.
B-2:
321
Heres how
1 Carefully disconnect all of the
power wires from the various
components
Heres why
Your computer is already shut down and
unplugged, and the case is open. Youre using
your ESD tools and following safety precautions
to avoid electrical shock.
322
Objective
2.2
Given a scenario, explain and interpret common hardware and operating system
symptoms and their causes
Hardware-related symptoms
Noise
Status light indicators
2.5
6.1
Outline the purpose of appropriate safety and environmental procedures, and given a
scenario, apply them
Electrical safety
Inverter
Matching power requirements of equipment with power distribution and UPS
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
1.2
1.4
In an ideal situation, an AC electric signal would be steady and consistent, and the
power would never go out. In reality, AC electricity is a noisy signal with many
variations. Some of these variations can interrupt service long enough to shut down your
computer. Other signal problems can damage your equipment.
323
AC signal problems
An ideal AC signal is a sine wave in which the voltage varies smoothly and steadily
from a consistent positive voltage level to a negative voltage level. Such a wave is
illustrated in Exhibit 3-12.
Description
Cause
Blackout
Brownout
A brief decrease in
voltage level; also
called a sag
Noise
A disruption of the
smoothly varying
AC signal
Spike
Surge
A brief increase in
voltage (longer duration
than spikes)
According to the APC Web site, brownouts (also called sags) account for 87% of all
power problems. For details, see www.apc.com/power/power_event.cfm.
324
Power conditioning
Power conditioning is the process of restoring a problematic AC signal to a high-quality
smooth signal thats safe for your computer and other electronic devices. Power
conditioning equipment includes:
Surge protectors
Battery backup devices
Generators
Surge protection
You can add a surge protector to a circuit to filter out spikes and surges. Typically, plug
strips include surge protection circuitry. The primary purpose of a plug strip (also
known as a power strip) is to provide additional AC outlets to power multiple devices
located in close proximity to one another. For this reason, not all power strips include
surge protectors. If you are relying on the surge protection of a power strip, you should
verify that it has such capability. You can also wire in surge protection by using surgeprotecting circuit breakers or other devices.
Surge protectors dont protect against noise, brownouts, or blackouts.
Battery backup
You can use a battery backup unit, often called an uninterruptible power supply (UPS),
to condition the power signal. (See Exhibit 3-13.) During normal power conditions, a
small portion of electricity is used to charge a battery in the UPS. During a blackout,
battery power is converted from DC to AC by an inverter and is supplied to the
computer or other devices. An inverter is an electrical device that converts direct current
to alternating current.
325
Thus, continuous UPSs are better suited to very sensitive electronics that cant tolerate
the switching time associated with a standby UPS.
Most UPSs include a voltage regulator that keeps voltage output levels within a
predefined range. With a voltage regulator and the surge protection features also
commonly provided, a UPS can provide a continuous and clean AC electric signal thats
well suited to powering computers and other sensitive electronics.
UPS software
If a power failure occurs, the battery in a UPS can provide power for only a short time.
Once its battery is exhausted, the UPS wont be able to supply power to your computer
anymore. In essence, the UPS simply delays a blackout.
Many UPSs include software and a method to send battery-level information to your
computer. Together, these components enable the UPS to signal your computer that the
battery is nearing empty and that the computer should shut down.
Exhibit 3-14: APCs PowerChute software, indicating the UPSs remaining battery life
Some versions of Windows, as well as other operating systems, include built-in UPS
monitoring software. If the UPS vendor provides software, you should use it instead. It
provides more features and is designed specifically to work with the UPS hardware.
326
Exhibit 3-15: PowerChute software when running off of the UPSs batteries
UPS and other power inverter safety precautions
One might assume that, because a UPS operates from a 12V battery, it doesnt provide
as much electrical output as a power outlet. This assumption is incorrect. A low power
inverter rated at 60 watts has a potentially fatal electrical output, typically delivering up
to about 360mA at 230V. This output is more than ten times the current level that can
stop your heart. In comparison, a small home UPS is rated at 200 watts, while a rackmounted UPS for your data center is rated at 12 kW. Adhere to the following safety
guidelines when using a UPS or other type of power inverter:
Place the UPS on a reasonably flat surface, either horizontally or vertically.
Keep the UPS dry.
Avoid placing the UPS on or near heating vents, radiators, or other sources of
heat.
Dont place the UPS in direct sunlight.
Keep the UPS in a well ventilated area to avoid overheating.
Maintain the UPS operating environment with an ideal air temperature between
50 and 80 F.
Dont use the UPS in an environment where flammable materials, fumes, or
gases are present.
Selecting a UPS
1 Determine whether you need a standby or online UPS.
A standby UPS switches to battery power when power goes out.
An online UPS provides unlimited backup power but is more expensive.
2 Determine the total power needs, in both watts and volt-amperes, of all the
equipment that will be connected to the UPS. You need a UPS that equals or
exceeds the total power requirements.
327
328
Do it!
C-1:
Heres how
Heres why
329
Electrical measurements
Explanation
When troubleshooting, you might be called upon to measure some aspect of electricity,
such as the voltage level output from a power supply or other computer component,
such as a printer or scanner. You measure these values with a multimeter. Multimeters
are available in digital and analog models.
Digital multimeters output discrete numeric values on an LED or LCD display.
Analog multimeters, the older type, display their output with a needle and dial.
Using a multimeter
Before taking a measurement with a multimeter, you must set options with a dial,
button, or other means to indicate what youre about to measure. For example, if you
were using a digital meter, as shown in Exhibit 3-16, youd press the appropriate
buttons to indicate which electrical property you were going to read.
330
331
Measuring continuity
You can determine whether a fuse is good or a wire is whole by measuring continuity.
You might also use this technique to determine which pins on one end of a cable are
connected to which pins on the other end.
To measure continuity, you can set your multimeter to display resistance (ohms) and
look for circuits with zero resistance, or if your multimeter includes a continuity mode,
you can use that. In this mode, the multimeter sounds a tone whenever it detects a
closed (unbroken) circuit.
Measurements you might need to take
You probably wont be called on to measure current. But you might need to measure
voltage, resistance, or continuity.
You might need to check the output voltage of a power supply at various leads to verify
that a component is getting the power it requires. You might also need to verify that
appropriate input wall voltage is available.
You measure resistance most often when determining if a cable is whole or if a break
exists. You might also need to determine if the appropriate size resistor (the correct
value in ohms) is being used for an application.
You should have your meter calibrated periodically by an approved source to ensure
that it meets proper working and safety conditions.
332
Do it!
C-2:
Safer performance because of less direct contact with the electrical current.
Heres how
Heres why
333
Power supply failures and electrical service outages can cause a variety of problems. As
a PC technician, you should be familiar with the most common symptoms, probable
causes, and suggested first try solutions for power supply problems.
You might encounter problems not listed in the following table, but it provides a few
scenarios to consider when youre troubleshooting.
Symptom
Probable cause
Suggested solution
Computer
intermittently stops
working or reboots
334
C-3:
335
2 Youre working on a computer that beeps and shows drive activity when you
press the power button. The monitors power light comes on, but no image is
displayed. You try a different monitor and it works just fine. Do these conditions
indicate a problem with the PCs power supply?
3 Your computer shuts itself down shortly after you boot it. Youve had powerrelated problems in the past and have even installed a UPS with software
monitoring functions. Because of the past problems, you suspect a power
problem. What should you investigate?
4 One or more power supply problems have been introduced into your lab
computer. Troubleshoot these problems to determine their causes.
5 Correct the problems you have found in your PC to return it to a working state.
Solving one problem might reveal the presence of another problem. Troubleshoot
and fix all problems that arise.
6 Document the problem(s) you find:
336
In this topic, you learned that electricity is the source of energy that powers electronics
and appliances. Voltage is the force of electricity. Current is a measure of the flow of
electricity. Resistance is a force that opposes current. You also learned about electrical
safety and the 1-10-100 rule, which states that you can feel 1 mA, 10 mA makes your
muscles contract uncontrollably, and 100 mA can kill you. You learned that static
electricity is a buildup and discharge of an electrical charge. You learned how to avoid
static by preventing charges from building up and by dissipating charges safely if they
do build up. You learned how to open computer cases and follow proper ESD
precautions while working inside a computer.
Topic B
In this topic, you learned that power supplies convert wall voltage to the various DC
voltages required by the computers components. To a small extent, the power supplies
condition the power signal and bridge very short power outages. You learned about the
power demands of various computer components, power supply ratings, and the
power connector standards used in modern computers. You also examined power
supply form factors. You also learned how to select, replace, and install a power
supply.
Topic C
In this topic, you learned about some common symptoms related to power supply
failures. You also learned the associated probable causes and suggested solutions to the
problems. You learned how to use a multimeter to measure electricity and a power
supply tester to test a computers power supply unit.
Review questions
1 Which of the following are conductors? [Choose all that apply.]
A Ceramics
B Gases
C Liquids
D Metals
E Plastics
2 Which of the following are insulators? [Choose all that apply.]
A Ceramics
B Gases
C Liquids
D Metals
E Plastics
337
3 Which of the following is a derived quantity that you can calculate by multiplying
the force of electricity caused by a difference in charge at two locations and the
measure of the flow of electrons past a given point?
A Current
B Electrical power
C Impedance
D Resistance
E Voltage
4 Which of the following is a force that opposes the flow of DC through a conductor?
A Current
B Electrical power
C Impedance
D Resistance
E Voltage
5 Which of the following is measured in amps?
A Current
B Electrical power
C Impedance
D Resistance
E Voltage
6 Which of the following are measured in ohms? [Choose all that apply.]
A Current
B Electrical power
C Impedance
D Resistance
E Voltage
7 What is the formula relating voltage, current, and resistance?
A i=V*r
B r=V*i
C V=i*r
D V = i/r
8 True or false? At a given voltage, current increases as resistance drops.
True.
9 True or false? You need to be concerned about electrostatic discharge because it can
be fatal to humans.
False. Electrostatic discharges arent dangerous to humans, even though the voltage in the
system can measure in the range of thousands of volts. However, such discharges are potentially
harmful to electronics.
338
339
16 How many ohms does a multimeter read for a closed circuit, such as a good fuse or
good wire?
Zero
4 Would you feel that voltage, or would it be sufficient to contract your muscles or
kill you?
A 1 amp current would kill you, if it were to pass through your heart or head. It could instead
cause an electrical burn if it passed through an extremity, such as a leg or arm.
5 Open your computer by removing both sides of the case and its front cover while
following proper electrical and ESD safety precautions.
a Remove the power supply.
b Re-install the power supply.
c Test that you installed the power supply correctly.
340
41
Unit 4
CPUs and motherboards
Unit time: 105 Minutes
42
Objective
1.2
1.4
Onchip cache
AMD
L1
Intel
L2
Hyperthreading
Multi core
Dual core
Triple core
Quad core
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
1.1
Processors
Bus speeds
Socket types
Chipsets
Speed
Number of cores
Power consumption
Cache
Front side bus
32bit vs. 64bit
43
Processors
Explanation
The central processing unit (CPU), or processor, is the brains of your computer. Its
the chip that processes instructions, manipulates data, and controls the interactions of
the other circuits in your computer. A CPU is shown in Exhibit 4-1.
44
45
CPU performance
An instruction is the low-level, hardware-specific command to be acted upon by a
processor. It might be something like ADD AX, BY to add the contents of the A and B
registers. Before this instruction can be executed, a previous instruction must have
moved the value of the X from a location in memory and stored it in the A register.
Another instruction must have moved the value of the Y from memory to the B register.
One more instruction is required to write the resulting sum back into a register, from
where it is transferred by the control unit to a new memory location.
You can determine the performance of a processor by examining the number of
instructions it can perform in a second. With microprocessors, this amount is usually
rated in millions of instructions per second (MIPS).
CPUs are often rated according to their clock speed. In a PC, the clock circuit keeps the
CPU and other chips synchronized so that they can work together.
Older CPUs took more than one clock cycle to perform a single instruction. Modern
processors perform many instructions in a single cycle. In fact, the clock speed is no
longer a good indicator of the performance of a modern CPU. By using the techniques
listed in the following table, a modern CPU can perform more than one instruction per
clock cycle and even perform multiple instructions at the same time.
46
Addressable
RAM
The total amount of memory thats accessible to the processor. The width of the
address bus controls the amount of addressable RAM to which the processor can read
or write.
Bus, address
The bus (pathway) that connects the processor to main memory. The wider the
address bus, the more memory can be accessed. Data isnt transferred over this bus.
Bus, data
The bus that connects the CPU, memory, and peripherals. The data bus is used to
carry data. The width and the clock rate of the data bus determine its data rate.
Bus, internal
The bus that determines how many bits of information the processor can work with at
once. The size of the internal register determines how much data the processor can
handle at one time and how it moves data around internally within the chip. If the
internal bus is smaller than the data bus, data and instructions must be manipulated in
parts. For example, a processor with a 32-bit internal bus and a 64-bit data bus must
deal with data in two halves.
Cache
High-speed temporary storage. Accessing data from cache is considerably faster than
accessing it from main memory. Various computer components use cachessuch as
CPUs and hard disks. Processors use levels 1, 2, and 3 caching, where level 1 is the
fastest and most closely coupled to the processor, level 2 less so, and level 3 even
less (yet still much faster than normal system memory.)
Clock speed
The number of cycles per second of the computers synchronization clock, measured
in hertz (Hz), millions of cycles per second (megahertz or MHz), or billions of cycles
per second (gigahertz or GHz). A modern processor performs more than one
instruction during every clock cycle. Older processors performed one or fewer.
Normally, a clock speed rating refers to the internal or core speed of the processor,
rather than to the actual speed of the computers synchronizing clock chip.
Dual
Independent
Bus (DIB)
A processor architecture that includes two buses: one, called the frontside bus, to the
main system memory and another, called the backside bus, to the level 2 cache. The
processor can access both buses simultaneously for improved performance.
Front-side bus
speed
The speed at which the processor interacts with the rest of the system. A processors
internal core speed can be many times higher than its front-side bus speed. If the core
speed is too much higher than the front-side bus speed, the processor can sit idle,
waiting for data to be moved in or out and made available for processing.
Hyperthreading
47
Design
Multimedia
extensions
(MMX)
An expanded set of instructions supported by a processor that provides multimediaspecific functions. Without MMX, a programmer might have to implement multiple
low-level commands to perform a multimedia operation. With MMX, the same
function would involve a single instruction.
Multiprocessing
The use of more than one processor within a system to speed program execution.
Operating systems and applications need to be written to support multiprocessing, or
no speed benefits are realized.
Overclocking
Running the CPU at a higher speed than it was rated to run at. Overclocking
increases performance, but also increases the potential for errors. Also, more heat is
generated by an overclocked CPU.
Pipelining
Superscalar
A technique that enables a processor to execute more than one instruction in a single
clock cycle.
Throttling
A technique by which the speed of the processor is scaled back so that it uses less
power and creates less heat. Throttling reduces performance. Its most useful with
portable computers, for which low power consumption and low heat production are
critical design factors.
48
Processor specifications
There are several manufacturers of CPUs. Probably the two most recognizable in the
personal computer realm are Intel and AMD (Advanced Micro Devices). These two
have the largest market share. Other manufacturers include, but are not limited to,
Centaur Technology, Elbrus International (a Russian microprocessor manufacturer),
Integrated Device Technology, Inc. (IDT), SIS (Silicon Integrated Systems), and ST
Microelectronics.
CPUs can be compared according to many specifications, including:
Primary specifications Clock speed, front-side bus speed, addressable RAM,
and cache sizes.
Bus width specifications The width, or number of bits, that can pass at one
time over the processors internal bus and data bus, plus the address bus width,
which determines the maximum addressable memory.
Internal specifications The internal and external voltages used by the chips,
the number of transistors that make up the processor, and whether it includes an
integrated FPU.
Refer to manufacturer Web sites for specific information about the following items for
individual processors:
Clock speed
Front-side bus speed
Maximum RAM
L1 cache size
L2 cache size
Internal bus size
Data bus size
Address bus size
These are the appropriate Web sites:
AMD desktop processors: products.amd.com/enus/DesktopCPUResult.aspx
Intel: www.intel.com/products/processor/index.htm
Internal specifications
The internal specifications of processors refer to the way the CPUs circuits are
constructed. The core voltage value describes the voltage level required by the core
processing components of the CPU. The I/O voltage value, sometimes called the
external voltage, is the level required by the CPUs input and output circuitry. In
modern processors, the core and I/O voltage values typically differ.
On modern processors, one or more voltage ID (VID) pins send a signal containing the
exact voltage requirements to the voltage regulator module (VRM) on the motherboard.
The VRM then supplies that specific power to the CPU. Not all motherboards include a
VRM. On many older motherboards, you must set jumpers or switches to match the
voltage supplied to the CPU with what it requires. If you supply the wrong voltage, you
can ruin the CPU.
49
410
Do it!
A-1:
Identifying CPUs
Heres how
Heres why
411
412
Chipsets
In older PCs, separate microchips were used to provide each individual function. For
example, one chip controlled the processors interaction with memory, another managed
the CPUs interaction with add-on peripherals, and so forth. The cost and complexity of
designing motherboards with many separate chips led designers to integrate the
functions into single chips or sets of chips.
A chipset is one or more chips, packaged into a single unit and sold together, that
perform a set of functions in a computer. The term is used most often to describe the
core features of a computer, which often include:
Memory control
System bus functions
Audio functions
Video display functions
System management functions
The chipset doesnt actually include the CPU. However, each chipset is designed to
support a select few CPUs.
Sometimes the term chipset is used with video adapter cards. In those cases, the
(video) chipset combines what used to be separate video chips into a single chip or unit.
Northbridge and Southbridge chips
Two of the most important components of a PC chipset are the Northbridge and
Southbridge chips. Together with the CPU, these chips define the characteristics and
capabilities of the computer.
The Northbridge chip controls interactions between the CPU, memory and cache, AGP
and PCIe video control circuitry, and the Southbridge. The Southbridge chip controls
interactions between buses and devices not controlled by the Northbridge, including the
standard PCI expansion bus, floppy drive controller, and serial, parallel, and PS/2
keyboard and mouse ports.
CPU packaging
Any type of microchip is made up of microscopic wires, transistors, and other
components. This plain chip is called the die. To be useful, it must be connected to the
rest of the circuitry of your computer. Due to the size differences between the wires on
the die and the circuit boards of your computer, the die cant be connected directly to
the circuit board.
413
Instead, the die is built into a package. A package is a case made from plastic, ceramic,
glass, metal, or other material, plus the wires and connectors that bridge the microscopic
connections on the die with the external circuitry. A package might also include support
function chips, memory, and cooling-related components.
Exhibit 4-3: The underside of an 80486DX2 CPU, showing the pins of its Pin Grid
Array package
Even though newer packages use smaller connectors, overall package size has grown as
functionality has grown. Newer packages include support chips, cache memory, and
features that enhance the cooling of the processor. One such larger package is shown in
Exhibit 4-4.
414
Full
name
Description
Processors
PDIP
Plastic dual
inline
package
PGA
Pin grid
array
CPGA
Ceramic pin
grid array
SPGA
Staggered
pin grid
array
PPGA
Plastic pin
grid array
FC-PGA
FC-PGA2
OOI
Organic
Land Grid
Array
(OLGA) On
Interposer
423-pin Pentium 4
415
Package
Full
name
Description
Processors
OPGA
Organic pin
grid array
AMD Athlon XP
SECC
Single Edge
Contact
Cartridge
Pentium II processors
with 242 contacts, and
Pentium II Xeon and
Pentium III Xeon
processors with 330
contacts
SECC2
Single Edge
Contact
Cartridge 2
SEP
Single Edge
Processor
FCBGA
Flip chip
ball grid
array
LGA
Land grid
array
Celeron D, Pentium 4,
Pentium 4 D, Pentium
Extreme Edition,
Core2 Duo,
Core2 Extreme
PGA-ZIF
Pin grid
array-Zero
insertion
force
416
Supports these
packages
Processors
Notes
Slot A
AMD Athlon
Socket A
(also called
Socket 462)
Socket 5
Pentium
Socket 7
Socket 8
Pentium Pro
Socket 423
Pentium 4
Socket 478
FC-PGA2
Celeron, Pentium 4,
Pentium D, and Pentium
Extreme Edition
Socket 370
Socket 603
PGA-ZIF
Xeon
Socket 604
PGA-ZIF
Xeon
Slot 1
417
Type
Supports these
packages
Processors
Notes
Slot 2
LGA775
(also called
Socket T)
LGA
Celeron D, Pentium 4,
Pentium D, Pentium
Extreme Edition, Core2
Duo, and Core2 Duo
Extreme
LGA 1156
(also called
Socket H)
LGA
LGA 1366
(also called
Socket B)
LGA
Socket 479
PGA-ZIF
Socket 495
PGA-ZIF
Mobile Celeron
Socket M
PGA-ZIF
Socket P
PGA
Exhibit 4-5: A Pentium MMX CPU atop its associated Socket 7 socket
418
Do it!
A-2:
Heres how
Heres why
If necessary.
Package: ________________
Socket: _________________
419
CPU installation
CPUs themselves rarely fail. Furthermore, you typically wont upgrade a PC by
replacing the CPU. Instead, youll probably either replace the whole motherboard
(including the CPU) or replace the whole computer.
You might have the opportunity to install a CPU if you purchase all of your computer
components separately to build a computer from parts. Some motherboards support
multiple processors. In such a situation, you might need to install an additional CPU in a
computer.
Regardless of why you might install a CPU, you must match the CPU to the
motherboard. The CPUs packaging must match the slots or sockets available on the
motherboard. Furthermore, the motherboard must supply sufficient power and be rated
for the speed of CPU you plan to install. If you purchase components as a set, your
vendor will have selected a matching CPU. If you purchase components separately,
make sure to match your CPU and motherboard.
CPU packages are held in their sockets by retaining clips or other mechanisms. Older
PGA packages are held in place by a locking lever. Other older slot and socket designs
use retaining clips to keep the processor package in place. Current CPU packages
employ a zero insertion force (ZIF) design. The purpose of the ZIF design is to avoid
problems caused by the forces you apply when inserting and extracting CPU packages
onto the motherboard. With the ZIF design, you move a lever or slider that pushes the
contacts apart. You can then insert the CPU package with very little force. You then
move the lever or slider back to its original position to close the contacts and grip the
pins of the CPU package. For the socket shown in Exhibit 4-6, you pull the locking arm
out from the socket to unsnap it, and then rotate it up, so its perpendicular to the socket.
420
A-3:
421
Heres how
1 Using the PC provided by your
instructor, unplug the PC and then
open the case while following
electrical and ESD safety
precautions
2 If necessary, remove the old CPU
3 Place the old CPU in a static-safe
bag or box
4 Install the new CPU
5 Close the case and reconnect
cables
6 Boot the PC to confirm that
youve installed the CPU
correctly
Log on to Windows as:
User name: COMPADMIN##
Password: !pass1234
Heres why
Your instructor might have a different computer
into which you can install a new or additional
CPU.
422
Objective
1.5
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
1.1
1.2
Cooling techniques
Explanation
CPUs and the other components in a computer are designed to operate within a range of
temperatures. Temperatures outside that range can damage components. In particular,
too much heat can cause logic errors, in which data within the chips and wires are
altered, or circuit damage, which can melt components!
The current crop of desktop CPUs (excluding the processor classes defined as energyefficient or low-power) can draw over 100 watts of power. The CPUs must dissipate the
heat from all that power.
423
For example, Intel specifies that for its Core2 Duo Desktop Processor E4300 processors,
the internal temperature of your computer case should not exceed 61.4C. To maintain
that temperature range, PC designers must include one or more of the following features
to cool the case and the processor itself:
Fans
Heat sinks and cooling fins
Heat pipes
Water pumps
Peltier coolers
Phase-change cooling
Undervolting
Fans and air openings
To maintain allowable temperatures, hardware designers must devise a way to move
heat away from the components that generate it. In most situations, this means forcing
hot air out of the case to allow cool air to enter.
Older CPUs generated so little heat that a simple fan (typically part of the power
supply) and a few openings in the case were all it took to maintain permitted operating
temperatures. Modern CPUs (and other components) generate too much heat for such
simple thermal management designs.
Modern cases include multiple openings through which air can flow. Some cases
include multiple fans, in addition to the power supply fan, to move air. Exhibit 4-7
shows a system case with both power supply and auxiliary fans.
Auxiliary fan
Exhibit 4-7: A system case with power supply and auxiliary fans to improve air flow
Heat sinks and cooling fins
Fans arent sufficient to dissipate the heat from Pentium-class processors. These
processors require more high-tech thermal management methods.
The amount of heat that can leave a component is directly proportional to its surface
area. Big, hot things cool faster than small, hot things do. Additionally, some materials
transfer heat better than others.
424
425
Even though no pump is involved, heat pipes provide an effective way of moving heat
away from the CPU. Additionally, the heat can be moved further away so that
convection can be more effective. Heat pipes also permit smaller and lighter fins.
Water pumps
For systems that generate too much heat for fins and heat pipes to cool, designers can
turn to more exotic cooling systems. One such system is a pumped water system. Like
heat pipes, tubes carry water or other liquid past the CPU to pick up heat. The heated
liquid is transported away from the CPU, often outside the computers case, where it
passes through cooling fins to transfer its heat away.
Some computer-game aficionados and others who work their PCs hard go even further.
They run the water cooling pipes through an ice-water bath or put the cooling fins
outside their windows during the winter. Typical office computer use rarely requires
such extreme cooling methods.
Peltier coolers
All of the preceding cooling methods rely on some form of convection. Heat moves
from the hot CPU to the cooler surroundings. What if the surroundings arent cooler
than inside the PCs case? Factory floors and some other environments can be very hot.
Convective cooling devices cant work in those situations.
A Peltier (pronounced PELT-ee-y) device is an electronic component that gets
colder when a voltage is applied. Peltier coolers for CPUs provide cooling when
convective methods wont work.
A Peltier device is connected directly to the CPU. Devices that can drop the temperature
of a CPU by 70 C are available. If more cooling is needed, Peltier devices can be
combined with water coolers.
Phase-change cooling
Phase-change cooling utilizes a vapor compression unit, much like a window A/C unit,
to cool the processor. The computer sits on the compression unit, and a tube runs from
the compressor to the processor. The compressor compresses a gas or gases into liquid,
and then that liquid runs through the tube to the processor. There it passes through an
expansion device. As the liquid absorbs the heat from the processor, it evaporates and
returns to the compressor in gas form to begin the process again. Phase-changing
cooling systems are more efficient than a single-phase water cooling systemup to 10
times more efficientbut they generate significantly more noise.
Undervolting
Undervolting is the practice of running a CPU or other computer component with
voltages below the devices specifications, so that the component draws less power and
produces less heat. However, if you run a processor at too low a voltage, it can produce
system errors, freezes, or crashes. You might also be unable to power on the system at
all. Be sure to check the specifications for your particular processor before you attempt
to use undervolting as a cooling technique in your system. Youll find that your ability
to cool by undervolting varies by manufacturer, by product line, and sometimes even by
different production runs of the same processor.
426
Do it!
B-1:
Heres how
Heres why
B-2:
427
Heres how
Heres why
428
Topic C: Motherboards
This topic covers the following CompTIA A+ Essentials (2009 Edition) version 2.0
exam objectives.
#
Objective
1.2
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
1.1
429
Motherboards
Explanation
The motherboard is the main circuit board in a personal computer. Its made up of
various components, including the CPU and other electronic devices, wires, and adapter
sockets into which additional circuit boards and devices can be attached. Exhibit 4-10
shows a motherboard with some of its primary components labeled.
Socket 478
connector
3 DIMM banks
ATX power
supply
Back panel
connectors
2 IDE ports
Chipset
AGP slot
Chipset
Floppy drive
port
4 PCI slots
CMOS battery
BIOS
CD-in connector
(white line)
Function
CPU
The chip that processes instructions, manipulates data, and controls the
interactions of the other components in your computer.
Expansion slots
Slots into which you can plug additional circuit boards to expand the capabilities
of your computer.
A slot into which you can plug an AGP graphics adapter card, which produces
the output displayed on your monitor.
A header into which you can plug cables to connect hard drives, CD drives, and
DVD drives to the system.
A header into which you can plug the cable to connect a floppy drive to the
system.
430
Function
Power connector
Connector to which you connect the output of the power supply to provide
electrical power to the motherboard. Older systems have a pair of connectors
rather than a single connector.
Memory slots
Slots into which you insert memory modules to add system memory to your PC.
Ports into which you can plug PS/2-style keyboard and mouse connectors.
USB port
One or more ports into which you can plug cables to connect USB devices to
your PC.
IEEE 1394/FireWire
port
One or more ports into which you can plug cables to connect FireWire devices
to your PC.
Serial port
One or more ports into which you can plug cables to connect serial devices, such
as modems or mice, to your PC.
Parallel port
One or more ports into which you can plug cables to connect parallel devices,
such as printers, to your PC.
Battery
Network interface
Video connector
Video circuitry built into the motherboard, which provides a video connector on
the back of the system case.
The motherboard is sometimes called the system board or main board. However, the
latter term is typically used to describe the main circuit board in non-PC devices, such
as alarm systems, televisions, and so forth.
431
In addition to the back panel connections shown in Exhibit 4-10, most computers
provide front panel connections, including USB and IEEE 1394/FireWire connections,
as shown in Exhibit 4-11.
Daughter boards
A daughter board is a circuit board that connects to a circuit board (sometimes, though
not normally, a motherboard) to provide or assist with its functions. Daughter boards are
often used with video cards to add more video-processing capabilities.
Riser cards
As shown in Exhibit 4-12, a riser card is a circuit board that connects to a motherboard.
Unlike a daughter board, the purpose of a riser card is to provide additional expansion
slots or sockets. Riser cards are most often used with special, small motherboards
designed for small cases.
Form factor
The form factor of a motherboard is its size and shape. In addition, the form factor
describes the power supply and case that can be used with a motherboard. It also
describes the general physical layout of the components on the motherboard.
Of course, motherboards must fit into cases, which means that screw holes or retainingclip locations must match between motherboards and cases. Standardized dimensions
and mounting layouts help make sure that components work together.
The following table lists the common PC motherboard form factors. Other form factors
are available. Be sure to check the manufacturers specification documents for your PC
when choosing a replacement motherboard.
432
Dimensions
(inches)
Notes
XT
8.5 by 11
AT
12 by 1113
Baby-AT
8.5 by 1013
ATX
9.6 by 12
Standard created by Intel in 1996 and still one of the most popular
form factors.
Mini-ATX
8.2 by 11.2
Micro-ATX
9.6 by 9.6
LPX
9 by 1113
Mini-LPX
89 by 1011
NLX
89 by 1013.6
FlexATX
9.6 by 9.6
Mini-ITX
6.7 by 6.7
Nano-ITX
4.7 by 4.7
BTX
10.5 by 12.8
MicroBTX
10.4 by 10.5
PicoBTX
8.0 by 10.5
C-1:
433
Heres how
Heres why
434
Motherboard installation
Motherboards occasionally fail, often due to manufacturing defects or rough handling. If
failure occurs, you might need to install a new motherboard. You might also need to
install a motherboard when upgrading a PC or building one from scratch.
Motherboards are typically held in the case by screws, but occasionally plastic clips are
used. Most often, you need to open both sides of the system case to access these screws
or clips. Additionally, you need to remove any wires, cables, connectors, and perhaps
even other system components, such as the power supply and drives, to remove the
motherboard. Standoffs are basically pegs that support the motherboard as you install it.
You use standoffs to keep the soldered contacts on the back of the motherboard from
touching the metal case. Without standoffs, if the contacts touch the metal case, it could
cause the motherboard to short out. Standoff pegs or spacers come in a variety of
materials. Some are metal (brass), while others are plastic.
To install a motherboard:
1 Unplug the computer and open the case while observing general electrical and
ESD safety precautions.
2 Disconnect any wires, cables, and connectors from the old motherboard.
3 If necessary, remove the power supply and drives from the system. In some
cases, these items are in the way and prevent you from removing the
motherboard.
4 Remove the old motherboard by unscrewing it from the case or by releasing the
retaining clips that secure it.
5 Store the old motherboard in an appropriate, static-safe bag or box.
6 Orient the motherboard and match its mounting holes to the case mounting
holes.
7 Install metal or plastic standoffs.
a If the motherboard holes line up with the case mounting holes, attach a
metal standoff into the case.
b If the motherboard holes line up with eyelet holes, insert a plastic slider
standoff onto the motherboard.
8 Install the new motherboard and secure it with the retaining mechanism (screws
or clips).
9 If necessary, reinstall the power supply and drives.
10 Connect the necessary wires, cables, and connectors. Configure any jumpers.
11 Close the case, reconnect cables, and boot the PC.
Windows activation requirements
With Windows XP, Microsoft introduced product activation for its Windows operating
system. Product activation is a type of cataloging process by which the software product
(in this case, Windows), its product key, and the hardware signature of your computer
are entered into a Microsoft database. Microsoft assures users that the process of
activation is completely anonymous, yet specific enough to prevent the same product
key from being reused on a different computer.
435
Commercial versions of Windows XP, Windows Vista, and Windows 7 have a 30-day
grace period, after which activation is mandatory. After the grace period expires,
Windows basically functions only enough to allow you to complete the activation
process, although Windows 7 and Windows Vista provide some additional functionality
above that offered by Windows XP after the activation deadline. Every few days,
Windows uses a pop-up window to remind you about activation until you successfully
complete the process.
You can activate Windows over the Internet or by telephone. The Internet option is
usually completed in seconds. The phone option can take several minutes while you
exchange unique numbers with the customer service representative or automated
attendant.
If you attempt to activate a copy of Windows that uses the same product key as an
already activated system, Internet and automatic activation will fail. You will then be
forced to perform telephone-based activation. This is a security measure to prevent
piracy. If youve simply upgraded your hardware, Microsoft will allow the new system
to be activated, but the activation of the old system will be voided in Microsofts
database.
Activation might be unnecessary for some new computer systems on which Windows is
already installed. Also, some of the volume licenses purchased by large companies use
special product keys for Windows that do not require individual system activation.
Activation has both benefits and drawbacks. One benefit is that it ensures that youve
purchased a fully licensed and valid product and did not inadvertently obtain a pirated
copy. Unfortunately, it can have one large drawback. If you make a significant change
in your hardwaresuch as replacing the motherboard or replacing multiple system
components simultaneouslyyour activation can be invalidated.
436
Do it!
C-2:
Heres how
1 Using the PC provided by your
instructor, unplug the PC and then
open the case while following
electrical and ESD safety
precautions
Heres why
Your instructor might have a different computer
into which you can install a new or replacement
motherboard.
437
Objective
2.2
Given a scenario, explain and interpret common hardware and operating system
symptoms and their causes
Hardware-related symptoms
Excessive heat
Noise
Alerts
Odors
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
1.2
438
Motherboards and CPUs can fail for various reasons. One of the most common causes
of failure is a large electric spike, such as that caused by a nearby lightning strike.
Often, a motherboard or CPU failure shows up in one of two ways: a complete system
failure occurs (nothing happens when you turn the computer on); or unusual problems
occur, perhaps sporadically.
As a PC technician, you should be familiar with the most common symptoms, probable
causes, and suggested first try solutions for motherboard- and CPU-related problems.
You might encounter problems not listed in the following table, but it will give you a
few scenarios to consider when troubleshooting motherboard and CPU problems.
Symptom
Probable cause
Suggested solution
D-1:
439
3 You are troubleshooting a computer thats unstable (it hangs, gets BSODs and
memory errors, spontaneously reboots, etc.). The user states that the symptoms
have gotten more frequent. What do you suspect is the problem?
440
In this topic, you learned that CPUs are the chips that process instructions, manipulate
data, and control the interaction of other PC components. You examined the
characteristics of popular CPUs, as well as the CPU features that determine its
performance characteristics. You learned that processors are sold as part of chipsets,
which together control the core functions of the computer. You examined the various
CPU packages and the corresponding slots and sockets into which theyre inserted.
You learned how to install a CPU on a motherboard.
Topic B
In this topic, you learned that CPUs generate an enormous amount of heat and require
active and passive cooling mechanisms to prevent overheating.
Topic C
In this topic, you learned that the motherboard is the primary circuit board in a
personal computer. You learned that motherboards come in specific sizes and shapes
that describe their form factor. Additionally, you learned about computer case form
factors and learned that the form factors of your motherboard and case must be
compatible.
Topic D
In this topic, you learned that motherboards and CPUs fail for various reasons,
particularly lightning strikes and electrical spikes. You learned about common
symptoms of such failures, their probable causes, and suggested solutions.
Review questions
1 Which is not a component of a CPU?
A Bus architecture
B Control unit
C Execution unit
D Register
2 The math coprocessor was the predecessor to which CPU component?
A ACL
B Core
C FPU
D Register
3 A single-core processor has one of what component?
A Control unit
B Execution unit
C FPU
D Register
4 ______________ are very small, very fast, memory locations for holding
instructions or units of data.
Registers
441
12 The plain chip called a die is built into a(n) _____________ so that it can connect
to the rest of the circuitry in your computer.
package
442
18 True or false? Thermal compound is basically a grease-like fluid used between the
CPU and its heat sink or cooling fins.
True. The compound improves heat flow by closely mating the CPU die to the heat sink or fan.
19 Which cooling system relies on small tubes filled with a small amount of fluid?
A Cooling fins
B Heat pipes
C Heat sinks
D Peltier coolers
20 Which cooling system uses an electronic component that gets colder when voltage
is applied?
A Cooling fins
B Heat pipes
C Heat sinks
D Peltier coolers
443
21 You open your PC and look at the CPU. How can you tell if it uses active or passive
cooling?
If there is just a heat sink on the CPU, it uses passive cooling. If theres a fan attached to the
CPU, it uses active cooling.
22 Before the Pentium CPU was introduced, what was the most common CPU cooling
mechanism?
A simple fan, typically part of the power supply, was all that was used with the 80286 and 80386
CPUs. Some 80386 and most 80486 CPUs also used cooling fins.
444
51
Unit 5
The Basic Input/Output System
Unit time: 90 Minutes
52
Objective
1.2
2.5
3.4
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
1.1
1.2
4.2
Firmware
Explanation
Firmware straddles a gray area between hardware and software. Firmware is software
written permanently or semi-permanently on a computer chip. Firmware is used to
control electronic devices, such as computers, printers, remote controls, calculators, and
digital cameras. In a computer, firmware is implemented using the BIOS and CMOS.
53
BIOS
The BIOS (Basic Input/Output System) is the computers firmwarea set of software
instructions stored on a chip on the motherboard. The BIOS instructions enable basic
computer functions, such as getting input from the keyboard and mouse, serial ports,
and so on. Without the BIOS, your computer would be a useless collection of wires and
electronic components.
AMI (American Megatrends Inc.), Award, MR BIOS (Microid Research Inc.), and
Phoenix are some common BIOS manufacturers. A motherboard manufacturer selects a
BIOS and integrates it into the design.
Shadowing
At startup, many computers copy the contents of the BIOS into standard memory to
improve performance. This technique is called shadowing because the contents in
memory are like a shadow of those on the BIOS chip.
CMOS
CMOS is memory that stores BIOS configuration information. A battery, typically on
the motherboard as shown in Exhibit 5-1, provides power to the CMOS chip so that its
contents are maintained when the computer is turned off or unplugged.
CMOS (complementary metal oxide semiconductor) is actually a type of computer chip.
This type of chip can maintain information using power from the CMOS battery when
the systems power is removed. The best known use of CMOS chips is to store BIOS
configuration data.
The term CMOS is frequently used to refer to the storage location of the BIOS
configuration information, rather than to the chip-manufacturing technology.
Battery
54
55
A-1:
Heres how
1 If necessary, shut down your PC
Heres why
Dont put the computer in hibernation or sleep
mode. You must turn it all the way off.
56
BIOS updates
Explanation
The BIOS is provided in a form of a memory chip that doesnt lose its contents when
the power is turned off. The BIOS can be implemented either in ROM (read-only
memory) or flash memory (a type of electronically reprogrammable memory chip).
ROM-based BIOS is programmed at the factory. This is an older technology.
You cant change this kind of BIOS without replacing the chip itself.
Using a special program provided by the computer (or BIOS) manufacturer, you
can update a flash-memory-based BIOS without changing the BIOS chip. This
action is often called flashing the BIOS.
Usually, the BIOS version that ships with your PC is all you ever need. However, you
might need to upgrade your BIOS in the following situations:
There are device problems or other bugs that your PC manufacturer identifies as
being caused by BIOS problems.
There are device problems that you can attribute to no other cause than the
BIOS. Additionally, you have exhausted all other troubleshooting avenues in
trying to fix the problems.
You need to use new hardware options that, while supported by your system,
arent supported by your BIOS.
Its important to note that, while this course focuses on updating a computers BIOS, the
firmware of other electronic devices, such as printers and routers, needs to be kept
current as well.
BIOS update sources
AMI, Award, and the other BIOS manufacturers dont provide BIOS updates directly to
consumers. Instead, these companies provide the BIOS to computer manufacturers, who
build it into their computers.
The BIOS manufacturers give the BIOS to PC manufacturers in an incomplete state.
The PC manufacturers make final modifications to tailor the BIOS to their exact
hardware. This tailored BIOS is whats shipped to you in your new PC. For this reason,
BIOS updates must come from your PCs manufacturer, not from the original
equipment manufacturer.
Determining the BIOS version
You can find the version of the BIOS installed in your system by using the Windows
System Information tool or running the DirectX Diagnostic Tool (DxDiag.exe.) To
determine the version of BIOS installed in your Windows 7, Windows 2000
Professional, Windows XP, or Windows Vista, system:
1 Click Start and choose All Programs (or Programs), Accessories, System Tools,
System Information.
2 Record the value listed in the BIOS Version/Date field. As shown in Exhibit 5-2,
this field lists BIOS version data, which you can use to determine if a newer
version is available on your PC makers Web site.
3 If its present, record the value listed in the SMBIOS field. The SMBIOS is used
by PC inventorying programs to collect data about your computer. SMBIOS
updates are usually included with BIOS updates. Not all PCs include the
SMBIOS.
57
Exhibit 5-2: The System Information utility displays the BIOS version
58
A-2:
Heres how
1 Boot your computer
Heres why
If necessary.
2 Log on to Windows 7 as
COMPADMIN## with a
password of !pass1234
3 Click Start and choose
All Programs, Accessories,
System Tools,
System Information
Manufacturer:
Version:
Date:
59
510
Configuration data is stored in the CMOS. This chip retains its data when the PC is off,
thanks to a battery connected to your motherboard. In older PCs, the battery was
soldered in place and wasnt easily replaceable. Nowadays, the battery, often a button
cell, is inserted into a socket and held in place with retaining clips.
You might need to replace the CMOS battery if your computer is losing its time or date
settings when you boot or if youre receiving one of the following error messages:
CMOS Read Error
CMOS checksum error
CMOS Battery Failure
A charge generally remains long enough for you to replace the battery without losing
data.
To replace the CMOS battery:
1 If youve customized your BIOS settings and they havent reverted back to the
default due to the battery failure, write the settings down.
2 Following proper ESD precautions, power down, disconnect external cables and
the power cord, and open your computers chassis.
3 If necessary, remove any cables that prevent access to the battery on the
motherboard. Remember where to reconnect each cable you disconnect!
4 Gently slide the battery out of its compartment, taking care not to break the
holding clamps.
5 If necessary, discharge the CMOS memory by moving the motherboard jumpers
near the battery. Typically, you move the jumpers from pins 1 and 3 to pins 2
and 4 to clear the memory. Then you move the jumpers back.
6 Insert the new battery into the holder, again taking care not to snap the holding
clamps.
7 Reconnect any cables you disconnected to gain access to the battery on the
motherboard.
8 Close the PC chassis.
9 Reconnect any cables and the power cord.
10 Reboot and, when prompted, enter the correct date and time.
11 Access the BIOS to reset any custom values.
A-3:
511
Heres how
Heres why
512
Objective
1.2
3.4
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
1.2
When you turn on your computer, a program contained in the BIOS performs a series of
basic checks to make sure your system components are in proper working order. This
set of checks is called the power-on self test (POST).
The POST isnt a complex or comprehensive test. There are four basic parts, which are
carried out in this order:
1 The BIOS tests the core hardware, including itself, the processor, CMOS, the
input/output system, and so forth. Any errors detected at this stage are reported
as a series of beeps (see the Beep codes section that follows).
2 The BIOS tests the video subsystem. This test includes checking the memory
dedicated to video operations, checking the video processing circuitry, and
checking the video configuration (that its valid and not corrupted).
3 The BIOS identifies itself, including its version, manufacturer, and date.
4 The BIOS tests main system memory. Some BIOS versions display a running
count of how much memory has been tested. Others are silent unless an error
is found.
513
Beep codes
Before the video system is initialized, the BIOS has no way to display errors on your
screen. Thus, errors detected early in the POST test must be reported as one or more
beeps played through the internal PC speaker. Its important to note that, if the systems
speaker is not functioning, you wont hear these beeps.
The exact beep codes vary by BIOS manufacturer. The following table lists a few of the
more common beep tones. For a more complete reference, visit
www.computerhope.com/beep.htm.
Beeps
Description
1 short beep
3 long beeps
A keyboard error.
8 short beeps
9 short beeps
A BIOS problem.
A memory error.
Numeric codes
When the POST has finished its core hardware tests, the system begins to initialize other
devices, including the video display circuitry. Once the video is initialized, any further
error codes can be displayed on the monitor.
The exact numeric codes and their meanings vary by manufacturer. You should visit
your vendors Web site to get the list of codes for your specific hardware.
The following table lists a few Lenovo-specific numeric error codes you might
encounter. Manufacturers other than Lenovo use similar numbers.
Code
Description
151
161
162
164
Memory size mismatch: your PC has more or less memory than the amount
the CMOS says your system has.
Memory failure.
1762
Logo screen
Some BIOS manufacturers hide the display of BIOS and POST messages. Instead, they
display their logo or another graphic. Typically, you can show the POST messages and
hide the logo by pressing the Tab key when the logo is displayed.
514
Do it!
B-1:
Heres how
Heres why
To boot normally.
515
The POST process covered previously is just one of the steps that your computer
performs when starting up. The following steps detail the hardware portions of the boot
process.
1 You turn on the power.
2 The timer chip begins sending continual reset signals to the CPU to prevent it
from booting the PC.
3 The power supply performs internal checks. When thats done and power output
levels have stabilized, it sends the Power_Good signal to the CPU.
4 With the arrival of the Power_Good signal, the timer stops sending reset signals
to the CPU, thereby permitting it to begin the boot process.
5 The CPU loads the BIOS and then searches for devices that have BIOS
extensions to load. Video adapters are the best example of devices that would
require a BIOS extension.
6 The BIOS checks whether this is a cold or warm boot. Cold boots happen when
you boot the PC from a powered-off state or when you press the hardware reset
button on the front of the system case. Warm boots happen when you click Start,
choose Shutdown, and click Restart. (With older versions of Windows and with
DOS, you could perform a warm boot by pressing Ctrl+Alt+Delete.)
7 If this is a cold boot, the BIOS performs the POST procedure.
8 The BIOS reads the CMOS configuration data and configures devices.
9 Plug and Play devices are detected and configured.
10 The BIOS determines which drive to boot from by checking the CMOS
configuration data.
11 The BIOS reads the master boot record (MBR) from the boot drive. This record
provides the information necessary for the boot process to proceed from this
point onward. If the MBR cant be located, the CMOS displays an error
message, such as Non-system disk or disk error.
12 The MBR contains the code for passing control of the boot process to the
operating system. The OS takes over and completes the boot process.
Boot devices
The boot device is the drive that the computer uses to load an operating system during
the boot process. In current computers, a boot device can be many different types of
drives, such as:
An internal hard disk
An internal optical drive (CD or DVD drive)
A USB drive (flash drive, or external hard disk or optical drive)
A network drive, using a network interface card that supports the Preboot
eXecution Environment (PXE)
Examples of older boot devices include:
Floppy disk drives
SCSI devices
Zip drives
516
B-2:
Heres how
1 If necessary, shut down your PC
2 Turn on the computer
3 At the appropriate time in the boot
sequence, press the key
combination that opens the BIOS
setup utility on your system
4 Identify the boot devices included
in your PCs boot sequence
5 Identify the order of devices in the
boot sequence
6 Exit the BIOS utility
Heres why
Dont put the computer in hibernation or sleep
mode. You must turn it all the way off.
517
As a PC technician, you should be familiar with the most common symptoms, probable
causes, and suggested first try solutions for BIOS-related problems. You might
encounter problems not listed in the following table, but it provides some scenarios to
consider when youre troubleshooting problems.
Symptom
Probable cause
Suggested solution
Devices misidentified
Hard drive
inaccessible
518
Probable cause
Suggested solution
Theres no video;
instead, the computer
emits eight short beeps.
A memory problem.
519
Do it!
Symptom
Probable cause
Suggested solution
Error message
Non-system disk
or disk error
Error message
Display type
mismatch
Error message
Memory size
mismatch
Error message
CMOS checksum
failure
B-3:
Heres how
1 One or more BIOS- and POST-related problems have been introduced into your
lab computer. Troubleshoot these problems to determine their causes.
2 Correct the problems youve found in your PC to return it to a working state.
Solving one problem might reveal the presence of another problem. Troubleshoot
and fix all problems that arise.
3 Document the problem(s) you find:
520
In this topic, you learned that the BIOS is a set of programs that control the most basic
hardware interactions within your PC. The BIOS is stored on a chip that isnt erased
when you turn off the power. Hardware configuration data used by the BIOS is stored in
CMOS. CMOS data is retained when the power is off, thanks to a battery installed on
your motherboard. You learned how to access and use the BIOS setup utility to change
the CMOS configuration data. You learned that, with modern PCs, you can flash the
BIOS to update it. You also learned that a failed BIOS update can render your PC
unusable, and you looked at the ways you could recover from a failed BIOS update
attempt.
Topic B
In this topic, you learned that the BIOS tests your computers hardware at boot time by
following the POST process. You learned about various beep and numeric error codes
that might be reported during the POST if the BIOS detects a hardware failure. You
learned how to determine the order of boot devices in your computer. You also learned
how to identify symptoms and causes of BIOS, CMOS, and POST problems and then
how to resolve the issue.
Review questions
1 True or false? The BIOS and CMOS are the same thing.
False. The BIOS is a set of instructions that control the low-level hardware functions of your
computer. CMOS usually refers to memory (backed up by a battery) that stores hardware
configuration data.
2 The battery shown in the following graphic is used to provide power to what
component?
A BIOS
B CMOS
C Firmware
D RAM
521
3 True or false? The same key combination will get you access to the system utility
on all personal computers, except laptops.
False. BIOS manufacturers provide different ways to access the system setup utility.
6 The clock on your computer reads January 1, 1980. What is the likely cause?
A Your system BIOS needs updating.
B When the operating system was installed, the correct date was never set.
C The CMOS battery needs replacing.
D A BIOS update failed.
7 Which of the following is not a step in the POST process?
A BIOS identification
B Core hardware test
C Main system memory test
D Master boot record being read from the boot drive
E Video subsystem test
8 True or false? The boot processes for a cold boot and a warm boot are exactly the
same.
False. The POST and other initial hardware tests arent performed during a warm boot.
9 True or false? To boot the computer, your boot device must be an internal hard disk,
internal optical drive, internal floppy drive, or USB flash drive.
False. Boot devices can also include an external USB hard disk or optical drive or a network
drive, using a PXE-compliant NIC and older technology such as an external SCSI or zip drive.
522
13 Why does your computer use beep codes to indicate an error, rather than simply
displaying a message on the monitor?
Beep codes are sounded during the portion of the boot process before the video subsystem has
been initialized. Thus, the system cant yet display anything on the screen. The systems only
output option is to emit a beep through the system speaker.
14 True or false? Every BIOS manufacturer uses the same flashing utility.
False. Flashing utilities are proprietary to the BIOS manufacturer, and you should always use the
correct version for your BIOS.
5 Attach the mouse and shut down your PC. If your computer uses PS/2 keyboard and
mouse devices, disconnect the keyboard and plug it into the mouse port, connecting
the mouse to the keyboard port. Boot your PC. Does your computer report any beep
or numeric error codes? If so, which codes? If not, why not?
You should receive the beep and numeric codes that indicate a keyboard failure. However, some
PCs can automatically correct this sort of misconnection and will boot normally.
6 Shut down your PC and connect the keyboard and mouse to the correct PS/2 ports.
Boot your PC.
61
Unit 6
Memory systems
Unit time: 120 Minutes
packages.
C Install RAM into a system while handling
62
Topic A: Memory
This topic covers the following CompTIA A+ Essentials (2009 Edition) version 2.0
exam objective.
#
Objective
1.6
Memory, commonly called RAM (random access memory), is the hardware component
that stores instructions and data as the CPU works with it. RAM is implemented as
computer chips attached to a specialized module.
Physical memory, or primary memory, is different from storage devices, or secondary
memory, such as hard drives, floppy drives, and optical discs. Storage refers to the
locations where dataincluding your applicationsis held in the long term. Data in
storage remains there when your computer is turned off.
An analogy for RAM
You can compare RAM and storage with the papers you work with at your desk. You
keep important papers in the file drawer, and you pull them out and put them on your
desktop to work with them. The file drawer is like the hard disk in your computer; its
where you store your data (papers) when youre not working on them. The desktop is
the working area and is analogous to RAM.
When necessary, the computer can "borrow an area of your hard disk to use as if it
were memory. A page file temporarily stores active data that doesnt fit in the RAM
installed on your computer. However, the computer cant work with the data in the page
file. It must first read the data back into real RAM, while writing some other data to the
page file.
Memory systems
63
Additionally, some types of chips dont lose their contents when power is removed. For
example, CompactFlash cardscommonly used with digital camerasare simply
computer chips in a convenient package. Yet a CF card is storage, not memory, because
you use it for the long-term storage of data (most often photos, but you can store other
files on a CF card, too).
Importance of RAM
Having sufficient RAM in your system is critical for the following reasons:
Performance Having more RAM almost always leads to improved computer
performance. When you have insufficient RAM, the CPU must work harder
shuffling data between RAM and the page file.
Software support Many applications require a minimum amount of RAM.
Having less RAM than specified can prevent you from running these
applications. Or, if they do run on your system, they perform so badly as to be
unpleasant to use.
Poor-quality or defective RAM is a major source of system crashes. One bad memory
storage location out of the millions of such locations in your RAM chips can bring your
system down. Your computer tests the RAM during the POST, but that test isnt
exhaustive and problem chips can slip through.
Additionally, the type of RAM your system uses, as well as the maximum amount of
RAM supported by your motherboard, has a direct effect on your systems
upgradeability. Make sure to buy a system that will support your future RAM needs, as
well as those of your current applications.
Measuring memory
The actual storage locations on a memory chip are called cells. Each cell stores a single
bit of data. A bit is a 0 or 1, representing an on/off or yes/no binary state.
The data you work with and the programs you run are made up of millions and billions
of individual bits of data. Describing such large units is confusing and inconvenient.
Instead, computer professionals use various units of memory storage to describe
memory and storage amounts.
Basic memory units
The following table lists the most basic units of memory storage.
Name
Number of bits
Bit
Nibble
16 (24)
Byte
256 (28)
Word
64
Abbreviation
Number of bytes
Byte
Kilobyte
KB
Megabyte
MB
Gigabyte
GB
Terabyte
TB
Memory types
Memory can be classified in various ways:
Volatile vs. non-volatile
Static vs. dynamic
Asynchronous vs. synchronous
Volatile and non-volatile memory
Volatile memory loses its contents when power isnt present. Non-volatile memory
doesnt lose its contents when power is removed. The following table lists the various
types of common memory, categorized as volatile or non-volatile.
Type
Volatile or
non-volatile
Description
RAM
Volatile
CMOS
Volatile
ROM
Non-volatile
PROM
Non-volatile
EPROM
Non-volatile
Memory systems
65
Type
Volatile or
non-volatile
Description
EEPROM
Non-volatile
Flash
Non-volatile
66
Memory access
To access the data in a particular memory cell, the CPU must have the address of that
cell. Although memory cells could be arranged in one long line, giving each cell an
individual sequential address, such a design would lead to slow and large chips. Instead,
chip designers arrange cells into rows and columns, much like the cells in a spreadsheet.
To read the data of any cell, the CPU needs both row and column addresses.
The exact way that CPUs address memory, along with many other factors, lead to a
confusing array of abbreviations describing memory types. The following table
compares the types of RAM found in older and current computers. The technologies are
listed in approximate increasing order of performance.
Abbreviation
RAM type
Description
DRAM
Dynamic RAM
FPM
VRAM
Video RAM
EDO
BEDO
Burst Extended
Data Out
SDR SDRAM
Synchronous
DRAM
DRDRAM
Direct Rambus
DRAM
DDR SDRAM
DDR2 SDRAM
Double Data
Rate 2
DDR3 SDRAM
Double Data
Rate 3
Memory systems
67
Access time
It takes a certain amount of time to access the data in memory, regardless of type or
technology. Of course, some memory types are faster and some are slower.
All memory has an initial latency, the amount of time between when an address (of the
data being requested) arrives on the bus and when the memory is ready to return that
data. After initial latency, a certain time passes before the data is retrieved and put onto
the bus so that the CPU can use it.
Access time is the overall amount of time between when a request is made and when the
data is available on the bus. In modern RAM, this time is very short, sometimes as little
as a few nanoseconds. A nanosecond is a billionth of a second.
Memory speed
Although RAM speeds are often measured in nanoseconds (ns), youre more likely to
see modern RAM rated by megahertz (MHz). A hertz is a cycle per second, so a
megahertz is a million cycles per second. The net result is that the MHz rating of RAM
is simply 1 divided by its speed in nanoseconds; alternatively, you can divide 1 by the
MHz rating to determine the speed in nanoseconds.
Overall speed
While you might see a module rated at 10 ns and another rated at 20 ns, you shouldnt
conclude that the 10 ns module is twice as fast. DRAM ratings dont include the initial
latency required for address decoding. Furthermore, todays DRAM, in the form of
SDRAM, is tied to the system clock. The actual speed at which your memory operates
is controlled by your systems bus speed, which is determined by your motherboards
chipset and clock speed.
In reality, the speed rating of a memory module represents a maximum speed at which it
can operate. You simply need to choose memory thats fast enough to keep up with the
rest of your system. Doing so today is easier, because SDRAM modules are rated to
match the front-side bus speed used with the CPU and motherboard.
Bandwidth
Bandwidth, or maximum theoretical throughput (or just throughput), is the amount of
data that can be transferred to or from memory per second. Its perhaps even more
important than a raw speed rating. Overall bandwidth is determined by the speed of the
RAM itself, plus the chips memory technology design. For example, an SDRAM
module operating at 100 MHz has a lower bandwidth than a 100 MHz DDR module
does.
68
Chips
Bandwidth,
or maximum
throughput
(in MBps)
Front-side
bus speed
System clock
speed
PC100
SDRAM
800
100 MHz
100 MHz
PC133
SDRAM
1000
133 MHz
133 MHz
PC1600
DDR-200
1600
200 MHz
100 MHz
PC2100
DDR-266
2100
266 MHz
133 MHz
PC2700
DDR-333
2700
333 MHz
166 MHz
PC3200
DDR-400
3200
400 MHz
200 MHz
PC2-3200
DDR2-400
3200
400 MHz
100 MHz
PC2-4200
DDR2-533
4200
533 MHz
133 MHz
PC2-5300
DDR2-667
5300
667 MHz
166 MHz
PC2-6400
DDR2-800
6400
800 MHz
200 MHz
PC2-8500
DDR2-1066
8500
1066 MHz
266 MHz
PC3-6400
DDR3-800
6400
800 MHz
100 MHz
PC3-8500
DDR3-1066
8500
1066 MHz
133 MHz
PC3-10600
DDR3-1333
10600
1333 MHz
166 MHz
PC3-12800
DDR3-1600
12800
1600 MHz
200 MHz
Consult your PC owners manual to determine which type of memory the PC can
support, or match new modules to existing ones. Then purchase that type of memory.
Often, your system supports faster memory (a type with a higher rating) than its
minimum required type. For example, if your system requires PC2100 memory, you can
probably install PC2700 memory without a problem. However, if the system requires
PC2700, you cant install PC2100 memory. Make sure to consult your owners manual
before installing any type of memory.
Memory systems
Do it!
A-1:
69
2 What does the number in a PC rating, such as PC2100, tell you about that
memory?
3 Which of these memory types are volatile memory? (Choose all that apply.)
A
RAM
Flash
EEPROM
CMOS
SDRAM
SRAM
EEPROM
CMOS
610
Objective
1.2
1.6
Packaging
Explanation
In the very early days of PC computing, you purchased individual DRAM chips and
installed them into sockets on your motherboard or video card, which is shown in
Exhibit 6-1.
Memory systems
611
Modules are easier to handle and work with than are individual chips. A memory
module has metal pins, or contacts, along its bottom edge. When inserted into the
appropriate motherboard socket, these pins complete the electrical connections between
the computers circuitry and the memory module circuits.
Single- and double-sided modules
Early memory packages featured DRAM chips on just one side. Manufacturers quickly
learned how to double the amount of memory in a given area by installing DRAM on
both sides of the module.
Number of DRAM chips
Early module types had eight DRAM chips, one to store each bit in a byte of data.
Think back to the addressing schemes described earlier; while each DRAM chip can
store multiple rows of data, it stores just one columns worth of data. Thus, eight chips
were required to store the eight bits of a byte that spanned a single row of data.
Thanks to ever-shrinking fabrication technologies, the number of chips on a module no
longer has a 1:1 chip-to-bit limit. A module might have two, four, or some other number
of chips, yet hold massive quantities of data. For example, 4 x4 chips can be replaced by
just 2 x8 chips.
612
Package types
The following table lists the most common memory package (module) types. The
memory package type you use must match the memory slots on your motherboard. Two
common examples of PC memory modules are shown in Exhibit 6-2 and Exhibit 6-3.
Note that 30-pin SIMMs are 8-bit devices; 72-pin SIMMs are 32-bit devices; and
DIMMs are 64-bit devices. You must install enough devices to satisfy the width of the
system data bus. For example, for a 64-bit Pentium class CPU, you install eight 30-pin
SIMMs, two 72-pin SIMMs, or one DIMM.
Package
Pins
Used in
Description
SIMM
30
386-class desktops,
early Macintosh
computers
SIMM
72
DIMM
100
Printers
DIMM
168
SDR SDRAM in
desktops
DIMM
184
DDR SDRAM in
desktops
DIMM
240
DDR2 SDRAM in
desktops
DIMM
240
DDR3 SDRAM in
desktops
Has 120 front pins and 120 back pins. Single notch.
RIMM
184
MICRODIMM
144
Subnotebook
computers
SODIMM
144
Laptop and
notebook
computers
Memory systems
613
Package
Pins
Used in
Description
SODIMM
200
Has 100 front pins and 100 back pins. A single offcenter notch ensures correct installation.
SODIMM
200
Has 100 front pins and 100 back pins. A single offcenter notch ensures correct installation. DDR2
SODIMMs are virtually indistinguishable in
appearance from DDR SODIMMs.
SODIMM
204
Exhibit 6-2: A DDR or DDR2 SODIMM package from a laptop (note the notch
location)
614
Exhibit 6-4: Two early SIMMs, one with parity support and one without
ECC
Error correcting code (ECC) permits your computer not only to detect that an error has
occurred, but also to correct that error. As with parity, when the computer reads the data
from the module, it recalculates the ECC value and compares it to the value on the
module. If the values match, no errors have occurred. If they dont, then by using other
calculations on the ECC value, the computer can determine what was changed and what
its original value was.
Use of parity and ECC in current computers
Early PCs used parity memory, while early Macintosh computers didnt. PC aficionados
of the day claimed that as a reason for the PCs superiority, but you could say that the
Macintosh was simply ahead of the curve. Modern computers of both platforms rarely
use parity or ECC memory.
Memory systems
615
In a move to save money, hardware designers have eliminated parity and ECC support
from most modern desktop and laptop computers. Designers hope that memory errors
wont occur that frequently. To a lesser extent, memory errors can be detected with
software rather than hardware.
Its cheaper to make a non-parity or non-ECC memory module than one with those
features. The difference is probably close to 11%, because designers can use one fewer
out of nine chips by not storing that parity bit or ECC code.
Server-class computers often do include ECC or parity. Take care when purchasing
memory modules for your computer. You must use modules that either support, or dont
support, parity or ECC, as dictated by your systems design.
Do it!
B-1:
Heres how
1 Identify the memory modules
supplied by your instructor. For
each, note its type, the number of
pins, and whether its for a
notebook or desktop computer
2 You want to add more RAM to a
computer you own. Whats the
first step you should take?
3 With the instructor, your lab
partner, or another student in
class, debate the pros and cons of
using ECC memory in your
computer
Heres why
616
Objective
1.1
1.3
Memory modules
Explanation
Today you install memory modules by inserting them into slots on the computers
motherboard. To do so, you must consider these factors:
Banking requirements
Proper handling techniques
Slot insertion techniques
Safe storage
BIOS configuration
Banking requirements
You physically install memory modules into slots on the motherboard, and those slots
are arranged into groups called banks. For example, depending on your computers
design (including the system data bus, the bit-width of the package, and how many
channels in each bank), a bank might include one, two, or four slots, which are usually
color-coded on the motherboard. When you install new memory, you must fill every slot
in a bank. For example, if your computer uses two-slot banks, then you must install
memory modules in pairs. Many modern computers and laptops use single-slot banks.
With this type of bank, you have to install only one module.
Depending on your computers configuration, you must use the same type and speed of
memory in every slot in a bank. In a few situations, you must use the same type and
speed of memory in every memory slot in your computer, even in different banks. In
most computers, you simply leave empty any extra slots. However, in computers that
use DRDRAM (Rambus memory), you must fill extra slots with a continuity module,
which is a small circuit board designed to complete the electrical circuit but not add
RAM to your system.
Dual-channel architecture is a technology that doubles data throughput from the
memory to the memory controller by using two 64-bit data channels, giving you a 128bit data path. Dual-channel architecture requires both a dual-channel-capable
motherboard and two or more DDR, DDR2, or DDR3 memory modules. You install
the memory modules into banks. Each memory module accesses the memory controller
through a separate path, thus increasing bandwidth. Using identical memory modules is
recommended for best compatibility in dual-channel operations. Markings on the
motherboardeither text labels or outlinesidentify the banks and their slot(s), if
present.
Memory systems
617
Proper handling
Memory modules are extremely sensitive to static and you can easily damage them.
Carefully follow static-safe work procedures, including these precautions:
As always, unplug the computer before opening it.
With the computer unplugged, use the proper method to dissipate static
electricity and use an appropriate anti-static workstation.
Once youve discharged any static potential, try to move as little as possible.
The movement of your clothing or shoes on the floor could generate new
charges.
Always handle modules by their edges, without touching the pins, components,
or traces (the wires embedded in the surface of the circuit board).
Inserting and removing the modules
Memory modules include notches or are shaped in such a way that you can insert them
into the slots in only the correct orientation. Dont force a module to fit if you cant
insert it easily.
With most SIMM modules, follow these steps to insert a module into a slot:
1 Gently insert the module into the slot at about a 45-degree angle.
2 Firmly, but gently, push the module into its slot while moving the module to the
fully vertical (or horizontal) position. As you do this, the metal or plastic
retaining clips engage to hold the module.
With most DIMM modules, follow these steps to insert a module into a slot:
1 Ensure the locking clips are open to the sides, and gently insert the module
straight into the slot, perpendicular to the motherboard.
2 Push firmly until the retaining clips snap into place on either side.
To remove a SIMM module:
1 Gently release the retaining clips at both ends of the module.
2 With the clips released, you should be able to move the module easily to a 45degree angle.
3 Remove the module.
To remove a DIMM module:
1 Release the retaining clips on both ends of the module.
2 Remove the module by pulling it straight up from the slot.
You should store memory modules in their original packaging.
CMOS configuration
The BIOS checks the memory in a computer when you boot it. The BIOS compares the
amount of memory in the computer with the amount listed in the CMOS setup data. If
theres a discrepancy, the computer displays an error message.
With most modern computers, you simply press a key to automatically change the value
for the CMOS memory amount without using the BIOS setup program. In some
computers, especially older computers, you must run the BIOS setup utility. Depending
on the utility, you might be able to select the amount of installed memory, you might be
prompted to enter the correct amount, or you might be prompted to save the settings
with the new memory automatically included.
618
Do it!
C-1:
Heres how
1 Consult your PCs owners manual to determine the PCs memory banking
requirements
2 Determine the type of memory module required by your PC
3 Obtain suitable modules from your instructor
4 Install the modules into your PC, following safe ESD practices
5 Boot the computer, and if necessary, reconfigure the CMOS to support the new
memory
6 Continue the boot process to confirm that youve successfully installed the new
memory
7 Log on as your COMPADMIN## user with a password of !pass1234
8 If directed by your instructor, remove the additional memory from your PC,
following safe ESD practices
Memory systems
619
Notebook memory
The location where you install memory in a notebook or laptop computer varies greatly.
In some notebooks, you unscrew a compartment cover on the underside of the case. In
others, you have to remove the keyboard from the case to access the memory area.
Refer to the documentation for your notebook to determine exactly how to install
memory into it. Memory shouldnt be installed until you shut down the computer,
unplug the power cord, and remove the battery. You dont want to get shocked by
voltage from the battery or wall socket. You also dont want to turn on the computer
accidentally while youre installing or replacing memory.
Shared video memory
In some notebook computers, some of the main system memory is shared with the video
circuitry. Such systems have no dedicated video memory. Reduced cost is the primary
benefit of this design, though there are also some savings in power consumption and
heat generation.
The downside of shared video memory is that some of your computers RAM is
dedicated to video operations and is thus inaccessible to the operating system and
applications. For example, in a notebook computer with 512 MB of memory and
running at 1024768, 16-bit color display resolution, about 12 MB of RAM is used for
normal video options. Thats not all that bad. However, 3D, texture mapping, and
shading operations can use many times that amount of memory. Even without
considering the needs of gaming applications, your system might use as much as 128
MB of memory for video operations, leaving just 384 MB for operating system and
application use.
Another big downside of shared video memory is that system memory is much slower
than dedicated video memory. Notebooks with shared video memory perform more
slowly than those with dedicated video memory.
If your notebook uses shared video memory, adding more system memory can offer
more of a performance boost than youd get from adding memory to a system with
dedicated video memory. Not only does the extra memory provide more space for your
applications, but it also reduces the impact that video operations have on available
memory. Its critical for these systems that you use the highest performing memory
modules that are supported by your notebook.
620
Do it!
C-2:
Heres how
1 Shut down the computer
Heres why
Youll remove and replace the memory in a
notebook computer.
Log on as your
COMPADMIN## user
Memory systems
621
C-3:
Heres how
Heres why
622
Objective
3.2
3.3
Explain the process and steps to install and configure the Windows OS
Virtual memory
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
2.3
Given a scenario, select and use system utilities / tools and evaluate the results
Task Manager
Resource usage
Task Manager
Explanation
One of the primary tools for monitoring memory usage on your PC is Task Manager.
Its a Windows GUI utility that provides information on applications, processes, and
services that are running on your computer. A version of Task Manager is available in
all Windows operating systems discussed in this courseWindows 2000 Professional,
all Windows XP versions, and all Windows Vista and Windows 7 versions. The
Windows 7 version is shown in Exhibit 6-5.
There are various ways to open Task Manager:
In all Windows operating systems, press Ctrl+Alt+Delete. Depending on the
operating system, either Task Manager or the Windows Security dialog box will
open. If necessary, click Task Manager in the Security dialog box.
In Windows 2000 Professional, all Windows XP versions, and all Windows
Vista versions, right-click an empty space on the taskbar and choose Task
Manager.
In Windows 2000 Professional, Windows XP, and Windows Vista, press
Ctrl+Shift+Esc.
Memory systems
623
624
Description
CPU Usage
Shows how busy the CPU has been over time. The value selected for
Update Speed (on the View menu) determines how often this graph is
updated. You can set updates to occur twice per second (High), once
every two seconds (Normal), once every four seconds (Low), or not at
all (Paused). You can press F5 to update a paused graph.
On multiprocessor or multi-core systems, theres one graph per
processor or core. On Pentiums with a quad-core processor, Task
Manager shows four graphs.
Memory
(Windows 7/Vista)
Physical Memory
Usage History
(Windows 7/Vista)
Shows how much physical memory has been used over the past few
minutes.
PF Usage
(Windows XP/2000)
Shows the amount of the page files capacity being used by the
computer. If this graph shows that your page file is near the
maximum, you should increase the page files size.
Shows the percentage of the page files size used over time. The value
selected for Update Speed (on the View menu) determines how often
this graph is updated.
System
(Windows 7/Vista)
or
Totals
(Windows XP/2000)
Physical Memory
Memory systems
625
Indicator
Description
Commit Charge
(Windows XP/2000)
Kernel Memory
Summary data
(Along the bottom of the tab.) Shows the current number of processes,
the current CPU usage percentage, and the current amount of physical
or commit-charge memory being used, compared to the maximum
available. In Windows 7 and Windows Vista, this value is shown as a
percentage.
Exhibit 6-6: The Performance tab of Task Manager, on a Windows Vista Business
computer with a quad-core processor
626
Do it!
D-1:
Heres how
Heres why
Press Ctrl+Shift+Escape.
Memory systems
627
628
Virtual memory
Windows operating systems use a memory-management scheme called virtual memory.
Virtual memory is actually hard disk space that allows Windows to load applications
and data as if there were more RAM available than is physically installed in the
computer.
With virtual memory, Windows swaps data and instructions back and forth between
actual RAM and a file on the hard disk called a page file or swap file. If an application
calls for data it thinks is in RAM, but Windows has temporarily placed it in a page file,
a page fault is generated and the Windows Virtual Memory Manager pulls that data
back into RAM for the application to access.
This process, which normally happens invisibly, is illustrated in Exhibit 6-7. If through
a hardware or application error Windows cant find the page file, an invalid page fault
error occurs, causing a blue-screen error. Its important to note that applications cant
actually read data from virtual memory. The data needs to be put back into physically
memory when its needed, thus making reading data stored in virtual memory slower
than reading memory stored in physical memory.
Memory systems
629
To determine the size of the page file, Microsoft recommends a range determined by
multiplying the amount of physical RAM by 1.5 and 3.0. However, this is just a general
guideline. As the amount of RAM in a computer increases, the need for a large page file
decreases. To calculate your page-file size, use your systems peak commit value. By
setting your page file size to your systems peak commit value, you will cover the
unlikely scenario in which all of the committed pages are written to disk-based page
files.
You can also place a page file on a different hard disk from the boot partition to
optimize performance. When the page file is stored on the boot partition, Windows has
to perform disk input/output (I/O) processes on both the system directory and the page
file. Moving the page file to a different disk allows Windows to handle multiple I/O
requests more quickly.
To change the Windows page-file size:
1 In Windows 7 and Windows Vista, click Start, right-click Computer, and choose
Properties.
In Windows 2000 and Windows XP, right-click My Computer and choose
Properties.
2 In Windows 7 and Windows Vista, click Advanced system settings.
3
4
5
6
630
Do it!
D-2:
Heres how
1 Click Start, right-click
Computer, and choose
Properties
Heres why
(If youre running Windows 2000 Professional
or running Windows XP in Classic Start Menu
mode, right-click My Computer on the desktop
and choose Properties.) To open the System
window.
Settings
If necessary.
Memory systems
631
Objective
1.2
The memory-testing actions performed by the BIOS are relatively simple and not very
accurate. Many memory problems arent detected by the BIOS. To test memory fully,
you should use a dedicated memory-testing utility.
Memory-testing utilities
Memory-testing utilities typically perform hundreds, if not thousands, of read and write
operations in every memory location. In addition, the utilities write more than one type
of value to every byte of memory to test various types of possible failures. Complete
testing cycles with these utilities can take many hours, or even days, depending on the
speed of the computer and the amount of RAM installed.
The following are some popular memory-testing utilities.
Utility
License
URL
Memtest86
www.memtest86.com
Microsoft Windows
Memory Diagnostic
oca.microsoft.com/en/windiag.asp
Memtest86
Memtest86 is perhaps the most popular free memory-testing utility available. Its
released under the Gnu Public License (GPL). It can test any Intel x86 computer,
regardless of operating system.
632
Exhibit 6-8: The Memtest86 screen, showing the default test in progress
As with nearly all such utilities, you must create a bootable floppy disk or CD that
contains this utility and support files. Then you boot from that disk rather than running
the utility from within Windows.
Memory systems
633
Troubleshooting
As a PC technician, you should be familiar with the most common symptoms, probable
causes, and suggested "first try solutions for memory-related problems. You might
encounter problems not listed in the following table, but it provides a few scenarios to
consider when youre troubleshooting memory-related problems.
Symptom
Probable cause
Suggested solution
Computer randomly
freezes (locks up) or
crashes
Wrong amount of
memory reported by
the BIOS
Random crashes,
corrupted data, strange
application behavior
634
Do it!
E-1:
Troubleshooting memory
Heres how
1 One or more memory-related problems have been introduced into your lab
computer. Troubleshoot these problems to determine their cause(s).
2 Correct the problems youve found in your PC to return it to a working state.
Solving one problem might reveal the presence of another one. Troubleshoot and
fix all problems that arise.
3 Document the problem(s) you find:
Memory systems
635
In this topic, you learned that RAM is the hardware component that stores active data
and applications. You learned about the various units, such as MB and GB, which are
used to describe the quantity of RAM installed in your PC. You learned about the
various characteristics of memory, such as whether its volatile or non-volatile and
synchronous or asynchronous, as well as the technology by which its accessed.
Topic B
In this topic, you learned that chips are bundled into packages called modules. You
learned about the various memory module types, including SIMMs, DIMMs, and
SODIMMs. You learned that errors in memory can be detected and even corrected
through parity or ECC.
Topic C
In this topic, you learned how to install RAM and handle modules. You also learned
about banking requirements, slot insertion techniques, safe storage methods, and BIOS
configuration requirements.
Topic D
In this topic, you learned how to monitor memory usage by using the Performance tab
in Task Manager. You also learned about the Windows page file and how to adjust its
size.
Topic E
In this topic, you learned that RAM can fail for various reasons. You learned how to
troubleshoot common symptoms of failures, and how to determine probable causes and
implement suggested solutions.
Review questions
1 The actual storage locations on a memory chip are called what?
A Bits
B Cells
C RAM
D Word
2 Which memory units size depends on the processor?
A Bit
B Byte
C Nibble
D Word
3 Which term refers to the type of memory that loses its contents when power isnt
present?
A Asynchronous
B Dynamic
C Non-volatile
D Static
E Synchronous
F Volatile
636
Memory systems
637
10 True or false? Parity permits your computer not only to detect that an error has
occurred in memory, but also to correct that error.
False. ECC permits your computer to detect and correct errors. Parity enables just error
detection.
11 You need to add more memory to your system. You know it has a 133 MHz system
bus. How can you determine what type of memory to install?
Consulting your owners manual is the best way to determine the supported memory types.
13 Which tab in Task Manager can you use to monitor the performance of memory in
your computer system?
A Applications
B Networking
C Performance
D Processes
E Services
14 In Task Manager, the CPU Usage History is divided into multiple graphs when you
have more than one _________________.
processor or core
638
3 Using your computer manufacturers support Web site or computers user manual,
determine the type of memory modules that your computer supports.
Answers will vary, but will include:
RAM type, such as DDR2 SDRAM
Package type, such as DIMM
Error correcting (ECC or non-ECC)
Memory speed, specified in MHz
Speed rating, specified as PC-#, PC2-#, or PC3-#
4 Using your Web browser, determine the cost to replace 2 GB of RAM for your
computer.
Answers will vary. For example, Dell sells a 2 GB memory module for its XPS 420 desktop for
$35.
71
Unit 7
Bus structures
Unit time: 45 Minutes
72
Topic A: Buses
This topic covers the following CompTIA A+ Essentials (2009 Edition) version 2.0
exam objective.
#
Objective
1.2
Computer buses
Explanation
Bus structures
73
Many expansion bus standards have been used over the years, but the PCI (Peripheral
Component Interconnect) bus, shown in Exhibit 7-1, is the predominant one, although
PCIe (PCI Express) is taking over. Others, such as the ISA, EISA, Micro Channel, and
PC bus, are rarely found today, unless youre working on an older computer.
74
Do it!
A-1:
Examining buses
Heres how
1 Shut down your PC and unplug it
from the outlet
2 Following proper ESD and
electrical safety precautions, open
your PC
3 Identify the expansion bus in your
PC
4 Are there connectors for the
address or data buses? Why or
why not?
5 Identify one or more devices that
connect to your computer through
the expansion bus
6 Does your PC have a riser bus?
7 Close your PC, plug it in, and start
it
Log on to Windows 7 as
COMPADMIN## with a
password of !pass1234
Heres why
Bus structures
75
System interaction
Explanation
Hardware and adapter cards must work together to access memory and CPU resources.
They must do so in an orderly manner so that they dont conflict with each other.
To avoid conflicts, hardware must perform the following functions:
Gain the attention of the CPU.
Access shared memory locations.
Extend the system BIOS.
Transfer data across the bus.
Interrupts
The CPU does the processing (or most of it) in a computer system. Devices must gain
the attention of the CPU in order to get it to do their work. The CPU is often busy doing
other work, so devices get its attention by sending an interrupt.
An interrupt is a signal that a device sends to the CPU to get its attention. For example,
whenever you press a key on your keyboard, the keyboard controller sends an interrupt
to the CPU. The processor stops whatever it was doing, reads which key was pressed,
and passes that keys code to the active application. From there, the CPU might return to
what it was doing before, depending on the priority of the tasks that need its attention.
Without interrupts, a CPU would have to poll each device, round-robin fashion, to see if
attention was needed.
IRQs
Computers rely on interrupts to provide an orderly way of gaining the attention of the
CPU. Not every interruption carries the same priority. Furthermore, the CPU must have
a way to determine which device interrupted it. These needs are met through IRQs, or
interrupt request lines.
Every device that uses interrupts is assigned an IRQ. IRQs are numerical identifiers
that, in most cases, are uniquely assigned to devices. The original IBM PC and XT-class
computers supported IRQ numbers 07. Beginning in 1982, the AT-class and similar
computers supported IRQs 015. Rather than redesigning the interrupt controller to
directly support the expanded IRQs, which would have made it incompatible with
existing operating systems, designers pulled a little trick. The new IRQs, 815, were
cascaded to IRQ 2. When a device sends an interrupt over IRQ 10, for example, that
IRQ is routed through IRQ 2. In this way, an OS that supports only the original IRQ set
still receives the interrupt. Additionally, because modern computers have many more
devices than older computers do, this architecture has seen further extensions in the way
the hardware and operating system address interrupts.
From 2000 forward, x86 systems have used an Advanced Programmable Interrupt
Controller (APIC) architecture to support more than 15 IRQs. An APIC architecture is a
programming interface for up to 255 physical hardware IRQ lines per APIC (the
distributed set of devices that make up an interrupt controller). In Intels model, there
can be as many as eight I/O APICs collecting interrupt signals from hardware devices.
Each I/O APIC has an arbitrary number of IRQs. Most Intel-based personal computers
have support for 24 IRQs per I/O APIC, although some have as many as 64.
76
Common use
System timer
Keyboard
Real-time clock
Various
10
Various
11
Various
12
PS/2 mouse
13
14
15
COM2
COM1
LPT1
Modern operating systems calculate and assign IRQs for you. With Windows, the
technique is called Plug and Play (PnP). Of course, the adapters you use must support
PnP. With such support, every time you start Windows, the BIOS determines which
IRQs are available, which devices need IRQs assigned, and what IRQs each device can
support. Then, the BIOS dynamically assigns IRQs to all devices youve installed, and
relays this information to Windows.
Bus structures
77
Device Manager
As shown in Exhibit 7-2, you can use the Windows Device Manager to determine which
IRQs have been assigned to the various devices in your computer. If you need to do so,
you can even manually assign IRQs, overriding the default assignments made by the
BIOS, which takes into account any IRQs that youve manually assigned when it
determines which IRQs remain available.
78
Do it!
A-2:
Heres how
Heres why
Choose Manage
2 In the navigation pane, select
Device Manager
Resources by type
Bus structures
79
I/O addresses
Explanation
Input/output addresses (I/O addresses) are a number range assigned to each device that
allows the CPU to communicate with it. A number range instead of a single number
allows the CPU to communicate multiple commands. Devices listen on the address bus
for their corresponding numbers and respond to the CPU when called.
As with interrupts, devices must work together to avoid using the addresses of the other
devices. To ensure this security, either you or the BIOS must configure a range of I/O
addresses assigned to each device in your computer. Common devices have preassigned addresses.
As shown in Exhibit 7-3, such I/O addresses are designated with 16-bit hexadecimal
numbers. In general, devices are assigned between 4 and 32 bytes of input-output
memory, though some get more or less than that.
A-3:
Heres how
Heres why
Input/output (I/O)
710
In the input/output scheme described so far, the CPU must be involved in every data
transfer with every device. While the CPU is certainly powerful, this involvement with
every data transfer can negatively affect performance. To improve performance,
designers created the direct memory access (DMA) controller, which is essentially
another processor chip to handle data transfers between devices and main memory.
DMA frees the CPU to perform other tasks.
The DMA controller communicates with each device over a dedicated channel. Each
device must have its own channel with the DMA controller. As with the other resources,
you or PnP must configure the DMA channel assigned to every device.
DMA has largely been replaced by newer techniques, such as bus mastering. For this
reason, DMA is generally used by core devices, such as the floppy disk controller,
whose designs havent changed significantly over time.
Do it!
A-4:
Heres how
1 Expand Direct memory
access (DMA)
Heres why
To display the DMA channel assignments on
your PC.
Bus structures
711
Memory addresses
Explanation
Some devices extend the system BIOS with new routines, or new versions of existing
routines. Display adapters are the most common type of device to do this, but IDE and
SCSI adapters also use BIOS extensions. These devices include their BIOS extensions
in a chip on their adapter card.
The system BIOS must locate and load these BIOS extensions. This means that the
adapter BIOS must be mapped to memory locations where the system BIOS can find it.
You, or PnP, must configure the memory address range of the devices BIOS. By
configuring this value, you provide a way for the operating system to access the system
routines contained on these devices.
As with the other resources, each device that requires a memory address assignment
needs its own unique assignment. PnP ensures that conflicting address ranges arent
assigned to devices in your computer. Historically these addresses have been in the
upper memory block (UMB) the space between 640KB (0x000A0000) and 1MB.
Exhibit 7-4 shows a list of memory address assignments in Device Manager.
712
Do it!
A-5:
Heres how
1 Expand Memory
2 What device seems to be using the
most memory within the base
memory address space?
3 Close Computer Management
Heres why
To display the base memory address
assignments on your PC
Bus structures
713
Objective
1.2
1.9
The PCI standard was developed by Intel Corporation and introduced in 1992. The
current crop of PCI adapters and expansion slots generally implement the PCI 2.0
specification, released in 1993.
The PCI specification supports bus speeds of either 33 MHz or 66 MHz. It also supports
both a 32-bit and 64-bit bus design, though the 32-bit version is much more popular.
With a 32-bit implementation at 33 MHz, the PCI bus supports a peak transfer rate of
133 MBps. In a 64-bit implementation at 66 MHz, the PCI bus supports a peak transfer
rate of 533 MBps.
PCI slots are shorter (in length) and taller than ISA slots. A graphic of PCI slots are
shown in Exhibit 7-1.
A PCI card is shown in Exhibit 7-5.
714
PCIe
Theres a newer specification, PCI Express (PCIe), that uses serial communication
instead of the parallel communication PCI uses. A connection between a PCIe device
and the system is known as a link. Each link uses a dedicated, bidirectional, serial,
point-to-point connection called a lane. In PCIe version 1.0, each lane can transfer 2.5
Gbps (0.25 GBps) of data simultaneously in each direction using 8b/10b encoding. A
link can use more than one lane at a time, but all links must support at least a single-lane
connection. This is referred to as an x1 (pronounced by-one) link. PCIe supports x1,
x2, x4, x8, x12, x16, and x32 bus widths.
PCIe cards cant connect to the system through PCI buses, but they are compatible with
software that uses the PCI standard. PCIe cards physically fit into slots designed for
their lane configuration or higher (up-plugging), but not into slots designed for lower
lane configurations (down-plugging).
Multifunction cards and maximum devices
The PCI specification supports multifunction cards, in which a single adapter provides
the functions of more than one expansion device. The specification permits up to eight
functions on a single card. Additionally, it permits up to five slots and cards per system.
So, in theory, through multifunction cards, you could add the equivalent of up to 40
expansion devices to your PC.
Do it!
B-1:
Heres how
1 Following all electrical and ESD
safety precautions, shut down
your PC and open the case
2 Locate a PCI slot
How many PCI expansion slots
does your computer contain?
How many of the PCI expansion
slots are in use? How many are
available?
3 Does your computer contain
expansion slots other than PCI?
Identify them
4 Leave the cover removed for the
next activity
Heres why
Bus structures
715
The video adapter is the component that generates the signals sent to your monitor. This
component can be built into your motherboard or can be an adapter card added to your
system later. Depending on the technology used, a video adapter can communicate over
an expansion bus.
Manipulating video data, such as drawing the dialog boxes and image content of a
typical Windows-based application, uses more system resources than most other
computer operations. Video display circuitry requires faster access and higher
bandwidth access to the CPU and memory than do any other subsystems in your PC.
Some video adapters are built into the motherboard. This arrangement is common on
low-end systems in which the manufacturers main goal is to make the machine as
inexpensive to the customer as possible. On other machines, the video adapter might be
installed in any of three types of slots: PCI, PCIe, or AGP. AGP and PCIe are wellsuited to transmitting video data at high speeds. Video adapters in most modern
computers are connected through one of these buses.
PCI-based video
PCI slotbased adapters are the slowest of the three types. These have to share the PCI
bus with all of the other PCI-based devices in the system. However, they work well for
implementing a two-monitor system if you are using two separate video cards. If there is
not an AGP or PCIe slot on your motherboard, this is your only option for upgrading the
video on your system.
PCIe-based video
PCIe cards are designed to replace AGP video cards in new systems. Motherboards that
support PCIe video cards became available in 2004. A x16 PCIe video card has a 4
GBps bandwidth in each direction. Theoretically, you can achieve 8 GBps capacity with
data moving upstream and downstream at the same time, because this is a dual-lane
technology. The high transfer speeds make this technology an ideal solution for
multimedia applications, such as gaming, photography, and videography. PCIe cards
have 22 control pins; a x16 slot has 186 pins. A x16 PCIe video card is shown in Exhibit
7-6. Youll find a comparison among PCI standards at tinyurl.com/ylpk4lw.
716
Bus structures
717
Exhibit 7-7: An AGP adapter (note the hook beside the edge connectors)
Characteristics
You will see AGP speeds referred to as #x. Using various techniques, the effective bus
speed of an AGP port is increased, or pumped, to a multiple of the standard speed.
The x in AGP specifications refers to how many times data is transferred during each
clock cycle. For example, an AGP 3.0 8x slot transfers data 8 times per clock cycle,
making it 8 times faster than the bus speed. The maximum speed would be 2.13 GBps,
assuming an effective clock rate of 533 MHz for the PCI bus.
You might encounter some older systems with slower bus speeds. AGP 1.0 was released
with both 1x and 2x speeds. AGP Pro was released for cards that required more power.
The AGP 2.0 4x bandwidth is up to 1.06 GBps on a virtual 266 MHz bus system. The
AGP 2.0 2x slot would have a bandwidth of up to 533 MBps on a virtual 133 MHz bus
system. This and other information about AGP is summarized in the following table. All
bus widths are 32-bit.
AGP
version
Speed
Pumping
Frequency
Max. data
transfer
Voltage
1.0
1x
Single
66 MHz
266 MBps
3.3 or 1.5 V
1.0
2x
Double
66 MHz
533 MBps
3.3 or 1.5 V
2.0
4x
Quad
66 MHz
1066 MBps
3.3 or 1.5 V
3.0
8x
Octuple
66 MHz
1.5 or 0.8 V
718
AGP slot
B-2:
Heres how
1 Identify the standard used by your
current graphics card
2 Identify the options available in
your PC for adding a graphics
card
Heres why
Bus structures
719
In this topic, you learned that a bus is a communication pathway. Your PC has three
categories of buses: address, data, and expansion. You then learned that interrupts
are signals sent by a device through a controller chip to the CPU when the device needs
attention. Devices also use I/O addresses, which receive communication from the CPU,
and DMA channels, which help to speed transfers. Some devices also extend the BIOS,
requiring you to configure base memory addresses, each of which defines the
beginning of a memory range that contains the BIOS extension.
Topic B
In this topic, you learned that the PCI bus, a 32-bit or 64-bit standard, is currently the
most prolific expansion bus. It supports PnP and shared system resources and is
considerably faster than previous bus technologies. You also learned that the PCIe bus
is quickly replacing the PCI bus as the standard. You then learned that video adapters
can use either the AGP or PCIe. Both offer improved throughput to improve video
display performance.
Review questions
1 Which PC bus is responsible for transmitting memory addresses?
A Address
B Data
C Expansion
2 Which bus is used to enhance PC functionality?
A Address
B Data
C Expansion
3 By convention, PCI slots are typically which color?
A Brown
B Gray
C Tan
D White
4 Typically, the PCI bus is a(n) ____-bit bus.
32
720
81
Unit 8
Expansion cards
Unit time: 120 Minutes
components of a modem.
D Identify the symptoms, probable causes,
82
Objective
1.2
1.7
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
1.1
Expansion cards
83
Video adapters
Explanation
Video adapters convert computer data to the signals required to produce the images that
you see on your screen. In the early generations of PCs, video adapters created just text
output, and often monochrome output at that. Nowadays, video adapters create the
signals necessary to display full-color and full-motion images and video.
Due to the enormous amount of information that must be manipulated by the adapter to
produce these signals, modern video adapters are almost computers in their own right.
They often feature a specialized processor chip and lots of on-board memory. Perhaps
even more than the CPU type or amount of memory in your system, the video adapter is
the component most responsible for the overall performance of your PC.
Creating an image
Although monitors arent the subject of this unit, a brief look at how they work will help
you understand why video adapters work the way they do. A traditional TV-style
monitor creates an image when a stream of electrons hits a phosphorescent coating on
the inside of the screen. In the earliest monitors, this coating would glow green in the
presence of the electron beam and remain black when it wasnt being hit with electrons,
hence the green and black of early monitors. Later developments in phosphor coatings
permitted the display of red, green, and blue glows that, when combined, produced a full
range of colors.
This electron beam is very narrow, hitting a spot on the screen barely a quarter of a
millimeter across at any particular time. To create a full-screen image, the beam is
moved rapidly back and forth across the screen, from the top to the bottom of the
screen, many times a second. To create a flicker-free image, the beam must paint out the
full screen image at least 60 times every second.
The rate at which the image is painted is called the refresh rate. With some early video
display standards, the full image couldnt be refreshed entirely in a single pass. These
systems used interlacing, in which the odd lines of the image were painted during one
pass of the beam and the even lines were painted during a second pass. Such interlaced
displays often suffered badly from flickering. This occurred because the effective
refresh rate was half the specified rate (30 Hz instead of 60 Hz, or 42 Hz instead of 84
Hz).
Resolution
An image to be displayed, whether its text or a picture, is divided by the display
adapter into a series of dots called pixels (adapted from picture elements). Officially,
a pixel is the smallest addressable unit of a picture. A monitors resolution is the
number of pixels across and down that an adapter can create.
CRT monitors use groupings of three subpixels, one each of red, green, and blue. These
three subpixels are arranged in a triangular pattern or as stripes, either of which is small
enough to appear as a single dot. A separate electron gun illuminates each color of
subpixel. LCD monitors use three colored stripes, though they use a backlight rather
than electron guns to illuminate the subpixels.
84
Maximum number
of colors
Bytes of storage
per pixel
Descriptive name
1/8
Monochrome
16
1/2
VGA
256
SuperVGA
16
65,536
High color
24
16,777,216
True color
Expansion cards
85
The following table lists the popular video standards developed by IBM.
Standard
Text mode
resolution
Graphics
mode
resolution
Text mode
matrix
(W H)
Maximum
number of
colors
Maximum
refresh
rate
Monochrome
Display Adapter
(MDA)
8025
n/a
914
2 (black and
green/amber/
white)
50 Hz
Hercules
Graphics Card
(HGC)
8025
720348
914
2 (black and
green/amber/
white)
50 Hz
Color Graphics
Adapter (CGA)
8025
640200
(mono) or
160 200
(color)
88
16 in text or
low-resolution
graphics modes,
4 colors in
high-res
graphics
60 Hz
Enhanced
Graphics
Adapter (EGA)
8025
640350
88
16 out of a
palette of 64
60 Hz
Video Graphics
Adapter (VGA)
Emulation of
EGA and
other early
modes, or via
graphics
emulation of
text mode
640480
Emulation of
EGA and
other early
modes
16 at 640480,
or 256 at
320240
resolution, out
of a 262,144color palette
60 Hz
Aspect ratio
The aspect ratio defines the relationship between the width and height of a display (or of
a display resolution). A 4:3 monitor, for example, is four units wide for every three units
tall. A resolution of 800x600 is an example of such a ratio4x200 wide by 3x200 high.
Most traditional or historical computer display resolutions use 4:3 aspect ratios.
Modern, widescreen computer displays, such as a 1440x900 widescreen monitor, have
an 8:5 (or 16:10) aspect ratio.
SuperVGA
VGA was the last widely accepted standard created by IBM. Shortly after it was
introduced, VGA was superseded by the capabilities of third-party graphics adapters.
Although the offerings from many of these vendors came to be called SuperVGA,
there was no official standard beyond VGA.
86
Connectors
MDA, HGC, CGA, and EGA video adapters produced a digital signal. This signal was
sent to the monitor via a 9-pin DIN connector. Beginning with VGA and continuing to
modern video displays, video-out signals are typically analog. The typical VGA
connector (used also by most of the modern XGA standards) is a 15-pin connector
officially called a DE-15 connector, as shown in Exhibit 8-1.
Expansion cards
87
88
Expansion cards
89
HDMI is fully compatible with DVI-D and DVI-I. DVI-D, DVI-I, and HDMI use the
same encoding scheme, so a DVI-D or DVI-I source can be connected to an HDMI
monitor (or vice versa) with a DVI/HDMI converter cable. One end of the cable is
HDMI, and the other DVI-D or DVI-D. HDMI isnt compatible with DVI-A.
A-1:
Heres how
1 If necessary, shut down your PC
and open its case
2 Examine the adapter cards in your
computer
Which cards can you use to attach
a monitor?
3 What type of bus is each card
connected to?
For each video card in your
computer, does it support analog,
digital, or both?
4 Examine each of the video adapter
cards provided by your instructor
Identify the type of each card
For each card, does it support
analog, digital, or both?
Heres why
Follow electrical and ESD safety precautions.
810
Expansion cards
811
Drivers
Drivers are utilities that enable a devices functionality. Every expansion device or
adapter card in your PC requires a driver. Some drivers are supplied with the operating
system. Other devices require drivers supplied by the device manufacturer.
Device vendors often supply their drivers to Microsoft. If Microsofts Windows
Hardware Quality Labs (WHQL) determines that the driver doesnt destabilize
Windows, they digitally sign the driver. At that point, Microsoft either includes the
driver in the operating system files or make the driver available on the Windows Update
Web site. Sometimes, however, you need to use the drivers supplied with your
expansion device, either on a CD that comes with it or on the vendors Web site.
Inserting cards
In general, youll follow these steps to install an expansion card in a PC. Expansion
cards include graphics, sound cards, storage controllers (IDE, SCSI, SATA, eSATA,
RAID), I/O cards (FireWire, USB, parallel, serial), network cards (wired and wireless),
video cards, capture cards, and media readers. Although exact steps might vary for
specific hardware, you will generally follow these steps to install an expansion card:
1 If youre not using a PnP-compatible expansion card or operating system,
determine the available system resources (IRQs, I/O addresses, and so forth).
Configure the DIP switches or jumpers on the card, as necessary, to assign
available system resources to it.
If youre using a PnP-compatible card and operating system, the vendor might
direct you to run an installation utility before installing the device. This
installation program puts the necessary drivers in a location where Windows can
find them when youre done installing the device. If appropriate, run that setup
program.
2 Shut down the PC, unplug it, and open the case. You might want to remove any
peripheral cables before opening the case. You might need to do so simply to
move the PC to a convenient work location. Removing the cables also prevents
static discharges from traveling from the PC to the peripheral. Also, doing so
prevents an electrical fault in the peripheral from conducting to the PC while
youre working on it.
3 Locate an empty and available expansion slot of the correct type.
4 Remove the cover for that slot. These covers are generally either screwed in
place or held by spring-clips.
5 If necessary, move or remove wires or other expansion cards that are in the way,
so that you can access the slot.
6 If you need to connect wire assemblies to the expansion boardnot to its back
slot cover plate, but to the board itselfconnect that end of the wire assembly
before installing the card. That way, you can easily reach the connector and be
sure youre installing the wire assembly in its correct orientation. Connect the
other end after youve installed the card.
7 Begin inserting the end of the edge connector thats farthest from the slot cover.
When the edge connector is level with the slot, gently push the card into place in
the slot. This helps you line up the connector correctly. Inserting the card at an
angle is usually easier than pushing it straight into the slot.
8 Fix the card in place with screws or clips, as appropriate to the cases design.
9 Connect any wiring assemblies, including those you temporarily removed to
install this card.
812
Expansion cards
Do it!
A-2:
813
Heres how
Heres why
814
Objective
1.2
1.9
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
1.1
Before the introduction of the sound card, PCs could produce simple beeps and clicks
through an on-board speaker. Such a speaker is still included in nearly every PC, but on
its own it has never been capable of producing music, computerized voices, and other
tones.
The ProAudio AdLib sound card, and later the Creative Labs SoundBlaster card,
revolutionized PC sound. These cards provided the ability to output music in addition to
the various beeps and other tones. With such cards, you could also input sound by
connecting an audio device, such as a tape player, to the input jack. The card would
digitize the sound for use or storage on your computer.
The SoundBlaster Pro is still considered the base standard with which all other sound
cards typically comply. Most sound cards provide features beyond those available in the
SoundBlaster Pro.
Sound card functions
To produce a signal for your speakers, a sound card must convert digital data into
analog sound waves. To enable you to input, or capture, audio, the sound card must also
convert analog sound signals into digital signals. Older sound cards enabled you to
connect a game device, such as a joystick or game paddle, and many of those also
enabled you to connect MIDI (musical instrument digital interface) instruments.
Nowadays, such functions are most often enabled through USB, FireWire, or even
wireless links.
Expansion cards
815
Components
Exhibit 8-7 shows a sound card. To perform its functions, a typical sound card includes
these components:
Digital signal processor (DSP) Functions like a CPU for sound processing
functions.
Analog-to-digital converter (ADC) Converts analog signals (such as sound
waves) to digital signals.
Digital-to-analog converter (DAC) Converts digital signals to analog,
producing the signals needed by speakers or other analog audio devices.
Various jacks Used to connect speakers, microphones, line-input or lineoutput devices, game adapters (joysticks), and sometimes MIDI devices.
Center speaker
Microphone
Rear speakers
Line in
816
B-1:
Heres how
1 Examine the sound card provided
by your instructor
What connectors do each of them
include that your computers
sound card doesnt?
2 Identify the connectors included
on your sound card
Heres why
You will install this sound card in your
computer in the next activity.
Expansion cards
817
818
Do it!
B-2:
Heres how
Heres why
Expansion cards
819
Objective
1.2
1.9
4.2
Modems
Explanation
Modems are devices that enable you to connect your computer to another computer
through a phone line. The modem in the sending computer must convert the digital
signals within the computer to analog signals that are compatible with the phone system.
The receiving modem must convert analog signals to digital signals.
Modulation and demodulation
Modems convert a digital signal into an analog one through a process called
modulation. The digital signal is layered over a standard analog wave to produce a
composite analog wave. To convert the composite signal back to digital, the receiving
modem demodulates it. Demodulation is the process by which the modem electronically
subtracts the carrier analog wave, revealing the digital signal it carries.
A modem gets its name from this process. It modulates and demodulates; hence its
called a modem.
Forms
A modem can be an external component that you connect to your PC through a serial
port. (In fact, that was the original purpose of serial ports on PCs.) Internal modems are
also common. These modems can be built into the motherboard, implemented on an
adapter card that you insert into your PCs expansion bus, or implemented on a card that
you insert into a riser slot.
820
Expansion cards
Do it!
C-1:
821
Heres how
1 If necessary, shut down your PC
and open its case
Heres why
Follow electrical and ESD safety precautions.
7 Expand Modems
8 Right-click your modem and
choose Properties
822
Modem connections
Modems use phone lines to communicate with other computers. You connect your
modem to a phone line by using a standard phone cord. Such cords feature RJ-11
connectors, which are square connectors with six pins. Analog phones and modems use
just two of those wires. Digital phones use four or more. The wires in a phone cord are
crossed from end to end: pin 1 on one of the RJ-11 connectors goes to pin 6 on the other
RJ-11 connector, pin 2 goes to pin 5, and so forth.
Exhibit 8-11: Modem jacks, showing the line and phone connection points
Expansion cards
823
C-2:
Heres how
Heres why
824
Objective
2.5
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
1.2
Expansion cards
825
Updating drivers
Explanation
Often one of the solutions to hardware problems involves obtaining and installing
updated device drivers. As a device is put in use by users, the manufacturer might find
that the driver needs to be changed due to conflicts or faulty code, or just to make the
device function more efficiently.
Although most devices are packaged with drivers, some of them might not be the most
up-to-date. In addition, Windows might not install the best drivers for your new device
if its installed with PnP. At some point, you might need to find additional drivers on the
Web, most likely from the device manufacturers Web site.
Most manufacturers offer free downloads of drivers and utilities for their devices. Just
find the name of the manufacturer and visit the appropriate Web site. Look for a link
that offers drivers, support, or downloads. Then download the driver (which is
sometimes zipped) to a local hard disk, from where you can install it on the appropriate
computer.
After youve found an updated device driver, you can install it. With self-installing
drivers, simply run the installation program. For other drivers, open Device Manager,
view the properties of the device and click the Update Driver button. Then, point the
wizard to the location of the new driver.
Do it!
D-1:
Heres how
1 In Device Manager, pick a device you want to update (maybe one of the devices
you installed or maybe a display adapter). Write down the manufacturers name
and the model of the device.
2 Visit the manufacturers Web site. (Use a search engine if you have to.) On the
Web site, find the link for support, downloads, or drivers.
3 Find the drivers for the device you chose. Download them to your computer and
save them on the desktop.
4 In Device Manager, right-click the device and choose Update Driver
Software. Dont search for a driver automatically; choose to browse your
computer for driver software and navigate to the folder on your desktop.
Complete the wizard, clicking Have Disk if prompted. Update the drivers if
theyre the same version or newer.
5 If necessary, restart the computer. Use Device Manager to verify that the device is
working properly.
826
Probable cause
Suggested solution
No video at all
Video flickers
Video is blurry
Monitor is failing.
Video is connected to
DVI connector, but
monitor displays
message that analog
connection is
disconnected
Expansion cards
827
Sound cards
The following table lists sound card problems you might encounter.
Symptom
Probable cause
Suggested solution
No sound
Sound is very
low
Sound is
distorted
No audio
captured
No audio
from CD
828
Probable cause
Suggested solution
Modem picks up
line and dials, but
doesnt connect
Modem reports
no dial tone
detected
Connection drops
frequently
Modem connects,
but only at low
speeds
Modem doesnt
work at all
Configurationrelated error
messages
Expansion cards
829
D-2:
Heres how
1 One or more expansion cardrelated problems have been introduced into your lab
computer. Troubleshoot these problems to determine their cause(s).
2 Correct the problems youve found in your PC to return it to a working state.
Solving one problem might reveal the presence of another one. Troubleshoot and
fix all problems that arise.
3 Document the problem(s) you find:
830
In this topic, you learned that video adapters convert computer data into the signals
that are sent to the monitor for display. You learned that resolution is the number of
pixels that an adapter can create and that color depth (or pixel depth) defines the
number of colors that can be displayed. You also learned about the various video
display standards, including CGA, EGA, and VGA. In addition, you identified the
various connector typesVGA 15-pin DE-15, DVI-I, DVI-D, DVI-A, and HDMI.
Topic B
In this topic, you learned that sound cards produce music and tones to be played on
external, powered speakers. Before the advent of sound cards, computers could create
beeps and clicks through on-board speakers. Sound cards typically exceed the features
of the SoundBlaster Pro sound card.
Topic C
In this topic, you learned that modems enable you to connect to remote computers over
telephone lines. Modems convert digital signals to analog, and then back again. You
learned about the riser slot types, which are sometimes used for attaching internal
modems to motherboards.
Topic D
In this topic, you learned that expansion cards can fail for various reasons, and you
learned how to update hardware device drivers and troubleshoot expansion cards. You
also examined common symptoms of failures and the probable causes and suggested
solutions.
Review questions
1 The rate at which an image is painted on screen is called which of the following?
A Interlacing
B Pixel depth
C Refresh rate
D Resolution
2 The number of pixels across and down that an adapter can create is called what?
A Interlacing
B Pixel depth
C Refresh rate
D Resolution
3 Which DVI connection types support both digital and analog signals? [Choose all
that apply.]
A DVI-D single link
B DVI-D dual-link
C DVI-I single link
D DVI-I dual-link
Expansion cards
831
A DVI-A
B DVI-D
C DVI-I
D HDMI
E VGA/SVGA
5 Which of the following is necessary to produce a signal for your speakers?
A Converting analog waves to digital signals.
B Converting digital data to analog waves.
C No conversion is necessary.
6 Which of the following are best-practice guidelines for avoiding electrostatic
discharge? Select all that apply.
A Unplug the computer before opening.
B Work at a static-safe workstation.
C Ground yourself to the buildings electrical ground.
D Handle cards by their edges or cover plates.
7 True or false? Riser cards are a common way to connect an internal modem in a
modern PC.
False. Riser cards never became popular, and PCI remains the most popular expansion bus type
for internal modem cards.
8 True or false? The cables you use to connect a modem to a phone jack have RJ-45
connectors.
False. Such cables use an RJ-11 connector.
9 Your computer produces no sound, yet you know that it has a sound card installed
and speakers connected. What is a possible cause of the problem?
The sound is muted or the volume is set at or near zero.
10 A customer tells you that the image on her monitor flickers and is giving her
headaches. Which of the following is the most likely cause of the problem?
A Color depth set too high.
B Refresh rate set too low.
C Video card driver is out of date.
D Pins in the video connector are bent or broken.
832
91
Unit 9
Peripheral connection types
Unit time: 105 Minutes
and connectors.
C Identify and connect USB ports, cables,
and connectors.
D Identify and connect FireWire ports,
92
Objective
1.2
1.8
1.9
1.11
Ports
Explanation
A port is a connector into which you can plug cables from external devices, or
sometimes, plug in the devices themselves. Two ports that have been available from the
earliest PC models are the serial and parallel ports.
Serial and parallel transmission
Serial transmission is a technique in which bits of data are sent, one at a time, across the
transmission medium. You can imagine the bits marching single-file down a single data
transmission wire (or across a single wireless transmission channel), as illustrated in
Exhibit 9-1. Special sequences of bits delineate data from associated control
information, such as marking the beginning and end of bytes or blocks of data.
93
Serial ports
Serial ports are the connectors into which you plug devices that use serial transmission
to communicate with your PC. While many types of devices and ports use serial
transmission, when most people speak of serial ports, they mean the communicationsoriented ports to which you connect devices such as modems. These ports are called the
communication or COM ports.
The basic PC hardware supports four COM ports: COM1, COM2, COM3, and COM4.
You can use only two of those at any one time. Windows supports software emulation
of additional COM ports, when extra ports are necessary. Therefore, you might find PCs
with higher-numbered COM ports.
System resources
By default, COM ports use the system resources listed in the following table.
Port
IRQ
COM1
03F8-03FF
COM2
02F8-02FF
COM3
03E8-03EF
COM4
02E8-02EF
COM ports 1 and 3 share the same IRQ, and COM ports 2 and 4 share the same IRQ.
This means that you cant have COM ports 1 and 3 (or 2 and 4) enabled at the same
time unless you reconfigure one of the ports to use a different IRQ.
94
Description
Port speed
The rate, in bits per second, at which data communications proceed over the COM
port. This speed controls how fast your computer interacts with the serial device (not
the communications speed of the device itself).
Consider an external modem: the port speed determines the speed at which your PC
and modem interact. The modem might communicate over the phone line either
faster or slower than that rate. If it communicates faster than the port speed, it has to
buffer data destined for the PC.
Data bits
Start/stop bits
The number of bits added before and after the data to designate the beginning and
end of the data within a block. Often, this value is configured as just the stop bits.
Parity
The error checking method used over the COM port. Options are:
None Parity checking is disabled.
Even If the sum of the data bits is an even number, the parity bit is set to 0. If the
sum is odd, the parity bit is set to 1. In this way, the sum of data and parity bits is
always an even number.
Odd If the sum of the data bits is an odd number, the parity bit is set to 0. If the
sum is even, the parity bit is set to 1. The sum of data and parity bits is always an odd
number.
Mark The parity bit is always set to 1.
Space The parity bit is always set to 0.
Flow control
A means by which communications over a serial port can be slowed down or even
stopped to permit the devices involved to keep pace with communications. Options
are:
None Flow control is disabled.
Hardware Devices use a separate flow-control wire, within the serial cable, to
send handshaking signals. Through these signals, devices can start and stop the
communications.
Xon/Xoff A software handshaking technique in which Transmit On (Xon) and
Transmit Off (Xoff) signals are sent over the same data communications line that
transmits the data. The receiving device sends the Xon and Xoff signals to the sender.
Xoff is ASCII character 19 (equivalent to the Ctrl+S key combination), and Xon is
ASCII 17 (Ctrl+Q).
95
Serial cables
Standard serial cables come in the following types:
EIA/TIA-232
EIA/TIA-449
V.35
X.21
EIA/TIA-530
The maximum distance for a serial cable depends on the data rate. In general, the slower
the data rate, the longer the maximum distance can be without signal degradation. The
following table lists the various data rates and corresponding recommended maximum
distances for the various types of serial cables.
Data
rate
EIA/TIA-232
2400 bps
60 meters
1250 meters
4800 bps
30 meters
625 meters
9600 bps
15 meters
312 meters
19200 bps
8 meters
150 meters
38400 bps
4 meters
75 meters
56000 bps
3 meters
30 meters
Not supported
15 meters
96
Pin 5
Pin 1
A-1:
97
Heres how
Heres why
Parallel ports
Explanation
Parallel ports are the connectors into which you plug devices that use parallel
transmission to communicate with your PC. Most often, when people speak of parallel
ports, theyre referring to the ports used for printers. These ports are called the LPT
ports. LPT stands for line printer, reflecting the use of this sort of printer with earlymodel PCs.
The basic PC hardware supports two LPT ports: LPT1 and LPT2. Additional LPT ports
can be added through expansion adapters. Many modern printers dont use the LPT port
at all, instead using the newer and more capable USB port.
System resources
By default, LPT ports use the system resources listed in the following table.
Port
IRQ
LPT1
n/a
0378 - 037F
LPT2
n/a
0278 - 027F
n/a
03BC - 03BF
Because LPT devices are used for output, these devices dont need to signal the
processor. Thus, LPT ports arent typically assigned IRQs for printing in Windows. By
default, in all Windows 7 versions, all Windows Vista versions, all Windows XP
versions, and Windows 2000 Professional, the parallel port driver doesnt assign an
interrupt.
98
99
Parallel port
910
Exhibit 9-7: Printer cables have DB-25 (left) and Centronics connectors
Do it!
A-2:
Heres how
1 Locate the parallel port on your
PC, and describe how you know
that its the parallel port
Heres why
911
Objective
1.2
1.8
Input devices
Explanation
Keyboards, mice, and trackballs typically attach through keyboard and mouse ports on
the back of the PCs case. Other input devices, such as pens (styli) or touch screens,
typically connect to a USB or specialized port. In this topic, youll focus on the
keyboard and mouse ports.
Keyboard ports and connectors
The typical modern keyboard port is a round, six-pin mini-DIN port, about a quarter
inch in diameter. Exhibit 9-8 shows this port. Its typically called a PS/2 port because
it was used for the first time with that model of IBM PC.
912
913
914
Exhibit 9-14: A bar code reader and a keyboard connected to the keyboard port
B-1:
915
Heres how
1 Power down your computer
Heres why
If your computer has a USB keyboard and
mouse, you will need a PS/2 keyboard and
mouse for this activity.
916
You can customize a mouse to suit a users needs and work preferences. For example, if
the user is left-handed, you can configure the right button as the primary button and the
left button as the secondary button. The user can then use the right button for doubleclicking, dragging, and selecting, and the left button for opening shortcut menus. You
can also change the speed with which the mouse pointer moves across the screen.
To access the mouse properties, open Control Panel. Click Hardware and Sound and
then, under Devices and Printers, click Mouse.
The Mouse Properties dialog box contains five tabs, described in the following table.
Tab
Used to
Buttons
Specify whether the mouse is set for right-hand or left-hand use. You can also set the doubleclick speed and activate ClickLock.
Pointers
Pointer
Options
Specify how you want the pointer to act on screen, including speed and visibility, and enable
or disable the Snap To feature.
Wheel
Specify the number of lines the screen moves for each wheel notch in both the horizontal and
vertical directions.
Hardware
Open the Properties dialog box for your specific brand and model of mouse, so you can work
with the mouse driver. If you open the mouses Properties dialog box through this method,
some of the driver buttons might be grayed out; thats a UAC feature.
B-2:
917
Heres how
1 Open Control Panel
Heres why
From the Start menu.
By default, the mouse is configured for righthanded use. The double-click speed is set
halfway between Slow and Fast.
918
Click Apply
919
Keyboard properties
Explanation
You can also change the keyboard properties. In Windows 7, to do so, open Control
Panel, and under Hardware and Sound, click Devices and Sound, and right-click your
keyboard and choose Keyboard settings. In Windows Vista, open Control Panel, and
under Hardware and Sound, click Keyboard.
The Keyboard Properties dialog box has two tabs: Speed and Hardware. As described in
the following table, youll most likely use the Speed tab to change keyboard settings.
Property
Tab
Description
Character repeat:
Repeat delay
Speed
Character repeat:
Repeat rate
Speed
Specifies how quickly a character is repeated when you hold down its
key.
Speed
Specifies the rate at which the insertion point blinks on the screen.
Device
Hardware
920
Do it!
B-3:
Heres how
1 In Control Panel, switch to Small
icons view
Heres why
In the View by list.
Click Keyboard
2 Under Cursor blink rate, drag the
slider bar to the right
3 Click Cancel
921
KVM switches
Explanation
KVM stands for keyboard, video, mouse. A KVM switch is a hardware device that
allows you to connect multiple computers to a single keyboard, video display, and
mouse. Each computer is connected to the box through a cable set provided with the
box. The keyboard, video display, and mouse are connected to the specified ports on the
box.
You use a manual switch on the front of the device or a keyboard shortcut to select
which computer you want to use with the keyboard, display, and mouse. Typically, a
light on the front of the switch box will light up, indicating which computer has control
of the keyboard, video, and mouse, as shown in Exhibit 9-17.
Indicator light:
computer is
controlling the
keyboard,
video, and mouse
Indicator lights:
computer is turned on
Selector switch
Keyboard
Master video,
keyboard, and
mouse connections
Mouse
Video
922
B-4:
Heres how
1 Examine the KVM switch
provided by your instructor
Heres why
You will work with at least one other student to
connect your computers up to the same monitor,
keyboard, and mouse through the KVM switch
923
924
Objective
1.2
1.8
1.9
1.11
925
Description
Host
Theres just one host per bus. This class is responsible for managing the USB
bus. The host provides power to devices and manages the configuration process
thats followed when devices are added or removed. A system might include
multiple hosts, each representing a separate USB bus. Windows Device Manager
identifies the host as a Hub or Controller.
Device
This class is divided into two subclasses: Functions and Hubs. The Functions
subclass includes the peripherals that you connect to the USB bus. Equipment in
this class can send and receive data over the bus, and control the flow of data.
These are the devices themselves, such as keyboards, mice, external drives, and
so forth. The Hub subclass (not to be confused with the Windows labeling of the
Host as a hub) defines the expansion devices that provide no functionality other
than providing more USB ports.
Audio
Communication
s device
HID (Human
Interface
Device)
Keyboards, mice, joysticks, and steering wheels; Point of Sale (POS) devices, such as
barcode scanners and scales; and arcade devices, such as coin changers, general input
and output devices, and other arcade devices.
Imaging
IrDA Bridge
Mass storage
Hard drives and optical drives; card readers (for CompactFlash, Memory Stick, Secure
Digital, and other memory cards); and digital cameras that use the mass storage
interface (they appear to the operating system as a drive letter rather than enabling
camera-specific functions).
Monitor
Monitors.
Printer
Printers.
Video
926
Transfer rates
Notes
USB 1.1
12 Mbps
USB 2.0
USB 3.0
927
Exhibit 9-23: Device Manager, showing both USB 1.1 and USB 2.0 hubs
Physical characteristics
USB ports and connectors come in two shapes, generally called Type A and Type B.
Both types use four pins or conductors. Type A ports and connectors are wide and flat
and are used at the PC end of a USB-to-device connection. If the device uses a
removable cable rather than a permanently connected one, it uses the Type B connector.
These two port and connector types are shown in Exhibit 9-24 and Exhibit 9-25.
928
929
External USB hubs are available in powered and unpowered versions. An unpowered
USB hub does not provide power to the bus and simply passes through the power
provided by the host. A powered hub uses an external power supply and provides bus
power to the ports it supplies.
You might need to use a powered USB hub to provide sufficient power on the bus, even
if youre connecting only low-power devices such as webcams. Such devices will fail to
initialize, or connectivity might intermittently fail, if theres insufficient power on the
bus. Factors, such as the devices in use, how many are attached, and the cable lengths
involved determine if you need to use a powered hub to provide extra power.
Installing USB devices
Typically, you must run an installation or setup program supplied with your USB device
before connecting it the first time. This operation puts device drivers into your Windows
system folder, where Windows can locate them. Only after running this program should
you connect your USB device. Depending on the device and driver, you might be
prompted to restart your computer during these steps.
Devices that connect via the USB port include:
Barcode readers
Keyboards
Mice
Touch-screen monitors
Multimedia devices, such as Web cameras, digital cameras,
and MIDI controllers
Scanners
Printers
Biometric devices, such as fingerprint readers
KVM switches
External storage devices, such as hard disks and optical drives
930
Do it!
C-1:
Heres how
1 Locate one or more USB ports on
your PC
Heres why
Systems often include ports on both the front
and back of the unit.
931
Objective
1.2
1.8
1.11
IEEE 1394
Explanation
932
933
934
Do it!
D-1:
Heres how
1 Locate one or more IEEE 1394
ports on your PC
Heres why
Many PCs do not include these ports on the
motherboard. Theyre added through expansion
cards instead.
935
Objective
1.2
1.7
1.8
1.9
936
Center speaker
Microphone
Rear speakers
Line in
Main (front) speakers
or headphones
937
The line-out port is used to connect a device being used as an output device. If a
separate speaker port isnt included, the speakers usually connect to this port. Its
usually identified by Line-out, Output, or a symbol or arrow indicating an outward
path. If color coding is used for the ports on the system, this port is lime green.
The mic port is used to connect a microphone. This port is usually indicated by the word
Mic or a picture of a microphone. If color coding is used for the ports on the system,
this port is pink.
Speakers
You hear operating system and application sounds through the speakers. A system with
a CD or DVD player can play music or video, and the audio portion will be played
through the speakers. Exhibit 9-30 shows speakers connected to a computer.
938
Exhibit 9-31: Speakers connect to each other and then to the computer
Some sound cards (or motherboards) feature separate connectors for the various
speakers in a surround-sound system. Others have a single 1/8" port to which you
connect all of the speakers in the system. Consult your computers owners manual for
information about connecting your speaker system.
Microphones
Microphones can be used with a computer to record sounds. The microphone connects
to a microphone port on the sound card. To identify this port, look for a picture of a
microphone, the word Mic, or a pink port, if its color-coded. Exhibit 9-32 shows a
microphone and the port to which you connect it on a computer.
Microphone port
939
E-1:
Heres how
1 Connect the speakers to each
other
Heres why
If necessary, refer to the documentation for
information on how to connect the speakers
together.
940
941
You might encounter computers with RCA connections for connecting video devices
and/or cable-TV cable. These are on a separate card from the sound card. They are often
used for connecting VCRs or video cameras that dont have FireWire or USB ports to
transfer the analog images to the computer for conversion to DVDs or for use in digital
editing applications. Exhibit 9-34 shows RCA connectors on a PC.
RCA connectors
S-Video
FireWire
USB
942
943
S/PDIF
Sony/Philips Digital Interface (S/PDIF) is a standard developed by Sony and Philips for
digital audio transfer. This connection is found on CD and DVD drives. It connects to
an S/PDIF connector on a sound card or on the motherboard.
Because they are digital rather than analog, S/PDIF connections eliminate the need to
convert digital CD or DVD data to analog. And because the signal doesnt have to be
converted, S/PDIF eliminates the noise that would be created during the signal
conversion and would lower the audio quality.
In addition to internal drives, you can have external S/PDIF connections. These are
typically added through a card dedicated to digital multimedia connections. External
devices using S/PDIF connections include home theater receivers and professionalquality CD and DVD players. The external devices connect via either a square
connector or a coaxial connection. Examples of these are shown in Exhibit 9-37.
Coax S/PDIF
connectio ns
Square S/PDIF
optical connections
944
Do it!
E-2:
Heres how
1 Determine which of the
multimedia connections are
available on your computer
2 Connect one or more devices to
the appropriate port(s)
3 If you needed to connect a game
system to your computer, what
connection would you most likely
use?
Heres why
Remember, S/PDIF connections are likely to be
internal, if theyre available.
945
Objective
1.2
1.4
As a PC technician, you should be familiar with the most common symptoms, probable
causes, and suggested first try solutions for port, cable, and connector problems. The
following tables list problems, probable causes, and suggested solutions for the
following equipment:
Serial ports, cables, and connectors
Parallel ports, cables, and connectors
PS/2 ports, cables, and connectors
USB ports, cables, and connectors
IEEE 1394 ports, cables, and connectors
Wireless ports
Multimedia ports
You might encounter problems not listed in the tables that follow, but they provide a
few scenarios to consider when youre troubleshooting problems. The information listed
is the same not matter if the port in question is on the front of your computer or the
back.
946
Probable cause
Suggested solution
PC cant detect or
connect to external
modem
Probable cause
Suggested solution
Parallel port
inaccessible
947
Probable cause
Suggested solution
No Keyboard Found
BIOS error
No mouse pointer, or
pointer wont move when
you move the mouse
Probable cause
Suggested solution
Cant connect to or
use USB device
Motherboard doesnt
support USB; device is
turned off or not
connected.
Unknown Device
in Device Manager
Detach the USB device, install drivers for it, and reattach it. Alternatively, use Device Manager to
remove the device and the USB host controller from
the operating system, and then reboot. Windows will
detect the host controller and re-install operating
system support for it.
948
Probable cause
Suggested solution
Device is unsupported.
Device disappears
from Device Manager
after installation
System stops
responding after you
connect the device
Multimedia ports
The following table lists common problems you might encounter with multimedia ports.
Symptom
Probable cause
Suggested solution
Usually an application
problem.
Driver problem.
949
Loopback plugs
When youre testing ports, a useful device to have in your toolkit is a loopback plug,
also known as a loopback adapter. This device is specific to the type of port youre
testing, and it plugs into the port. The loopback adapter enables you to perform a
loopback test, in which a signal is sent, passes through all of the necessary circuits to
complete the path, and returns to the port being tested. The returned signal is compared
to the sent signal to determine if theres a problem with the port or on the path that the
signal traveled.
Do it!
F-1:
Heres how
1 One or more problems related to ports, cables, and connectors have been
introduced into your lab computer. Troubleshoot these problems to determine
their causes.
2 Correct the problems youve found in your PC to return it to a working state.
Solving one problem might reveal the presence of another one. Troubleshoot and
fix any other problems that arise.
3 Document the problem(s) you find:
950
In this topic, you learned that bits are sent one by one over a single wire in serial
transmission and that multiple bits plus control signals are sent simultaneously over
multiple wires in parallel transmission. Serial ports, often called COM1, COM2, and
so forth, implement serial transmissions for devices such as modems. These ports
typically use 9-pin D-shaped connectors. Parallel ports, often called LPT1, LPT2, and
so forth, implement parallel transmissions for devices such as printers. These ports
typically use 25-pin D-connectors or Centronics connectors.
Topic B
In this topic, you learned that you typically connect keyboards, mice, and trackballs to
your PC by using the PS/2 ports. A PS/2 port is a round 6-pin mini-DIN connector.
The keyboard connector is typically purple and the mouse connector is typically green.
Although you can physically connect these devices to the opposite ports, they wont
function if you do.
Topic C
In this topic, you learned that the USB port is a high-speed, hot-swappable peripheral
bus that you can use to connect many types of devices, including keyboards, mice,
monitors, digital cameras, and external drives. USB components are categorized as
hosts or devices. Devices are divided into functionswhich are the peripherals you
connect to the USB portand hubs. You can daisy-chain hubs. USB versions include
USB 1.1, USB 2.0 and USB 3.0, of which USB 3.0 offers the highest speed and greatest
distances.
Topic D
In this topic, you learned that FireWire, IEEE 1394, and Sony i.Link are all names
given to the same high-speed peripheral interconnection bus. IEEE 1394 is a hotswappable, high-speed bus that supports up to 63 devices. FireWire uses a peer-to-peer
architecture for greater efficiency than can be achieved with USB. IEEE 1394 supports
asynchronous and isochronous transmissions. You also learned about the three
IEEE-approved FireWire standardsFireWire 400, FireWire 800, and FireWire
S3200.
Topic E
In this topic, you learned that there are several multimedia ports. Sound cards typically
have 1/8" round jacks. Some computer systems include RCA jacks for connecting
VCR, video cameras, and other electronic devices that use RCA jacks. You also learned
that most systems connect MIDI devices to either a joystick or USB port. Some
computer systems include a card with MIDI ports. S/PDIF is found on some systems
for audio connections. S-Video connections enable you to connect devices that would
normally not be connected to a computer, such as a TV or a game system. You also
learned about TV tuner cards and video capture cards, which allow you to view and
record analog and digital television signals from an antenna, cable, or satellite.
Topic F
In this topic, you learned that ports, connectors, and cables can fail for various reasons.
You learned how to troubleshoot these components. You also examined common
symptoms of failures and the probable causes and suggested solutions.
951
Review questions
1 The following picture is a connector for what type of communication?
A Parallel
B Serial
2 True or false? In parallel transmission, bits of data are sent one at a time across the
transmission medium.
False. In serial transmission, bits of data are sent one at a time across the transmission medium.
952
953
A FireWire 400
B FireWire 800
C FireWire S3200
954
A PS/2
B Centronics
C MIDI
D RCA
E S-Video
20 Which type of multimedia port is shown in the following graphic?
A Coax
B S/PDIF
C MIDI
D RCA
E S-Video
955
21 True or false? A TV tuner card allows you to record your favorite television
programs on your hard disk.
False. A TV tuner card only allows you to receive the TV signal for your favorite television shows
and watch them. To record the show on your hard disk, you need a video capture card. Some,
though not all, video capture cards include TV tuners.
Coax
25-pin parallel
MIDI
Centronics
S/PDIF square
PS/2
1/8"
S/PDIF round
RCA
S-Video
2 If available, also correctly identify: 25-pin serial, USB 3.0, and FireWire S3200.
956
101
Unit 10
Data storage devices
Unit time: 165 Minutes
disks.
102
Objective
1.2
1.9
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
1.1
103
Host bus adapter (HBA) is the formal name given to the expansion card or circuitry
integrated onto the motherboard that connects your PC to a storage device. In practice,
that term is usually reserved for use with a few types of drives, such as SCSI drives. The
term adapter is used when referring to IDE/ATA, SATA, and other types of storage
devices.
Regardless of its name, the purpose of an adapter is to enable your computers CPU to
communicate across the storage bus. At the other end, the controller is the circuit that
enables the storage device to communicate across the bus. Typically, a controller is
implemented in a single chip or set of chips integrated into the drives interface
circuitry.
An interface is the communications standard that defines how data flows to and from
the disk drive. In current practice, an interface is implemented as a circuit board
attached to the top (or bottom, depending on how you look at it) of the drive unit, as
shown in Exhibit 10-1.
With older drive technologies, the interface was implemented with circuitry on the
adapter rather than on the drive. Thus, you sometimes encounter the term interface
referring to that circuit board on the drive. Given that such a circuit board implements
the logic and functions of the interface specification, that use of the term makes a
certain amount of sense.
Exhibit 10-1: A hard disk drive showing its drive interface board
104
Introduced
Description
SCSI
Early 1980s
IDE
Mid-1980s
ATA, PATA,
and SATA
Standardized by
ANSI in 1994
IEEE 1394
(FireWire,
i.Link)
Mid-1990s,
standardized in
1995
Mid-1990s
Transfer
rate
Description
Speed enhancements
ATA
3.38.3 MBps
Enhanced IDE,
Fast ATA, Fast
ATA-2
13.3-16.6
MBps
105
Standard
Transfer
rate
Description
Speed enhancements
ATA-2
11.116.6
MBps
ATA-3
Up to 16.6
MBps
None.
ATAPI
No transfer
rate specified
in the standard
AT Attachment Packet
Interfacean extension of the
ATA specifications to support
tape and CD-ROM drives.
None.
ATA/ATAPI-4
16.733 MBps
ATA/ATAPI-5
Up to 66.7
MBps
ATA/ATAPI-6
Up to 100
MBps
ATA/ATAPI-7
Up to 133
MBps
SATA 1
(SATA 150)
Up to 1.5
Gbps (150
MBps)
SATA 2
(SATA 300)
Up to 3 Gbps
SATA 3
(SATA 600)
Up to 6 Gbps
106
Transfer
rate
Description
Speed enhancements
eSATA
Up to 3 Gbps
Transfer rate
3.3 MBps
5.2 MBps
8.3 MBps
11.1 MBps
16.7 MBps
Later, designers came up with direct memory access (DMA) schemes that removed the
need for the CPU to be involved with every transfer. The six DMA schemes provided
the performance levels listed in the following table.
DMA mode
Transfer rate
Single-word 0
2.1 MBps
Single-word 1
4.2 MBps
Single-word 2
8.3 MBps
Multi-word 0
4.2 MBps
Multi-word 1
13.3 MBps
Multi-word 2
16.7 MBps
Transfer rate
16.7 MBps
25 MBps
33.3 MBps
44.4 MBps
66.7 MBps
100 MBps
133 MBps
107
108
109
Slave
Master
Exhibit 10-6: A PATA cable, showing where to connect the master and slave drives
Secondary IDE
Primary IDE
SCSI
The Small Computer Systems Interface (SCSI) is a bus interface and is, in many ways,
more like an expansion bus than like a drive adapter technology. SCSI, which is
pronounced scuzzy, supports all sorts of data storage devices, printers, scanners, and
video devices. SCSI has even been used as the basis for very high-performance
computer networks.
SCSI was developed in the early 1980s but not standardized by ANSI until 1986. Since
that time, the technology has undergone many changes. It remains a popular drive
interface with workstations, servers, and high-end desktop computers. Its also
commonly used with higher-end scanners and digitizing devices. Until recently, SCSI
was also very popular with drives used with Macintosh computers.
Standard
Bus width
(bits)
Bandwidth
Maximum
cable length
Maximum number
of devices
SCSI
8 bits
5 MBps
6 meters
Fast SCSI
8 bits
10 MBps
1.53 m
16 bits
20 MBps
1.53 m
16
Ultra SCSI
8 bits
20 MBps
1.53 m
48
16 bits
40 MBps
1.53 m
416
Ultra2/LVD
8 bits
40 MBps
12 m
Ultra2 Wide
16 bits
80 MBps
12 m
16
Ultra3
16 bits
160 MBps
12 m
16
1011
Standard
Bus width
(bits)
Bandwidth
Maximum
cable length
Maximum number
of devices
Ultra-320
16 bits
320 MBps
12 m
16
Ultra-640
16 bits
640 MBps
12 m
16
Serial-attached
SCSI (SAS)
1 bit
300 MBps
8m
Device IDs
Every SCSI device, including the host bus adapter (HBA), must be assigned a unique ID
number. SCSI IDs begin at 0 and count upward. With 8-bit SCSI implementations, SCSI
ID 7 has the highest priority and 0 the lowest. With 16-bit SCSI, ID 7 is still the highest
priority (to maintain backward compatibility). SCSI 15 has the next highest, counting
downward to 8 having the lowest priority. The HBA is normally assigned the highest
priority SCSI ID, which is always SCSI ID 7.
You must assign unique IDs to devices. Its not uncommon when implementing SCSI
devices to have ID conflicts that prevent devices from working.
Termination
Both ends of the SCSI bus must be terminated. Such terminators are basically electrical
resistors that absorb signals that reach the end of the bus. Without them, signals could
reflect back onto the bus, leading to a confusing mix of actual and reflected signals.
The HBA includes either removable resistors or switch-selectable on-board terminators
built in. Drives and other devices can also include switch-selectable termination or
removable terminators. Exhibit 10-8 illustrates an external drive with switch-selectable
termination.
SCSI ID
Termination switch
Exhibit 10-8: External SCSI drive with SCSI ID selector and termination slide-switch
SCSI terminators are supposed to add electrical impedance equal to the impedance of
the cable. Passive terminators are simply resistors that dampen reflected signals through
non-electronic means. They come close to matching the impedance in most situations.
In demanding applications, however, you should use an active terminator. An active
terminator is an electronic component that dynamically tunes itself to exactly match the
impedance of the cable. Active termination is most often used with the newer, higherperforming types of SCSI.
USB
USB is not a drive interface, but instead a general purpose data bus. Most USB drives
are actually ATA drives with an integrated USB interface adapter. While this is
certainly a convenient way to attach an external ATA drive to your PC, its not the same
as connecting a drive directly to the USB interface.
True USB drives are feasible. The circuitry of the drive would be connected directly to
the USB bus without any sort of ATA controller involved. Hard drives with this
configuration are rare, perhaps non-existent. However, the typical USB flash drive or
memory card reader is just such a drive. Circuitry in these devices translates directly
from the memory cards electrical interface to the USB bus. No ATA/PATA controller
is involved in most USB flash drive designs.
USB flash drives implement the USB mass storage device class (UMS), which is a set
of communications protocols defined by the USB Implementers Forum. UMS enables
operating systems to access storage devices via the USB bus. UMS is supported in
Windows since the Windows 98 days. It is also supported by Mac OS X and Linux.
UMS doesnt support the full range of low-level hard drive functions, such as
S.M.A.R.T., command-queuing, and so forth. For USB flash drives, this is typically not
a concern. External hard drives in a USB enclosure might be a PATA drive internally.
But, because they connect to the PC via the UMS interface, they are likewise unable to
take advantage of these advanced low-level functions.
The USB 1.1 specification limited data transfer to 12 Mbps (megabits per second). The
USB 2.0 specification increased that limit to 480 Mbps. The USB 3.0 specification has a
maximum transfer speed of 5 Gbps.
1013
A-1:
Heres how
Heres why
Objective
1.1
1.2
3.2
3.3
Explain the process and steps to install and configure the Windows OS
File systems
FAT32 vs. NTFS
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
1.1
2.1
Select the appropriate commands and options to troubleshoot and resolve problems
FORMAT
Objective
2.3
Given a scenario, select and use system utilities / tools and evaluate the results
1015
Disk Manager
Active, primary, extended, and logical partitions
Mount points
Mounting a drive
FAT32, NTFS, FAT64 (exFAT)
External hard drives
Flash drives
Drive status
Foreign drive
Healthy
Formatting
Active unallocated
Failed
Dynamic
Offline
Online
Most consumer PC hard drives store data by means of magnetism. Magnetic hard drives
are made up of the parts described in the following table.
Component
Description
Platters
The metal or plastic disks on which the magnetic material is coated. Data is
recorded in that magnetic material as a set of magnetically polarized regions.
Spindle
The axis, or central hub, that the platters spin around. A motor turns the
spindle very quickly, 7200 revolutions per minute for example.
Read/write
heads
The magnetic devices that both read and write data on the platters. The heads
are attached to the arms, which are moved by the actuator.
Voice coil
actuator
The mechanism that moves the heads very precisely into position over the
magnetic tracks written on the platters.
Actuator
Head
Platter
Spindle
1017
Sector
Track
Physical installation
Physically installing an internal hard disk drive into a PC involves a few steps, which
you must perform in the following order:
1 Shut down the PC and open its case. (Observe electrical and safety precautions.)
2 Set jumpers or switches on the drive to provide drive identification.
3 If youre installing a SCSI drive, you might need to configure bus termination by
setting switches or jumpers or by installing or removing terminator blocks. The
bus must be terminated on both ends and cannot have extra termination installed
in the middle of the chain.
4 Install the drive into the PC chassis.
5 Connect data and control cables from the adapter to the drive.
6 Connect the power cable from the PCs power supply to the drive.
After you physically install the drive, additional preparation steps are required to make
it available to the operating system.
1019
Chassis installation
You can typically use any available bay for a hard drive. However, one or more smaller,
drive-sized bays are typically available for this precise purpose. Make sure you install
the drive in a location that the data and power cables can reach.
Most modern drives work equally well mounted horizontally or vertically. Unlike with
older drives, theres typically no harm in mounting a drive one way and then mounting
it in a different orientation later.
As always, before you open a PCs case, make sure you shut down the computer and
unplug it from the outlet. Follow all of the typical static safety precautions. Dont bump
or jar the drive. Hard drives are sensitive to shocks, and you can easily damage them.
Data cable connections
Most drive cables are keyedthat is, their connectors are molded in such a way that you
can insert them only the correct way into the connector sockets. If youre using an older
non-keyed cable, wire 1 in the cable is marked with a red (or other color) stripe. Pin 1
on the socket is labeled with either a number or a small triangle pointing at the pin. You
need to line up the cable so that pin 1 goes into socket 1.
If youre using cable-select to set the master/slave selection for a drive, make sure you
connect the IDE drive to the intended connector. If youre using SCSI, make sure the
bus is correctly terminated at both ends and that termination is not applied in the middle
of the chain.
Power cable connections
Most PATA and SCSI drives use the large peripheral power connector. This connector
has beveled corners so that you can insert it into the socket correctly. SATA drives use a
specialized power connector that looks very different from the peripheral power
connector. Its also keyed so that youre sure to connect it properly.
B-1:
Heres how
Heres why
1021
Low-level formatting
Low-level formatting divides the disk into tracks and divides each track into sectors.
Historically, this was a step that the user performed. Since the early 1990s, low-level
formatting is done at the factory. Its not something that you have to do after it comes
from the factory. In fact, in most cases, you cannot low-level format a drive, even if you
wanted to.
Background information
Older hard drives used a stepper motor to move the heads into position over the tracks.
Each step of the motor would move the heads one track in or out. Due to heat, wear, and
other factors over time, the size and shape of the platters changed. Eventually, the steps
moved by the motor no longer put the heads precisely over a track. At that point, data
read/write errors made the disk unusable. Eventually, your only solution was to lowlevel format the drive to define new tracks beneath the new positions of the heads. Of
course, doing so obliterated your data.
New hard drives use voice coil actuators rather than stepper motors. Drive circuitry can
detect whether the head is positioned precisely over the track. If not, the voice coil can
tweak the position to optimize read and write operations. This process eliminates the
need to repeat low-level formatting of a drive.
In older hard drives, each track contained the same number of sectors. Modern hard
drives use complex sector arrangements such as zoned bit recording (ZBR). With ZBR,
more sectors are recorded in the larger outer tracks than in the smaller inner tracks. ZBR
is optimized by the drive manufacturer to balance transfer speed and data density.
Together with the benefits of voice coils, ZBR is another reason why low-level
formatting has become a process done only at the factory.
1023
You can also create extended partitions. Each extended partition contains one or more
logical volumes, which are what the operating system accesses for file storage. With all
of the PC operating systems, you can create a single extended partition, which can
contain as many logical drives as space permits.
In most situations, you wont need to create extended partitions. You can install a
separate operating system into each volume (including into each logical volume within
the extended partition). Thus, one justification for creating an extended partition is to
enable booting into more than four operating systems on a single system.
Its important to note that Microsoft changed the partitioning scheme for Windows 7
and Windows Vista to accommodate expanded drive sizes. It places the starting and
ending points for partitions in different locations on the hard disk than in previous
versions of Windows. That makes the new partitioning scheme incompatible with the
scheme used in previous versions of Windows. If you need to create a multiboot
computer, you should create all of your partitions by using Windows 7 and Windows
Vista, not a previous version of Windows or a third-party utility.
Partitioning utilities
In DOS and Windows 9x systems, you use the MS-DOS fdisk command to partition a
hard drive. The version of fdisk that was included with Windows 98 could also
partition drives for use with the FAT32 and NTFS file systems. To force fdisk to write
a new MBR, you must use the fdisk /mbr command.
You can use the Disk Management component of the Computer Management console in
Windows 2000 Professional, Windows XP, Windows Vista, Windows 7, and Windows
Server. You can access this console component via the Control Panel and use it to
partition and format new disk drives.
You can use the text-mode diskpart command in Windows XP, Windows Vista,
Windows 7, and Windows Server 2003 and newer. (You might have to download the
tool for some Windows versions.) This command-line tool enables you to perform all
the disk management tasks that youd perform with Disk Management. You can also
use this tool within management scripts, making it a powerful alternative to the
graphical tools.
Disk Management and diskpart are designed for adding a drive to a working
Windows system. For new drives in new systems, you need a different method. Most
versions of Windows since Windows NT offer you the option of partitioning the hard
drive during the operating system installation.
File systems
The operating system must be able to access and track files stored on the hard drive. The
file system is the collection mechanism that enables these functions. A file system
defines such parameters as the minimum and maximum cluster sizes, how the locations
of files are tracked, and how files and directories are stored within the actual clusters.
An operating system can find any file on the hard drive by looking it up in the file
systems data structures.
You select the file system you want to use when you install the operating system. If you
have more than one partition, you can use different file systems on each partition.
1025
FAT16
FAT32
NTFS
18 characters
1255 characters*
1255 characters*
File extensions
03 characters
0255 characters*
0255 characters*
2 GB
4 GB
16 EB (exabytes)
2 GB
32 GB (some OSes
up to 2TB)
65,536
4,194,304
4,294,967,295
DOS, Windows
3.1, Windows 95
Windows 9x, Me
No
No
Yes
No
No
Yes
* FAT32 and NTFS file names are limited to 255 characters overall, which are divided between the file
name and extension. For example, you could assign a 200-character file name and a 55-character file
extension.
1027
Exhibit 10-12: Windows Explorer identifies the root directory of C: as Local Disk
(C:)
A file system table (called a file allocation table in the FAT file systems) stores the
name and address of the first cluster of each file and folder contained in the root
directory. A marker in each cluster either notes the address of the files next cluster or
marks it as the last cluster in the chain.
Folders other than the root directory are essentially files that contain data about the
actual files and folders they contain. The operating system reads these special files and
uses the information in them to display the list of files and folders. Theres no limit to
how many files and folders you can store in a folder thats not the root directory (other
than the overall limits defined by the file system type).
1029
Depending on the status of a hard disk or partition, Disk Management will display one
of the status messages listed in the following table.
Status
For
Description
Healthy
Partition/Volume
Unallocated
Partition/Volume
Formatting
Partition/Volume
Failed
Partition/Volume
Basic
Disk
Dynamic
Disk
Not initialized
Disk
Initializing
Disk
Online
Disk
Offline
Disk
Unreadable
Disk
Foreign
Disk
B-2:
3 When do you assign the file system thats used on the disks in your PC?
If necessary.
1031
11 Click Next
12 Click Next
15 Click Next
16 Record the drive letter of your
new drive
17 Click Finish
B-3:
Mounting a volume
Heres how
1 Click Start, right-click
Computer, and choose
Heres why
To open Computer Management.
Manage
Click Next
4 In the size box, enter 5000, and
click Next
To create a 5 GB volume.
Click Next
6 Edit the Volume label box to read
My mount
1033
Click Cancel
9 In Disk Management, right-click
My mount and choose Change
Drive Letter and Paths
Click Remove
Click Yes
10 In Computer, observe the
Marketing folder
11 Close all open windows
RAID levels
RAID is a technique for adding redundancy, lengthening disk life, improving
performance, and enabling relatively uninterrupted access to data. There are various
basic levels of RAID, which have been extended by nesting the basic types.
1035
Exhibit 10-14: RAID level 1, disk mirroring (left) and duplexing (right)
Exhibit 10-15: RAID 3 stripes data and stores parity on a dedicated drive
RAID level 4 Block-level striping with dedicated parity. Data is striped,
block by block, across the disks in the array. Parity is stored on a dedicated
parity disk.
RAID level 5 Block-level striping with distributed parity. Data is striped
block-by-block across the disks in the array. Parity is distributed across all of the
disks rather than being stored on a dedicated parity disk. Distributing the parity
data removes the single drive bottleneck that limits write performance in lowernumbered RAID levels.
Exhibit 10-16: RAID 5 stripes data and parity across a set of drives
RAID level 6 Block-level striping with double distributed parity. Essentially
identical to RAID 5, except that the parity information associated with each
block of data is stored twice (on separate drives). This enables the array to
continue operating in the event of two failed drives.
1037
Benefits
Detractions
RAID 0 (striping)
1039
RAID level
Benefits
Detractions
B-4:
Two
Three
Four
Five
2 What term is used to describe disk mirroring when each drive is connected to its
own hard disk controller?
A
Disk mirroring
Disk duplexing
Shadowing
Controller mirror
RAID 0
RAID 1
RAID 4
RAID 5
1041
Objective
1.1
This topic covers the following CompTIA A+ Practical Application exam objective.
#
Objective
1.1
CDs
Explanation
CDs are 120 mm (12 cm) plastic discs that contain a layer of reflective metal-alloy foil
encased in transparent plastic. The CD contains a single spiral track. A 74-minute CD
can hold 650 MB of data; an 80-minute CD can hold 700 MB of data. Exhibit 10-19
illustrates the components of a CD.
CD drives
CD drives have largely been supplanted by multi-format drives that can read (and
maybe write) CDs, DVDs, and other optical disc types. If your computer has a plain
CD drive, it is typically one of two types:
CD-ROM drive Can only read from CDs.
CD-RW drives Can read from and write to CDs.
1043
CD drives of either type contain three major parts, which are illustrated in Exhibit 1020.
The drive motor Drives the spindle, which spins the disc.
The laser lens and laser pickup Focuses in on and reads the disc.
The tracking drive and tracking motor Moves the laser to follow the track
on the CD.
Spindle
Laser
Tray
DVDs
Like CDs, DVDs are 120 mm (12 cm) diameter discs but are often thinner than CDs.
DVDs use a different encoding method than the one CDs use, and DVDs are higherdensity discs. The higher density requires a narrower laser beam than CDs require. A
DVD track is 0.74 microns wide, whereas a CD track is 1.6 microns wide.
DVD drives have become standard devices on computers, typically replacing CD drives.
Many computers include DVD-Rewritable (DVD-RW) drives. Read-only DVD drives
can sometimes read and write CDs.
A DVD drive running at 1X transfers data at 1.38 MB per second. DVD drives are
available in higher speeds, up to 16X. They come in read-only, write-once, and
rewritable versions. Note that a 1X DVD is approximately nine times as fast as a 1X CD
drive.
DVD drives use red and infrared lasers with a 650 nm laser beam. Compare this to the
longer-wavelength 780 nm laser used for CDs.
To play a DVD movie, the computer system requires an MPEG-2 decoder. Originally,
this was a separate board installed in the system. Sometimes it was incorporated into the
graphics card. Current systems are powerful enough to handle decoding the content
through software.
DVD media
A standard DVD disc has a 4.7 GB capacity. This DVD is also known as a DVD-5; the
5 refers to the DVD holding almost 5 GB. Discs can be single-sided and singlelayered, as the DVD-5 disc is. A 3" mini-disc is also available; it holds 1.5 GB of data.
Data DVDs use the UDF (universal disc format) file system. (Movie and other noncomputer data DVDs dont use UDF.)
1045
Sides
Layers
Capacity
DVD-5
Single
Single
4.7 GB
DVD-9
Single
Double
8.5 GB
DVD-10
Double
9.4 GB
DVD-14
Double
13.3 GB
DVD-18
Double
17.1 GB
DVD standards, which were created by the DVD Forum, include DVD-R, DVD-RW,
and DVD-RAM. Media created according to these standards can display the DVD logo.
Full details can be found on the DVD Forum Web site, at http://dvdforum.org.
Another source for further information about DVDs is
http://dvddemystified.com/dvdfaq.html.
The DVD+RW Alliance created standards for DVD+RW, DVD+R, and DVD+ R DL
media. These arent official DVD standards and cant display the DVD logo. Instead,
they display the RW logo. Details can be found at the http://dvdrw.com Web site.
DVD-Rs and DVD+Rs are both write-once media, however with DVD+R discs, you
dont have to write the entire disc in a single session; you can record additional sessions
later. This makes DVD+Rs more suitable for use with a computer in which you might
record data in a series of sessions. DVD-Rs are reputedly more compatible with home
theater DVD players, though thats not as true now as it used to be.
DVD-ROM discs, being non-recordable, are used to distribute software. DVD-RW and
DVD+RW are rewritable discs, with the latter being faster to format. A DVD-RAM
holds up to 9.4 GB. That standard never became well established, and few modern
systems can use it.
1047
Before installing the drive, you need to set the jumpers on an IDE drive to master, slave,
or cable-select. Its much easier to set them before you install the drive into the bay. On
SCSI drives, you need to set the device ID and perhaps termination.
For most systems, the drive is installed directly into the bay and screwed in place.
Along both sides of the drive are screw holes that you should be able to match up with
holes in the bay. In some systems, theres a box you remove; you install the drive in the
box and re-install the box in the computer. Some systems, usually older ones, use drive
rails. The rails attach to both sides of the drive, and they slide into the bay to hold the
drive in place.
After youve fit the drive into the bay, you should check that the door to the optical
drive can open freely and that the tray can extend freely. If the drive is off-kilter and hits
against the frame, you wont be able to open the drive and insert a disc in the tray.
Optical drive connections
Optical drives can be internal or external devices. Internal devices can be connected via
IDE, Serial ATA, or SCSI. External drives are most often IEEE 1394 or USB 2.0
devices. Some external drives might also be connected via SCSI, or even a parallel
connection for older drives. External versions arent as popular as they were in the past
because computers now come with internal optical drives as standard components.
Optical drive connections are shown in Exhibit 10-21.
C-1:
Heres how
Heres why
1049
Click Finish
13 Click the Stop button, and remove
all discs from the optical drive
14 Close Windows Media Player
C-2:
1051
Heres how
Heres why
Click Finish
3 Click
4 Click
5 Click
Click
6 Click
Click
7 Click
12 Click
Files are converted and then copied to the CD.
The progress percentage is shown in the lower
part of the window.
14 Click
1053
Objective
1.1
This topic covers the following CompTIA A+ Practical Application exam objective.
#
Objective
1.1
USB flash drives are a popular storage solution. They are about the size of an adult
persons thumb or a pack of chewing gum, and they weigh about as much as a car key.
They come with capacities from a few megabytes to many gigabytes. Their capacity is
much greater than that of a floppy disk, and many flash drives can hold more than a CD
can.
Flash drives are designed to be hot-swappable, meaning that you can attach or detach
the device from your computer without shutting the PC down and restarting it. This
functionality is part of the USB specification.
When hot-swapping, be sure that the drive has finished writing before you remove it. If
the drive is in the middle of a write operation when you disconnect it, the file that was
being written, or even the entire directory structure, can become unreadable. Sometimes,
an LED light on the drive indicates when a write operation is in progress. Generally,
you should use the Safely Remove Hardware icon to stop the device before removing it
from the computer. Some computer makers recommend ejecting the drive instead. To do
so, right-click the USB flash drive in Windows Explorer and choose Eject.
Exhibit 10-23 shows three USB flash drives. Notice that the top one is made to look like
a pen, and the drive is contained in half of the pen. Most drives have a size and shape
similar to these examples, but some have slightly different shapes. Some drives have
bulges and ridges to make them easier to grip when youre inserting them in and
removing them from the USB port.
1055
D-1:
The files for this activity are in Student Data folder Unit 10\Topic D.
Heres how
Heres why
If appropriate.
1057
Case (opened)
Diskette medium
Tracks
Density
Capacity
5.25"
40
Double density
360 KB
5.25"
80
15
High density
1.2 MB
3.5"
80
Double density
720 KB
3.5"
80
18
High density
1.44 MB
3.5"
80
36
Extended (or
Extra-high) density
2.88 MB
1059
With 3.5" disks, you slide open a small door to enable write protection. In the
associated drives, if an LED light can shine through this door, then writing is disabled.
Both of these write protection devices are shown in Exhibit 10-28.
D-2:
Heres how
Heres why
Drive B connector
Motherboard connector
Exhibit 10-29: A floppy cable with pin-style connectors for 3.5 drives
The typical floppy controller connector is a 34-pin male connector soldered to the
motherboard. Such a connector, technically called a header, is shown in Exhibit 10-30.
D-3:
1061
Heres how
Heres why
COMPADMIN##
8 Open Computer
D-4:
1063
Heres how
Heres why
3 In Windows Explorer or
Computer, right-click A: and
choose Format
4 Click Start
Click Close
6 Display the contents of the floppy
Tape formats
Backup tapes come in various cartridge formats. The original tapes were reel-to-reel
tapes on mainframes; then came cassette tapes, and then DAT tapes. The tapes have
gone from relatively slow devices with low capacity to the high speeds and capacities of
the current tapes.
QIC
Historically, the quarter-inch cartridge, or QIC (pronounced quick), tapes were
enormously popular. Developed in the early 1970s, the QIC cartridge and its
descendents were still in active use in 2010.
QIC tapes are belt-driven, rather than having the tape attached to the reels. Because of
this setup, the tapes need to be retensioned periodically. Retensioning means winding
the tape end to end and then rewinding it in a single operation. This process resets the
belt to the proper equalized tension.
The Travan version of QIC uses a miniature cartridge and was developed for the home
market. This cartridges capacity ranges from 400 MB to 10 GB. The SLR (scalable
linear recording) drive, developed by Tandberg Data, uses a QIC format in quarter-inch
and 8mm versions. Capacities range as high as 200 GB per cartridge. Because it is the
only type of drive still being manufactured that uses QIC-style cartridges, the term SLR
has come to be used in place of QIC in many instances.
DDS
The digital audio tape (DAT) format was designed for audio recording. It has been
adapted for data storage with the digital data storage (DDS) format. This format uses
tape thats 4 mm wide. DDS recorders contain two read heads and two write heads. The
tape is read, and if errors are detected, the data is rewritten.
The cartridges are expected to last for approximately 2000 passes and should be
replaced after that. That should be good for about 100 backups. The cartridges are rated
for a 10-year shelf life. However, the technology is rather old and the tape drives require
frequent cleaning. A DDS2 tape is shown in Exhibit 10-31.
1065
D-5:
5 What does DLT stand for? What capacities are offered by DLT?
1067
Objective
2.5
This topic covers the following CompTIA A+ Practical Application exam objectives.
#
Objective
2.1
Select the appropriate commands and options to troubleshoot and resolve problems
CHKDSK (/f /r)
2.3
Given a scenario, select and use system utilities / tools and evaluate the results
Disk management tools
DEFRAG
Check Disk
Computer hard disks, like automobiles, benefit from regularly scheduled maintenance.
Windows operating systems include utilities you can use to keep your hard disk
performance at an optimal level. These disk maintenance utilities can:
Remove unnecessary files from a hard disk.
Scan a disk for errors.
Defragment a disk.
1069
In the editions of Windows XP and Windows 7 and Vista listed previously, you can also
remove old system restore points. To do so:
1 Open Windows Explorer or Computer (My Computer).
2 Right-click the disk you want to scan for unnecessary files, and choose
Properties.
3 On the General tab, click Disk Cleanup.
4 Select My files only or Files from all users on this computer. Click Continue
(in the Windows Vista UAC).
5 Activate the More Options tab.
6 Under System Restore and Shadow Copies, click Clean up.
7 Click Delete (or Yes in OSs before Windows Vista) to remove all system restore
points except the most recent.
8 Click Delete Files (click OK and then Yes in OSs before Windows Vista).
9 Click OK.
E-1:
Heres how
Heres why
1071
E-2:
1073
Heres how
1 Activate the Tools tab
Heres why
In the Local Disk (C:) Properties dialog box. In
this activity, youll check your C: drive for
errors by using the ScanDisk utility.
Under Error-checking,
click
2 Clear Automatically fix file
system errors
Click Start
where drive is the drive letter of the volume you want to check for errors. Optional
parameters and switches include those shown in Exhibit 10-32 below.
E-3:
1075
Running chkdsk.exe
Heres how
Heres why
7 Log on as COMPADMIN##
1077
Disk Defragmenter
Disk Defragmenter helps to improve hard disk performance by reorganizing the files on
the disk. It is available with all current versions of Windows.
A file thats saved in one continuous block of space on the hard disk is called
contiguous. A file thats saved in multiple noncontiguous blocks of space is called
fragmented.
Files can be divided across multiple noncontiguous clusters on the disk. From a speed
perspective, the optimal arrangement is to have all of a files clusters located
contiguously on the disk. However, as you add, remove, and change the contents of
files, they grow or shrink. Files can become fragmented into many clusters spread
across noncontiguous portions of the disk.
When a file is saved, it isnt necessarily saved in one contiguous block of space on the
hard disk. The computer starts saving the file in the first available block of space. If that
space isnt large enough for the entire file, the computer saves what it can in the first
space, and then moves onto the second available block.
This pattern continues until the entire file is saved. Noncontiguous blocks of space
become available as files are deleted. When the computer needs to retrieve a fragmented
file, it must gather the pieces from multiple areas of the disk. If you have a highly
fragmented file, this can cause a noticeable decrease in data access and retrieval
performance because the computer requires more time to gather all the pieces of the file
from multiple locations on the disk. The operating system accesses fragmented files
less efficiently than contiguous files.
Fragmentation isnt as much of a problem in newer operating systems such as Windows
XP and Windows 7, as it was in earlier operating systems. However, you can still use a
file defragmentation utility to move file clusters and return the disk to a less fragmented
state. Using such a utility is sometimes called defragging the disk.
Defragging
When you defrag a hard drive, software reads all the clusters that make up your files.
Then the software writes those clusters sequentially on the disk. Typically, the
defragging utility must read and write files multiple times to arrange all of your various
files in the most efficient physical locations on the disk. For maximum benefit, you
often must run the utility multiple times also.
Disk
selection
Runtime graphs
Start
Defragment
mode
Start
Analyze
mode
Legend
E-4:
1079
Defragmenting a disk
Heres how
Heres why
2 Select (C:)
Click Analyze disk
4 Click Close
where drive specifies the drive you want to defragment. Optional switches include
those shown in Exhibit 10-34 below.
E-5:
1081
Running defrag.exe
Heres how
1 Click Start and choose
All Programs, Accessories
Heres why
Youll open a Command Prompt window with
administrator permissions.
Click Yes
2 What command would you use to
determine if drive C: needs to be
defragmented?
3 What command would you use to
determine if drive C: needs to be
defragmented and to view the
report on screen?
4 What command would you use to
defragment drive C:, even if it
doesnt need to be defragmented?
5 Analyze drive C: and then analyze
it again in verbose mode
Compare the information
displayed by each command
Objective
2.2
Given a scenario, explain and interpret common hardware and operating system
symptoms and their causes
Hardware-related symptoms
Noise
Odors
Alerts
Visible damage (e.g., cable, plastic)
This topic covers the following CompTIA A+ Practical Application exam objective.
#
Objective
1.2
Deleting files in Windows involves two steps: you move the files to the Recycle Bin,
and then you actually delete the files. You can recover files from the Recycle Bin by
selecting them and clicking Restore. This returns them to their former locations.
When you delete a file in the Recycle Bin, the operating system doesnt truly erase the
file. Instead, Windows simply marks the file as deleted in the file allocation tables. The
space used by the deleted file is now available for other uses.
Using a third-party utility, you can sometimes recover these deleted files. The utility
scans the file table for files that are candidates for recovery. Some utilities then scan
each files chain of clusters to determine which files are fully recoverable. Then you
select the files to recover, and the utility marks the file as not deleted. The name of the
file is often altered in the process; typically the first letter of the name is changed or
removed.
1083
You should install the file-recovery utility before you need to restore deleted files.
Otherwise, as you install the utility, its files will use up the disk space containing the
files youre trying to recover.
Third-party diagnostic utilities
Various vendors supply utilities you can use to diagnose disk troubles, recover data, and
optimize the operations of your hard drives. Examples include Symantecs Norton
SystemWorks, Ontrack Data Recoverys Data Advisor, and Stellar Data Recoverys
Stellar Phoenix.
Probable cause
Suggested solution
Cables disconnected or
damaged; master/slave or
SCSI ID conflict; dead
drive; drive controller
disabled in BIOS.
Space on drive
doesnt match
advertised space
Disk unit
misunderstanding; file
system limitations; space
being used by system
recovery programs;
reserved space on drive;
BIOS misconfiguration.
Files becoming
corrupted
No status light
indicator
Drive letter
incorrect
Cables connected
incorrectly; master/slave
setting different from
intended setting; drive
letters reassigned with
Windows.
1085
Symptom
Probable cause
Suggested solution
Noise
Troubleshooting CD drives
Problem
Probable cause
Suggested solutions
No audio plays
from CD
Disc scratched or
damaged; DVD inserted in
a CD drive.
No status light
indicator
Failed CD drive
Buffer underrun
Probable cause
Suggested solutions
Burned CD-RW
disc cant be read
on another
computer
Media incompatibility;
older optical drive in other
computer does not support
recordable CDs; disc not
finalized (fixed, fixated, or
closed).
Noise
Faulty CD drive
Probable cause
Suggested solutions
On a laptop or other
system with two
displays, the overlay
cant be created to play
on both devices.
support.microsoft.com/kb/306713.
UDF-formatted discs
cant be read; you can
read only some files or
none; the disc might
not show up in
Explorer
No playback software
installed, or decoders
are missing.
Noise
No status light
indicator
Failed drive
1087
Do it!
Problem
Probable cause
Suggested solutions
Port inaccessible.
F-1:
Heres how
1 One or more drive-related problems have been introduced into your lab computer.
Troubleshoot these problems to determine their cause(s).
2 Correct the problems you find in your PC to return it to a working state. Solving
one problem might reveal the presence of another one. Troubleshoot and fix any
other problems that arise.
3 Document the problem(s) you find here:
In this topic, you learned that drive adapters are built into the motherboard or added
via your PCs expansion slot and that the interface is the communications standard
between the controller and the hard drive. You learned about the various interface
standards, including IDE/PATA, SATA, SCSI, USB, and IEEE 1394. You learned that
you must configure IDE drives to designate one as master and one as slave. With SCSI
drives, you learned that each drive must have a unique SCSI ID.
Topic B
In this topic, you learned that there are two types of hard disks: magnetic and solidstate. You identified the components of magnetic hard drives, including the read/write
heads, voice coil actuator, platters, motor, and spindle. You learned that hard disks are
divided into partitions, also called volumes. You also learned that file systems, such as
FAT32 and NTFS, define how operating systems access the data stored on a drive.
Topic C
In this topic, you identified features of CD, DVD, and Blu-ray discs. You also learned
how to use an optical drive for reading data, listening to music, watching film clips,
and writing data.
Topic D
In this topic, you examined different types of removable storage media. You identified
USB flash drives and learned that digital cameras connected via USB or IEEE 1394
show up as additional drives on your computer. You learned that floppy drives store
data on flexible media housed in a removable package with either a soft or hard casing.
Floppy diskettes store between 360 KB and 2.88 MB. Floppy drives are slow and lowcapacity compared to hard drives and optical drives, and thus sometimes arent included
with modern PCs. You also identified the different types of tape drives.
Topic E
In this topic, you learned how to perform basic disk maintenance tasks, such as
checking your hard disk for errors and defragmenting the disk. You learned how to use
tools such as chkdsk, Check Disk, Disk Defragmenter, and defrag.exe to perform
these tasks.
Topic F
In this topic, you learned that drives and disks can fail for various reasons, and you
learned how to troubleshoot these components. You also examined common symptoms
of failures and the probable causes and suggested solutions.
Review questions
1 Which PC drive interface is a parallel system bus?
A IEEE 1394
B SATA
C SCSI
D USB
2 The IDE interface is now more correctly called the ______________ interface?
A PATA
B IEEE 1394
C SCSI
D SATA
1089
A High-speed PATA
B SATA
C SCSI
D Standard PATA
4 Which PC drive interfaces dont support a maximum of two drives per controller?
[Choose all that apply.]
A High-speed PATA
B SATA
C SCSI
D Standard PATA
5 Which of the following SCSI standards has the highest bandwidth?
A Fast SCSI
B Fast-Wide SCSI
C Ultra2 Wide/LVD
D Ultra SCSI
6 True or false? SCSI devices with a lower SCSI ID have a higher priority on the
SCSI bus.
False. SCSI IDs begin at 0 and count upward, with higher IDs having a higher priority on the
SCSI bus. For 16-bit SCSI buses, ID 7 has the highest priority, then counting downward from 15
for the remaining IDs.
7 True or false? True USB drives, which connect directly to the USB bus without any
sort of PATA/SATA interface involved, are very common in todays PCs.
True. USB flash drives are extremely popular. Most are true USB drives and dont use the
PATA/SATA interface.
8 True or false? You can designate a master IDE drive on both the primary and
secondary channels.
True. Each channel can have one master and one slave drive.
15 Partitioning divides a drive into one or more logical drives, also called
____________.
volumes
16 True or false? Hard drive tracks are concentric regions on the platters, onto which
the data is written via magnetism.
True
A Level 0
B Level 1
C Level 3
D Level 5
21 The following graphic illustrates two variations of which RAID level?
A Level 0
B Level 1
C Level 3
D Level 5
1091
A Level 0
B Level 1
C Level 3
D Level 5
23 Commercially produced CDs are created through a process called what?
A Burning
B Lasering
C Mastering
D Pressing
24 Writable CDs are written through a process called what?
A Burning
B Lasering
C Mastering
D Pressing
25 The speed of a CD drive is expressed in #X, where # is the number of times faster
than the rate at which a CD spins. This power of X is accurate up to approximately
which value?
A Two
B Four
C Eight
D Twelve
E Sixteen
F Twenty-four
26 True or false? DVDs are the same diameter as CDs.
True. Both are 120 mm, or 12 cm.
1093
30 True or false? To safely remove a USB flash drive, you should shut down the PC.
False. USB flash drives are hot-swappable. To safely remove the device, be sure that the drive
has finished writing data, and then use the Safely Remove Hardware icon to stop the device.
31 The items in the following graphic are examples of which type of storage device?
34 Which tape format was belt-driven rather than having the tape attached to reels?
A AIT and SAIT
B DDS
C DLT and SDLT
D LTO
E QIC
35 Which tape format uses helical-scan recording, in which the head is tilted and data
is recorded in diagonal strips across the head?
A AIT and SAIT
B DDS
C DLT and SDLT
D LTO
E QIC
36 In Windows Vista, which disk maintenance utility runs on a reboot?
A The chkdsk command
B Disk Cleanup
C Disk Defragmenter
D ScanDisk
37 Which disk maintenance utility identifies files that can be deleted to recover space
on a hard disk?
A The chkdsk command
B Disk Cleanup
C Disk Defragmenter
D ScanDisk
38 Which disk maintenance utility arranges files to contiguous areas on the disk?
A The chkdsk command
B Disk Cleanup
C Disk Defragmenter
D ScanDisk
1095
111
Unit 11
Video output and image input devices
Unit time: 60 Minutes
112
Topic A: Monitors
This topic covers the following CompTIA A+ Essentials (2009 Edition) version 2.0
exam objectives.
#
Objective
1.7
1.8
6.1
Outline the purpose of appropriate safety and environmental procedures, and given a
scenario, apply them
EMI
Magnets
Electrical safety
CRT
Physical safety
Heavy devices
CRT monitors
Explanation
Traditional television sets and computer monitors use the same technology to create
images. A phosphorescent screen coating is struck by electron beams, and the coating
then glows for a fraction of a second. The electron beam must strike the coating many
times to keep the coating glowing.
Color cathode ray terminals (CRTs), use three electron beams to produce images. Each
beam is for a separate colorred, green, or blue. (This is why CRTs are also referred to
as RGB monitors.) The beams pass through horizontal and vertical deflection coils and
are focused by the magnetic yoke. Exhibit 11-1 shows a CRT monitor.
113
114
115
Some applications, especially games and graphics applications, require that the
resolution be set to a specific setting. Common Windows 7, Windows Vista, Windows
XP, and Windows 2000 Professional settings are 800600, 1024768, 1152864,
1280800, 12801024, and 16001200. Exactly which ones are available on your
system depends on the resolutions your monitor and video adapter support.
Refresh rate
For an image to stay on the screen, it needs to be refreshed multiple times per second.
The refresh rate is the number of times per second the screen is refreshed or redrawn.
This rate is measured in Hertz (Hz). At 60 Hz, the monitor is refreshed 60 times per
second. The image appears more stable, with less noticeable flickering, at higher refresh
rates. The human eye usually doesnt notice the redraw at 72 Hz or higher. A refresh
rate of 85 Hz is recommended for a 12801024 resolution.
If your monitor cant support that combination, it drops back to the previous setting so it
can show the screen image and prevent damage to the hardware.
Dot pitch
Dot pitch is the distance, measured in millimeters, between dots of the same color on
the screen. Most monitors have a dot pitch between 0.15 and 0.30 mm. The smaller the
dot pitch number, the better the image. An average-quality monitor usually has a dot
pitch between 0.22 and 0.26.
A television set usually has a dot pitch between 0.5 and 0.7. This is why the TV image
is so much grainier than the image on a CRT monitor.
Flat or curved screens
Traditionally, televisions and monitors had curved screens. The edges of the display
area were slightly distorted. Newer units are almost all flat screens, which are clear
across the entire surface.
A flat screen is different from a flat-panel monitor. Flat-screen CRTs still use the
cathode ray tube, and the dimensions of the monitor are quite deepusually as deep as
they are high. These monitors are called "flat screen because the CRT tube is flat on
the front, rather than curved. Flat-screen monitors are more expensive than typical
CRTs.
116
Do it!
A-1:
Heres how
Heres why
Youll compare the lowest-price monitor, a midpriced one, and the highest-price monitor.
117
Video connectors
The monitor connects to a video adapter. VGA and SVGA CRT monitors connect via a
15-pin D-subminiature (D-sub) connector. The monitor cable ends in a male connector,
which plugs into a female port on the video adapter. If the computer uses color-coded
ports that follow the color coding created by Microsoft, Intel, and Toshiba, this is a blue
port. The video adapter converts digital information from the computer into analog
information for transmission to the monitor, which then converts the information back
to digital.
Each pin in a video cable is responsible for carrying specific information. If one of the
pins is bent or damaged, the monitor wont display the image properly.
Display properties
When you connect a monitor to a Windows 7, Windows Vista, Windows XP, or
Windows 2000 Professional system, it automatically detects the monitor and installs
either the Default Monitor driver or the PnP monitor driver for it. To get the full benefit
of features available on your monitor, you can check for drivers that are specific to it.
Through Display in Windows 7, Display Settings in Windows Vista, and Display
Properties in previous versions of Windows, you can set the screen resolution, color
quality, and monitor settings. To set the refresh rate, monitor type, and properties
specific to your monitor, click the Advanced Settings button (Vista) in the Display
Settings dialog box, or click the Advanced button (pre-Vista versions) on the Display
tab in the Display Properties dialog box.
In Windows 7, in Display, click "Change display settings, then click Advanced
Settings and select the Monitor tab.
Color depth
Color depth specifies how many bits are used to describe the color of a single pixel.
VGA monitors use 16-bit color depth, known as High Color or HiColor, and can show
65,536 colors. SVGA monitors are capable of 24-bit color depth, using 8 bits for red, 8
bits for blue, and 8 bits for green. An SVGA monitor can show 16,777,216 colors; this
setting is also known as True Color. The 32-bit color depth uses the additional bits for
showing additional information in the image. This setting is useful for games and other
graphics-intensive applications.
Display adjustments
When you install a monitor, you might need to adjust the display a bit. Settings usually
include brightness, contrast, and the position of the image on the screen. The method
used to adjust these settings varies from monitor to monitor. Some monitors have
separate buttons or knobs for each setting; others display a menu thats accessed using
buttons on the monitor.
If the image isnt visible, the brightness or contrast might be set too low. If the image is
distorted, the brightness or contrast might be set too high. If the image is partway off the
screen, adjust the image position. If these settings dont improve the image, refer to your
monitor documentation for additional suggestions on resolving the issue.
118
Safety
Caution: Never open a monitor unless youve been specifically trained in internal
monitor repair techniques, which arent covered in this course.
Computer equipment can be heavy and bulky, especially laser printers, servers, and
large CRT monitors. Use care when lifting and moving equipment, not only for the sake
of the equipment, but also for your back and other muscles.
When lifting equipment, take a balanced stance. If the equipment is on the floor, squat
close to it and use your leg muscles to lift it as you stand up. Keep your back straight
with your chin tucked in. Grip the equipment, using your entire hand rather than just
your fingers, and bring it close to your body, keeping your elbow close to your body as
well.
Make sure that you can see where youre going with the equipment. Crashing into
another person, a wall, or other equipment can be hazardous.
Interference
Images can be distorted if a CRT monitor is placed near another CRT, a powerful
magnet (such as those found in speakers), fluorescent lights, or heavy machinery
(containing motors that generate large magnetic fields). Move the monitor as far away
from the interference as possible to see if thats the problem. Moving it away should
reduce or eliminate the problem. The monitor might need to be degaussed.
Do it!
A-2:
Heres how
1 Shut down Windows 7
Heres why
Youll disconnect your monitor, reconnect a
CRT monitor, and examine the display settings.
119
Click Apply
Click Yes
Click No
12 Click Cancel
Close the Screen Resolution
window
1111
Screen size
LCD monitors are measured diagonally, just like CRT monitors. However, unlike the
published dimensions of CRT monitors, those of an LCD monitor refer to the viewable
area. Such measurements dont include areas of the screen hidden by the bezel.
Viewing angle
The viewing angle can be an important factor to consider. When youre viewing an
LCD monitor straight on, as you do most of the time, the monitor should be fine.
However, if you want to show other people whats on your monitor, and theyre
viewing it from an angle, the image might not be visible or might be distorted, or the
colors might look wavy or incorrect.
Angles are measured in degrees. The maximum angle at which the image isnt distorted
is listed as the viewing angle. Because various manufacturers measure this differently,
you should check it yourself. Be sure to check from both sides of the screen, as well as
from top and bottom angles, if you think people might need to see from those angles as
well.
Response rate
The response rate measures how quickly the pixels can change colors. This number is
important if you have moving images, such as in Web sites, videos, or gaming. The
response rate is measured in milliseconds. A response rate should be a lower number for
better performance. An 8 ms response time works very well for gaming. A 20 ms
response time works fine for such tasks as word processing.
Contrast ratio
Contrast ratio is the ratio between the monitors brightest white and darkest black. The
higher the contract ratio, the better the image, so 900:1 is better than 600:1. Today, its
easy to find monitors with a contrast ratio of 40,000:1.
Native resolutions
The native resolution is the number of individually addressable pixels in the screen
matrix. Some of the common native resolutions found in LCD monitors are:
XGA 1024768 pixels
SXGA 12801024 pixels
UXGA 16001200 pixels
Widescreen LCD resolutions include:
WXGA+ 1440900 pixels
WSXGA+ 16801050 pixels
WUXGA 19201200 pixels
LCD monitors produce the clearest picture when all pixels are used. Although you can
usually configure an LCD monitor for a lower resolution than the native resolution, the
image will be somewhat blurry or distorted, because not all pixels will be illuminated.
On a few LCD monitors, you can set a higher resolution than the native resolution, but
again, the image might not be as clear as the image at the native resolution.
Touch-screen monitors
Some touch-screen monitors are CRT-style monitors. Other touch-screen monitors use
LCD panels. Still others consist of a separate panel that fits over a monitor.
Touch-screen monitors use several methods to receive input information:
Layers Electrical current runs through a layer thats placed over the monitor.
When the layer is pressed, it touches another layer. This action indicates the
screen position youve selected, and the software knows whats on the screen at
that location.
Capacitors Capacitors are placed between layers over the screen. A touch
changes the charge in the capacitors, and this change in charge is used by the
controller to calculate the location of the touch.
Acoustic waves A sending transducer and a receiving transducer are placed
on the surface of the monitor. Reflectors on the monitors surface send the
electrical signal between the transducers. A touch on the screen interrupts the
flow, and the location can be calculated.
Touch-screen monitors take the place of mice. The drivers for the monitor communicate
with the operating system, and the information that would usually come from the mouse
is instead interpreted from the information received from the monitor.
Connections can be damaged by pressing the screen too hard or by using sharp objects
on the surface. There are usually connections to the video adapter and to another port,
such as a USB or mouse port. If these connections arent set up properly, the touch
screen wont work properly. If the touch panel is attached to a regular monitor but isnt
properly aligned, the touches wont match up with the on-screen items.
A touch screen usually requires calibration, which identifies the corners and the center
of the surface. The drivers use this information to calculate where the user is touching
the screen. You might need to recalibrate the monitor if it isnt working properly.
1113
Laptop monitors
Laptop monitors are usually LCD monitors, although some are plasma monitors. The
connections for a laptop monitor include a ribbon cable that connects the screen to the
video card. The inverter regulates power to the fluorescent lamps in the LCD panel. The
lamps provide the backlight in the monitor.
Laptop computers can have integrated or separate graphics cards. Built-in cards use the
main memory. Dedicated cards usually use their own memory, although some cards
have some memory but also share main memory. Dedicated video cards require more
power, so those notebooks have a shorter battery life. However, the tradeoff might be
worth it for users who need faster response times.
A-3:
Heres how
Heres why
Youll compare the lowest-price monitor, a midpriced monitor, and the highest-price monitor.
1115
1117
Multiple monitors
If youre using an operating system that supports multiple monitors, such as Windows
7, Windows Vista, Windows XP, Windows 2000, or Windows 98, you can use two or
more monitors simultaneously. This arrangement is useful when youre working with
large spreadsheets, multiple related documents, and other large documents. Using dual
monitors in Windows 7 gives you a larger space to display two windows than the Aero
Snap feature does. Aero Snap displays each window in half of a single monitor. To use
multiple monitors, you need two displays, two video cables, and either two video
adapters or one video adapter with two ports.
You can connect CRTs, LCD monitors, or a mix of each. The setup depends on which
adapters your computer has and what types of monitors you have. The Microsoft
Knowledge Base article "Hardware requirements for multiple-display support in
Windows XP (article 296538), Windows Vista article located at
http://www.microsoft.com/whdc/device/display/multimonVista.mspx,
or Windows 7 Help at http://support.microsoft.com/kb/976064. This
contains information that can help you figure out what equipment you need to set up
multiple monitors. Exhibit 11-4 shows an example of a connecting two monitors to a
computer.
1119
Display projectors
Display projectors enable you to show whats on your screen to a room full of people.
These projectors are useful for meetings and classes. The device connects to the
computers VGA port. Theres usually a splitter so that the image is displayed on your
monitor and is projected onto a whiteboard, wall, or movie screen.
DisplayPort technology
The DisplayPort digital display interface is a new specification being developed by
VESA members. It covers CRT, LCD, plasma, and projection displays. It also covers
connections to PCs, game systems, DVD players, and other image sources. The cable
can carry high-quality audio along with the video information.
The specification defines a common interface for internal and external display
connections. The high bandwidth in the specification supports higher-resolution
monitors, higher refresh rates, and more colors.
The DisplayPort connector is smaller than connectors meeting the current video
standards. The smaller cable accommodates thin notebook computers and other devices,
as well as desktop computers. Multiple ports fit on a single video card. More
information can be found at vesa.org/press/displayportpr.htm.
A-4:
Heres how
Heres why
COMPADMIN##
settings
1121
Click Apply
Click Yes
Click No
Topic B: Cameras
This topic covers the following CompTIA A+ Essentials (2009 Edition) exam version
2.0 objective.
#
Objective
1.8
Digital cameras
Explanation
Digital cameras are very popular devices. The quality of the picture that a digital camera
takes is expressed in megapixels, or millions of pixels contained in the image. Camera
resolution capacities range from less than 1 megapixel to more than 8 megapixels.
The following table describes the resolutions needed for typical uses. Higher-megapixel
images are larger files. As the cost of digital technology comes down, youll find higher
megapixel depths offered in Web cameras, phone cameras, and consumer-grade cameras
than those listed in the following table.
Megapixels
(MP)
Good for
Print size
(max.)
Found in
Under 1 MP
1 to 2 MP
E-mailing pictures
4"6"
3 to 4 MP
Printing, e-mailing, or
using on the Web, if you
resize or crop the image
5"7"
5 to 8 MP
Large prints
8"10"
Over 8 MP
11"14"
and larger
Memory cards
Images in digital cameras are stored on memory cards. Some cameras also include
internal memory, which is built into the camera and isnt removable.
The higher a pictures resolution is, the larger the file is. Most cameras have settings for
lower-quality pictures so that you can fit more pictures on a card, but the default setting
is typically for the highest quality.
An uncompressed picture from a 4 MP camera is around 6 MB per picture. An
uncompressed picture from a 6 MP camera is about 7.5 MB per picture. Most cameras
use compression, though, so the file is half the size of the uncompressed state.
1123
Memory cards are removable, so having extra ones allows you to take more pictures
without needing to delete some or transfer them to your computer before taking more
pictures.
This is useful if youre going to be away from the computer for a while, such as on
vacation or taking a full days worth of pictures before being able to upload them to the
computer.
There are several different types of memory cards. Check your camera documentation
to see which one your camera uses. The following table describes the memory cards
youre likely to encounter. They all use solid-state circuitry with no moving parts.
Exhibit 11-6 and Exhibit 11-7 show a few of the memory cards described in the table.
Type
Description
CompactFlash
Memory Stick
Comes in two versions: MS and MS Duo. Duo is often sold with an adapter so that
it can be read by or used in devices that use MS.
Controller: Built into the memory card.
Capacity: Up to 8 GB.
Secure Digital
SmartMedia
xD-Picture Card
Memory stick
SD card
1125
B-1:
Heres how
1 Insert the media card into the
digital camera
Heres why
Youll use a digital camera and then connect it
to the computer to transfer the picture to the
hard drive.
Network cameras
Network cameras (also called IP cameras), like webcams, are designed for Web-based
video, and sometimes audio, distribution. Unlike webcams, network cameras dont need
to be connected to a PC. Instead, they include a network port supporting wired or wireless
Ethernet network connections. Network cameras also include embedded software that
captures the video and packages it for distribution. Often the embedded software includes
a limited-functionality Web server that allows a limited number of users to connect and
view the video stream.
1127
Network cameras are used for live video feeds (and are often called "live webcams
when used this way). Some include software that enables their use as security
camerasthe software detects motion, turns on the camera, begins saving video footage
on an internal storage location or server, and sends an e-mail or text message to a
designated address.
Connection software
In order to make a connection with a webcam or network camera that doesnt have its
own Web server software, you need to connect to a service provider, such as Skype,
Vonage, or a plethora of other providers, which enable people across the globe to
communicate with one another, often at no charge. The exact steps to install, configure,
and connect vary by provider, so its best to use the instructions on your chosen
providers Web site to get your webcam or network camera transmitting across the Web.
B-2:
Heres how
1 Download Skype for Windows
Heres why
If youre using a different operating system,
download Skype for that platform instead.
Visit www.skype.com
Click Download Skype
Click Download Now
If necessary.
Location: ______________________________
2 Open SkypeSetup
Follow the programs prompts to
install Skype
3 When prompted, create a new
Skype account
Click Next
Enter your e-mail address and location
Click Sign In
Close the Getting Started window
1129
Open Skype
10 Both partners:
click
1131
In this topic, you learned about CRT monitors. You learned how CRTs produce
images, and you learned about the terminology used to describe CRT monitors. Then,
you identified advantages of LCD monitors over CRT monitors. You learned how
images are produced on an LCD monitor. You also briefly examined using multiple
monitors, display projectors, touch screens, and DisplayPort technologies.
Topic B
In this topic, you learned that you can use different types of cameras to input both static
and live images to your computer. Network video hardware and softwareincluding
webcams, network cameras, headsets, microphones, and speakerscan transmit both
live and previously recorded video, and sometimes audio, across the Web.
Review questions
1 Whats another name for a CRT monitor?
A DVI monitor
B Flat-panel monitor
C LCD monitor
D RGB monitor
2 What color dots are in a pixel triad? [Choose all that apply.]
A Black
B Blue
C Green
D Orange
E Red
F White
G Yellow
3 True or false? Degaussing prevents stray electrons from illuminating dots that
shouldnt be illuminated.
False. Thats the purpose of the shadow mask or aperture grill. Degaussing demagnetizes the
mask or grill, thereby neutralizing it. Degaussing prevents beam scattering, which degrades the
image display.
6 True or false? "Resolution refers to the relationship between the horizontal and
vertical sizes of the screen.
False. Resolution refers to the number of pixels on the display device.
7 True or false? "Contrast ratio refers to the difference between the shades of each
color on an LCD monitor.
False. Contrast ratio is the ratio between the monitors brightest white and darkest black.
9 The 24-bit color depth shows how many shades for each of the three basic monitor
colors?
A 24
B 32
C 128
D 256
E 1,024
10 True or false? LCD monitors use thin film transistor technology.
True
1133
121
Unit 12
Printers
Unit time: 100 Minutes
technologies.
B Install printers.
C Optimize printing and perform routine
122
Objective
1.11
Dot-matrix printers
Explanation
Dot-matrix printers have been around for as long as personal computers have been
available. They are rather rare today, but they still have their place in some companies
because multipart forms can be printed on them.
These printers are noisy and slow compared to other printer types. The noise comes
from the impact nature of the print method. Impact printers, such as dot-matrix printers,
use a mechanical means to press ink from a ribbon onto the page. With a dot-matrix
printer, small pins do the pushing. Each character is printed separately, leading to slower
output than from other printers.
Print quality on dot-matrix printers is comparable to that produced by a typewriter. One
of the main uses of typewriters was typing letters. Thus, the top print quality of a dotmatrix printer is referred to as near letter quality (NLQ).
Components
A dot-matrix printer uses a print head that usually contains 9 or 24 pins. The pins are
pushed forward in patterns to form letters, numbers, and other characters. The pins
strike an inked ribbon, and the ribbon strikes the paper.
Nine-pin printers produce low-quality images. Some printers print over the same area
after moving the paper slightly to overprint the first set of dots, thus improving the print
quality. Twenty-four-pin printers have smaller pins closer together, so they produce a
finer image than 9-pin printers do.
The paper is pulled through the printer by a tractor feed or friction. A tractor feed uses a
sprocket to mesh with holes in the side of continuous-form paper. The sprockets turn,
pulling the paper through the printer. Friction feed uses single sheets of paper. The
roller is held tight against the print head, and the paper moves through. Typewriters use
friction feed. Most printers have a lever for switching between tractor feed and friction
feed.
The continuous-form paper usually has perforations at 11-inch or 14-inch intervals so
the paper can be separated into standard-sized pages. The paper is also perforated along
the side so that the area with the tractor holes can be removed after printing. When
youre setting up the paper in the printer, align the top of the page with the print head so
that pages dont print across the perforations.
Printers
123
Banners are often printed on dot-matrix printers using continuous-feed paper. Banners
can be printed on perforated paper, usually without worrying about whether the paper is
at the top of the first page. You might also print banners on paper that has no
perforations between sheets.
Multipart forms are the main use of dot-matrix printers now that other printer types have
become more affordable and easier to use. The forms can be preprinted or blank.
Preprinted forms require careful alignment so that the print falls in the boxes or on the
lines of the forms.
Friction feed was primarily used for envelopes and single sheets of paper. Some dotmatrix printers include a paper tray from which single sheets are fed, but more often,
you must insert the single sheet, set the lever for friction feed, and print each page, one
at a time.
Connections
Dot-matrix printers usually have either a serial or parallel interface connection. These
printers were the usual choice for users when personal computers were first introduced
(before interfaces such as USB, infrared, and IEEE 1394 were introduced). Its also rare
to find a dot-matrix printer with a built-in network interface. Some printers have both
serial and parallel interfaces so that users can choose.
Options
Dot-matrix printers dont usually have a lot of optional features. However, some printers
have slots for adding font cards, memory, or additional paper feeders for easy switching
between single sheets and continuous-form paper.
124
Do it!
A-1:
Questions
Answers
Inkjet printers
Inkjet printers, also known as ink dispersion printing technology, produce images by
forcing ink through tiny nozzles and onto the paper. Each nozzle is approximately 50 to
60 microns in diameter. The ink is forced through the nozzles through either of two
basic methods: thermal bubble or piezoelectric bubble. Exhibit 12-2 shows an inkjet
printer.
Printers
125
Piezoelectric technology
Piezoelectric technology creates a bubble with a piezo crystal behind each nozzle. An
electrical current sent to the crystal causes it to vibrate. When it vibrates inward, it
releases ink onto the paper; when it vibrates outward, it pulls ink from the cartridge.
Ink cartridges
Ink cartridges are the reservoirs that hold ink for inkjet printers. The number of
cartridges used varies, but most printers have a black cartridge plus a color cartridge
with compartments for yellow, cyan, and magenta. The entire color combination is often
referred to as CYMK (cyan, yellow, magenta, and black). Some printers have separately
replaceable cartridges for each of the colors. Some have more colors than these three
basic ones. Some inexpensive printers dont have a separate black cartridge. Instead,
when black is required, they mix all three colors together to produce a dark color.
Exhibit 12-3 shows two inkjet cartridges: one black, and one containing cyan, yellow,
and magenta inks.
126
Printers
127
Paper path
Some inkjet printers have a paper tray behind the printer and pull the paper through the
printer on a straight-through path. This setup leads to fewer paper jams and is good for
heavy paper stock. Exhibit 12-5 shows a straight-through paper path in an inkjet printer.
128
A-2:
Questions
1 What are the two basic methods of
ink dispersion in inkjet printers?
2 List the colors found in a fourcolor inkjet printer.
3 True or false? The print head
moves across the page and prints
columns of pixels.
4 True or false? You can print
photos on any paper, but some
kinds of paper produce better
images than others.
5 Describe the paper path for inkjet
printers.
Answers
Printers
129
Laser printers
Laser printers provide the standard level of quality by which other printers are
measured. They can produce high-quality printouts in a high-volume printing
environment. Many laser printers are black-and-white output devices, but color laser
printers are dropping in price, to the point where theyre worth considering, even for
home use, if you plan to do more printing than an inkjet printer can handle. Exhibit 12-8
shows a laser printer.
Printers
1211
Description
Cleaning and
erasing
A rubber blade clears the excess toner from the drum. Another roller or corona wire
removes the charges from the drum.
Charging or
conditioning
The primary charge roller (in newer laser printers) or primary corona wire (in older
laser printers) applies a negative charge of approximately -600 volts to the EP drum.
Writing or
exposing
The laser beam reduces the negative charge to about -100 volts on the EP drum in the
areas that become the image to be printed.
Developing
Areas of the drum that were written to by the laser attract toner.
Transferring
A positive charge of about + 600 volts is applied to the paper by the transfer charging
roller or corona wire. The ink is transferred to the paper due to the charge.
Fusing
Pressure and heat set the toner to the paper. A 350F fusing roller melts the toner, and
by squeezing the paper through a set of rollers, presses the toner into the paper.
Note: Some sources place the cleaning and erasing stage at the beginning of the
process. Others place it at the end of the process. In either case, it prepares the drum for
receiving and printing the next image.
Do it!
A-3:
Question
1 Using your Web browser,
compare the cost of a laser printer
to the cost of the consumables.
2 What process do laser printers use
to produce images?
3 List the components of a toner
cartridge.
4 List the components of the laser
scanning assembly.
5 True or false? The HVPS converts
120-volt current into high-voltage
electricity used by the EP process.
6 List the steps in the laser printing
process.
Answer
Printers
1213
Other printers
Most corporate and home users use either an inkjet or laser printer. A few people still
use dot-matrix printers for special requirements or because they never upgraded as
newer technologies became available and at lower prices.
There are several other types of printers that you might encounter in your support
career. Most of these are too expensive for the casual user, but as prices continue to
drop on printer technologies, even these more expensive printer types might become
more commonplace.
Most of the printers mentioned in this topic are designed for high-quality production of
graphics. They produce a higher-resolution image even if the DPI statistics listed are as
the same as those of inkjet or laser printers. Printer resolution refers to addressable dots
per inch. Each of these dots can be composed of over 25 dots, thereby enabling a 300
DPI image to look the same as a 4800 dpi inkjet printout.
Solid-ink printers
Solid-ink printers use sticks of wax that are melted to create the ink for printing. There
are usually cyan, magenta, yellow, and black sticks. These are heated to a melting point.
After being combined to form the various colors in the image, the ink is then sprayed
onto the drum. The paper passes over the drum and under a roller, and the image is
transferred onto the paper.
Solid-ink printers are environmentally friendly, because they dont produce ozone as
laser printers do, and the ink is nontoxic. The process doesnt use excessive heat, as
laser printers do.
The output from solid-ink printers is very high quality. The ink sticks last for
approximately 3000 pages, compared to an average of 1500 pages for laser printers or
500 to 1000 pages for inkjet printers.
Plotters
Plotters are pen-based output devices that produce line images. (Printers produce raster
images.) Plotters are typically used for precise engineering documents from CAD
applications. A pen in the printer moves side to side on an X-axis as the paper moves up
and down on the Y-axis.
A multi-color plotter uses multiple pens to create an image. Usually, the plotter is a
carousel containing 4 to 12 pens, but in some plotters, you need to change the pen to
each color as you need it.
Plotters create lines with the pens. Other printers can create lines only by spacing the
dots very close together. Curved lines produced with a pen are smoother than those
produced with dots.
Most plotters are used to create engineering documents. Some other industrial uses have
replaced the pens with cutting devices. For example, in the garment industry, rather than
printing from the application, you cut fabric. The sign industry also uses plotters with
cutting devices to cut out signs; an application outputs the sign shape to the material to
be cut.
Printers
1215
Some of these printers also include a pop-up screen that enables you to manipulate the
picture before printing it. You can typically crop pictures and reduce red-eye effects
with such printers.
Large-format printers are typically inkjet-based printers. They are often used to create
banners and large signs.
Do it!
A-4:
Questions
1 Whats the base in which solid-ink
colors are held?
2 What features make solid-ink
printers environmentally friendly?
3 What base is the ink for a dye sub
printer held in?
4 Whats another name for the dye
diffusion thermal process?
5 True or false? Dye sub printers
require the use of halftones and
dithering to create shades of
colors.
6 List three types of thermal
printers.
7 Why can a plotter make a
smoother line than other types of
printers?
Answers
Objective
1.11
2.3
Given a scenario, determine the troubleshooting methods and tools for printers
Print spooler
Printer properties and settings
Print a test page
2.5
The Windows print process can be divided into three major processes. Each of these
processes is composed of several sub-processes involved in getting the print request
from the user to the printer. The three main processes are:
Client
Spooler
Printer
The client processes include the following:
1 A user sends a print job from within an application.
2 The application calls a graphics device interface (GDI).
3 The GDI sends the print job to the print spooler.
Printers
1217
B-1:
2 Which process does this step fall into: A graphics device interface (GDI) is called
by the application?
3 Which process does this step fall into? The print language is translated into
information that the printer can print.
4 Which process does this step fall into: The print processor makes any necessary
modifications for printing the job?
Exhibit 12-12: Notification that Windows 7 cant automatically install the appropriate
driver
Some printers come with a utility for monitoring the ink levels in the cartridges, so youll
know when ink supplies are getting low and need to be replaced. Exhibit 12-13 shows
such a screen from such a utility. Notice that it includes information about the current
print job and about the ink levels in the printer.
Printers
1219
Although you can purchase kits for refilling cartridges, using one usually voids the
printer warranty. If you do refill a cartridge, make sure that you get the ink thats right
for your printer. Thermal inkjet printers need ink that can withstand high heat. Getting a
water-soluble ink for a solvent-based ink printer or vice versa can result in improper
application of the ink to the page and create a major mess. Because the print head is
contained in most print cartridges, a cartridge should be refilled only two or three times.
Printer interfaces
Today, most inkjet printers are connected by USB interfaces. In supporting inkjet
printers, you might encounter some that still use the parallel port interface. Even less
likely, you might encounter some printers with SCSI or serial interfaces. Many inkjet
printers are also being manufactured with wired or wireless Ethernet network connections
so that they can be connected directly to your home or business network. Exhibit 12-14
shows the communications interfacesa parallel port and a USB porton an inkjet
printer.
Printers
1221
Interfaces
Laser printers are used in a wide variety of situations. These printers have the most
widely varied connection types of any printers. Most laser printers have two or more
connection interfaces. These could include:
Parallel
SCSI
USB
Serial
IEEE 1394/FireWire
Wired or wireless Ethernet network connections
Examples of the communications interfaces on a laser printer are shown in Exhibit 1216.
USB interface
Parallel interface
Printers
Do it!
B-2:
1223
Heres how
1 If necessary, log on to Windows 7
as COMPADMIN##
Heres why
The password is !pass1234.
If none is loaded.
Device Manager
Driver Software
Printers
1225
Manage
Device Manager
Click Cancel
18 Close Computer Management
Objective
1.11
2.3
Given a scenario, determine the troubleshooting methods and tools for printers
Manage print jobs
Print spooler
Printer properties and settings
6.1
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
1.4
1.5
Printer configuration
Explanation
After installing a printer in Windows, you can configure how it prints. Configuration
options include setting the defaults for orientation, number of pages, print quality, and
printer language. Keep in mind that laser printers connected to a print server might
require you or a server administrator to optimize the servers print settings, which can
override any settings you configure on a network client. An example of printer
configuration settings is shown in Exhibit 12-17.
Printers
1227
Description
Orientation
Portrait (narrow dimension is the top of page) or landscape (wide dimension is the top of the
page).
Collation
The way individual pages in a multipage document are printed when you print more than one
copy. Collated means that entire copies of the document are printed together. Uncollated
means that all copies of page 1 are printed, then all copies of page 2, and so forth.
Copies
Quality
Options for draft, normal, or high quality on some printers. Others offer varying resolutions.
Color
Full color or black-and-white. There might also be options for color matching software to be
used if such software is installed with your printer.
Order
The order the pages are printed infrom last page to first, or from first page to laston
multipage print jobs.
Printers
1229
Printer language
Description
pcl.sep
Printer control
language (PCL)
pscript.sep
PostScript
sysprint.sep
PostScript
sysprtj.sep
PostScript
For steps on creating a custom separator page using a text editor such as Notepad, go to
www.microsoft.com and search for "create custom separator page. There are several
articles about this process on Microsofts support site.
C-1:
Optimizing printing
Heres how
1 Open Notepad
2 Type some text in Notepad
3 Choose File, Print
Heres why
Youll examine the options available for your
printer.
Printers
4 Click Preferences
1231
9 Click OK
10 Close the Devices and Printers
window
Printers
1233
Some printers come with holders for printing on smaller media or on unconventional
media, such as CDs. The sensors often detect a paper jam if you try to feed envelopes or
small media through the normal paper path, so these holders enable the sensor to see a
full-size sheet going through.
Upgrades for inkjet printers include auto-duplexers. Usually, to print two-sided pages
with an inkjet printer, you have to determine how the sheet feeds through the printer,
and then turn the paper over so that the second side doesnt print upside down or on top
of the first page. The duplexer takes care of positioning the pages correctly for printing
on the backside.
A PostScript upgrade kit is available for some printers. This kit enables the user to send
PostScript output to the inkjet printer. Most printers dont use such sophisticated
language for creating printer output.
Mobile inkjet printers include batteries. This variation on the inkjet printer is popular
with users who do a lot of traveling and need to print documents. Options for mobile
printers include car adapters that plug into the cigarette lighter, additional batteries, and
carrying cases.
A Bluetooth adapter can be plugged into the USB port on the printer. This adapter
enables any Bluetooth-compatible device to print wirelessly.
Most inkjet printers arent designed for high-volume printing. However, if you want to
share your printer on a network, and you want to connect it directly to the network,
some printers have the option of installing an Ethernet card or a print server card. Some
other interfaces you might be able to add include IEEE 1394b and serial ports.
C-2:
Heres how
Heres why
Printers
1235
Maintenance
Sometimes simple maintenance is all thats needed to keep a printer running smoothly.
Check the manufacturers documentation for each device youre supporting. The
documentation will list any requirements for scheduled maintenance tasks, especially
on laser printers. Also check the devices log and service history to see which
maintenance tasks or repairs other technicians have performed.
Dot-matrix printers
Keeping the printer clean helps it last a long time. Paper bits, dust, and other debris can
easily get into a printer and cause problems. You can spray compressed air into the
printer to help remove such contaminants. You can use mild household cleaners on the
exterior case to keep it clean.
The roller can become sticky, especially if it gets printed on without any paper on it.
Rubbing alcohol is useful for cleaning the roller. Oil the print head or guide only if the
printer documentation instructs you to. Otherwise, doing so can clog the workings of the
printer.
Printers
1237
Laser printers
Laser printers require more maintenance than inkjet printers, and the maintenance is
more involved. However, regular maintenance can prevent service calls for poor print
output and paper jams. Generally, there are two times when you should perform
preventive maintenance on laser printers:
Scheduled maintenance Clean, lubricate, and perform adjustments based on
the manufacturers recommended schedules.
Unscheduled service calls During service calls, check the counters, such as
the one shown in Exhibit 12-21. Check the manufacturers recommendations for
maintenance, and clean, lubricate, and adjust components, or replace
components as needed. Before you complete the service call, examine the printer
for any potential future problems, and resolve those before you leave.
C-3:
Heres how
1 Turn off and unplug your inkjet
printer
Heres why
Youre going to perform some routine
maintenance tasks on an inkjet printer.
Printers
1239
Plug in the printer, if youre using a Windowsbased utility. Connect to your computer, if
necessary.
Objective
2.2
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
1.5
Printers
#
Objective
2.4
1241
Operational problems
Windows-specific printing problems
Print spool stalled
Incorrect / incompatible driver / form printing
When troubleshooting printer problems, which can include failed, distorted, and
defective print jobs, you can follow some general troubleshooting steps to isolate the
problem to one of the following areas:
The application trying to print
The printer
The operating system and drivers
The connection (either a printer cable or the network adapter, the network cable,
and the part of the network thats between the computer and the printer)
The application
To troubleshoot the application, first close down and restart it. If that doesnt solve the
problem, try printing other files from the same application.
If you can print other files from the same application, troubleshoot the file that
wouldnt print.
If the other files wont print either, try printing from another application,
especially a simple text editor, such as Notepad.
If you can print from another application, troubleshoot the application thats
causing problems, using the manufacturers documentation or Web site.
If you cant print from any applications, move on to testing the printer.
The printer
To verify that the printer is online and working, check its control panel or on-board
screen. Cycle the power off and on to see if that resolves the problem. Look for any
service error messages, which can indicate critical operational failures. Service
messages might also appear on the users screen if the printer or print server is
configured to display messages to users.
Printers
1243
Printer issues
When youve ruled out the application, the operating system, the drivers, and the
connection, youve isolated the problem to the printer. Use the following sections to
find a cause and solution for the specific print issue. If you arent able to resolve the
problem yourself, or you believe the solution requires a repair beyond your ability,
contact a qualified printer technician.
Printers
1245
Dark images
Cause
Solutions
Solutions
Low toner
Remove the toner cartridge and shake it horizontally (or according to the
manufacturers instructions) to redistribute toner. Replace the toner
cartridge as needed.
Laser failing
Incorrect paper
Solutions
Drum defect
Unplug the printer and allow the heated roller to cool for at least
15 minutes. Clean the roller, following the manufacturers
instructions. Replace the roller or fuser assembly if necessary.
Solutions
Solutions
Incorrect paper
Inspect the thermistor and thermistor cable. Test and replace the
fuser assembly. Replace worn or missing cleaning pads in the
fuser assembly.
Solutions
Laser/scanner assembly
failure (white horizontal
lines)
Printers
1247
Focus
Cause
Solutions
Loose or improperly
mounted laser assembly
Incorrect paper
Fusing temperature or
pressure too low
HVPS failing
Voided areas
Cause
Solutions
Damaged drum
Limited memory
Solutions
Verify that the pickup roller is operating properly. Clean and remove
any obstructions. Replace components as needed.
Check for proper operation of gears in the drive train; remove debris,
if necessary.
Verify that the paper tray isnt worn or defective. Check paper guide
tabs.
Special paper
Check for loose or bent paper guide tabs. Check for obstructions or
debris buildup in the paper path.
Solutions
Misaligned or worn
transfer belt
Solutions
Incorrect paper
Printers
1249
Solutions
Remove dust and debris from the laser aperture, LEDs, or other
optical components.
Check for debris (tape, staples, etc.) in the cartridge where the
magnetic roller lifts the toner out of its trough. Remove debris.
Solutions
Transport/feed issues
Transport and feed issues, some of which have already been described, include the
following:
Media jamming
Skewing
Creasing, wrinkling, folding, and tearing
Multiple sheets feeding in at one time (multifeeding) and misdirected media
(misfeeding)
Burning
Printers
Do it!
D-1:
1251
Heres how
Heres why
In this topic, you learned about dot-matrix printers, which are slow, noisy impact
printers good for printing multipart forms. You learned that dot-matrix print heads
typically have 9 or 24 pins and that the paper can be moved through the printer by
tractor-feed or friction-feed mechanisms. You learned about inkjet printers and how
they force ink through nozzles by using thermal bubble or piezoelectric technology.
You learned that cyan, yellow, magenta, and black (CYMK) inks are commonly used in
color inkjet printers. Next, you learned about laser printers, which are becoming quite
affordable, although the consumables sometimes cost as much as the printer. You
learned that laser printers use the electrophotographic process to produce images. You
identified the components of a laser printer, and you listed the stages involved in the
laser printing process. Finally, you learned about other types of printers, including
solid-ink, thermal, and dye sublimation printers. You also examined the use of plotters,
snapshot printers, and large-format printers.
Topic B
In this topic, you examined the Windows printing process and its components,
including the spooler. Then you installed a printer and learned how to upgrade printer
drivers. You installed printer add-ons and upgrades.
Topic C
In this topic, you learned how to maintain printers. You learned the steps you should
take during routine maintenance of inkjet and laser printers, including replacing
consumables, removing accumulated dust and toner, replacing parts based on parts-life
counters, and ensuring a well-ventilated environment.
Topic D
In this topic, you learned how to troubleshoot printers. You learned how to isolate
problems in printers and how to troubleshoot problems with image quality.
Review questions
1 Whats the print quality of dot-matrix printers compared to?
A Darkroom photographs
B Laser printer output
C Thermal printer output
D Typewriter output
2 How many pins does the print head of a dot matrix printer contain? [Choose all that
apply.]
A 6
B 9
C 12
D 24
E 36
3 A __________-wheel printer is an impact printer that could produce letters using
only the font that was on the wheel installed in the printer.
daisy
Printers
1253
4 Which printing technology uses an electrical current sent to a crystal, which causes
it to vibrate and release ink onto the paper?
A Inkjet
B Laser
C Piezoelectric bubble
D Thermal bubble
5 True or false? The print head for inkjet printers is usually part of the ink cartridge.
True
6 Whats inkjet output quality compared to? [Choose all that apply.]
A Darkroom photographs
B Laser printer output
C Thermal printer output
D Typewriter output
7 A(n) _____________ paper path stores paper in a tray below and in front of the
printer, and the printer pulls the paper up through rollers and under the print head.
curved
8 True or false? Laser printers combine electrostatic charges, toner, and laser light to
produce high-quality images one page at time.
True
9 What is the laser printing step in which "areas of the drum that were written to by
the laser attract toner?
A Exposing
B Fusing
C Developing
D Transferring
10 Which laser printer component is made up of rollers and a heating lamp?
A Electronic control package
B Fusing assembly
C Transfer corona assembly
D Toner cartridge
11 Which laser printer component is used to focus the laser beam?
A Corona wire
B HVPS
C Mirror
D Lens
15 For dot-matrix printers, what is the option that allows you to switch between sheetfeed, single-page paper and tractor-feed paper without having to unload either from
the printer?
A Additional paper trays
B Auto-duplexers
C Offset stacker
D Paper park
16 For inkjet printers, what is the option that allows printing on both sides of a single
sheet of paper?
A Additional paper trays
B Auto-duplexers
C Offset stacker
D Paper park
17 True or false? Inkjet printers cant print PostScript.
False. Some can be upgraded with a PostScript upgrade kit.
18 If you have users who print large documents with many graphics, you can optimize
performance by configuring the printer _________ setting.
spool
Printers
1255
21 Which of the following is the most likely cause of ghosting or shadows on printed
page?
A Accumulated toner on the transfer corona
B Broken paper guides
C A faulty sensor in the registration assembly
D Residual toner on the drum
22 Which of the following are possible causes of smudged print? [Choose all that
apply.]
A Low toner
B Damp paper
C Debris on the laser scanning mirror
D Limited memory
E Fuser problems
23 What problems might you see if the temperature of the fuser is too low?
Smearing; unfocused text and graphics.
25 What problem should you suspect if you have weak or missing color on printouts?
The color toner supply or incorrect paper.
26 List some likely problems youd see on pages printed in a laser printer with a faulty
drum.
Repetitive image defects, blank pages, light or weak text and graphics, voided areas, and ghosts
or shadows.
27 How can a paper path test help you isolate a problem in a laser printer?
It can show you where theres a problem in the paper path, from the paper tray to the exit rollers.
6 What kind of maintenance kits are available and what do they contain?
Answers will vary by manufacturer.
131
Unit 13
Connecting computers
Unit time: 100 Minutes
network.
B Compare wired network connections.
C Differentiate between basic
internetworking devices.
132
Objective
4.1
4.2
4.3
6.1
Outline the purpose of appropriate safety and environmental procedures, and given a
scenario, apply them
EMI
Network interference
Connecting computers
133
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
3.2
Networking models
Explanation
Nowadays, networks make the world go round. From the small home network to the
larger networks at your doctors office or your bank to the world-wide Internet,
networks are involved in some way in almost all of the business activities and a good
part of the leisure activities in the world today.
134
Network topologies
Networks are defined by a combination of their logical and physical topologies. A
logical network topology describes the path that data takes between nodes. It is
generally determined by the communication protocols used. The physical network
topology describes the material layout of network wiring and the locations of nodes.
Connecting computers
135
136
Connecting computers
137
138
Connecting computers
139
A-1:
Do it!
A-2:
Heres how
1 Identify the server computer in
your classroom
Heres why
Youll identify components of your classroom
network. There might not be a server in your
classroom configuration.
Connecting computers
1311
Network wiring
The computers in the network need a pathway to connect each other. This pathway can
be a physical connection, using cabling. The connection can also be made through radio
waves, infrared light, or other wireless methods.
Wiring is the heart of a network. Its also the part most vulnerable to performance
problems caused by poor installation practices. Installing wiring in new construction is
generally a straightforward process. Installing wiring in existing structures, whether
within the walls or on the surface, can be a frustrating experience. No network is better
than the quality of the wiring it runs on.
Connecting computers
1313
Twisted-pair cable
Twisted-pair cable is commonly used in many business applications to deliver both
voice and data information from one location to another. Selection of the proper cable
type is based on the cables electrical characteristics, conductor size, and ability to resist
electromagnetic interference (called crosstalk or noise).
Until recently, most networks have used either unshielded twisted-pair (UTP) or
shielded twisted-pair (STP) cabling to connect the nodes in the network. The twistedpair cable used for networking has four pairs of wires. The wires in each pair are twisted
around each other, and the pairs are twisted together and bundled within a covering, as
shown in Exhibit 13-7. The two wires (two halves of a single circuit) are wound
together to cancel out electromagnetic interference (EMI) from external sources. The
pairs are twisted together to prevent crosstalk.
Crosstalk occurs because alternating electrical current flowing through a wire creates an
electromagnetic field around the wire. This field then affects the current flow in any
adjacent cables. When you place two wires in an electrical circuit close together, as is
done in each of the twisted wire pairs, their electromagnetic fields are the exact opposite
of each other. The magnetic field in one wire cancels out the other wires field. The
more twists you have in a cable, the better it is at reducing crosstalk. However, there is a
drawback. When you increase the number of twists, you also increase the distance that
signals must travel down the cable, thus increasing attenuation. Attenuation is a decrease
in the strength of the electrical signal as it travels farther down the cable.
Speed and
frequency
Typical use
CAT 3
10 Mbps; 16 MHz
CAT 5
CAT 5e
Used for data and voice in Fast Ethernet and Gigabit Ethernet
networks. Has better transmission performance characteristics
than CAT 5.
Ethernet, Fast Ethernet, Gigabit Ethernet, Token Ring, and
ATM all support CAT5e.
CAT 6
Connecting computers
1315
There are other categories of twisted-pair cabling, which the following table describes.
Category
Speed and
frequency
Typical use
CAT 1
Up to 1 Mbps; 1 MHz
CAT 2
4 Mbps; 4 MHz
CAT 4
16 Mbps; 20 MHz
CAT 6a
CAT 7
CAT 7a
40 Gbps at 50 meters,
100 Gbps at 15 meters;
1000 MHz
Currently, when you go to purchase CAT twisted-pair cabling, youll find two
categories: solid and stranded. Solid cabling has a thicker, more protective covering,
making it less flexible. Its best for longer network runs and for fixed wiring
applications. Stranded cabling has a thinner protective covering, making it more pliable
and useful for shorter distances and for movable wiring applications such patch cables.
Current TP telephone wire typically contains two pairs of wires: pair 1 is blue and
blue/white; pair 2 is orange and orange/white. The oldest style of residential twistedpair wiring consisted of just two wires, typically wrapped in brown insulation.
Coaxial cable
Twisted-pair and fiber optic cabling are used most often in todays networks, but if
youre supporting older networks, you might run into some coaxial cable. Coaxial
cables (coax for short) contain a layer of braided wire or foil between the core and the
outside insulating layer. The shielding provided by this layer helps protect the data from
EMI problems. Another layer of plastic or rubberized material separates the central core
from the shielding layer, because if these two layers touch, the data signal will be
damaged or lost. A coaxial cable is shown in Exhibit 13-9.
Connecting computers
1317
Impedance
Core size
Uses
RG-6/U
75
1.0 mm
RG-6/UQ
75
1.0 mm
RG-8/U
50
2.17 mm
RG-9/U
51
2.17 mm
RG-11/U
75
1.63 mm
RG-58A/U
50
0.9 mm
RG-59/U
75
0.81 mm
Another coax cable you might encounter is marked RG-62/U. This cable is used for the
older network technology called ARCnet. This cable has 93 impedance and uses
AWG 22 gauge wire with a .64 mm core.
Connecting computers
1319
When youre working with coax for networking applications, its important that you
dont mistake RG-59 cable for RG-58, the stranded copper defined for 10Base2 thinnet.
RG-59 coaxial cable is used for low-power video and RF signal connections. Youll
find it shipped with consumer electronic equipment, such as VCRs or digital cable and
satellite receivers. The impedance between these two cables is different50 versus
75 . Network equipment is designed to expect particular cable impedance. If you use a
cable with incorrect impedance, power is lost during data transfer, resulting in low
signal reception. Such low reception causes the network link performance to suffer or to
fail completely.
In recent years, RG-6 cables have become the standard for cable TV, replacing the
smaller RG-59. RG-6 cables have less attenuation of data signals and better shielding
than RG-59. RG-6 cable handles signals sent in the higher GigaHz frequencies better
than RG-59 cable does; the latter was designed to handle MegaHz range signals. RG-6
cables are most commonly used to deliver cable television signals to and within homes,
and they arent suitable for networking.
A-3:
Heres how
Heres why
Cable type:
______________________________________
Connecting computers
1321
Plenum wiring
A plenum is an enclosure thats used to move air for heating, cooling, or humidity
control in a building. A plenum might be created by a false ceiling, a false floor, metal
duct work, or a variety of other construction methods, but its main purpose is to move
air thats environmentally controlled in some manner. A secondary purpose of a plenum
might be to contain high- or low-voltage wiring. Because plenums often connect rooms
in a building, they provide convenient paths through which to run wiring.
A-4:
Heres how
1 If necessary, boot your computer
and log on to Windows 7 as:
User name: COMPADMIN##
Password: !pass1234
2 Open Internet Explorer
3 Use your preferred search engine
to determine which categories of
network cable are available in
plenum grade
4 What is the price difference
between plenum-grade cabling
and general-purpose cabling?
5 What is a typical temperature
rating for plenum-grade CAT
cable?
Heres why
Where ## is your assigned student number.
Connecting computers
1323
Ethernet
Ethernet is the most popular media access method in use today. Its popular because it
strikes a good balance between ease of setup and use, speed, and cost. Four types of
Ethernet architecture are available now. Each is distinguished primarily by the speed at
which it operates. This is referred to as the networks data rate or bandwidth and is
measured in bits per second (bps). The four types are:
10-Gigabit Ethernet (also called 10GbE) The fastest of the Ethernet
standards. With a data rate of 10 Gbps (gigabits per second), it is 10 times faster
than Gigabit Ethernet.
1000-Mbps Ethernet (or Gigabit Ethernet) Operates at a speed of 1000
Mbps (1000 megabits per second = 1 gigabit per second). Its used for large,
high-speed LANs and heavy-traffic server connections. Few, if any, home
networks require Gigabit Ethernet.
100-Mbps Ethernet (or Fast Ethernet) Operates at a speed of 100 Mbps.
10-Mbps Ethernet Operates at a speed of 10 Mbps. The first Ethernet
version was developed by the Xerox Corporation in the 1970s and later became
known as Ethernet IEEE 802.3. All subsequent Ethernet architectures conform
to IEEE 802.3.
Ethernet can be set up with various types of wire or cable. However, the different
speeds of the versions and the conditions in which they operate usually dictate what
type of connecting wires you need to use. BASE refers to baseband signaling, which
means that only Ethernet signals are carried on the wire or cable.
The bandwidth for each network type is a theoretical maximum value. A networks
actual bandwidth can be reduced by network data processing delays. These delays are
collectively called latency. Latency can be caused by a variety of factors, such as when
a network device that operates at a slower data rate than other network components, or a
device becomes overloaded with data and cant process it all in a timely manner. The
impact of latency on a networks bandwidth can last just a few seconds or can be
persistent depending on the source of the delays.
Designations for the different Ethernet standards are based on the medium that each
standard uses:
BASE-R standards Run over fiber optic cable.
BASE-W standards Run over fiber optic cables; referred to as Wide Area
Network Physical Layer (WAN PHY). BASE-W standards use the same types of
fiber and support the same distances as 10GBASE-R standards; however, with
BASE-W, Ethernet frames are encapsulated in SONET frames.
BASE-T standards Run over twisted-pair cable, either shielded or
unshielded.
BASE-C standards Run over shielded copper twisted-pair cable.
Most current Ethernet installations use unshielded twisted-pair (UTP) cable or fiber
optic cable. Older Ethernet installations used either 50-ohm RG58A/U coaxial cable
(also known as thin Ethernet and 10Base2) or 50-ohm RG8/U coaxial (known as thick
Ethernet and 10Base5). However, these are both obsolete now.
In the names of these standards, F typically identifies fiber optic cabling. R refers to
LAN technologies, and W refers to WAN encodings. S, L, and E designate wavelength.
Medium
Distance
10GBASE-T
10GBASE-SR
10GBASE-SW
Multi-mode fiber
26 or 82 meters,
depending on the
diameter of the cable used
Notes
Single-mode fiber
10 km
10GBASE-ER,
10GBASE-EW
Single-mode fiber
40 km
Used to connect
transceivers.
Medium
Distance
Notes
1000BASE-T
1000BASE-CX
Balanced copper
shielded twisted-pair
25 meters
1000BASE-LX
Single-mode optic
fiber
5 km*
1000BASE-LX10
Single-mode optic
fiber
10 km
Wavelength of 1270 to
1355 nm.
1000BASE-BX10
Single-mode fiber,
over single-strand
fiber
10 km
Different wavelength
going in each
direction1490 nm
downstream, 1310 nm
upstream.
1000BASE-SX
Multi-mode optic
fiber
500 meters
Connecting computers
1325
Medium
Distance
Notes
100BASE-TX
Twisted-pair
copper, CAT5
or above
Single- or
multi-mode
fiber
100BASE-FX
10BASE-T
The 10BASE-T standard has a peak transmission speed of 10 Mbps, using copper
twisted-pair cable. It can operate up to 100 meters. This standard was widely deployed
in the 1980s, using inexpensive and flexible twisted-pair cabling. It was easier to install
than previous Ethernet implementations that used coaxial cable.
Ethernet bonding
Ethernet bonding combines the bandwidth of two network interface cards as a costeffective way to increase the bandwidth available for data transfers for critical servers,
such as firewalls and production servers. Ethernet bonding can also provide fault
tolerance so that when one NIC fails, you can replace it without disabling client access
to the server.
A-5:
Questions
1 Which is the fastest Ethernet
standard?
Answers
Connecting computers
1327
Wireless LANs
Wireless LAN (WLAN) technology uses radio waves or infrared light instead of cables to
connect network nodes. Connections are made through a wireless NIC, which includes
an antenna to send and receive signals. WLANs are popular in places where networking
cables are difficult to install, such as outdoors or in historic buildings with wiring
restrictions, or where there are many mobile users, such as on a college campus.
A-6:
Question
1 In wireless communications, what
replaces the wire?
2 What should you consider when
determining which wireless
technology to use?
Answer
Connecting computers
1329
Description
Dial-up networking
(DUN)
Virtual private
network (VPN)
Digital Subscriber
Line (DSL)
Cable
Connections made over the same lines that carry cable television
signals.
Satellite
Wireless
Cellular
Faster WAN technologies are used to connect a small ISP or large business to a regional
ISP, and to connect a regional ISP to an Internet backbone. These technologies include
the following:
T lines and E lines
X.25 and frame relay
ATM
POTS/PSTN
The slowest but least expensive Internet connection to an ISP is affectionately known
as plain old telephone service (POTS). Also referred to as the public switched
telephone network (PSTN), its the network of the worlds public circuit-switched
telephone networks. Use of this network used to be a common method of home
connection, and it uses a dial-up system each time the connection to the ISP is made
over the telephone line, as illustrated in Exhibit 13-15. As the Exhibit illustrates, digital
data are converted to analog by the modem, then sent over the telephone system. At the
receiving end, the modem converts the data from analog back to digital. The
connection isnt continuous, and when the line isnt connected to an ISP, it can be used
for regular telephone service or any other telecommunications function. The maximum
data speed on a regular telephone line is 33.6 Kbps for uploading and 56 Kbps for
downloading.
A technology called modem bonding allows multiple dial-up links over POTS to be
combined for redundancy or increased throughput.
Connecting computers
1331
Description
B channel
D channel
H channel
DSL
A Digital Subscriber Line (DSL) is a high-speed data and voice transmission line that
still uses telephone wires for data transmission but carries the digital data at frequencies
well above those used for voice transmission. DSL uses a DSL transceiver (commonly
referred to as a DSL modem by laymen), a standard phone line coming into the
transceiver, and a USB or Ethernet RJ-45 connection to the computer. Voice and digital
data can be transmitted on the same line at the same time. The regular voice telephone
line must be dialed for each use, but the DSL part of the line is always connected to the
computer.
A typical DSL can transmit data at speeds up to 1.5 Mbps in both directions, or it can be
set up as an asymmetric line (ADSL), which can transmit up to 800 Kbps upstream (to
the ISP) and 8 Mbps downstream (from the ISP). Other variations of DSL include
Symmetric Digital Subscriber Line (SDSL), with speeds up to 2.3 Mbps in both
directions; High-bit-rate DSL (HDSL), with speeds up to 1.5 Mbps in both directions;
and Very high-bit-rate DSL (VDSL), with speeds up to 52 Mbps downstream and 16
Connecting computers
1333
Thus, the connectivity devices you use with those media should not be called modems.
Technically, such devices are transceivers. However, most people still call them
modems, as in cable modem or DSL modem.
Satellite
A satellite-link Internet connection to an ISP is available nationwide. Its especially
attractive in rural areas where telephone-based services might be limited and cable
sometimes isnt available. A satellite communication link uses a dish, similar to a
satellite television dish, mounted on the building to communicate with a stationary
satellite in orbit. The server is connected to the dish antenna. Incoming Internet data
travels from the ISP to the satellite in orbit, and then down to the dish and into the LAN
server. The connection speed varies according to the ISP but can go up to 1.5 Mbps.
The uplink connection from the LAN to the ISP is sometimes made by a telephone
line/modem connection and isnt as fast as the satellite downlink. A digital radio signal
from the LAN up to the satellitewhich in turn sends the signal to the ISPis also
available. However, it costs much more than the telephone connection, which is usually
adequate for sent data.
Exhibit 13-17 illustrates how a satellite ISP sends data at high speed to LANs via a
stationary satellite and receives data from the LAN over a slower telephone/modem
line.
Connecting computers
1335
At the time this course was written, many cellular providers were promoting their 3G
and 4G networks. The 3G networks are wide-area cellular telephone networks that
evolved to incorporate high-speed Internet access and video telephony. The 3G standard
is based on the ITUs IMT-2000 standard and doesnt specify a standard data rate. It
typically provides a minimum speed of 2 Mbps and a maximum of 14.4 Mbps for
stationary users, and 348 Kbps in a moving vehicle. The 3G networks use EV-DO
technology.
The 4G networks are capable of speeds of 100 Mbps while moving and 1 Gbps
stationary.
The 4G standard is still in development, with the following goals:
More simultaneous users per cell, thus increasing network capacity
A minimum data rate of 100 Mbps between any two points in the world
Connectivity and roaming across multiple networks
High QoS (quality of service) for multimedia support: Multimedia Messaging
Service (MMS), video chat, mobile TV, HDTV content, and Digital Video
Broadcasting (DVB)
Interoperability with existing wireless standards
Implementation as an all IP-packet-switched network
Access to 4G networks will be provided by such schemes as the following: Code
Division Multiple Access (CDMA); Multi-carrier code division multiple access (MCCDMA); and Frequency Division Multiple Access (FDMA) schemes, such as
Orthogonal FDMA (OFDMA), Single Carrier FDMA (SC-FDMA), and Interleaved
FDMA.
T lines and E lines
The first successful system that supported digitized voice transmission was introduced
in the 1960s and was called a T-carrier. A T-carrier works with a leased digital
communications line provided through a common carrier, such as BellSouth or AT&T.
Although it was originally intended for voice, the line also works with data. The system
has become a popular choice for Internet access for larger companies. The leased lines
are permanent connections that use multiplexing, a process of dividing a single channel
into multiple channels that can be used to carry voice, data, video, or other signals.
Several variations of T-carrier lines are available; the most popular are T1 and T3 lines.
Multiplexing allows a T1 line to carry 24 channels, and each channel can
transmit at 64 Kbps. A 24-channel T1 line can transmit a total of 1.544 Mbps. If
a T1 line is used for voice only, it can support 24 separate telephone lines, one
for each channel.
A T3 line can carry 672 channels, giving it a throughput of 44.736 Mbps.
T1 and T3 lines can be used by a business to support both voice and data, with some
channels allocated to each.
The E-carrier is the European equivalent of the American T-carrier. The E-carrier is a
digital transmission format devised by ITU. (See the ITU Web site at www.itu.int.) An
E1 line can transmit data at a rate of 2.048 Mbps, and an E3 line can work at speeds of
34.368 Mbps.
Both T-carriers and E-carriers use four wires: two for receiving and two for sending.
Originally, copper wires were used (telephone wiring), but digital signals require a
clearer connection.
Connecting computers
1337
ATM
Asynchronous Transfer Mode (ATM) is a very fast network technology that can be used
with LANs as well as WANs. It uses fixed-length packets, called cells, to transmit data,
voice, video, and frame relay traffic. Each cell is 53 bytes: 48 bytes of data plus a 5-byte
header. The header contains the information needed to route the packet. All packets
used by ATM are 53 bytes, so its easy to determine the number of packets and the
traffic flow, and this helps utilize bandwidth efficiently.
ATMs also use virtual circuits, meaning that the two endpoints are stationary but the
paths between them can change. ATMs can use either PVCs or switched virtual circuits
(SVCs). SVCs are logical, point-to-point connections that depend on the ATM to decide
the best path along which to send the data. The routes are determined before the data is
even sent. In contrast, an Ethernet network transmits the data before determining the
route it takes; the routers and switches are responsible for deciding the paths.
ATMs achieve a throughput of 622 Mbps. This makes them popular for large LANs,
because theyre faster than Ethernet at 100 Mbps. An ATM network works best with
fiber optic cable, so it can attain high throughput. However, it also works with coaxial
or twisted-pair cable.
Maximum throughput
speed
POTS
Up to 56 Kbps
ISDN
Up to 1.5 Mbps
Asymmetric Digital
Subscriber Line
(ADSL)
Symmetric DSL
(SDSL)
1.544 Mbps
High-bit-rate DSL
(HDSL)
1.5 Mbps
Up to 52 Mbps downstream
and 16 Mbps upstream
Cable modem
802.11a wireless
Up to 54 Mbps
802.11b wireless
11 Mbps
802.11g wireless
Up to 54 Mbps
802.11n wireless
200 Kbps
Evolution-Data
Optimized (EV-DO)
Connecting computers
1339
Technology
Maximum
throughput speed
High-Speed
Downlink Packet
Access (HSDPA)
T1
1.544 Mbps
T3
44.736 Mbps
E1
2.048 Mbps
E3
34.368 Mbps
X.25
Up to 56 Kbps
Frame relay
Up to 1.544 Mbps
ATM
622 Mbps
SONET
Synchronous Optical NETwork (SONET) is an ANSI-standard protocol for signal
transmission on optical networks. SONET was originally designed to transport data
traffic in circuit-switching networks, such as T1 and T3. It evolved to transport ATM
traffic. SONET can carry nearly any higher-level protocol (including IP). Synchronous
Digital Hierarchy (SDH) is the European counterpart to SONET.
The SONET standard is divided into categories based on a base signal (Synchronous
Transport Signal, or STS) and an optical carrier (OC) level. The following table lists the
various categories of SONET.
Signal
Rate
STS-1, OC-1
51.8 Mbps
STS-3, OC-3
155.5 Mbps
STS-12, OC-12
622.0 Mbps
STS-48, OC-48
2.48 Gbps
STS-192, OC-192
9.95 Gbps
STS-768, OC-768
39.81 Gbps
A-7:
6 Whats ATM?
Connecting computers
1341
Small-office/home-office (SOHO)
In this day and age, you can assume that all small-office/home-office (SOHO) networks
are going to connect to the Internet in one way or another. The connection might be
used to browse the Web, communicate with customers through e-mail, or connect to a
private network at an office or school to check e-mail or transfer files. A SOHO can
connect to the Internet through an Internet service provider (ISP) and private networks
using any of the following methods:
POTS/PSTN
ISDN
DSL
Cable
Satellite
Wireless
Cellular
Bluetooth
A-8:
Exercises
1 For each user, select the appropriate connection technology.
Susan is a salesperson who travels extensively. She needs to send and receive
communication with the home office and clients while in transit. Whats Susans
best choice for connection technology?
James is an architect who works out of his home in a mountainous region. James
must send and receive large CAD drawings to and from clients and builders. What
is Jamess best choice for connection technology?
Grace lives next to James in the Adirondack mountains. She is retired and uses
e-mail to communicate with her children and grandchildren all over the country.
Sometimes they send her digital pictures attached to the messages so she can see
the grandchildren. She occasionally uses her Web browser to look up information.
What is Graces best choice for connection technology?
Outlander Spices currently spends thousands of dollars a month for local and long
distance telephone service. Like most companies, they have high-speed Internet
connections to most locations. What connection technology could they use to
support their telephone needs and save money?
2 Describe the ways that the cellular telephone system can be used to make Internet
connections.
Connecting computers
1343
Objective
1.2
1.9
4.1
4.2
4.3
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
3.2
Joining lengths of optical fiber is more complex than joining electrical wire or cable.
The ends of the fibers must be carefully cleaved, and then spliced together either
mechanically or by fusing them together with an electric arc. A ferrule is a cap placed
over the end of an object to prevent splitting. For optical fiber, the ferrule is a
component of the connector. The purpose of a cable connector (ferrule) is to terminate
the end of the cable and allow for ease in connecting and disconnecting the cable from
network devices to avoid splicing. In addition to preventing splitting, it aligns the fiber
with the socket. Ferrules can be ceramic, plastic, or stainless steel. Fiber optic
connectors must be designed to connect and align the fibers cores so that light can pass
through correctly. The most common fiber optic connectors include:
ST (straight tip) connectors are the most popular connection type for fiber optic
cables. These come in a few varieties. One is a slotted bayonet with a 2.5 mm
cylindrical ferule that screws on to the cable. The drawback of this is that it can
cause scratches on the fiber. Another ST type is a feed-through mechanism in
which the cable passes through the connector.
SC (standard connector) connectors use a 2.5 mm ferrule that snaps into a
network device with a simple push/pull motion. Its standardized in TIA-568-A.
You might also hear SC connectors referred to as subscriber connectors or
square connectors.
LC (local connector) connectors are half the size of SC connectors with a 1.25
mm snap-in type ferrule. You might hear LC connectors referred to as Lucent
connectors.
Other less common fiber optic connectors include:
FC (fixed connection) connectors have been mostly replaced with SC and LC
connectors. The FC connector uses a 2.5 mm ferrule that is keyed to align in the
connection slot and then screw tightened.
MT-RJ (mechanical transfer registered jack) connectors are duplex connectors
with both fibers in a single ferrule. It has male and female (plug and jack)
connections, snaps in to connect, and uses pins for alignment. You may hear
these connectors incorrectly referred to as RJ-45.
FDDI connectors have two 2.5 mm ferrules with a fixed shroud covering the
ferrules. FDDI connectors snap-in and are generally used to connect network to
a wall connection.
Opti-jack connectors have two ST-type ferrules in a fixed shroud the size of a
twisted-pair RJ-45 connector. Like the MT-RJ connector, the Opti-jack
connector snaps-in and has both male and female connections.
MU connectors are snap-in connectors similar to SC connectors but with a 1.25
mm ferrule.
Volition connectors are made by 3M. They dont use a ferrule. Instead you align
fibers in a V-groove like a splice. It connects using a snap-in and comes in both
male and female connections.
LX-5 connectors use the same ferrule as the LC connector, but it includes a
shutter over the end of the fiber. It also connects using a snap-in.
Connecting computers
Examples of the fiber optic connectors are shown in Exhibit 13-20.
B-1:
1 What are the most common fiber optic connectors you might encounter?
1345
Connecting computers
1347
End 2
Pin 1
Pin 8
Pin 2
Pin 7
Pin 3
Pin 6
Pin 4
Pin 5
Pin 5
Pin 4
Pin 6
Pin 3
Pin 7
Pin 2
Pin 8
Pin 1
Connecting computers
1349
B-2:
Heres how
Heres why
Connecting computers
1351
Coaxial connections
Thinnet (RG-58) cables connect to the computer with a BNC barrel connector. The
standard BNC is considered a 2-pin connectorpin 1 is the center conductor which
carries the data signal, and pin 2 is the tinned copper braid which provides the ground.
Segments of coax cable for networks are connected with T-connectors. The end of the
line ends in a terminator, which is needed to keep the signal from reflecting back down
the cable and corrupting data. Examples of these connectors are shown in Exhibit 13-24.
B-3:
Heres how
1 Locate a network coaxial cable
Locate a cable television coaxial
cable
2 What type of connector is
attached to each cable?
Heres why
Connecting computers
1353
Network adapter
A network adapter, also referred to as a network board or Network Interface Card
(NIC), provides a communication channel between your computers motherboard and
the network. The function of a NIC is to send and receive information from the system
bus in parallel and to send and receive information from the network in series. The NIC
also converts the data that it receives from the system into a signal thats appropriate to
the network. For an Ethernet card, this means converting the data from the 5-volt signal
used on the computers motherboard into the voltage used by UTP cables. The
component on the NIC that makes this conversion is a transceiver.
In most cases, the NIC is an adapter card that plugs into one of the expansion slots that
most PCs have on their motherboards or attaches to the computer through an external
port, such as a USB 2.0 or IEEE 1394 (sometimes referred to as FireWire) port. The
NIC has one or more ports built into it that are used to connect the NIC and its computer
to a network using a cable that plugs into the port or wireless radio waves. The type of
connector on the card varies with the type of network medium being used, as shown in
Exhibit 13-28.
NIC selection
When selecting a NIC, its critical to match it with the following:
The network architecture to which it connects
If wired, the specific type of cable connection it uses; if wireless, the standard it
uses (802.11a/b/g/n)
The type of slot in the computer (PCI or ISA) in which its installed
All internal cards for desktop systems are PCI cards at this point. If youre supporting
older equipment, you might encounter some ISA or EISA cards in which you need to
configure the IRQ, DMA, and I/O addresses. A utility from the manufacturer is used to
configure the settings on those cards.
Connecting computers
1355
Status indicators
Most networking devices, including NICs, have status indicator lights that you can
observe to see if the device is working. Typically, there is a solid link light if the device
sees a compatible networking device. An activity light flashes when data is being sent
or received. Some NICs have a single light that indicates both. If these lights arent
illuminating, you should check the configuration of the card to see if thats the problem.
You can do so through Device Manager.
The network card should be listed in Device Manager without any error or warning
icons. In Exhibit 13-30, the LAN network card is reported as functioning, but the
wireless adapter is reported as disabled.
B-4:
Heres how
Heres why
Manage
Click Continue
4 In the navigation pane, under
System Tools, select Device
Manager
7 Click Cancel
Close Computer Management
Connecting computers
1357
Modems
As you learned previously, modems are devices that enable you to connect your
computer to another computer through a phone line. A modem can be an external device
(Exhibit 13-32) connected to a USB or serial port. It can also be a modem card (Exhibit
13-33) using PCI slot, or in older computers, an ISA slot. The modem in the sending
computer must convert the digital signals within the computer to analog signals that are
compatible with the phone system. The receiving modem must convert analog signals to
digital signals.
Exhibit 13-34: Modems convert digital signals to analog and then back to digital
Sound traveling over regular phone lines is transmitted as analog signals. PC data must
be converted from two simple states or measurements, 0 and 1, or off and on, to waves,
like sound waves, that have a potentially infinite number of states or measurements.
Modems use different characteristics of waves to correspond to the zeros and ones of
digital communication.
On a PC, the modem provides a connection for a regular phone linean RJ-11
connectionwhich is the same type of connection that you see for a regular phone wall
outlet (Exhibit 13-35). In addition to a line-in connection from the wall outlet, a modem
usually has an RJ-11 connection for a telephone.
Connecting computers
Do it!
B-5:
1359
Heres how
Heres why
5 Click Cancel
Close Computer Management
Objective
4.1
5.2
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
3.2
Internetworking devices
Internetworking can be defined as the technology and devices by which computers can
communicate across networks. To connect computers together in a network, you need
connection devices, in addition to network interface cards or modems and cabling. In
this topic, youll look at three common internetworking devices: the hub, the switch, and
the router.
Connecting computers
1361
The benefit of the star design is that because each node has its own connection to the
central network connectivity device, when a single connection fails, it doesnt affect the
communication ability of other nodes connected to the same central device. However, if
the central device fails, all of the nodes connected to it will no longer be able to
communicate on the network. Currently the star design is the most popular LAN
physical topology.
Connecting computers
1363
C-1:
2 Which physical network topology has the benefit that its simple and inexpensive
to set up?
3 In which physical network topology does all communication on that segment stop
if theres a break in the line anywhere?
Connecting computers
1365
Ethernet hubs
To connect computers together in a network, in addition to cabling, connection devices
are also necessary. These vary depending on the transport protocol used.
When wiring Ethernet in a star topology, it is necessary to use a device that will take
the signal transmitted from one computer and propagate it to all the other computers on
the network. This device is called an Ethernet hub.
A hub is a network device that can be used to connect network devices. An example of a
hub is shown in Exhibit 13-41. A hub is generally inexpensive and is best suited for a
small, simple network. These devices can include computers, servers, or printers.
Connecting computers
1367
When a signal passes through a hub, it takes a small amount of time for the signal to be
regenerated. The time lag, or delay, between receiving the signal and sending it out
again is called latency. When many hubs are linked, a high level of latency is introduced
for packets traveling from one end of the collision domain to the other, and the carrier
sense portion of CSMA/CD becomes unreliable. When the latency is too high, the
number of collisions will increase because a computer at one end of the collision
domain can begin sending a packet while another computer at the other end is sending a
packet at the same time. A collision is the result.
There are several types of hubs on the market, of which the important ones are of four
types. Each has features of its own, but just about any combination of these feature sets
can be found in a single hybrid device. When purchasing a hub, make sure to perform
sufficient research to get a combination of necessary features.
Passive hubsA passive hub takes incoming electrical signals on one port and
passes them down the cable on its other ports
Active hubsActive hubs repair weak signals by actually retransmitting the
data with proper transmission voltage and current. This essentially resets the
cable length limitations for each port on the hub.
Switching hubsA switching hub takes an incoming packet of data and
actually looks inside at the destination hardware address. Then instead of
rebroadcasting this packet on all the ports, the hub sends the packet out to only
the port connected to the destination machine. Switching hubs can also make
changes in transmission speeds.
Intelligent hubsAn intelligent hub might have management features that help
it to report on traffic statistics, retransmission errors, or port
connects/disconnects. These hubs might have advanced features, such as built-in
routing or bridging functions.
Layer 2 switches
The term Layer 2 switch (also known as an Ethernet switch or simply switch) is
generally a more modern term for multiport bridge. Switches operate at the data link
layer of the OSI model. This means that they are capable of performing tasks that deal
with full packets of data and MAC addresses.
A switch connects devices like a hub, but learns MAC addresses and uses them to make
forwarding and filtering decisions. When a switch is first turned on, its not configured
with any information about which computers are connected to what ports. When a
switch doesnt know where to deliver a packet, it is delivered to all ports. Therefore, in
the first few moments of operation, it functions very much like a hub, in that it will
forward each packet received to every port except the one from which the packet came.
Broadcast packets are always forwarded to all ports.
As each packet is processed by the switch, the switch tracks the source MAC address of
the packet and the port on which it was received. In this way, the switch eventually
builds a list that contains the location of each computer on the network. Based on this
list, the switch forwards packets only to the relevant port. This enhances network
throughput by reducing traffic on the overall network.
Connecting computers
1369
Routers
As networks become more complex, you need an internetworking device that provides
control of the flow of traffic. Routers open the MAC (Media Access Control) layer
envelope and looks at the contents of the packet delivered at the MAC layer. The
contents of the MAC layer envelope are used to make routing decisions. The router
provides a port of entry that can control entrance and exit of traffic to and from the
subnet. This segmentation is vital in organizations that rely on department-level network
management. It also improves security and reduces congestion across the internetwork.
As shown in Exhibit 13-46, you can segment an extended internetwork into manageable,
logical subnets by using routers.
Connecting computers
1371
When a router receives a packet, it will generally forward it to the appropriate network
based on a table maintained in the router. There are two types of tables:
A static table is maintained by a system manager and is updated manually as the
network is modified.
A dynamic table is updated automatically as routers converse among themselves,
by using a common routing protocol.
The additional intelligence of routers provides for multiple (redundant) paths between
locations, which provide both backup and the ability to do load balancing, and makes
full use of available bandwidth.
Some key points to know about routers include:
A router connects two or more subnetworks.
A router might be configured to support a single protocol or multiple protocols.
A router will only process packets contained in frames specifically addressing it
as a destination.
Packets destined for a locally connected subnetwork are passed to that network.
Packets destined for a remote subnetwork are passed to the next router in the
path.
A router that exists in the same subnet as a host can be configured as a default
gateway.
Note: The term gateway is also used to refer to a network device used to connect
dissimilar systems or protocols.
Connecting computers
1373
Software firewalls include those bundled with Windows 7, Vista and XP, as well as
third-party applications, such as Zone Alarm. A software firewall on a local PC can also
prevent the spread of worms that transmit themselves to open ports on other PCs.
At their core, all firewalls protect networks by using some combination of the following
techniques:
NAT (network address translation)
Basic packet filtering
Stateful packet inspection (SPI)
Basic firewalls use only one technique, usually NAT, but firewalls that are more
comprehensive use all of the techniques combined. Of course, as you add features,
complexity and cost increase.
Stateless packet filters examine IP addresses and ports to determine whether a packet
should be passed on or forwarded. Stateful packet filters monitor outbound and inbound
traffic by watching addresses, ports, and connection data. Each time an internal client
makes an external request, its IP address is placed in a connection table. When the
stateful packet filter receives a communication from an external source, it attempts to
match the communication with the entries in the connection table. If the packet is part of
an existing communication stream initiated by an internal client, the packet is allowed
through. If not, the packet is dropped.
Some more advanced firewalls understand the data contained in packets and thus can
enforce more complex rules. For example, a firewall might determine that an inbound
packet is carrying an HTTP (Web) request and is going to a permitted address and port.
Such a packet would be transmitted. Packets carrying other protocols or going to other
addresses might be blocked.
Connecting computers
Do it!
C-2:
1375
2 You want to reduces congestion across the your network. Which internetwork
device would you use?
In this topic, you described the basic components of a network. You identified the
components that are required for a local area network, and learned about the difference
between a node and a host. You also learned about peer-to-peer and client/server
networks, and how each model works. You then identified the various types of
cablesfiber optic, UTP, STP, and coaxialused in LANs. You also learned how
computers are networked together in the most common network architecture, Ethernet.
You then examined how computers can be added to a network through wireless
connections. Finally, you learned about WAN technologies.
Topic B
In this topic, you compared the various wired network connections, the features of each
cable type, their data speed ratings, and the connectors they use. You also learned about
the special characteristics needed for plenum wiring. You then examined the different
types of NICs and how they differ between desktop and notebook computers. In
addition, you learned about modems and how they work.
Topic C
In this topic, you differentiated between three basic internetworking devices: Ethernet
hubs, routers, and switches. You learned that Ethernet hubs are used to wire network
devices into a star topology. Routers are used to connect network segments and to
create smaller, more manageable subnetworks out of a large network. Switches are used
to connect two networks and make them function as one.
Review questions
1 Which type of network is defined as a specifically designed configuration of
computers and other devices located within a confined area?
A Peer-to-peer network
B Local area network
C Client/server network
D Wide area network
2 In which type of network does each host on the LAN have the same authority as the
other hosts?
A Peer-to-peer network
B Local area network
C Client/server network
D Wide area network
3 Which type of network requires a network operating system (NOS)?
A Peer-to-peer network
B Local area network
C Client/server network
D Wide area network
Connecting computers
1377
10 _____________ cable has the best wiring value and expansion capability.
Composite
17 True or false? A LAN becomes a WAN when you expand the network
configuration beyond your own premises and must lease data communication lines
from a public carrier.
True
Connecting computers
1379
A Cellular
B DSL
C ISDN
D POTS/PSTN
Connecting computers
26 Which of the following Radio Guide cable categories are used for Ethernet
networking? [Choose all that apply.]
A RG-6
B RG-8
C RG-9
D RG-11
E RG-58
F RG-59
27 Which of the following fiber optic cable connectors is an ST connector?
1381
32 The device on a NIC card that converts the data it receives from the system into a
signal thats appropriate to the network is called a ______________.
A Port
B PROM chip
C Receiver
D Transceiver
33 True or false? On the majority of todays laptop computers, the network adapters
are PC Cards.
False. Network adapters are standard equipment on notebook computers now.
Connecting computers
1383
34 True or false? The purpose of a modem is to convert digital data signals from the
computer into analog signals for transmission over the phone line.
True. It also converts analog signals received from the phone line back into digital signals for the
computer.
2 Youve just purchased a laptop computer and want to connect it to your network,
which supports 802.11b wireless LAN. Research the cost of a wireless LAN card to
insert in your laptops PC Card slot. Compare the data transfer rates of the cards
youve researched.
Answers will vary.
b Use the status of your Local Area Connection object to determine the speed of
your network adapter.
Answers will vary.
c What type of network cable is used to connect your NIC to the LAN? What are
its properties in terms of connectors and maximum length?
Answers will vary.
141
Unit 14
Networking computers
Unit time: 105 Minutes
142
Topic A: Addressing
This topic covers the following CompTIA A+ Essentials (2009 Edition) version 2.0
exam objectives.
#
Objective
3.2
4.1
4.3
6.1
Outline the purpose of appropriate safety and environmental procedures, and given a
scenario, apply them
RFI
Cordless phone interference
Microwaves
Networking computers
143
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
2.1
Select the appropriate commands and options to troubleshoot and resolve problems
IPCONFIG (/all /release /renew)
PING (-t l)
3.1
3.2
144
Network protocols
Explanation
Computers and devices that are connected via network media require a method for
communicating with other computers and devices on the network. In order for
communication to occur, there must be a set of rules or protocols. Network
communication protocols establish the rules and formats that must be followed for
effective communication between networks, as well as from one network node to
another. A network communication protocol formats information into packages of
information called packets. The media access method, such as Ethernet, is then used to
send these packets onto the medium itself. The following table describes some common
network LAN protocols that you can use in Windows networks.
Protocol
Description
TCP/IP
IPX/SPX
AppleTalk
NetBEUI
Networking computers
145
Addressing
Every device on a network must have a unique address. On a network, different methods
are used to identify devices and programs, as shown in Exhibit 14-1. These methods are:
Media Access Control (MAC) address A unique address permanently
embedded in a NIC by the manufacturer.
IPv4 address A 32-bit address consisting of a series of four 8-bit numbers
separated by periods.
IPv6 address A 128-bit address, which can support a much bigger pool of
available addresses than IPv4.
Character-based names Host names, and NetBIOS names used to identify a
computer on a network with easy-to-remember letters rather than numbers.
MAC addresses
A MAC address, also referred to as a physical address, adapter address, or Ethernet
address, identifies a device on a LAN. Its a unique value expressed as six pairs of
hexadecimal numbers, often separated by hyphens or colons, as shown in Exhibit 14-2.
(In a hexadecimal number, a base of 16 rather than 10 is used to represent numbers.
Hexadecimal numbers consist of a combination of numerals and letters.) Part of the
address contains the manufacturer identifier, and the rest is a unique number. No two
NICs have the same identifying code. MAC addresses are absolutea MAC address on
a host normally doesnt change as long as the NIC doesnt change.
146
IP addresses
An IP address identifies a computer, printer, or other device on a TCP/IP network, such
as the Internet or an intranet. When you install a network interface card in a device, you
can configure it to use an IP address to communicate. The exact steps to do this vary by
device and operating system. You should refer to the appropriate manufacturer
documentation to configure IP addressing on your device.
There are two types of IP addressing schemes: IPv4 and IPv6. All protocols in the
TCP/IP suite identify a device on the Internet or an intranet by its IP address.
IPv4
An IPv4 address is 32 bits long and is made up of 4 bytes separated by periods. For
example, a decimal version of an IP address might be 190.180.40.120. The largest
possible 8-bit number, in binary form, is 11111111, which is equal to 255 in decimal.
The largest possible decimal IPv4 address is 255.255.255.255. In binary, its
11111111.11111111.11111111.11111111.
Within an IPv4 address, each of the four numbers separated by periods is called an octet
(for 8 bits). This number, in decimal form, can be any number from 0 to 255, making
for a total of 4.3 billion potential IP addresses (256 256 256 256). With the
allocation scheme used to assign these addresses, not all IP addresses are available for
use.
All IP addresses are composed of two parts: the network ID and the host ID. The first
part of an IP address identifies the network, and the last part identifies the host. The
network ID represents the network on which the computer is located, whereas the host
ID represents a single computer on that network. No two computers on the same
network can have the same host ID; however, two computers on different networks can
have the same host ID.
The Internet Assigned Numbers Authority (IANA) implemented classful IPv4 addresses
in order to differentiate between the portion of the IP address that identifies a particular
network and the portion that identifies a specific host on that network. These classes of
IP addresses are shown in the following table.
Networking computers
147
Class
Addresses
Description
1.0.0.0 126.0.0.0
128.0.0.0 191.255.0.0
192.0.0.0 223.255.255.0
224.0.0.0 239.0.0.0
Multicasting addresses.
240.0.0.0 255.0.0.0
Experimental use.
APIPA
The network 169.254.0.0 is reserved for Automatic Private IP Addressing (APIPA).
Windows operating systems (Windows 2000 and later) automatically generate an
address in this range if they are configured to obtain an IPv4 address from a DHCP
server and are unable to contact one. These addresses are not routable on the Internet.
IPv6
IP version 6 uses 128-bit addresses. These addresses are written and displayed in the
hexadecimal-equivalent values for each of their 16 bytes. In hexadecimal, you represent
the first four bits in a byte (which means there are 16 possible values for those four bits)
by using the numbers 0 to 9 and the letters A through F. You then represent the
remaining four bits in a byte with their hexadecimal equivalent value. Thus, for each
byte, you see two numbers, with the first number identifying the first four bits and the
second number identifying the remaining four bits. Like IPv4 addresses, IPv6 are also
composed of two parts: the network ID and the host ID.
You write an IPv6 IP address by grouping the address in hexadecimal, two bytes at a
time, and separating these groups by colons (:). For example, you might see an IPv6
address of 3FFE:FFFF:0000:2F3B:02AA:00FF:FE28:9C5A. You can remove any
leading zeroes in an IPv6 address. If a 2-byte block of an IPv6 address consists of all
zeroes, you can "compress the address by using double colons (::) to indicate those
bytes. The double colons (::) can be used only once in an IPv6 address. This means that
with the address in our previous example, we could rewrite it in the format
3FFE:FFFF::2F3B:02AA:00FF:FE28:9C5A.
148
Networking computers
149
Subnet mask
Subnet masks are used to identify the network-ID portion of an IP address. You can use
it to infer the host-ID portion of the IP address. Subnet masks allow additional addresses
to be implemented within a given address space. The default mask for each class is
listed in the previous table.
The following table shows two examples of how the network ID and host ID of an IPv4
address can be calculated by using the subnet mask.
IP address
Subnet mask
Network ID
Host ID
192.168.100.33
255.255.255.0
192.168.100.0
0.0.0.33
172.16.43.207
255.255.0.0
172.16.0.0
0.0.43.207
No matter how many octets are included in the network ID, they are always contiguous
and start on the left. If the first and third octets are part of the network ID, the second
must be as well. The following table shows examples of valid and invalid subnet masks.
Valid subnet masks
255.0.0.0
0.255.255.255
255.255.0.0
255.0.255.0
255.255.255.0
255.255.0.255
When data is routed over interconnected networks, the network portion of the IP address
is used to locate the right network. After the data arrives at the LAN, the host portion of
the IP address identifies the one computer on the network thats to receive the data.
Finally, the IP address of the host must be used to identify its MAC address so the data
can travel on the hosts LAN to that host.
The default gateway
In TCP/IP jargon, "default gateway is another term for "router. If a computer doesnt
know how to deliver a packet, it gives the packet to the default gateway to deliver. This
happens every time a computer needs to deliver a packet to a network other than its
own.
Networking computers
1411
Character-based names
Computers use numeric network addresses to communicate with each other. People
prefer to use names, such as fully qualified domain names (FQDNs) or NetBIOS names,
to describe the computers on the network. Most likely, when you direct your computer
to connect to a remote host, you provide a name for that remote host.
Fully qualified domain names
FQDNs (fully qualified domain names) are hierarchical names, conforming to a
hierarchical naming scheme called the DNS (Domain Name System) namespace or
BIND (Berkeley Internet Name Domain) because it was originally developed at the
University of California at Berkeley. FQDNs are typically composed of three parts: a
host name, a domain name, and a top-level domain name. For example, in the name
www.microsoft.com, "www is the hosts name (or at least an alias for the actual
name), "microsoft is the domain, and "com is the top-level domain.
Its also possible to use subdomains. For example, in
server1.corporate.microsoft.com, "corporate is a domain within the microsoft
domain. Four-part names such as this arent rare, but you probably wont see further
divisions beyond that.
RFC 1123 specifies that the name can contain:
ASCII letters a through z (not case-sensitive)
Numbers 0 through 9
Hyphens
The entire FQDN has a maximum of 255 characters.
When your computers FQDN matches another computers FQDN with the exception of
the host name, many times you dont need to enter the full FQDN to connect. For
example, on a Windows network, when you enter a host name without an FQDN, the
operating system automatically uses your computers domain information with the host
name youve entered to find the computer you want to connect to.
DNS
The most common use for the Domain Name System (DNS) is resolving host names to
IP addresses. When you visit a Web site, you normally specify a fully qualified domain
name (FQDN), such as www.yahoo.com, in a Web browser. DNS servers match host
names to IP addresses. These specialized servers maintain databases of IP addresses and
their corresponding domain names. For example, you could use DNS to determine that
the name www.yahoo.com corresponds to the IP address 69.147.76.151.
A-1:
Examining addresses
Heres how
Heres why
TCP/IP
NetBEUI
IPX/SPX
AppleTalk
TCP/IP
NetBEUI
IPX/SPX
AppleTalk
Networking computers
1413
TCP/IP
NetBEUI
IPX/SPX
AppleTalk
Choose Properties
Click Details
10 Examine the Physical Address
line
Networking computers
1415
Exhibit 14-4: Current IP configuration information for both wireless and wired network
connections on a computer
This command can also be used with switches to complete tasks related to IP
configuration. For example, ipconfig /release releases a DHCP leased address,
and ipconfig /renew requests a new address lease. For a complete list of
ipconfig switches and their meanings, type ipconfig /? at the command prompt.
When you are having network problems, the first thing you should do is to check the
TCP/IP settings on the computer. Check to see if the IP address and subnet mask are
correct, and verify the default gateway and DNS server address. When you verify this
information, you might find that the computer has no IP address configured or has
configured itself with an APIPA address.
Networking computers
Do it!
A-2:
1417
Heres how
Heres why
Press e
3 Compare the IP configuration
information reported to the
information you viewed in the
previous activity
where computer is the other computers name or IP address. A successful result looks
similar to Exhibit 14-5.
Networking computers
1419
A-3:
Heres how
1 At the command prompt, type
ping 127.0.0.1
and press e
Heres why
This is the loopback address, which verifies that
TCP/IP is working on this computer. Pinging the
loopback address tests a computers own basic
network setup.
You should receive four successful responses.
My partners IP address:
_____________________________
7 Ping 72.14.204.99
8 Ping www.google.com
Networking computers
1421
A-4:
Application
Transport
Internet
Network Interface
2 Which layer of the TCP/IP model breaks large messages into smaller packets of
information and tracks whether they arrived at their final destinations?
A
Application
Transport
Internet
Network Interface
Networking computers
1423
Application-layer protocols
The TCP/IP architectures Application layer accepts information from applications on
the computer and sends this information to the requested service provider. In addition,
Application-layer protocols are available only on TCP/IP networks, and each of these
protocols is associated with a client application and service. For example, FTP clients
use the FTP protocol, and Telnet clients use the Telnet protocol. However, some client
software can use more than one protocol. For example, Web browsers can use HTTP to
communicate with Web servers and use FTP to communicate with FTP servers.
HTTP
Hypertext Transfer Protocol (HTTP) is the most common protocol used on the Internet
today. This is the protocol used by Web browsers and Web servers. HTTP defines the
commands that Web browsers can send and the way Web servers can respond. For
example, when requesting a Web page, a Web browser sends a GET command. The
server then responds by sending the requested Web page. Many commands are defined
as part of the protocol.
HTTP can also be used to upload information. Submitting a survey form on a Web page
is an example of moving information from a Web browser to a Web server. You can
extend the capabilities of a Web server by using a variety of mechanisms that allow it to
pass data from forms to applications or scripts for processing. These are some of the
common mechanisms for passing data from a Web server to an application:
Common Gateway Interface (CGI)
Internet Server Application Programmer Interface (ISAPI)
Netscape Server Application Programmer Interface (NSAPI)
The World Wide Web consortium (W3C) is the standards body responsible for defining
the commands that are part of HTTP. To read more about the standards definition
process, visit the W3C Web site: www.w3c.org.
HTTPS connections
Secure Web servers use SSL (Secure Sockets Layer) or TLS (Transport Layer Security)
to enable an encrypted communication channel between themselves and users Web
browsers. SSL is a public-key/private-key encryption protocol used to transmit data
securely over the Internet, using TCP/IP. The URLs of Web sites that require SSL begin
with https:// instead of http://. When you connect through SSL, the connection
itself is secure, and so is any data transferred across it.
Secure HTTP (S-HTTP) is another protocol used to secure Internet transmissions.
Whereas SSL secures a connection between two computers, S-HTTP secures the
individual data packets themselves.
FTP
File Transfer Protocol (FTP) is a simple file-sharing protocol. It includes commands for
uploading and downloading files, as well as for requesting directory listings from
remote servers. This protocol has been around the Internet for a long time and was
originally implemented in UNIX during the 1980s. The first industry-distributed
document, or Request for Comment (RFC), describing FTP was created in 1985.
Networking computers
1425
IMAP4
Internet Message Access Protocol version 4 (IMAP4) is another common protocol used
to retrieve e-mail messages. The capabilities of IMAP4 are beyond those of POP3. For
example, IMAP can download message headers, which you can use to choose which
messages you want to download. In addition, IMAP4 allows the use of multiple folders
to store messages on the server side.
Transport-layer protocols
TCP/IP architecture Transport-layer protocols are responsible for getting data ready to
move across the network. The most common task performed by Transport-layer
protocols is breaking messages down into smaller pieces, called segments, that can
move more easily across the network. The two Transport-layer protocols in the TCP/IP
protocol suite are Transmission Control Protocol (TCP) and User Datagram Protocol
(UDP).
One of the defining characteristics of Transport-layer protocols is the use of port
numbers. A port number is a 16-bit integer ranging from 0 to 65535. There are three
types of port numbers, described in the following table.
Port type
Description
Well-known ports
Registered ports
These port numbers range from 1024 through 49151. Port 1024 is
reserved for TCP and UDP and shouldnt be used. A list of registered
ports can be found on the IANA Web site:
www.iana.org/assignments/port-numbers
Dynamic ports
Each network service running on a server listens at a port number. Each Transport-layer
protocol has its own set of ports. When a packet is addressed to a particular port, the
Transport-layer protocol knows which service to deliver the packet to. The combination
of an IP address and port number is referred to as a socket.
A port number is like an apartment number for the delivery of mail. The network ID of
the IP address ensures that the packet is delivered to the correct street (network). The
host ID ensures that the packet is delivered to the correct building (host). The Transportlayer protocol and port number ensure that the packet is delivered to the proper
apartment (service).
Do it!
Service
FTP
TCP 21, 20
20 is used for FTP data;
21 is used for FTP control
SSH
TCP 22
Telnet
TCP 23
SMTP
TCP 25
DNS
UDP 67, 68
UDP 69
HTTP
TCP 80
POP3
TCP 110
NTP
UDP 123
IMAP
TCP 143
SNMP
Secure HTTP
TCP 443
A-5:
Heres how
1 Switch to Internet Explorer and
observe the address bar
Heres why
http://www.msn.com displays. The Web
browser automatically connects you to port 80
on this server.
Press e
Press e
Networking computers
1427
Press e
Press e
Press e
Press e
Press e
Networking computers
1429
802.11b
Devices supporting 802.11b transmit data at up to 11 Mbps and use a frequency range
of 2.4 GHz in the radio band. The speed decreases as the client gets farther away from
the wireless access point, moving closer to the maximum distance of about 50 meters
indoors and 300 meters outdoors. The maximum range depends on many factors,
including product quality, antenna strength, the type of obstructions the signal
encounters, and the presence a clear line of sight between transmitter and receiver. The
802.11b standard was a popular and inexpensive network solution for home and office.
Unfortunately, many cordless phones, microwave ovens, and Bluetooth devices also use
the 2.4 GHz frequency range and interfere with an 802.11b wireless network.
The 802.11b standard extends the Ethernet protocol to wireless communication. It can
handle many kinds of data. Its primarily used for TCP/IP, but it can also handle other
forms of networking traffic, such as AppleTalk or PC file-sharing standards.
802.11a
Devices supporting 802.11a can transmit data at speeds up to 54 Mbps in the 5 GHz
band. It isnt compatible with 802.11b. It allows for a shorter range between a wireless
device and an access point (15 meters indoors and 30 meters outdoors, compared with
45 and 90 meters, respectively, for 802.11b). However, it is much faster than 802.11b
and doesnt encounter interference from cordless phones, microwave ovens, or
Bluetooth devices, as 802.11b does.
If its higher cost is acceptable, 802.11a could be an option for a wireless home LAN
easily capable of broadcasting high-definition DVD movies to TVs located throughout
the house, without your worrying about bandwidth or cables. Devices supporting
802.11a arent compatible with those supporting 802.11b or g.
802.11g
The 802.11g standard is another IEEE wireless standard that uses the 2.4 GHz band and
has become widely available. Its backward-compatible with 802.11b but has higher
throughput at 20+ Mbps. You will often see 802.11g devices advertised with speeds of
up to 54 Mbps. Devices supporting 802.11g have a transmission range of up to 45
meters indoors and 90 meters outdoors. Note that 802.11g devices can experience
interference from other common household devices, such as microwave ovens,
Bluetooth devices, baby monitors, and cordless telephones that also operate in the 2.4
GHz band.
802.11n
The 802.11n standard was ratified in September 2009 by the IEEE. Devices supporting
802.11n can transmit data at up to 600 Mbps in either the 5 GHz or 2.4 GHz band. The
transmission range is up to 70 meters indoors and 250 meters outdoors. Devices
supporting 80211n can coexist with 802.11g, 802.11b, and 802.11a devices.
Bluetooth
Bluetooth is a standard for short-range wireless communication and data
synchronization between devices. This standard was developed by a group of electronics
manufacturers, including Ericsson, IBM, Intel, Nokia, and Toshiba, and its overseen by
the Bluetooth Special Interest Group. The transmitters and receivers are applicationspecific integrated circuits (ASICs); they can transmit data at rates in excess of 1 Mbps,
with up to three voice channels also available.
Bluetooth works in the 2.4-GHz frequency range, is easy to configure, and is useful for
short-range connections, such as connecting a PDA to a cell phone so that the PDA can
connect to a remote network.
Bluetooths limited range10 meters for a class 2 devicegenerally confines it to
connecting nodes within a single room or adjacent rooms. It operates at low speeds
compared to other wireless technologies. Version 1.2 has a data rate of 1 Mbits/sec and
version 2.0 + EDR (Enhanced Data Rate) transfers at a rate of 3 Mbits/sec.
Bluetooth technology allows you to create wireless connections between computers,
printers, fax machines, and other peripherals, but it doesnt have the range to serve as a
wireless connection between an access point and laptops dispersed throughout a home
and yard. Some vendors have developed Bluetooth devices with higher transmitting
power, increasing the range of the technology to 100 meters, but these higher-power
devices havent yet gained wide acceptance.
Networking computers
Do it!
A-6:
1431
Objective
1.10
4.1
4.3
5.2
Networking computers
1433
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
3.2
B-1:
Heres how
Heres why
Version 4 (TCP/IPv4)
Click Properties
Networking computers
1435
6 Click Advanced
10 Click OK
11 Click OK
12 Click Close
Networking computers
1437
Networking computers
Do it!
B-2:
1439
Unicast
Multicast
Broadcast
DHCPACK
DHCPOFFER
DHCPDISCOVER
DHCPREQUEST
3 From an IPv6 router advertisement packet, how does the IPv6 device know where
to get its IPv6 address?
4 From an IPv6 router advertisement packet, how does the IPv6 device know where
to get its IPv6 configuration parameters?
Networking computers
1441
Data speed
Distance from AP
High
4.3 Mbps
40 to 125 meters
Medium
2.6 Mbps
55 to 200 meters
Standard
1.4 Mbps
90 to 400 meters
Standard low
0.8 Mbps
If the signal from your WAP or wireless router isnt strong enough with the built-in
antennas, you can add a more powerful antenna and sometimes add a signal booster.
The WAP or wireless router should be placed in a central location within 60 to 90
meters of users wholl be accessing it. As shown in the previous table, the closer the
users are to the device, the stronger the signal and the better the network speed.
B-3:
Heres how
Heres why
Networking computers
1443
Networking computers
1445
Isolation
Isolation is a means of segregating network traffic. There are two types: wireless client
isolation and network isolation.
With wireless client isolation, also called AP isolation, wireless clients are put onto
individual VLANs so that they cannot access each other. This method is commonly
used in public wireless networks to prevent one user from accessing another users
computer. Imagine the risk you face in a library or coffee shop, where another user
might attempt to access your shared folders or even mount brute-force attacks on your
PC over the Wi-Fi (802.11 wireless) hotspot network.
You might also want to provide network isolation. For example, you might want to
permit wireless clients to access the Internet and your corporate mail server, which is on
your wired network. However, you might also want to prevent wireless clients from
accessing other wired nodes, such as your file servers.
Some APs offer network isolation through custom routing configurations. You can also
enable such isolation through your general network design and firewall configuration.
Transmission encryption
You should enable transmission encryption on your wireless routers unless you have a
very good reason not to. Transmission encryption both limits which clients can connect
to your AP and protects data from eavesdropping during transmission.
Products certified by the Wi-Fi Alliance as Wi-Fi compatible must support at least the
WPA Personal level of encryption. As of this writing, products dont have to support the
802.11i standard, but this requirement will soon take effect.
Description
WEP (Wired
Equivalent
Privacy)
Was built into the 802.11 wireless connectivity standards that govern how
data can be encrypted while in transit on the wireless network.
WEP uses a 64-bit or 128-bit symmetric encryption cipher. For WEP to
work, a key is configured on both the WAP and the client. This key is used
to encrypt the data transmitted between the WAP and the client. There are
no standards for how the WEP key is to be placed on the clients and the
WAP. Most implementations require you to type in the key manually on
each client and the WAP.
Although WEP is an easy way to prevent casual hackers from viewing the
traffic transmitted on your wireless LAN, this method is the least secure
encryption technique. WEP has known design flaws that make it relatively
easy to crack. However, it is the only viable option for 802.11b and other
older wireless clients.
WPA Personal
(Wi-Fi Protected
Access Personal)
and WPA2
Personal
WPA2
WPA/WPA2
Enterprise
RADIUS
Uses a specialized server for authentication and uses WEP for data
encryption, as illustrated in Exhibit 14-10. The authentication server can
include keys as part of the accept message thats sent back to the WAP. In
addition, clients can usually request a key change. This feature ensures that
keys are changed regularly to limit the ability of hackers to view
information on the wireless network.
802.11i
Networking computers
1447
B-4:
Networking computers
1449
Networking computers
1451
Disable DHCP within the WLAN to keep a tighter control over users
Assign static IP addresses to your wireless clients. Doing this creates more
administrative overhead to manage, but makes it harder to access your network.
Enable MAC address filtering on access points to limit unauthorized
wireless NICs Many access points allow you to control access based on the
MAC address of the NIC attempting to associate with it. If the MAC address of
the wireless clients NIC isnt in the access points table, access is denied.
Although there are ways of spoofing a MAC address, it takes an additional level
of sophistication.
Enable 802.1x This is the recommended method of authentication and
encryption for enhanced security on computers running versions of Windows
later than Windows XP. The use of 802.1x offers an effective solution for
authenticating and controlling user traffic to a protected network, as well as
dynamically varying encryption keys. The 802.1x standard ties EAP to both the
wired and wireless LAN media and supports multiple authentication methods,
such as token cards, Kerberos, one-time passwords, certificates, and public key
authentication. You configure 802.1x encryption from the IEEE 802.1x tab of
the policy settings Properties dialog box.
A network administrator should periodically survey the site, by using a tool such as
NetStumbler or AirSnort, to see if any rogue access points are installed on the network.
In addition, the administrator can take a notebook equipped with a wireless sniffer and
an external antenna outside the office building to see what information inside the
building can be accessed by someone parked in the parking lot or across the street.
B-5:
Heres how
1 Open Internet Explorer and enter
the IP address of your WAP
Heres why
You are prompted for administrator credentials
on the WAP.
Check Apply
Check Apply
5 Select the Advanced tab
Select MAC filters
Choose Only allow
computers with MAC
address listed below to
access the network
Networking computers
1453
RADIUS servers
When you implement an authenticating server, such as RADIUS, the wireless client
must submit its credentials to the authenticating server before wireless network access is
established. When the client computer is in range of the wireless AP, it tries to connect
to the WLAN that is active on the wireless AP. If the wireless AP is configured to allow
only secured or 802.1x-authenticated connections, it issues a challenge to the client. The
wireless AP then sets up a restricted channel that allows the client to communicate with
only the RADIUS server.
The RADIUS server accepts a connection only from only two sources: a trusted wireless
AP; or a WAP that has been configured as a RADIUS client on the Microsoft Internet
Authentication Service (IAS) server and that provides the shared secret key for that
RADIUS client.
The RADIUS server validates the client credentials against the directory. If the client is
successfully authenticated, the RADIUS server decides whether to authorize the client
to use the WLAN. If the client is granted access, the RADIUS server transmits the client
master key to the wireless AP. The client and wireless AP now share common key
information they can use to encrypt and decrypt the WLAN traffic passing between
them. How you configure clients to participate in this process depends on the operating
system.
Networking computers
1455
If you click the icon, it opens the Wireless Connection Properties box (shown in Exhibit
14-12), which also gives you the summary information for your connection.
B-6:
Heres how
Heres why
3 Click Add
Click Manually create a
network profile
Click Next
7 Click Connect to
Select 123ABC567
Click Connect
8 In the SSID name box, enter
123ABC567
If necessary.
Networking computers
12 Open the Network and Sharing
Center
1457
Networking computers
Do it!
B-7:
1459
Heres how
Heres why
Click Next
6 Click Edit
Click OK twice
8 In the User name box, type
MyUserName
13 Click Connect
14 Click Skip
Click Close
15 In the Network and Sharing
Center, click Change adapter
settings
Networking computers
1461
Property
Use to
General
Phone number
Dialing rules
Dialing options
Redial attempts
Security
Advanced
(custom settings)
Networking
Protocols and
services
Sharing
Internet connection
sharing
Options
B-8:
Heres how
1 Right-click Office Dial-up
Connection and choose
Heres why
In the Network Connections window.
Properties
Click Continue
Networking computers
1463
11 Click Cancel
13 Click Cancel
14 Select Office Dial-up
Connection and click Delete
this connection
Click Yes
Click Continue
15 Close all open windows
Topic B
In this topic, you created wired and wireless network connections, including dial-up
networking (DUN) with a modem. You also learned how to secure wireless client
connections to your LAN.
Review questions
1 Which protocols used in Windows are routable? [Choose all that apply.]
A AppleTalk
B IPX/SPX
C NetBEUI
D TCP/IP
2 Which unique address is permanently embedded in a NIC by the manufacturer?
A Character-based
B IPv4
C IPv6
D MAC
E Port
3 Which unique address is a 128-bit address written in hexadecimal?
A Character-based
B IPv4
C IPv6
D MAC
E Port
4 Which address is a number between 0 and 65,535 that identifies a program running
on a computer?
A Character-based
B IPv4
C IPv6
D MAC
E Port
Networking computers
1465
10 Which TCP/IP architecture layer defines the rules, commands, and procedures that
client software uses to talk to a service running on a server?
A Application
B Internet
C Network
D Transport
17 True or false? The distance you are from the wireless access point doesnt affect the
speed of your data transfers.
False. As you move farther away from an access point, the data speed drops.
Networking computers
1467
22 On what page of the dial-up connections Properties dialog box would you specify
the protocols you want to use to connect to a remote access server?
A General
B Networking
C Options
D Security
b How does your computer connect to the Internet (for example, telephone line to
ISP, company LAN to ISP, cable modem)?
In the classroom, it will probably be a company LAN.
c If you use a telephone line to connect to the Internet, whats the telephone
number you dial to your ISP?
Answers will vary.
d Does your computer use a NIC to connect to the Internet? If so, whats the MAC
address of the NIC?
Answers will vary.
CompTIAA+
Certification:
Comprehensive, 2009
Edition, Revised
Student Manual
Volume Two
Jon Winder
Charles G. Blum
Josh Pincus
Dan Quackenbush
Writers:
Copyeditor:
Ken Maher
Keytester:
Cliff Coryea
Trademarks
ILT Series is a trademark of Axzo Press.
Some of the product names and company names used in this book have been used for identification purposes only and
may be trademarks or registered trademarks of their respective manufacturers and sellers.
Disclaimers
We reserve the right to revise this publication and make changes from time to time in its content without notice.
The logo of the CompTIA Authorized Quality Curriculum (CAQC) program and the status of this or other training
material as Authorized under the CompTIA Authorized Quality Curriculum program signifies that, in CompTIAs
opinion, such training material covers the content of CompTIAs related certification exam.
The contents of this training material were created for the CompTIA A+ Essentials exam, 2009 Edition (220-701),
and the CompTIA A+ Practical Application exam, 2009 Edition (220-702), covering CompTIA certification
objectives that were current as of August 2009.
ISBN 10: 1-4260-2178-X
ISBN 13: 978-1-4260-2178-7
Printed in the United States of America
1 2 3 4 5 GL 06 05 04 03
151
Unit 15
Network troubleshooting
Unit time: 60 Minutes
issues.
152
Objective
1.4
Support technicians need tools that perform a wide variety of functions. Repair toolkits
are available for amateurs and for professionals. These specialty hardware toolkits
contain versions of the tools appropriate for working with networking components. You
can also assemble your own toolkit with the following items:
A variety of screwdrivers You should have large and small versions of flatblade, Phillips, and Torx screwdrivers.
Small and large needle-nose pliers These are useful for grasping objects.
Tweezers Also used for grasping objects.
Three-pronged "grabber For picking up screws or other objects in areas
too small to get your fingers into.
Extension magnet For retrieving metal screws or other small metal objects
from areas too small to get your fingers into.
A small flashlight A small penlight or a light that can be clamped to the
computer case can prove quite useful.
Small containers For holding screws and small components that are easily
lost.
Antistatic bags To protect components that are sensitive to static electricity.
Never lay a component on the outside of an antistatic bag. The bag is
designed to collect static charges on the outside of it, so if you place a
component on the bag, the collected static charges might discharge onto the
component.
Grounding wrist straps and ESD antistatic mats To protect the equipment
from any static you might be carrying on your body.
A grounding wrist strap should never be worn when youre working on the
interior of a monitor, but in all other cases, this is a highly recommended ESD
protection tool.
Antistatic sprays Useful if your clothes are likely to generate static.
Compressed air For blowing dust and debris off of components.
Computer vacuum Designed with static protection features to clean
electronic components; some also have special filters designed to clean up toner
spills.
Network troubleshooting
153
Used to
Multimeter
Test equipment with readings of ohms, amps, and volts. Comparing the
readings with the appropriate values for a component helps you determine if
theres a problem with the component.
Nut driver
Cable stripper
Remove the outer insulation from network cables and expose the wires inside
them. Usually, this tool also includes wire cutters to cut the cable or wire.
You can also purchase a single cable tool that strips, cuts, and crimps all in
one.
Snips
Punchdown
tool
Crimper
Crimp a connector onto a network cable. It comes in varieties for RJ-11, RJ45, and coaxial cable.
Butt set
Time-domain
reflectometer
(TDR)
Optical timedomain
reflectometer
(OTDR)
Certifier
Test and verify network cable speeds by sending data packets across the
network. You can use certifiers to verify that network segments are operating
at optimal levels.
Temperature
monitor
Voltage event
recorder
Toner probe
Locate hard-to-find cables, such as those hidden in floors, ceilings, and walls
and in bundles. Detect telephone and Ethernet service, indicate polarity and
active line numbers on voice circuits, and indicate active pair numbers on
Ethernet circuits. Available in both digital and analog versions.
Loopback plug
154
Description
Disc containing
common drivers
Antivirus
software
You should include a boot disc from which you can boot a system that has
been infected with a boot virus. Norton and McAfee are examples of
companies that make antivirus software you can use to create such a disk.
Follow the manufacturers directions to clean the virus from the system.
Sometimes you need to boot from the antivirus software CD when you
need to clean a system, so configure CMOS to be able to boot from CD.
Boot disc
Operating system
CD or DVD
Having a copy of the operating system CD enables you to get to the CAB
files that you might need when installing or repairing some piece of
hardware. Its also useful if you need to boot from the CD or if files or
drivers have been corrupted and need to be replaced.
Documentation
about common
problems
Web sites for the manufacturers of the equipment you support should be included
somewhere in your toolkit. A bookmark list, a paper list, or a document containing the
URLs is useful. Being able to access the support sites directly is beneficial when you
need to obtain updated drivers or look for solutions to problems. Another useful site is
drivers.com. You can download drivers for many components, including some from
companies no longer in operation.
A CD binder is useful for carrying these tools with you. CD binders come in a variety of
sizes. You can also copy the files to a USB flash drive instead of to a CD if you prefer.
Network troubleshooting
Do it!
A-1:
155
Heres how
1 Open a Web browser and go to a
search site
Heres why
Youll examine the components of a hardware
technicians toolkit.
156
Objective
3.2
4.1
5.2
6.1
Outline the appropriate safety and environmental procedures, and given a scenario,
apply them
EMI
Network interference
This topic covers the following CompTIA A+ Practical Application exam version 2.0
objectives.
#
Objective
1.4
2.1
Select the appropriate commands and options to troubleshoot and resolve problems
IPCONFIG (/all /release /renew)
PING (-t l)
TRACERT
NSLOOKUP
Network troubleshooting
#
Objective
3.1
157
158
Problems with wired connections can have many sources. Some are physically based,
such as a bad network cable, and some are software-based, such as an invalid TCP/IP
address.
Electrical interference
Electrical interference is a common problem that occurs on networks and degrades data
signals. Network noise is any electrical signal on the network cable that isnt part of the
senders original signal. Noise is generated both internally and externally.
Internally, twisted-pair cables produce relatively little electrical interferencethe twists
cancel each other out. Any variation in the thickness of the wire, the cable insulation, or
the capacitance of wires or insulation causes a mismatch and creates noise between the
pairs. Good cables minimize the internally produced noise, but dont remove it
altogether.
Electrical interference can also come from many external sources. You should always
install cables in separate conduits, away from items such as electric motors (like those
in elevators), fluorescent lights, and air conditioners. In areas where theres an
abundance of electrical noise, you can use shielded cables or other technologies, such as
fiber optic cables, to avoid interference.
When a data signal travels down a conductor, it creates an electrical field, which
interferes with any wires close by. This kind of interference is called crosstalk.
Crosstalk increases at higher frequencies and with parallel wires. The twists in twistedpair cables cancel this effect; however, its important that the twists are symmetrical and
that adjacent pairs have different twists.
Other physical issues
In addition to crosstalk and interference, you should be aware of the additional issues
described in the following table.
Issue
Description
Attenuation
Collisions
Open impedance
mismatch (echo)
Network troubleshooting
159
Network troubleshooting
1511
A network analyzer can be a laptop computer with a proprietary operating system and
other software specifically designed to capture and analyze packets on a network.
Network optimization
Fixing network problems can be as easy as replacing a worn cable, but sometimes
network problems require bigger fixes. For example, some network communication
problems require a reconfiguration of the entire network, either for all network
communication or for specific types.
Many networks have servers that contain highly sensitive data that must be
available around the clock. To increase the amount of uptime for these servers
and provide a high level of availability, a network administrator must build in a
level of fault tolerance, which simply means that theres a way to recover
quickly from a server or network problem.
For example, a server farm provides a high level of fault tolerance by spreading
sensitive data and applications across a number of servers. If one server were to
fail, the remaining servers would still provide services to network users.
To decrease response times for Internet users and to reduce the load on gateway
servers, you can deploy proxy servers that use a caching engine to store
frequently requested Web addresses. These servers can store Web content that
users access frequently, and return that content to the users faster than they could
retrieve the content directly from the Web.
Many applications, such as Voice over IP (VoIP) and video applications, are
particularly prone to latency sensitivity, which is caused when the network
breaks the data into different-size packets that might be transmitted out of
sequence. The latency sensitivity can cause jitters in the video or voice
transmissions, severely reducing their quality and potentially rendering them
useless.
Quality of Service (QoS) mechanisms and policies on the network can be used to
prioritize video and VoIP transmission to ensure that the packets receive priority
over other types of network traffic. The QoS mechanisms can help reduce and
eliminate jitters and other types of interference.
When troubleshooting network problems, you should be aware of these issues and
escalate them if necessary.
Duplex and speed mismatches
Traffic can travel in one direction at a time (half-duplex) or in both directions (fullduplex) on an Ethernet network. When the protocol fails to negotiate the traffic flow of
the connection, you have a duplex mismatch. This problem can cause the connection to
work at low speed and drop packets at high speed. Common mismatches occur in
switch-to switch or switch-to-computer connections. Most often, a mismatch is caused
by a configuration error with one port being set to auto-negotiate, half- or full-duplex,
and the other end not configured to the same setting. As the level of traffic increases,
youll notice errors, such as collisions, on the slower end of the link.
B-1:
Heres how
1 Follow your instructors
directions to attach your cable
tester to your computers network
cable
Heres why
Youre going to test the section of cable
between your computer and the classroom hub.
Network troubleshooting
1513
Probable cause
Suggested solution
Unable to connect to
infrared wireless
device
Unable to connect to
radio wireless device
Unable to connect to
Bluetooth wireless
device
Network troubleshooting
Do it!
B-2:
1515
2 Several users report this morning that they cannot connect to the network. These
users connect wirelessly via a wireless access point. What are two things you
should check to troubleshoot this problem?
3 Users report that they are intermittently losing their connections to the wireless
network. What should you check?
Purpose
IPCONFIG
NBTSTAT
Displays NetBIOS over TCP/IP statistics, NetBIOS name tables, and the
NetBIOS name cache. You can use this utility with switches to remove or
correct NetBIOS name cache entries.
NETSTAT
NSLOOKUP
Reports the IP address of an entered host name, or the host name of an entered
IP address.
Ping
ROUTE
Telnet
TRACERT (Trace
Route)
Traces and displays the route taken from the host to a remote destination;
TRACERT is one example of a trace-routing utility.
Most of these commands are entered from a command prompt. To open a Command
Prompt window in any version of Windows, run the cmd command. From the Command
Prompt, you can enter a Windows or DOS command, including any of those in the
previous table. Each of the commands includes switches and parameters. To view the
available switches and parameters, along with their descriptions, at the command
prompt, enter the desired command follow by a space and then /?.
Network troubleshooting
Do it!
B-3:
1517
2 Users in one location have complained that load time for the companys intranet
site is slow. No one in any other location is reporting a problem. What TCP/IP
utility can you use to diagnose the problem?
Use to
/all
/flushdns
/displaydns
/registerdns
Renew all IP address leases from DHCP servers, and reregister the computers host name and IP address on your
networks DNS servers.
Network troubleshooting
1519
Check to see if the IP address and subnet mask are correct, and verify the default
gateway and DNS server addresses. When you do this, you might find that the computer
has no IP address configured or has configured itself with an automatic private address.
(Remember that IPv4 APIPA addresses are within the 169.254.x.x range, and that IPv6
link-local addresses begin with FE8, FE9, FEA, or FEB.) If so, this gives you a couple of
options:
If IP addressing information is assigned by a DHCP server, suspect a problem
with a DHCP server itself or with the network between the users computer and
the DHCP server. First, verify that the network card is working correctly and is
attached to the network cable, which is in turn plugged into the appropriate
network port on the wall or floor. Try to release and then renew the IP address
from the DHCP server. If you can verify these things, and you cant get an IP
address from the DHCP server, then escalate the call to the appropriate network
administrator.
If IP addressing is assigned manually, then assign the correct information, such
as IP address, default gateway, subnet mask, or DNS server address, and test to
see if connectivity is restored.
Network troubleshooting
Do it!
B-4:
1521
Heres how
Heres why
ipconfig
Network troubleshooting
1523
Network troubleshooting
Do it!
B-5:
1525
Heres how
1 In the Command Prompt window,
type ping 127.0.0.1
and press e
Heres why
(The window should still be open from the
previous activity.) This is the loopback address,
which verifies that TCP/IP is working on this
computer. Pinging the loopback address tests a
computers own basic network setup.
You should receive four successful responses.
6 How does being able to successfully ping the IP address of your default gateway
help you when troubleshooting?
7 Users are complaining that they are unable to access one of your organizations
file and print servers (even though they had just been using this server). You
discover that another person in Desktop Support moved the server to a new
subnet. What might be the cause of users not being able to access this server?
How can you resolve the problem?
TRACERT
If a user is telling you that he or she cant access resources on the network, you should
verify that the users client software is configured properly. You should also verify that
File and Printer Sharing is installed and enabled on the computer the user is trying to
access.
You can perform an additional test on the network by using the tracert command to
check the network path between two computers. At an MS-DOS or command prompt,
enter tracert computer where computer is the name or IP address of a
destination.
Network troubleshooting
Do it!
B-6:
1527
Heres how
1 At the command prompt, enter
nslookup
3 Enter exit
To exit NSLookup.
4 Enter
tracert [IP_address of a classroom server]
To trace the path to a server in your network.
This is a short path, so the results are returned
promptly.
5 Enter
tracert www.yahoo.com
Network troubleshooting
1529
Network troubleshooting
1531
In Windows Vista:
1 Click Start and choose Control Panel.
2 Open Security, Windows Firewall.
3 Click Allow a program through Windows Firewall. Click Continue.
4 On the Exceptions tab, check a program or port in the list to allow
communication; clear the checkbox to block communication.
5 If your program isnt listed on the Exceptions tab, you can click Add Program
for a list of additional programs you can add to the Exceptions tab. Select the
desired program.
If desired, click Change scope. Using the dialog box, shown in Exhibit 15-6, you
can allow communication through the open port by all Internet computers, only
computers on your IP subnet, or specific computers designated by IPv4 or IPv6
address. Select your desired configuration and click OK.
Click OK.
6 Click OK.
Network troubleshooting
1533
B-7:
Heres how
Heres why
1 A user reports that shes not able to send or receive e-mail. What steps should you
take?
2 If the user still reports problems after youve checked the settings on her
computer, whats a likely next step?
3 What are some reasons a user could have problems accessing an FTP server?
4 A user reports that hes having trouble accessing the Web. Youve verified that he
has local network connectivity. What other issues might be causing this problem?
Network troubleshooting
1535
Exhibit 15-7: The Network and Sharing Center provides access to Windows Network
Diagnostics
Exhibit 15-8: Windows Network Diagnostics helps you resolve many common TCP/IP
problems
Wireless networks
Windows Network Diagnostics can help you resolve problems with wireless networks,
too. The utility will attempt to identify the cause of the problem youre experiencing,
and then walk you through the steps to correct the problem. In addition, information
about the problems the utility detects is recorded in the System log, with the Event ID of
6100. You can review these events to help identify the cause of the problem with the
wireless network.
Network troubleshooting
Do it!
B-8:
1537
Heres how
Heres why
Properties
Click Properties
5 Enter an invalid DNS server
address
Click OK
Click Close
Close the Network Connections
window
6 Open Network and Sharing Center
7 In the Network and Sharing
Center, click Troubleshoot
problems
Click Next
Click Troubleshoot my
connection to the Internet
Click Close
Click Properties
11 Enter a valid DNS server address
Click OK and Close
Network troubleshooting
1539
In this topic, you learned how to build hardware and software toolkits to help in your
troubleshooting practice.
Topic B
In this topic, you learned to troubleshoot the network. You learned to troubleshoot the
physical network by troubleshooting cables and wireless devices. Then you learned
how to troubleshoot the logical network by troubleshooting TCP/IP and client
connectivity issues.
Review questions
1 Which utility enables you to reset a computers network adapter?
A Network Map
B Windows Network Diagnostics
C IPCONFIG
D Local Area Connection
2 What steps can you take to minimize electrical interference on a wired LAN?
Install cables in separate conduits, away from items such as electric motors, fluorescent lights,
and air conditioners. In areas where theres an abundance of electrical noise, use shielded cables
or other technologies such as fiber optic cables to avoid interference.
3 What might be the cause if you cannot connect to a radio wireless device?
Answers include:
Out of range
Interference from electrical motors or equipment
Drivers not installed
Wireless router turned off
Security settings preventing connections
4 Which command displays the IP address of the host and other configuration
information?
A getmac
B ipconfig
C nslookup
D ping
Cabling
Jacks
Network cards
Hubs
7 What information does the ipconfig command report?
9 Which command would you use to verify name resolution (DNS) settings?
A ipconfig
B ping
C nslookup
D tracert
10 What is the difference between SMTP and POP3?
SMTP is used primarily for sending e-mail, and POP3 is used for retrieving e-mail.
11 _________ is the decrease in signal strength along the length of a network wire.
Attenuation
12 True or false? QoS can be used to prioritize video and VoIP transmission to reduce
jitters.
True
13 Which ipconfig switch is used to delete all name resolution information from the
clients DNS Resolver cache?
/flushdns
Network troubleshooting
1541
If you can browse the Web, inform Jim about the nature of the problem.
161
Unit 16
Portable computers
Unit time: 120 Minutes
components.
162
Objective
1.3
1.10
Notebook computers are small computers with all the necessary input and output
components contained in a portable unit. They typically weigh less than five pounds,
although some of the more powerful notebooks weigh closer to eight pounds.
Notebooks use standard client operating systems, such as Microsoft Windows, Mac OS,
or Linux. They contain all of the components a desktop computer needs to be a
functional computing device, although most components are modified to some extent
from their desktop versions. Exhibit 16-1 shows a notebook computer.
Portable computers
163
Monitor
Keyboard
164
Power sources
Notebook computers contain a battery that provides anywhere from 30 minutes to 8
hours of power. Notebook batteries come in a variety of sizes and shapes. Theyre
designed to fit in around other notebook components, so they might be oddly shaped.
Usually, theyre rectangular or square with a connector on one edge. Exhibit 16-3 shows
a notebook battery.
Portable computers
165
There are three basic types of batteries: nickel cadmium (NiCad), nickel metal-hydride
(NiMH), and lithium ion (Li-Ion). Most notebooks have Li-Ion batteries. Older systems
might still use Ni-Cad or NiMH batteries.
NiCad batteries often have a problem called memory effect. A NiCad battery
remembers how full it was during the last charge and doesnt charge past that
point.
Nickel metal-hydride batteries have two to three times the capacity of a similar
size NiCad battery. They also suffer from memory effect, but not as great as
NiCad batteries. However, NiMH batteries have a higher self-discharge rate than
both NiCad and Li-Ion batteries. NiMH batteries use hydrogen instead of
cadmium lead, making them a more environmentally friendly choice.
Li-Ion batteries are lightweight and have a long battery life. The liquid
electrolyte is contained within a steel structure to prevent leakage. Another
alternative is lithium polymer, which uses a jellied substance rather than a liquid
for the electrolyte material.
Zinc Air batteries are a new technology that uses a carbon membrane to absorb oxygen.
They also contain a zinc plate and use potassium hydroxide for the electrolyte.
However, this type of battery is not rechargeable and needs to be used quickly before
the chemicals dry out.
Fuel cells are predicted to be a popular battery choice in the future. These are still in
development, but they show great potential, not only for notebook computers, but also
for cars and other devices all around us.
Power adapters
Notebook computers also come with an external power cord and transformer (often
referred to as an "AC adapter or "fixed-input power supply), which you can use to
power the notebook when you arent mobile. Notebook computers automatically switch
power from the power outlet to the battery when you unplug them from the wall, and
they automatically switch power from the battery to the power outlet when plugged
back into the wall outlet. You also use the power cord to recharge the battery.
The power cord has a transformer between the outlet and the computer. Its a square or
rectangular box, so its often referred to as the power brick. Exhibit 16-4 shows a
notebook power cord. The power cords size and shape vary from notebook to notebook
but are similar to the one shown. If you need to replace either the power cord or the
battery, make sure you purchase one specifically designed for your notebook computer.
Transformer
Outlet plug
Computer plug
166
Processors
Notebook computers often use special CPUs that are engineered specifically to use less
power and generate less heat than typical desktop CPUs. Intel, AMD, and other
manufacturers are continually improving and updating their processors. For the most upto-date specifications, you should refer to the manufacturers Web sites.
AMD notebook processors:
http://www.amd.com/us/products/notebook/processors/Pages/no
tebook-processors.aspx
Portable computers
167
Heat dissipation
As processors work at faster speeds, they produce additional heat. Typically, desktop
computers dissipate this heat with a heat sink. Most notebook computers also use a heat
sink, but its not as large as that of a desktop computer. Notebook computers employ a
feature called thermal throttling, in which the processor senses that its getting too hot
and automatically reduces the clock speed to consume less power and produce less heat.
Thermal throttling reduces the notebooks power consumption enough to prevent heat
damage to the processor and other internal components.
Power management
Notebook computers also use power management features to help keep overheating in
check and manage battery usage. The processor runs at a low speed until it detects that
you have requested processor-intensive tasks. The processor speed increases to
accomplish the tasks.
If you do a lot of processor-intensive tasks, you might get better performance by
manually setting the power management options. You can set them in the system BIOS
or, in newer operating systems such as Windows Vista and Windows 7, from within the
GUI. You can use the power management options to set your own custom balance
among heat, performance, and battery life or to choose one of the operating systems
preset power schemes.
Most notebook computers now incorporate the Advanced Configuration and Power
Interface (ACPI) to control the amount of power drawn from the battery when the
notebook is not in use. ACPI is an open industry specification that was co-developed by
Compaq, Intel, Microsoft, Phoenix, and Toshiba to establish standard interfaces for
operating system configuration and power management on laptops, desktops, and
servers. In order to fully use all ACPI features, the computers hardware, system BIOS,
and operating system must support ACPI. Youre likely to encounter three power states
on notebook computersSleep, Hibernate, and Standby.
Newer notebook computers that are designed specifically for mobile computing
integrate wireless network adapters onto their motherboards to seamlessly connect to
Wi-Fi networks. Manufacturers use this integration to apply power management options
to network connectivity.
168
Memory
Memory modules for notebook computers are different from those found in desktop
computers. Notebook memory chips have a smaller form factor than desktop memory
chips in order to fit into the notebook memory sockets. Notebooks typically use lowprofile SODIMM chips. The SODIMM, which stands for "small outline dual inline
memory module" has become a standard for many notebook computers. The SODIMM
is approximately half the size of a regular DIMM, measuring 6.76 cm x 3.015 cm.
SODIMMs have 72, 100, 144, 200, or 204 pins.
Other notebooks might use MicroDIMM memory, which uses CSP architecture, grid
ball array, or other such technologies. MicroDIMM memory chips are smaller than
SODIMM chips, measuring 4.25 cm x 2.5 cm or 5.4 cm x 3.0 cm, and are typically used
in subnotebooks. Micro DIMM modules can have 144, 172 or 214 pins. The type of
memory your particular notebook uses depends on the motherboard installed. Exhibit
16-5 shows a notebook memory chip.
Drives
Notebook computers are equipped with a hard drive and a DVD or CD drive. Its
unusual to find a modern notebook with a floppy drive. The DVD or CD drive might or
might not be an RW drive. Hard drives in notebooks typically have a smaller capacity
than hard drives in desktop computers. A common drive size for a notebook computer,
at the time this course was written, was 320 GB.
The notebook hard drive has a small form factor; its usually a 2.5" drive. The hard
drive is designed to use less power than typical desktop drives. Its often slower than the
desktop hard drive as well.
Portable computers
169
Keyboards
The keyboard on a notebook computer is smaller than a standard desktop keyboard.
Several of the keys contain functions usually found on separate keys on a desktop
keyboard. To access the alternate functions, you press a function key, labeled "Fn,
along with the other key. As shown in Exhibit 16-6, the alternate functions are usually
written in smaller, light type, or in a different color, on the edge of the key.
Function keys have alternate functions as well. These are usually functions that, for a
desktop computer, would have separate physical buttons on the monitor or the
computer. Functions include adjusting the volume, switching between the built-in
monitor and an external monitor, changing the displays brightness, and using Num
Lock. Refer to your documentation for additional information on other alternate
functions that might be included on your keyboard.
The keys are placed close together on a notebook keyboard. For people with large
fingers, this can make it more difficult to type. Some notebooks have a PS2 port to
which you can connect an external keyboard. If your notebook doesnt, and you want an
external keyboard, youll need to find one that can be connected via a USB port.
Fn function
Monitors
The monitor is an integrated component of a notebook computer, just as the keyboard is.
The monitor forms the hinged cover for the laptop. Most notebook monitors are very
thin LCD devices. LCD technology is used in notebook computers because:
Less power is used.
Less heat is created.
Less space is used for an equivalent size viewable area compared to other
technologies.
The user experiences less glare.
Portable computers
1611
Contrast ratio
The contrast ratio of a monitor is the ratio between its brightest white and darkest black.
A minimum ratio for comfortable viewing is in the range of 400:1 to 600:1. Higher-end,
large LCD monitors can have contrast ratios of 80,000:1 to 100,000:1.
Pointing devices
Notebook computers have integrated pointing devices built into the middle of the
keyboard or below the keys. Some notebooks have a small pointer, much like a joystick,
thats located between the center keys of the keyboard; you push this pointer up, down,
left, and right to move the mouse. Separate buttons below the Spacebar are used as the
left and right mouse buttons.
Trackballs
You might encounter some notebook computers with an integrated trackball. Integrated
trackballs work like standard trackballs, except that you cant reposition them next to
the computer.
Touchpads
Other computers have a touch surface, also known as a glide pad or touchpad, below the
spacebar. You can tap the pad for a mouse click, or use the buttons below or beside the
pad as the left and right mouse buttons. Slide your finger in the direction you want the
mouse pointer to move, and then tap the touchpad or the button next to it to make
selections.
Some notebook cases arent very substantial, and resting your hands on the surface next
to the touchpad can result in the sensors perceiving that youve chosen to move the
mouse pointer. This can be bothersome, so advise users only to rest their hands lightly
on the surface to avoid this problem. An integrated touchpad is shown in Exhibit 16-7.
Glide surface
Right button
Left button
Microphone port
Line out
Volume controls
Mute button
Portable computers
Do it!
A-1:
1613
Heres how
Heres why
Portable computers
1615
Wireless communications
Wireless connections are a popular means of linking devices, such as PCs, handheld
computers, music players, and more. Wireless connections generally use one of the
following:
Infrared light
Radio waves
Bluetooth
Infrared
Infrared wireless technology uses pulses of invisible infrared light to transmit signals
between devices. It offers relatively low-speed, line-of-site connections between
devices. Infrared light cant pass through obstructions or around corners. Connection
speeds can be up to 16 Mbps, with a typical range of one meter. To make connections,
devices must aim their transceivers almost directly at each other. Devices that are more
than 30 degrees off to the side of a receiver are generally unable to connect.
Devices that use infrared include handheld computers, such as PDAs, and some wireless
keyboards, mice, and printers. Infrared connection technology standards are set forth by
the Infrared Data Association (IrDA).
Network connections
Most notebooks now include both a LAN interface and a wireless one. The LAN
interface is typically an RJ-45 port for an Ethernet network. Many notebook computers
also include a modem port. Wireless technology for network connectivity is becoming
increasingly popular for LANs, especially in buildings where it might be difficult to
install new wiring.
Portable computers
1617
Ethernet
Ethernet is the most popular form of LAN in use today. Its popular mainly because it
strikes a good balance between ease of setup and use, speed, and cost.
Three types of Ethernet architecture are available now. Each is distinguished primarily
by the speed at which it operates. Each version can be set up with various types of wire
or cable, but each versions speed and operating conditions might dictate what type of
connecting wire is used. Most current Ethernet installations use shielded twisted-pair
(STP) cable, unshielded twisted-pair (UTP) cable, or fiber optic cable.
Wireless networks
As their name suggests, wireless LANs dont use wires to connect the nodes of the
network. The nodes arent physically connected to one another or to a central device.
Instead, they communicate with an access point or wireless hub by using a wireless
network interface card (NIC), which includes a transceiver and an antenna. The wireless
NIC allows the node to communicate over relatively short distances by using radio
waves, which it sends to the nearest hub and receives from the hub.
The major wireless technologies include:
Wi-Fi (Wireless Fidelity) The marketing name for IEEE 802.11b, IEEE
802.11g and IEEE 802.11n technologies. You find Wi-Fi in public places, such
as airports and coffee shops, that offer Internet access.
WiMAX (IEEE 802.16 Air Interface Standard) In wireless metropolitan area
networks.
Cellular WAN Uses cellular phone technology and equipment to link a
handheld PC to the Internet or another network.
Bluetooth Short-range wireless technology used to connect nodes in a single
room or in adjacent rooms.
802.11a Developed at the same time as 802.11b. Due to its higher cost, it was
used in business networks, while 802.11b dominated the home market.
A-2:
Questions
1 In wireless communications, what
replaces the wire?
2 List the major wireless
technologies
3 Which wireless standard is
typically used in airports and
coffee shops?
4 Whats the range of the Bluetooth
technology?
5 Which wireless technology
connects mobile users to the
Internet, using a well-established
network, but is relatively slow, at
speeds equivalent to dial-up (56
Kbps)?
Answers
Portable computers
1619
Topic B: Configuration
This topic covers the following CompTIA A+ Essentials (2009 Edition) version 2.0
exam objectives.
#
Objective
1.10
3.3
Explain the process and steps to install and configure the Windows OS
Configure power management
Suspend
Hibernate
Standby
Explanation
As with any Windows computer, there are many features you can configure on a
notebook computer to optimize it for the way you use it every day. The Windows
Mobility Center provides a central location for a variety of settings, including power
and display options, that you can access with just a few clicks, instead of opening
multiple windows in the Control Panel. In addition, optimizing power settings to
maximize usage and battery life is an important consideration on all notebook
computers.
Exhibit 16-12: The Windows Mobility Center on a notebook computer running Windows
7
To open the Windows Mobility Center:
1 Open the Control Panel.
2 In Windows 7, under Hardware and Sound, click Adjust commonly used
mobility settings.
In Windows Vista, click Mobile PC, and then click Windows Mobility Center.
You can also right-click the battery icon in the notification area in Windows 7 or click
the battery icon in Windows Vista and choose Windows Mobility Center. Typically,
Windows Mobility Center will contain tiles for the following:
Display brightness
Volume
Battery status
Wireless networking status
Screen orientation (important for tablet PCs)
External display
Sync Center
Presentation settings
Portable computers
Do it!
B-1:
1621
Heres how
Heres why
Portable computers
1623
Your notebook might or might not be configured to support sleep and hibernate modes
the way you want. Many people find it most convenient to have their laptop go to sleep
when they close the cover, and have the computer hibernate when they press the power
button. You can configure these actions by following these steps in Windows Vista and
Windows 7:
1 Open the Control Panel.
2 Click Hardware and Sound.
3 Under Power Options, click "Change what the power buttons do.
4 Using the lists, select the action you want taken when you close the lid or press
the power button. You can specify different actions depending on whether the
computer is running from the battery or is plugged in.
5 Click Save changes.
Power options
You can configure which components are powered down and when with standby mode.
You can configure whether your computer goes to sleep and the interval after which it
will do so. You can also configure whether your computer supports hibernation and how
you hibernate your computer. You do all this through the Power Options window in the
Control Panel, shown in Exhibit 16-13.
B-2:
Heres how
1 Configure your notebook computer to go to sleep when you close the lid, and
hibernate when you press the power button.
Put your computer to sleep. Move the mouse or press a key to wake your
computer.
Hibernate your computer. Wake your computer by pressing its power button
again.
2 Which is the faster power-saving mode to enter and resume from: sleep or
hibernate?
Portable computers
1625
Objective
1.2
1.9
1.10
3.3
Explain the process and steps to install and configure the Windows OS
Demonstrate safe removal of peripherals
Objective
1.3
Given a scenario, install, configure, detect problems, troubleshoot, and repair/replace laptop
components
Components of the LCD, including inverter, screen, and video card
Hard drive and memory
Disassembly processes for proper reassembly
Document and label cable and screw locations
Organize parts
Refer to manufacturer documentation
Use appropriate hand tools
Recognize internal laptop expansion slot types
Upgrade wireless cards and video card
Replace keyboard, processor, plastics, pointer devices, heat sinks, fans, system board, CMOS
battery, speakers
When an internal component of a notebook computer needs replacing, most often youll
need to purchase the replacement from the manufacturer because most notebooks
contain custom devices. However, PC Cards, mini PCI cards, and some other
components, such as memory, are standardized so that you can purchase them from any
manufacturer. Some third-party manufacturers make replacement components so that
you have an alternative to the original equipment manufacturer.
Sometimes you can use a PC Card to replace a function that no longer works on the
built-in component. If you do this, you might need to disable the built-in component to
prevent a conflict between the two components.
When you need to replace an internal component, follow these general guidelines for the
disassembly process to ensure proper reassembly:
Refer to the manufacturers documentation to locate panels or slots through
which you can access internal components.
Document and label screw locations to ensure that the correct screws are
reinserted in their proper locations.
Organize and separate new parts and any parts you remove from inside the case.
Use hand tools appropriate for working with laptop computers.
Portable computers
1627
Hot-swappable components
Hot-swappable components are those components that you can add or remove without
turning the computer off. Technologies that support hot-swapping include:
PCMCIA
USB
IEEE 1394 (commonly referred to as the brand name FireWire)
Fibre Channel (used for enterprise storage)
Serial ATA (SATA)
Some computer components, such as the PC Card, require a simple hot-swap. In a
simple hot-swap, you shut down the component before removing it. In the Windows
operating systems, you accomplish this by clicking the Safely Remove Hardware icon
in the system tray and stopping the device.
PC Card cards
The expansion cards used in notebook computers are PC Cards. These are roughly the
size of a credit card, with varying thicknesses based on the type of card. There are three
types of PC Cards. They all have a 68-pin female connector that plugs into a connector
in the PC Card slot on the side of the computer. The Personal Computer Memory Card
International Association (PCMCIA) developed the standards for PC Card adapters.
However, the PCMCIA Association has been dissolved. The standards going forward
will be managed by the USB Implementers Forum.
PC Card types
The three types of PC Card adapters are:
Type I 3.3 mm thick
Type II 5 mm thick
Type III 10.5 mm thick
Most often, youll encounter Type II PC Card adapters. These are typically used for
network adapters and modems, for adding ports such as FireWire and SCSI, and
sometimes for memory. Some of the cards use a dongle to attach to a network cable or
to other cables. Other cards use a pop-out port for the connector to plug into. A Type II
PC Card is shown in Exhibit 16-14.
Description
CardBus
The conventional PCI bus is a parallel bus. Depending on the version, the PCI bus
transfers either 32 or 64 bits of parallel data. A newer version of the PCI bus, called the
ExpressCard, is designed for notebooks. ExpressCard uses a differential serial bus
instead of a parallel bus. Compared to conventional PCI buses, the ExpressCard has
both a reduced cost and a higher bus speed.
The ExpressCard is the same size as a parallel PCI card; however, the ExpressCard isnt
compatible with the parallel PCI bus. Its connectors, signal voltage levels, and format
are different from those of a parallel PCI bus.
Inserting and removing PC Cards
You insert the PC Card straight into the slot, and it connects to the pins in the back of
the slot. Before removing a PC Card, you should stop its services by using the Safely
Remove Hardware icon in the system tray. Then you press the Eject button on the case
to pop the card out of the slot.
Portable computers
1629
Description
Metaformat, also
known as Card
Information
Structure (CIS)
Card Services
An API that enables the sharing of device drivers and other software by PC
Cards and sockets. Card Services is designed to provide support for PC
Card devices to share device drivers, configuration utilities, and
applications. Its also designed to provide a single resource for functions
shared by the software.
Socket Services
Exhibit 16-15: The Safely Remove Hardware icon and dialog box
Before removing a device, you should always stop the service first. This ensures that the
device isnt being accessed by any programs or services. If its a storage device,
stopping it ensures that it isnt in the middle of writing information. Data can become
corrupted if you remove the storage device while its being written to.
In Windows 7, when you click the Safely Remove Hardware icon, you receive a list of
hot-swappable devices as shown in Exhibit 16-16. Select the device, and Windows 7
automatically stops the services and prepares the device for removal.
Portable computers
Do it!
C-1:
1631
Heres how
Heres why
Exhibit 16-17: Built-in modem and network provided by mini PCI cards
Mini PCIe cards
The Mini PCIe card, shown in Exhibit 16-18, is replacing the Mini PCI card found on
many Mini-ITX system boards. Its smaller than the Mini PCI card by about halfwith
the Mini PCIe measuring 30 mm x 51 mm, and it has a 52-pin edge connector. The Mini
PCIe technology is essentially the same as ExpressCard. The Mini PCIe slot on the
system board must support both ExpressCard and USB 2.0, as the Mini PCIe card can
use both technologies for connectivity.
Portable computers
1633
Screws
Portable computers
1635
Portable computers
1637
7 Carefully remove the system board from the notebook. It might be held in place
by plastic clips or screws.
8 Place the new system board into the computer, carefully lining up the cutouts for
side ports, such as USB.
9 Replace the processor, remembering to remove any old thermal compound and
to add new.
10 Replace the internal components that were attached to the system board.
11 Reassemble the notebook, reversing the steps you took to disassemble it to this
point.
12 Replace the battery and, if desired, reconnect the notebook to an external power
source.
CMOS battery
The CMOS battery in notebook computers is typically located underneath the keyboard.
The general steps to replace a notebook CMOS battery are as follows:
1 Disconnect the notebook from any external power source and remove the
battery.
2 Follow the steps to remove the keyboard.
3 Remove the plate or shell covering the internal components.
4 Locate the CMOS battery on the system board.
5 Remove the battery. In some notebook computers, it is held in place with clips.
In others, the battery is encased in plastic, connected to wires and a connector,
and then plugged into the motherboard. In the latter case, you would replace the
entire battery assembly, not just the battery itself.
6 Reassemble the notebook.
7 Replace the battery and, if desired, reconnect the notebook to an external power
source.
8 Turn on the computer and enter the CMOS utility.
9 Enter the BIOS settings.
10 Save settings and restart.
Pointing device
Most notebook computers sold today use a touchpad. In general, the replacement steps
to follow are:
1 Disconnect the notebook from any external power source and remove the
battery.
2 Follow the steps to disassemble the bottom of the notebook where the system
board is located.
3 Disconnect the pointing devices cables. Make sure to label the cables, so you
know where to reattach cables for the right and left mouse buttons.
4 Carefully remove the old pointing device.
5 Insert a new pointing device in its place.
6 Reattach the cables.
7 Reassemble the notebook, reversing the steps you took to disassemble it to this
point.
8 Replace the battery and, if desired, reconnect the notebook to an external power
source.
Portable computers
Do it!
C-2:
1639
Heres how
Heres why
C-3:
Adding peripherals
Heres how
1 Identify the peripheral ports on
your notebook
2 Determine which port should be
used to connect the given
peripheral device
3 Connect the device
If necessary, connect power to the
device
If necessary, turn the device on
4 Verify that the device works
Heres why
Check your answers against the notebooks
documentation. There are typically USB, VGA,
and parallel ports, but there might be others.
Portable computers
1641
Front view
Notebook
connector
Rear view
Peripheral
ports
C-4:
Heres how
Heres why
Portable computers
1643
Objective
2.2
Given a scenario, explain and interpret common hardware and operating system
symptoms and their causes
Hardware-related symptoms
Excessive heat
Status light indicators
2.4
Given a scenario, explain and interpret common laptop issues and determine the
appropriate basic troubleshooting method
Issues
Power conditions
Video
Keyboard
Pointer
Stylus
Wireless card issues
Methods
Verify power (e.g. LEDs, swap AC adapter)
Remove unneeded peripherals
Plug in external monitor
Toggle Fn keys or hardware switches
Check LCD cutoff switch
Verify backlight functionality and pixilation
Check switch for built-in WIFI antennas or external antennas
Objective
1.3
Given a scenario, install, configure, detect problems, troubleshoot, and repair/replace laptop
components
Components of the LCD, including inverter, screen, and video card
Hard drive and memory
Disassembly processes for proper reassembly
Document and label cable and screw locations
Organize parts
Refer to manufacturer documentation
Use appropriate hand tools
Recognize internal laptop expansion slot types
Upgrade wireless cards and video card
Replace keyboard, processor, plastics, pointer devices, heat sinks, fans, system board, CMOS
battery, speakers
Although notebook computers are designed to be rugged enough to endure the bumps
and tumbles that can occur during travel, theyre still electronic devices that can be
damaged relatively easily. You might encounter power-related problems, components
might be jarred loose, or components might be damaged and need to be replaced.
Some college dorm rooms tend to be a bit on the messy side, and a notebook computer
thats left under piles of papers and clothes and gets stepped on might end up with a
cracked screen, a damaged keyboard, or any other number of problems. Offices with
cups of coffee, birthday cakes, and lunches can lead to spills into the keyboard. The
keyboard on a notebook computer often covers other components, so a user wont be
damaging just the keyboard if things are spilled on it. These are just some of the
problems you might encounter when providing support to mobile users.
And as you troubleshoot notebook problems, remember than unexpected noises from the
notebook can indicate problems with the same components as desktop computer: hard
drive, floppy drive, cooling fan, and optical drives.
Keyboards
The keyboard on a notebook computer is smaller than a standard desktop keyboard.
Typically, notebook keyboards include the alphanumeric keys, function keys, and the
most important "system keys, such as Enter, Backspace, and so forth. Unlike desktop
keyboards, notebooks rarely contain dedicated numeric keypads, and some keys serve
dual purposes.
To access the alternate purpose of a dual-purpose key, you press the key while holding
down the Fn key. For example, to increase the brightness of your laptops screen, you
might press the F2 function key while holding down the Fn key. The alternate actions of
these dual-purpose keys are usually written in small, light type, or in an alternate color,
on the edge of the keys.
Portable computers
1645
Sometimes the function keys work as a toggle. If a user is typing and getting unexpected
results, such as trying to type a "j and getting the number "1 instead, perhaps a
function key was activated.
Pointing devices
Notebook computers have integrated pointing devices built into the middle of the
keyboard or placed below the keys. Some notebook keyboards have a small pointer,
much like a joystick, which can be pushed up, down, left, and right to move the mouse.
Separate buttons below the Spacebar are used as the left and right mouse buttons.
The cases of some notebook computers arent very substantial, and resting your hands
on the surface next to the touchpad can result in the sensors perceiving that youve
moved the mouse pointer. This can be bothersome, so youll want to advise users to rest
their hands lightly on the surface to avoid this problem.
The stylus
On tablet PCs, you access applications through the touch screen. Using a stylus or
sometimes your finger, you tap the application you want to use. You can then interact
with the computer through menus, handwriting recognition software, an external or onscreen keyboard, or icons within the application.
If a user is having problems entering or selecting information with the stylus, you might
need to recalibrate it through the operating system. To tell the tablet PC where the
boundaries of its screen are, youre prompted to tap the screen at the center and the four
corners. This gives the operating system the boundaries of the screen, and the OS can
then calculate where youre pointing when you tap the screen with the stylus. If
recalibration doesnt fix the problem, the screen might need to be replaced.
External peripherals not working
If a notebooks peripherals arent working, its possible that a port was damaged.
However, a more likely cause is that the function-key combination for using the internal
or external component was engaged. This happens easily on cramped notebook
keyboards. The Fn key is often located near the Ctrl and Alt keys and can easily be
pressed accidentally when users are trying to press Alt+F4, for example. On one
notebook computer, Fn+F4 switches the monitor output to laptop display only, external
monitor only, or both on at once.
Overheating
Although the components in a notebook computer are designed to run cooler than their
desktop counterparts, overheating can still be a big problem for notebook computers.
Some computers shut down when they detect that theyre running too hot. Others go
into Hibernation mode.
Notebook computers are often referred to as "laptop computers, but its better to place
them on a hard surface, such as a desk or table, rather than on your lap. The hard surface
allows proper air circulation around the computer to help prevent overheating.
Special cooling pads can be purchased and placed under a notebook computer. Some of
these are just louvered platforms that let air pass through. Others connect to the USB
port and have small fans to help cool the notebook. Some notebook computers include
built-in fans on the underside to help dissipate the heat buildup.
Portable computers
1647
Many laptop display problems are caused by the Fn keys being set to the wrong
monitor settingfor example, its set to use an external monitor when one isnt
connected. If youre experiencing display problems, you should:
1 Press the monitor Fn key to switch between the settings.
2 Connect a known working external monitor if one isnt connected, or disconnect
it if it is.
3 Adjust the backlight or brightness setting of the display.
4 Verify that the LCD cutoff switch isnt stuck. It turns the display off when the
notebook lid is closed.
5 Reboot the computer in Safe mode, which loads standard VGA drivers. If the
display loads in Safe mode, you need to reset the display settings for a normal
boot.
Additional monitor problems can be caused by the users choosing incorrect resolution
settings. A monitors resolution is the number of pixels across and down that a video
adapter can create. Sometimes users select settings that are incompatible with their
monitor. Youll need to correct the settings, and you might need to boot into Safe mode
to do this. More complex monitor problems can be caused by a faulty LCD backlight
bulb, LCD inverter cable, LCD inverter, or motherboard.
The wireless antenna
In some laptops, the wireless antenna is in the lid. If the lid is tipped below or beyond a
90 angle, it can adversely affect the bandwidth available for the network connection.
Sometimes the connection is lost entirely. To correct the problem, you need to
reposition the notebook cover. Some notebook computers have a hardware switch you
can use to turn the wireless antenna on and off. You should verify that the switch is in
the correct position. If its a push-button switch, instead of a mechanical toggle switch,
theres usually an LED indicator light to tell you if the wireless is on or off.
Wireless ports
In addition to the network problems you might have with wireless devices, if a wireless
device is not responding the batteries might be run down. If the device uses alkaline
batteries, replace them. If the device uses rechargeable batteries, place the device or
batteries in the charger. (A mouse with rechargeable batteries is placed in the charger;
other devices might require the batteries to be removed and placed in a charger.)
D-1:
Heres how
1 One or more problems were introduced into your system, and you need to resolve
them. To start, determine whether you can use the built-in keyboard, monitor, and
pointing device.
2 Determine whether you can use the external keyboard, monitor, and pointing
device. These can be connected directly to ports on the notebook or to a port
replicator or docking station.
3 Determine whether the notebook can be used from battery power.
4 Document the problems you found:
7 Test the system to verify that the problems were completely resolved.
Portable computers
1649
Power problems
Even rechargeable notebook batteries eventually wear out. Most batteries can be
recharged about 500 times and still hold a charge. This duration usually works out to
about two or three years of life expectancy for battery power. When the battery no
longer takes or holds a charge, you need to replace it. Most often, you need to obtain
one from the notebooks manufacturer, although there are some third-party
manufacturers of replacement batteries. If you replace the battery with one that isnt
specifically designed for your laptop or isnt from a reputable manufacturer, be
carefulbatteries have been known to overheat, becoming a fire hazard.
The system tray usually contains a battery indicator that indicates how much battery
power remains. If you point to this icon, it displays the percentage of battery power
remaining and the estimated time it will last. Usually, if you right-click or double-click
the icon, you can configure settings to extend battery life by turning off components
after a period of inactivity.
There might also be predefined settings for specific needs, such as watching DVDs
under battery power or getting the most performance even if it means using up battery
power faster. Exhibit 16-21 shows an example of a notebook power management utility.
Portable computers
1651
D-2:
Heres how
Heres why
Portable computers
1653
To ship a notebook, properly pack it. If you dont have the original packing material
from you manufacturer, you can follow these packing steps to help it arrive at its
destination undamaged:
1 Place bubble wrap around your laptop.
2 Choose a box with at least a 2" air gap between the laptop and the box on the
top, bottom, and sides.
3 Fill the air gap with packing popcorn, bubble wrap, or other protective material.
The packing material should fill the entire air gap.
4 Use strapping tape to secure the flaps on the box closed.
5 Ship through a carrier that offers insurance and delivery confirmation.
D-3:
Maintaining a notebook
Heres how
Heres why
Portable computers
1655
In this topic, you learned how to identify notebook components. You also compared
the wireless networking standards used by notebook computers.
Topic B
In this topic, you configured a mobile computer. You examined the Windows Mobility
Center, and you learned how to configure power settings.
Topic C
In this topic, you learned how to replace the internal components of a notebook
computer. Internal components are categorized into hot-swappable and coldplug
devices. You also learned how to connect peripheral devices to a notebook computer to
add functionality.
Topic D
In this topic, you learned how to troubleshoot and maintain notebook components.
Notebooks take more bumps and abuse than desktops, so knowing how to support and
maintain them and their components is critical in todays business environment.
Review questions
1 Which of the following components are typically built into a notebook computer?
[Choose all that apply.]
A Monitor
B Printer
C Scanner
D Pointing device
2 Which of these battery types isnt typically used to power a notebook computer?
A Lithium ion (Li-Ion)
B Alkaline
C Nickel metal-hydride (NiMH)
D Nickel cadmium (NiCad)
3 Which type of battery is used most often in notebook computers?
A Lithium ion (Li-Ion)
B Nickel cadmium (NiCad)
C Nickel metal-hydride (NiMH)
D Zinc Air
4 True or false? The power cord for a notebook is a standard cord, such as that used
for a desktop computer.
False. The power cord for a notebook computer has a transformer between the outlet and the
computer. Its a square or rectangular box, so its often called a "power brick.
8 In which power state does the computer take all current applications running in
RAM, save them to the systems swap partition on the hard disk, and turn the
notebooks power off?
A Hibernate
B Sleep
C Shut down
D Standby
9 Which type of memory module package is typically used in notebook computers?
A DIMM
B MicroDIMM
C SIMM
D SODIMM
10 True or false? If your notebook doesnt support swapping a CD or DVD drive with
a floppy drive, you wont be able to use a floppy drive with the computer.
False. You can purchase an external floppy drive and connect it to the computer through one of
the peripheral ports, such as a USB port.
11 Which LCD technology uses the least amount of power from your notebooks
battery?
A Active matrix
B Passive matrix
C Reflective
D Transflective
E Transmissive
12 Which wireless connection technology uses pulses of invisible light to transmit
signals between devices?
A Bluetooth
B Infrared
C Radio
D WiMAX
Portable computers
1657
17 Which card and socket layer service is designed to provide support for PC Card
devices so they can share device drivers, configuration utilities, and application
programs?
A Card Services
B Metaformat
C Socket Services
18 True or false? A port replicator is a more robust solution than a docking station for
using a notebook computer while at the office.
False. The docking station is a more robust solution than a port replicator. A docking station
provides the same ports as a replicator, but it also has slots for full-size desktop PCI cards. It
might also have additional media/accessory bays, floppy drives, and CD drives. It acts as a
platform stand for a desktop monitor.
19 To access the alternate purpose of a dual-purpose key, you press the desired key
while holding down which key?
A Alt
B Ctrl
C Fn
D Shift
22 True or false? To install PC Cards, you must shut down the computer first.
False. PC Cards are hot-swappable and can be inserted while the notebook is running.
23 If you incorrectly set the displays ______________ settings, the monitor might not
display information properly.
resolution
24 Some laptops have their wireless antenna in the lid. If the lid is tipped below or
beyond a __________-degree angle, it can adversely affect the bandwidth available
for the network connection.
90
25 Most notebook batteries can be recharged approximately how many times before
theyll no longer hold a charge and need to be replaced?
A 100
B 300
C 500
D 1000
26 Why can the wireless network adapter be turned off on some notebooks?
Usually, if youre mobile, you dont have access to a wireless network, so you can save the power
needed for the card to keep the notebook powered longer. You can also turn it off for security
purposes. If youre at a wireless hotspot and suspect suspicious activity, you can switch off the
wireless network card.
Portable computers
1659
171
Unit 17
Windows management
Unit time: 125 Minutes
172
Objective
3.1
Compare and contrast the different Windows operating systems and their features
Windows 2000, Windows XP 32bit vs. 64bit, Windows Vista 32bit vs. 64bit, Windows 7
32-bit vs. 64-bit
Sidebar, Aero
User interface, start bar layout
3.3
Explain the process and steps to install and configure the Windows OS
Configure power management
Suspend
Wake on LAN
Sleep timers
Hibernate
Standby
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
2.3
Given a scenario, select and use system utilities / tools and evaluate the results
Regional and language settings
2.4
Although regional and language settings are typically configured during Windows
installation and then never touched again, you can reconfigure the settings at any time in
the Control Panel. To access the settings in Windows 7 or Windows Vista, open the
Control Panel, click Clock, Language, and Region, and then click Region and Language
in Windows 7 or Regional and Language Options in Windows Vista. In Windows XP,
open the Control Panel and click Date, Time, Language, and Regional Options. Then
click Regional and Language Options. In Windows 2000 Professional, open the Control
Panel and double-click Regional Options.
Windows management
173
The following table describes the settings you can configure on each tab of the
Windows 7 and Windows Vista Regional and Language Options dialog box.
Tab
Settings
Formats
The display of numbers, currency, dates, and times. All formats have
default groups of settings, but all are customizable.
Location
Your computers location, which can affect some applications that provide
location-specific content.
Keyboards and
Languages
Administrative
The following table describes the settings you can configure on each tab of the
Windows XP Regional and Language Options dialog box.
Tab
Settings
Regional Options
Languages
Advanced
The following table describes the settings you can configure on each tab of the
Windows 2000 Professional Regional Options dialog box.
Tab
Settings
General
Your computers location, which can affect some applications that provide
location-specific content; your computers language settings.
Numbers
Currency
Time
Date
Input Locales
174
Do it!
A-1:
Heres how
Heres why
Press g
You can configure the language for nonUnicode programs, and you can copy regional
settings to new user accounts and specific
system accounts.
7 Click Cancel
Windows management
175
Indexing
Because its faster to search through an index than it is to search through every file on a
computer, Windows builds an index of files from specific folders in the directory
structure. The Indexing Service performs a comprehensive search operation during
indexing. It goes through each file, creating a catalog of detailed information on each
file. The service has filters for HTML files, text files, and all types of Microsoft Office
files. The Indexing Service is designed to perform its work when the computer is idle.
The service pauses whenever it senses activity from the keyboard or mouse. If you
regularly search for specific content in data files on large volumes, the Indexing Service
can save you a considerable amount of time. Some estimates state that searching for
content with the Indexing Service returns results hundreds of times faster than using a
standard search engine.
Windows 7
In Windows 7, the indexing service isnt installed by default. Windows Search has taken
over the tasks performed by the indexing service in previous versions of Windows.
Windows Search creates a system-level index for over 200 common types of files. The
system creates an initial scan of your computer, then as new files are created and new
emails received, theyre indexed during the computers idle time. By default, Windows
Search indexes the contents of all users Documents and Favorites folders, the Public
folders, and default mail stores. On Windows 7 Professional, Ultimate, and Enterprise
computers, you can modify these settings using user- and computer-based group
policies.
Windows Vista
In Windows Vista, by default the index is built from the Offline Files, the Start Menu
folder, and the Users folder. Because most users will store their files in their Documents
or Pictures folders, the Users folder is a prime location for indexing. If users complain
that their files arent showing up when they search or that the search is slow, check to
see if the correct folders are being indexed. If necessary, reconfigure the index by
adding new folders, and then rebuild it.
To reconfigure or troubleshoot indexing in Windows Vista:
1 Open the Control Panel.
2 Click System and Maintenance.
3 Click Indexing Options.
You can add or remove folders in the index list, and you can control index settings such
as the index location and whether encrypted files are indexed. You can also rebuild the
index or restore index settings to their defaults.
176
Windows management
Do it!
A-2:
177
Heres how
Heres why
1 Click Start
In the Search box, type
gpedit.msc and press e
2 Navigate to Computer
Configuration, Administrative
Templates, Windows Components
and select Search
Observe the settings in the details
pane
178
Windows Aero
Windows Aero is the name of the new graphical user interface (GUI) that Microsoft
introduced with Windows Vista. The Windows GUI had remained much the same from
the introduction of Windows 95 up through Windows XP in 2001. This new GUI
includes the following features:
Translucent windows, taskbar, and Start menu
Taskbar thumbnails, which provide a preview of the windows they represent
Three-dimensional Windows Flip, shown in Exhibit 17-1, which allows you to
flip between open windows while seeing whats in each window (Available in
Windows Vista)
Description
Aero Peek
Aero Shake
When you have multiple windows open on your desktop, you can
press and hold your mouse pointer on the title bar of a single window,
then shake the mouse back and forth. This minimizes all other open
windows, leaving just the one you shook on the desktop.
Windows management
179
Desktop feature
Description
Aero Snap
Drag the title bar of a window to the top of the screen and the window
automatically maximizes. Drag the title bar back down and the
window goes back to its original size and position. Drag the title bar
to the left or right of your screen, and it snaps to one side and takes up
half the desktop.
Jump lists
Windows management
1711
The following table describes some of what you can do with the various settings.
Category
Use settings to
Enable window transparency, and change the colors used for various window
components.
Desktop Background
Screen Saver
Sounds
Mouse Pointers
Theme
Display Settings
A-3:
Heres how
1 Click Start and choose
Heres why
To open the Documents folder.
Documents
Click Start
2 Observe the Start menu, the edges
of the Documents folder window,
and the taskbar
3 Close Documents
4 Right-click the desktop and
choose Personalize
Windows management
6 Select a new color and observe the
window
Experiment with the Color
intensity slider bar
7 Clear Enable transparency
Click Save changes
8 Click Desktop Background
From the Picture location list,
select Pictures Library
1713
Solution
Verify that the color setting is 32-bit and the refresh rate is set to
at least 10 Hz.
If Windows Aero is displayed when you start the computer but turns off very shortly
after Windows starts, you might need to update your computers system BIOS software.
Do it!
A-4:
Heres how
1 True or false? All applications
support Windows Aero
2 If a computer doesnt display the
Windows Aero UI, whats the
first thing you should check?
Whats the second?
Heres why
Windows management
1715
Windows management
1717
Exhibit 17-9: The Windows Sidebar Properties dialog box in Windows Vista
Removing gadgets
To remove a gadget, click the Close button (the X button) to the right of it. You can also
right-click the gadget and choose Close Gadget.
Hiding and exiting the Windows Sidebar
In Windows Vista, to hide the Windows Sidebar, right-click it and choose Close Sidebar
to minimize it to an icon in the notification area. When you hide Windows Sidebar, the
gadgets continue to run even though they are not visible. To display the Windows
Sidebar again, click its icon in the notification area.
To exit the Windows Sidebar, right-click the Sidebars icon in the notification area and
choose Exit. When you exit Windows Sidebar, the gadgets are closed, too.
Displaying the Windows Sidebar
If youve hidden the Windows Sidebar and want to display it again, click the Windows
Sidebar icon in the system tray. If youve closed the Windows Sidebar and it doesnt
reopen when Windows restarts, you can open it by clicking Start and choosing All
Programs, Accessories, and Windows Sidebar.
A-5:
Heres how
Heres why
6 Click OK
online
Windows management
15 Point to the Clock gadget
Click
1719
Windows management
1721
a set of power-saving options. You can customize the default plans or create your own.
The sleep timer values include: 1, 2, 3, 5, 10, 15, 20, 25, 30, and 45 minutes, or 1, 2, 3,
4, and 5 hours. The standard plans are:
Balanced Balances energy savings and performance. This plan is typically
used with desktop computers.
Power saver Favors energy savings over responsiveness, meaning that you
may have to wait while components power up or wake your computer more
often than with another plan. This plan is typically used by notebook computers.
High performance Favors performance over energy savings. Fewer
components are turned off so that your computer is more responsive. This plan is
typically used with servers and computers that share their resources.
Advanced power settings
To access the advanced power settings for any of the predefined plans or a custom plan
youve created, under the desired power plan, click Change plan settings. In Windows
7, click Change advanced power settings. In Windows Vista, click Change advanced
settings to open the dialog box shown in Exhibit 17-11.
Exhibit 17-11: The Advanced settings tab for a Windows 7 power plan
If your desktop motherboard supports the hybrid sleep option, it appears on the
Advanced settings tab as shown in Exhibit 17-12.
Exhibit 17-13: The Power Option Properties dialog box in Windows 2000 Professional
Windows management
Do it!
A-6:
1723
Heres how
Heres why
14 Click Cancel
If necessary.
Windows management
1725
A-7:
Heres how
1 On your desktop computer, configure it to hibernate when you press the power
button.
If your computers keyboard has a Sleep button, press it to put your computer to
sleep. Then move the mouse or press a key to wake your computer.
Hibernate your computer. Wake your computer by pressing its power button
again.
2 If you have a notebook computer available, configure it to go to sleep when you
close the lid, and hibernate when you press the power button.
Put your computer to sleep. Move the mouse or press a key to wake your
computer.
Hibernate your computer. Wake your computer by pressing its power button
again.
3 Which is the faster power-saving mode to enter and resume from: Sleep or
Hibernate?
Windows management
1727
Wake on LAN
If you have a computer that you or other users connect to via the network, such as a
print server, you can configure the computer in a power saving mode and then specify
that it wakes up when the network card receives a connection request.
1 In the Control Panel, click Network and Internet, and then Network and Sharing
Center.
2 Click Change adapter settings in Windows 7 or Manage network
connections in Windows Vista.
3 Right-click your Local Area Connection and choose Properties.
4 In Windows Vista, click Continue.
5 Under Connect using, click Configure.
6 Select the Power Management tab. (On some computers, the power management
information might be on the Advanced tab.)
7 Check Allow the computer to turn off this device to save power and Allow
the device to wake the computer, or check the appropriate boxes under Wake
on LAN. The options vary based on the NIC and the manufacturer. An example
is shown in Exhibit 17-16.
8 Click OK.
The computer can go into a power-saving mode, but awaken at a network request.
A-8:
Heres how
Heres why
Windows management
1729
Objective
2.3
Given a scenario, select and use system utilities / tools and evaluate the results
Task Scheduler
Task Scheduler, shown in Exhibit 17-17, is a utility you can use to schedule routine
maintenance tasks or to act on the occurrence of a specific event. Task Scheduler can
run behind the scenes with no user intervention, or it can accept input from the loggedon user.
Windows management
1731
Settings
You can configure additional settings that will control the tasks behavior. These
settings include whether the task can be run on demand, when and how often to restart
the task if it fails, when to stop the task, and when to delete the task if its not run.
Windows XP and Windows 2000 Professional
To create a task in Windows XP or Windows 2000 Professional, you use the Scheduled
Task Wizard. To start the wizard:
1 Click Start and choose All Programs (Programs in Windows 2000), Accessories,
System Tools, Scheduled Tasks.
2 Double-click Add Scheduled Task. The Scheduled Task Wizard starts.
3 Click Next.
4 Select the program you want Windows to run and click Next. You can select one
from the list or use the Browse button to find one that isnt listed.
5 Enter a name for the task and choose when to run the task. Choices include:
Daily
Weekly
Monthly
One time only
When my computer starts
When I log on
6 Click Next.
7 Depending on the choice you made, youre prompted to enter details about when
to run the task as shown in the following graphics.
Windows management
1733
Exhibit 17-22: When computer starts task and When I log on task
8 Click Next. Your task is created.
9 If you want to configure Advanced options for the task, check Open advanced
properties for this task when I click Finish.
10 Click Finish.
B-1:
Heres how
1 Open Computer Management
Heres why
Youre going to create two tasks. In this activity,
youll create a weekly reminder. In the next
activity, youll create a task to run Windows
Defender when you lock your computer.
Click Next
5 On the Action page, select
Display a message and click
Next
Click Next
6 On the Summary page, observe
the Open the Properties dialog
for this task when I click Finish
checkbox
7 Click Finish
Observe the new task in the
library list, and the five tabs from
its Properties dialog box displayed
below
8 Observe the History tab
Windows management
9 Right-click the task in the list and
choose Run
If necessary, select
10 Click OK
1735
Click OK
13 On the Actions tab, select the
action and click Edit
Edit the message to read
REMEMBER THIS WEEKS
INVOICES
Click OK
14 On the Conditions tab, check
Wake the computer to run
this task
Click OK
B-2:
Heres how
Heres why
Click OK
6 In the Create Task dialog box,
click OK
Windows management
1737
Objective
3.2
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
2.1
Select the appropriate commands and options to troubleshoot and resolve problems
NET
2.3
Given a scenario, select and use system utilities / tools and evaluate the results
Administrative Tools
Services
3.1
Description
continue
pause
Pauses a service.
session
share
start
stop
Stops services. The net command cant stop all services. Refer to
www.microsoft.com/resources/documentation/windows/
xp/all/proddocs/en-us/net_stop.mspx?mfr=true for a list
of stoppable services.
use
view
Windows management
Do it!
C-1:
1739
Heres how
1 Click Start and choose
All Programs, Accessories
Heres why
If Command Prompt is pinned to the Start menu,
you can right-click it from there instead of
navigating down to the Accessories menu.
6 Enter
net use \\computername\Marketing
To connect to the shared Users folder on another
computer in the classroom.
8 Enter
net use \\computername\Marketing /delete
To remove the connection.
10 Enter
net share marketing /delete
To stop sharing the Marketing folder.
Windows management
1741
Description
Services
A computer administrator can stop and start services and change the startup
properties of those services.
WMI
Control
Indexing
Service
Use the Indexing Service to get fast and easy access to system information
through the Windows Search function. The Directories feature allows you to
view items that are being indexed in the Directories folder.
Services
When it comes to optimizing and securing a computer, one of the first things you can do
is disable any unnecessary components, such as services. When a service is
unnecessarily installed or is no longer used, you should disable it. Running unnecessary
services consumes resources, such as memory and the CPU, and adds overhead to the
system. If youre having a problem with a component on a computer, see if the service
is running.
Windows management
1743
C-2:
Managing services
Heres how
Heres why
Choose Manage
3 Select Services
4 Double-click
Computer Browser
Windows management
Do it!
C-3:
1745
Heres how
1 Right-click WLAN AutoConfig
Heres why
In the Services console.
Choose Properties
3 Click Apply
Click Start
10 Click OK
Windows management
11 Right-click WLAN AutoConfig
and choose Stop
1747
Description
HKEY_CLASSES_ROOT
Contains file association data that Windows uses to start the correct
program when you open a file from within Windows Explorer or
Computer (My Computer).
HKEY_CURRENT_USER
Holds the user data for the user whos logged onto the computer.
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CURRENT_CONFIG
Registry editors
Registry files are binary files, so you cant edit them directly in a text editor, such as
Notepad. You can edit Registry files indirectly by using the Control Panel applets or
Device Manager. Changes made there, and in other Properties dialog boxes in Windows,
are kept in the Registry.
You can also edit the Registry directly by using one of the Registry editors: regedit.exe
or regedt32.exe. (Both tools are called Registry Editor.) Windows 9x/Me uses the
regedit.exe utility. Windows 2000 Professional provides both regedit.exe, for its
superior search capabilities, and regedt32.exe, a more powerful editing tool. All
versions of Windows 7, Windows Vista and Windows XP, combine the two tools into
one, shown in Exhibit 17-26, so you get Regedit whether you start Regedit or Regedt32.
If, for some reason, you have to edit the Registry in an operating system other than
Windows 7, Windows Vista or Windows XP, you might find yourself using Regedit to
find a particular key or value, and using Regedt32 to actually edit the settings.
Windows management
1749
C-4:
Heres how
Heres why
1 Click Start
In the Search box, type
regedit and press e
Click Yes
3 Expand
HKEY_CURRENT_USER
6 Click Cancel
9 Click Cancel
Windows management
1751
Registry searches
To search for Registry entries, open the Registry Editor (Regedit.exe in Windows 2000
Professional) and choose Edit, Find. This opens the Find dialog box, shown in Exhibit
17-27. In the Find what box, enter the text string you want to search for. Then, under
Look at, check Keys, Values, Data, or any combination of the three. (All three are
selected by default.) To start the search, click Find Next.
C-5:
Heres how
Heres why
4 Press #
5 Continue pressing #
Windows management
1753
One of the fastest and easiest ways to create a backup of a single subkey or value is to
export it from the Registry Editor. (If you have to back up a full Registry key, its better
to back up the entire Registry.) To export a portion of the Registry or the entire
Registry:
1 Open the Registry Editor.
2 Choose File, Export to open the Export Registry File dialog box, shown in
Exhibit 17-28.
3 Under Export range, select either All (to back up all keys) or Selected branch.
4 Save the file with a suitable name, in a secure location. Keep in mind that a full
backup can run several megabytes.
To restore the Registry or the portion you backed up, double-click the .reg file you
created. This installs the information in the correct location in the Registry.
Recovery discs
In Windows 7, Windows Vista, Windows XP, and Windows 2000 Professional, you can
use system recovery utilities to create a system recovery disc that includes a copy of the
entire Registry. In Windows 2000 Professional, the system recovery disc is called an
Emergency Repair Disk (ERD). The ERD contains basic system configuration files that
you can use to restore your computer to a bootable state if your Registry is damaged or
if the operating system is on an NTFS partition that isnt booting. When you create an
ERD, basic system configuration information from the Registry is placed on the disk
and in the %systemroot%\Repair folder on the hard disk. In Windows Vista and
Windows XP, the system recovery is called Automated System Recovery (ASR). The
Automated System Recovery Wizard creates a backup of your system partition and
makes a floppy disk containing critical system settings. In Windows 7, you create a
system repair disc from Control Panel, Backup and Restore.
You can then use ASR to recover from a system failure caused by problems with the
system/boot volume, such as Registry corruption.
Additional details of the Emergency Repair Disk and Automated System Recovery
utilities are provided in the operating system troubleshooting unit.
C-6:
Heres how
Heres why
Desktop backup
4 Click Save
Windows management
1755
Objective
2.3
Given a scenario, select and use system utilities / tools and evaluate the results
Remote Desktop Protocol (Remote Desktop / Remote Assistance)
Remote Assistance
Explanation
Remote Assistance provides a way for a user to ask someone at another computer for
help with a computer problem. Remote Assistance allows the helping user to see the
other users desktop and, when permitted, to take control of that system temporarily to
resolve problems. Some organizations might have a network configuration that prevents
a second user from taking control of the first computers keyboard and mouse; this will
depend on your specific network setup. Theoretically, depending on network
configuration, you can ask for and receive help on just about any Windows 7 and
Windows Vista computer in the world.
The Remote Assistance session works like this:
1 You invite someone to help you by creating and making available an invitation.
You can send an e-mail message to the person youre asking for help, or you can
create an invitation file that you can put in a shared location, attach to an e-mail
message, or send through an instant messaging program. You must also give the
helper the password associated with the invitation.
2 The helper accepts your invitation and enters the password.
3 You show the helper the problems youre experiencing. He or she can then
answer your question or take control of your computer (if permitted) to fix the
problem.
4 Either you or the helper then ends the session.
In Windows 7 and Windows Vista, Remote Assistance is enabled by default. To
configure Remote Assistance settings, click Start, right-click Computer, and choose
Properties. Under Tasks, click Remote settings, and enter a password if prompted. On
the Remote tab, you can enable or disable Remote Assistance. Click Advanced to
enable or disable remote control of your computer and to set time limits for invitations.
To create an invitation, open Windows Help and Support, click Ask, and then click the
Windows Remote Assistance link. Click Invite someone you trust to help you; choose
to use e-mail to invite the friend or create an invitation; and then complete the wizard.
D-1:
Heres how
1 Click Start, right-click
Computer, and choose
Heres why
Youre going to configure Remote Assistance
and then request assistance from the instructor.
Properties
3 Click Advanced
Observe the Remote control
section
Click
Under Ask a person for help, click
Windows Remote
Assistance
Windows management
9 In the File name box, type
1757
firstnames Invitation
Click Save
10 Observe the Windows Remote
Assistance window
Do it!
D-2:
Heres how
1 Wait for your instructor to accept your invitation. Click Yes when asked whether
to accept the connection.
Instructor: You need to access the Public Documents folder on the students
computers.
2 Click Chat and explain to your instructor what the problem is. Open your
personal folder and Sticky Notes.
3 Instructor: Click Request control.
Allow your instructor to take control of your session. Watch as your instructor
opens and closes folder windows and programs.
4 End the session.
5 Access the remote settings and disable Remote Assistance.
Windows management
Do it!
D-3:
1759
Heres how
Heres why
5 Click Cancel
6 Click OK
Windows management
Do it!
D-4:
1761
Heres how
Heres why
Click Options
!pass1234
5 Click OK
Click Yes
In this topic, you learned how to configure regional and language settings, and you
configured indexing, Windows Aero, and the Windows Sidebar. You then learned how
to configure the power management options in Windows Vista to conserve energy on
both desktop and notebook computers.
Topic B
In this topic, you leaned how to use Task Scheduler to create and configure scheduled
tasks. You learned how to create a basic task by using a wizard, and how to create a task
manually.
Topic C
In this topic, you learned how to manage resources using the net command. You
learned how to control Windows services by using the Services console. You learned
how to start, stop, and change startup options for some services. You learned the
purpose of the Windows Registry. You learned about the differences between the two
Registry management toolsregedit.exe and regedt32.exe. You learned how to use
regedit.exe to manage the Registry. You learned how to search the Registry to find
information. In addition, you learned how to back up the Registry files in order to
recover from a Registry problem.
Topic D
In this topic, you learned how to manage and troubleshoot problems remotely by using
the Remote Desktop and Remote Assistance features.
Review questions
1 Which Registry key contains file association data for application startup?
A HKEY_CLASSES_ROOT
B HKEY_CURRENT_USER
C HKEY_DYN_DATA
D HKEY_CURRENT_CONFIG
2 Which Registry key isnt found in Windows 7, Windows Vista or Windows XP?
A HKEY_CLASSES_ROOT
B HKEY_CURRENT_USER
C HKEY_DYN_DATA
D HKEY_CURRENT_CONFIG
3 In Task Scheduler, a(n) __________ causes an action to be performed.
trigger
4 True or false? You can configure a pop-up message, a text message, and an e-mail
message as actions in Task Scheduler.
False. You cant configure a text message.
5 Which tab of a services Properties dialog box do you use to configure the operating
system response when the service fails?
A Dependencies
B General
C Log On
D Recovery
Windows management
1763
6 True or false? Power management features are beneficial for notebook computers
only.
False. Desktop computers use electricity and can use a considerable amount of power even
when they sit idle. Configuring power management features in desktops can decrease the power
consumption of a computer and its components when idle.
9 Which utility enables you to connect to a remote computer and work as if you were
sitting at that computer?
Remote Desktop
11 True or false? By default, any user can offer assistance to another user by using the
Remote Assistance utility.
False
12 True or false? By default, any user can make a Remote Desktop connection.
False
181
Unit 18
Windows monitoring
Unit time: 90 Minutes
and data.
182
Objective
3.2
3.3
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
2.3
Given a scenario, select and use system utilities / tools and evaluate the results
Administrative Tools
Event Viewer
Task Manager
Process list
Resource usage
Process priority
Termination
System Information
2.4
Windows 7, Windows Vista, Windows XP, and Windows 2000 Professional, include
tools that you can use to monitor a computer system. You can use the information that
you gather with these tools to optimize components or troubleshoot problems with the
operating system.
Windows monitoring
183
Windows Diagnostics
Windows Diagnostics is a utility that collects information about the configuration of a
specified computer and displays it in the System Information window, shown in Exhibit
18-1. In Windows 7, Windows Vista, Windows XP Professional, and Windows 2000
Professional you can open System Information by clicking Start and choosing All
Programs (or Programs), Accessories, System Tools. You can also enter msinfo32 at
the command prompt or in the Search or Run dialog box.
The System Information window displays system summary information, plus detailed
information in several categories, including:
Hardware Resources
Components
Software Environment
Internet Settings (not in Windows 7 or Windows Vista)
184
Do it!
A-1:
Heres how
Heres why
msinfo32
Press e
Maximize the System Information
window
Observe the Summary information
Windows monitoring
185
4 Expand Components
186
To retain command-line functionality, you must enter the full path of the msinfo32
command. If you dont, it simply opens the default System Information window.
The following table describes the parameters and switches available for running
msinfo32 from the command line in Windows 7 and Windows Vista.
Parameter/switch
Description
/nfo Path
/report Path
/computer ComputerName
The following table describes the additional parameters and switches available for
running msinfo32 from the command line in Windows XP and Windows 2000
Professional.
Parameter/switch
Description
/pch
/report:filename.txt
/computer:computername
/category:categoryname
/categories:categorylist
/showcategories
/?
Windows monitoring
Do it!
A-2:
187
Heres how
Heres why
Click Yes
3 Enter the command you recorded
in Step 1
188
DirectX Diagnostic
In Windows 7 and Windows Vista, DirectX Diagnostic (dxdiag.exe) is a utility you can
use to see the status of your DirectX installation. In Windows 2000 Professional and
Windows XP, the DirectX Diagnostic tool is more robust and can be used to test and
troubleshoot video- or sound-related hardware problems. In Windows Vista, however,
DxDiag only displays information; you can no longer use it to test hardware and other
DirectX components.
To run DirectX Diagnostic in Windows 7 or Windows Vista:
1 Click Start.
2 In the Search box, type dxdiag.
3 Press Enter.
4 Click Yes to allow DxDiag to check whether your drivers are digitally signed, or
click No if you dont want the drivers checked.
The DirectX Diagnostic Tool window opens, as shown in Exhibit 18-2. In Windows
XP, you can also open DirectX Diagnostic from the Tools menu in Msinfo32.
Windows monitoring
189
The following table describes the pages of the DirectX Diagnostic Tool. All pages will
display a warning if the tool detects a problem with a file, driver, device, or setting.
Page
Description
System
System Manufacturer
Memory
Computer Name
System Model
Page file
Operating System
BIOS
DirectX Version
Language
Processor
DirectX
Files
(Windows XP and 2000 only.) Lists the file name and version number for each
DirectX file installed on your computer. It also lists the file name and version
number of the common files used by games that run under DirectX.
Display
Displays your current video settings and your devices available memory.
Dxdiag.exe cant report memory that is in use when you start the utility,
however, so its not uncommon for the utility to report less memory than your
video card actually has. This page also reports whether your video driver has
passed Microsoft's Windows Hardware Quality Labs (WHQL) test. WHQL
Logod is set to Yes if your driver passed.
In Windows XP and 2000, you can disable DirectDraw, Direct3D, and AGP
Texture Acceleration from this page. You can also test DirectDraw and
Direct3D. If your computer passes these tests, it tells you that the DirectX
Graphics runtime files are installed and functioning correctly.
Sound
Displays your current sound settings. Similar to Display, the utility reports
whether your audio driver is signed, again indicating that it passed Microsofts
Windows Hardware Quality Labs tests.
In Windows XP and 2000, you can test DirectSound. Use the Hardware Sound
Acceleration Level slider to correct audio glitches that can be caused by some
audio drivers. The best way to troubleshoot DirectSound audio problems is to
reduce the acceleration by one notch and then retest. Be aware that if you lower
the Hardware Sound Acceleration Level from the default setting of full
acceleration, you can disable advanced audio processing techniques such as 3D
spatialization.
Music
(Windows XP and 2000 only.) Displays your current MIDI settings. You can
test DirectMusic, which is a component of DirectX 6.1 and later.
Input
Lists the input devices currently connected to your computer and the drivers
installed on your computer for those devices.
Network
(Windows XP and 2000 only.) Lists the registered DirectPlay Service Providers,
which are the connection methods DirectPlay operates across. If a Registry
problem is reported here, you can usually resolve it by reinstalling DirectX.
The DirectPlay test uses a chat window over DirectPlay to test a connection
between two computers. If your computer cant successfully chat with another
computer in this test, it probably wont be able to establish a network
connection within games.
More Help
(Windows XP and 2000 only.) Contains additional tools for troubleshooting any
DirectX issues you couldnt resolve by using the other pages in the utility.
A-3:
Heres how
Heres why
1 Click Start
In the Search box, type dxdiag
and press e
Click Yes
Windows monitoring
9 Click Save All Information
10 Click Save
11 Click Exit
1811
Description
Application
Displays the status of applications running on your computer. You can end an
application, switch to a running application, or start an application.
Processes
Displays information about the processes that are running on your computer. Each
process entry shows the name of the executable file, the name of the account running
the application (it might be a system service account), the processs percentage of
CPU usage, and the amount of memory the process is using. You can end processes
from this tab.
Performance
In Windows 7, Windows Vista, and Windows XP, Task Manager has two additional
tabs, described in the following table.
Tab
Description
Networking
Users
Displays the names and status of any users currently logged on. You can log users off
or disconnect them by using this tab. The Users tab is available on Windows XP
computers that arent members of a domain and that have Fast User Switching
enabled.
Windows 7 and Windows Vista also includes a Services tab. You can use it to view
running services quickly. Exhibit 18-3 shows all of the Task Manager tabs in Windows
7 and Windows Vista.
To open Task Manager:
Right-click the taskbar and choose Task Manager.
Press Ctrl+Shift+Esc.
Press Ctrl+Alt+Del and click Task Manager or Start Task Manager.
Windows monitoring
1813
A-4:
Monitoring applications
Heres how
Heres why
Task Manager
Windows monitoring
1815
A-5:
Ending a process
Heres how
Heres why
In Task Manager.
2 Click Memory
4 Select notepad.exe
Click End Process
Click End Process
A-6:
Monitoring services
Heres how
1 On the Processes tab, click Show
Heres why
In Task Manager.
Windows monitoring
1817
Exhibit 18-4: Data types that can be displayed under the Networking graph.
A-7:
Heres how
Heres why
In Task Manager.
Windows monitoring
1819
Description
User
ID
Status
Client Name
Session
Displays the session name. (Youll need to scroll to the right to see this
column.)
A-8:
Monitoring users
Heres how
1 Select the Users tab
Heres why
It shows that youre the only user logged onto
your computer.
Select COMPUSER##
Click OK
8 Switch to COMPUSER##
Click OK
9 Close Notepad
10 Log off COMPUSER## and then
log on as COMPADMIN##
11 Close Windows Task Manager
Windows monitoring
1821
Computer Management
The Computer Management tool enables you to manage the local computer or a remote
computer. Administrative tasks you can complete from the Computer Management
console include:
Monitoring system events, such as application errors
Creating and managing shared resources
Determining which users are connected to the computer youre managing
Starting and stopping system services
Setting properties for storage devices
Viewing device configurations
Adding or changing device drivers
Managing applications and services
You can use Computer Management to determine the source of problems with a
computer. The Computer Management console contains three categories: System Tools;
Storage; and Services and Applications.
To open the Computer Management console, do either of the following:
Click Start; right-click Computer (or My Computer), and choose Manage. In
Windows Vista, click Continue.
Open the Control Panel:
In Windows 7, click System and Security
In Windows Vista, click System and Maintenance
In Windows 2000 and Windows XP, click Performance and Maintenance
Click Administrative Tools; and double-click Computer Management. In
Windows Vista, click Continue.
Event monitoring
Event Viewer is a Windows utility that enables you to monitor events that occur on your
system. The events that are recorded can help you determine the cause of problems
youre having with a particular application, a component of the operating system, or a
suspected security breach.
Console tree
Scope pane
Actions pane
Windows monitoring
1823
Event information
Each of the three event categories displays certain header information for each recorded
event. This information is described in the following table.
Item
Description
Level (7/Vista);
Type (XP/2000)
The type of event thats recorded: Error, Warning, Information, Success Audit
(Security Log only), or Failure Audit (Security Log only).
Date
Time
The time the event was recorded. Date and Time are combined in a single column
in Windows 7 and Windows Vista.
Source
Task Category
(7/Vista); Category
(XP/2000)
Event ID (7/Vista);
Event (XP/2000)
An ID that identifies the type of event. Event IDs are coded into the operating
system and individual applications and can be used by product support personnel to
troubleshoot problems.
Computer
The name of the computer where the event occurred. In Windows 7 and Windows
Vista, the User and Computer information isnt listed in a column. You must look
at the General tab of the event details.
User
The name of the user who was logged on when the event was recorded. Many
components run under a system account, so you might see SYSTEM in this
column, even if a user was logged on when the event occurred.
OpCode
The point at which the event was recorded. . In Windows 7 and Windows Vista,
the OpCode information isnt listed in a column. You must look at the General tab
of the event details.
Logged
The date and time the event was logged. In Windows 7 and Windows Vista, the
Logged information isnt listed in a column. You must look at the General tab of
the event details.
Keywords
Words that you can use to search for more information about the event. .In
Windows 7 and Windows Vista, the Keywords information isnt listed in a column.
You must look at the General tab of the event details.
Description
Error
Warning
Information
Success Audit
(Security Log only)
Failure Audit
(Security Log only)
Windows monitoring
Do it!
A-9:
Heres how
Heres why
Choose Manage
Click the
1825
5 Select Security
6 Select Setup
7 Select System
9 Observe Subscriptions
Windows monitoring
1827
Windows monitoring
1829
Heres why
1 Click Level
Remove sorting
Filter Current Log
Check Application
Click in a blank area of the
dialog box
6 Open the Task category list
7 Click OK
Windows monitoring
8 Do any events match the filter
criteria?
9 Observe the top of the event list
1831
Objective
3.2
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
2.3
Given a scenario, select and use system utilities / tools and evaluate the results
System Monitor
Administrative Tools
Performance Monitor
Reliability Monitor
Explanation
In addition to knowing how well your system components are operating, youll also
want to know the overall reliability of your system, including the hardware components,
applications, and the Windows Vista operating system itself. Reliability Monitor is one
tool you can use to assess the stability of a system over a period of time and pinpoint
any components that might be causing system problems.
Reliability Monitor tracks the following events that affect system stability:
Software installs and uninstalls
Application failures
Hardware failures
Windows failures
Miscellaneous failures
Windows monitoring
1833
B-1:
Heres how
Heres why
Windows monitoring
1835
Resource Overview
In Windows Vista, Reliability and Performance Monitor contains an important tool
called Resource Overview, which you can use to assess and maintain the health of your
system. As shown in Exhibit 18-11, Resource Overview is the first tool you see when
you open Reliability and Performance Monitor. It provides real-time graphs and detailed
information about four key components:
CPU Displays CPU utilization.
Hard disk Displays the disk input/output statistics.
Network Details network traffic.
Memory Displays memory statistics, including the percent of memory used
and the number of hard page faults.
B-2:
Heres how
Heres why
Reliability and
Performance
Windows monitoring
1837
Performance Monitor
You use Performance Monitor (known also as System Monitor in Windows XP), shown
in Exhibit 18-13, to monitor computer performance in real time (in one-second
intervals), or in the form of saved reports of real-time data. Hundreds of computer
performance variables called counters are available for you to measure and assess a
computers performance. For example, you can:
Create a baseline to compare system performance over time.
Monitor system resource use.
Locate performance problems.
Identify performance bottlenecks.
Description
Processor:
% Processor Time
Memory:
Pages/sec
Monitors the rate at which pages are read from or written to disk. This counter
can point to page faults that cause system delays. You might need to add RAM
if this number is increasing consistently or higher than your baseline.
PhysicalDisk:
Disk Transfers/sec
Records the rate of read and write operations on your disk. If the value
recorded exceeds 25 disk I/Os per second, you have poor disk-response time.
This can cause a bottleneck that affects response time for applications running
on your system. It might be time to upgrade your hardware to use faster disks
or scale out your application to better handle the load. (Scaling out an
application means adding one or more servers to your distributed software
application.)
Windows monitoring
1839
Counter
Description
Network Interface
Monitors network traffic. You can use counters to measure bandwidth and
packet errors to determine if slow performance is due to network problems
rather than local system issues.
B-3:
Heres how
Heres why
After you add counters, this is where the realtime data will be displayed. Under the graph is a
list of the counters it displays. By default, the
%ProcessorTime counter is displayed.
counters list
Windows monitoring
11 Observe the graph
1841
Use to
Open saved log files and display them in Performance Monitor.
Change the Performance Monitor display from a line graph to a histogram to a
text-based report.
Add and delete counters.
Highlight counters so you can see their lines on the graph more easily.
Open the Performance Monitor Properties dialog box.
Pause and restart the real-time display.
Update data, one click at a time.
You can also use the Performance Monitor Properties dialog box to configure
Performance Monitor and the display of data. The following table describes the tabs and
the settings you can configure on them.
Tab
Use to configure
General
The display of components, such as the legend and the toolbar; how much data
is displayed in the histogram and report views; whether Performance Monitor
should collect samples automatically; how often samples should be collected;
and how long the samples should be displayed.
Source
Whether the data source to be displayed is real-time data or comes from a saved
log file.
Data
How data is displayed, including which counters should be displayed, and the
color, scale, width, and style of the line displayed for each counter.
Graph
Graph elements, such as the view, scroll style, title and vertical axis labels, and
scale.
Appearance
Windows monitoring
Do it!
B-4:
1843
Heres how
Heres why
again
10 Click
Click
a few times
Click
11 In the list of counters, select the
Thread Count counter and
click
12 Delete the Pages/sec and
Disk Transfer/sec counters
13 Close Performance Monitor
Windows monitoring
1845
Description
Specified command line arguments are copied when the Run this
program option is used.
Windows monitoring
1847
Objective
2.5
3.4
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
2.3
Given a scenario, select and use system utilities / tools and evaluate the results
Disk management tools
NTBACKUP
System Restore
Backups
Explanation
Microsoft operating systems include a backup utility you can use to create copies of
your files so you can recover your data if a system failure occurs. On a bootable
computer, you should back up any critical data before you attempt to troubleshoot any
problems.
The archive bit
Files on a Windows system include a special attribute, called an archive bit, that is used
during backups, with the exception of daily backups. The archive bit is set to 1 when the
file needs to be backed up. Files need to be backed up if theyre new or if they have
changed since the last backup. In most cases, the bit is reset to 0 when the file is backed
up, and the bit remains that way until you or an application changes the file. Copy and
differential backups leave this bit at 1.
Windows monitoring
1849
Windows monitoring
1851
Backs up
Normal
All selected files. Clears the archive attribute. With a normal backup, you need
only the most recent copy of the backup file to restore from backup.
Copy
Selected files. Doesnt clear the archive attribute, which shows that the file has
been backed up.
Daily
All selected files that were modified the day of the daily backup. Doesnt clear
the archive attribute.
Differential
Selected files that have been created or modified since the last normal or
incremental backup. Doesnt clear the archive attribute. Differential backups
require that you have the most recent normal backup in addition to the
differential backup, if you want to restore files.
Incremental
Selected files that have been created or modified since the last normal or
incremental backup. Clears the archive attribute. Incremental backups require
that you have the most recent normal backup in addition to the incremental
backup, if you want to restore files.
Windows monitoring
Do it!
C-1:
1853
Scheduling a backup
The files for this activity are in Student Data folder Unit 18\Topic C.
Heres how
1 From the Student Data folder for
this topic, copy the Files folder
to your Documents folder
Heres why
Youll use these for the backup and restore
activities.
Click Next
5 Click Let me choose
Click Next
6 Clear Backup data for newly created users
Expand COMPADMIN##s
Libraries
7 Clear checkboxes for all types
except Documents Library and
Pictures Library
Clear Include a system
image of drives: (C:)
Click Next
8 Click Change schedule
Click OK
10 Click Save settings and run
backup
11 If youre backing up to a CD or
DVD, youre prompted to insert a
blank CD or DVD into your
computer
Click OK, and when prompted to
format the disc, click Format
Windows monitoring
1855
Restoring files
Files can be restored to their original locations or to alternate locations. For example, if
you want to restore an earlier version of a file for comparison with the latest version,
you can restore the old version to a different location so that the newer version doesnt
get overwritten.
You can either restore all of the files and folders that were backed up or restore selected
files from the backup. Typically, you just need to restore specific files. Usually, you
need to perform a full restore only when a catastrophe has occurred, such as a hard drive
crash, the loss of a computer thats being replaced, or some other major problem.
Restoring files in Windows 7
To restore files from a backup in Windows 7:
1 Open Backup and Restore.
2 Click Restore my files.
3 Backup automatically restores all files from the latest backup, unless you specify
individual files and folders using the Browse for files and Browse for folders
buttons.
4 Click Next.
5 Specify the location to restore the files to. This can be the original location or a
new one.
6 Click Restore.
7 Click Finish.
Restoring files in Windows Vista
To restore files from a backup in Windows Vista:
1 Open Backup Status and Configuration.
2 Click Restore Files.
3 Select either Files from the latest backup or Files from an older backup.
Click Next.
4 Browse to locate the files you want to restore, or specify to restore all of the
files. Click Next.
5 Click Start Restore.
6 Click Finish.
The length of time it takes to restore data from a backup depends on the amount of data
and on the backup method used. For example, an incremental backup requires a full
backup plus every incremental tape applied in order, making it slower to restore than a
differential backup, which requires a full backup plus the most recent differential
backup.
C-2:
Heres how
Heres why
6 Click Next
Click Restore
Click Finish
Windows monitoring
1857
System Restore
The System Restore utility in Windows 7, Windows Vista, and Windows XP creates
snapshots of your computers configuration. There are three types of snapshots:
System checkpoints Created automatically when Windows Vista or XP
detects the beginning of a request to make a system configuration change.
Manual restore points Manually created by a user, using the System Restore
utility.
Installation restore points Created automatically when certain programs are
installed.
Using the System Restore utility, you can restore your computer to a previous
configuration with the settings recorded in a system checkpoint, a manual restore point,
or an installation restore point. This is helpful in recovering a system thats not
functioning properly due to newly installed hardware or software or updated
configuration settings. The restore process might also help you recover from a virus or
worm that has infected your computer. Before you begin troubleshooting, you can
create a system restore point, so you can return the computer to its original state if your
troubleshooting solutions cause larger or additional problems. System Restore does not
affect user data files. You must back up those files and restore them using the Backup
utility.
Windows Vista automatically creates restore points every day and just before you make
certain system changes, such as installing new software. You can also manually create a
restore point at any time.
To manually create a restore point in Windows 7 or Windows Vista:
1 Open the Control Panel.
2 Click System and Maintenance, and then click System.
3 On the left, click System Protection.
4 In Windows Vista, click Continue, or enter the administrators password.
The System Protection tab of the System Properties dialog box is displayed, as
shown in Exhibit 18-17.
5 Click Create.
6 Type a brief description of the restore point in the text box.
7 Click Create.
Windows monitoring
Do it!
C-3:
1859
Heres how
1 Click Start, right-click
Computer, and choose
Properties
Heres why
Youll create a restore point. Its a good idea to
create a restore point before you begin making
changes to troubleshoot a problem. If you
implement a change that makes the problem
worse, you can use System Restore to return the
computer to its pre-troubleshooting state.
3 Click Create
4 In the Create a restore point
box, enter My Restore Point
5 Click Create
7 Click OK
8 Close the System window
Windows monitoring
1861
Windows reboots and restores the system state to the settings saved in the restore point.
Changes in user data arent affected, but any installation or configuration changes made
after the restore point are lost.
System Restore doesnt replace the process of uninstalling a program. To completely
remove the files installed by a program, Microsoft recommends that you remove the
program by using the Add or Remove Programs utility or the programs own uninstall
utility.
Windows 7 includes a feature that allows you to scan for programs and drivers that have
been changed since the selected restore point. Simply select a restore point and click
Scan for affected programs. Windows returns a report similar to the one shown in
Exhibit 18-19.
C-4:
Heres how
Heres why
Click Next
3 Check Show more restore
points
Click Next
5 Click Finish
Click Yes
6 Log on to Windows
7 Click Close
Windows monitoring
1863
In this topic, you learned how to use the Windows Diagnostics, DirectX Diagnostic,
Task Manager, and Event Viewer utilities to monitor your computer. You used
Windows Diagnostics to collect and display information about the configuration of your
computer. You ran Windows Diagnostics from both the GUI and command-line
interfaces. With DirectX Diagnostic, you viewed the status of your DirectX installation.
You used Task Manager to identify the applications, processes, and services running on
your computer, monitor network utilization, and manage logged-on users. You used
Event Viewer to view recorded problems.
Topic B
In this topic, you learned how to use Reliability and Performance Monitor to monitor
the performance of your computers components. You used the Resource Overview to
assess the health of your system and make decisions about its maintenance. You used
Performance Monitor to monitor your computer performance in one-second intervals,
and then save reports of the data you collected.
Topic C
In this topic, you learned how to back up and restore data, creating a system restore
point, and restoring to a restore point.
Review questions
1 Which of the following Windows Diagnostics categories isnt available in Windows
Vista?
A Components
B Hardware Resources
C Internet Settings
D Software Environment
2 Which of the following command-line switches for Windows Diagnostics isnt
available in Windows 7 and Windows Vista?
A /computer ComputerName
B /nfo Path
C /report Path
D /showcategories
3 True or false? In Windows 7, you can use DirectX Diagnostic to test and
troubleshoot video- or sound-related hardware problems.
False. In Windows 2000 Professional and Windows XP, DirectX Diagnostic can be used to test
and troubleshoot video- or sound-related hardware problems. In Windows Vista, however,
DxDiag only displays information.
4 In Task Manager, you use the _______________ tab when an application has
crashed and isnt responding to keyboard or mouse input.
Applications
8 Which event types are used only in the Security log? [Choose all that apply.]
A Error
B Warning
C Information
D Success Audit
E Failure Audit
9 Which graph in the Resource Overview utility will show you the number of hard
page faults?
A CPU
B Hard disk
C Memory
D Network
10 In Performance Monitor, hundreds of computer performance variables, called
_______________, are available for measuring and assessing a computers
performance.
counters
11 If you wanted to identify a memory leak, which performance variable would you
monitor?
A Memory: Pages/sec
B PhysicalDisk: Disk Transfers/sec
C Process: Thread Count
D Processor: % Processor Time
12 Which of the following display types can you use to display data in Performance
Monitor? [Choose all that apply.]
A Line graph
B Pie chart
C Histogram
D Pictogram
Windows monitoring
1865
13 When you use Windows Backup to back up the system state, which files are backed
up?
Registry
Boot files
COM+ class registration database
IIS metadirectory
Windows File Protection system files
14 What are the two modes you can run Windows Backup in?
Wizard mode and Advanced (manual) mode.
15 Which backup type requires that you have the most recent normal backup in
addition to this backup if you want to restore files? [Choose all that apply.]
A Copy
B Daily
C Differential
D Incremental
E Normal
16 For what intervals can you schedule backups?
Daily
Weekly
Monthly
At predefined times
On predefined days
17 When Windows detects the beginning of a request to make a system configuration
change, what type of restore point is created?
A System checkpoint
B Manual restore point
C Installation restore point
D Automatic checkpoint
191
Unit 19
Operating system troubleshooting
Unit time: 60 Minutes
process.
B Identify operating system problems.
192
Objective
3.4
Startup files
Explanation
Windows 7, Windows Vista, Windows XP, and Windows 2000 Professional computers
use a set of files to start up. They are described in the following table and are listed in
the order in which they are used during the startup process. In the table, Windows
refers to all Windows 7, Windows Vista, Windows XP and Windows 2000
Professionalversions, unless otherwise noted.
File
Description
BOOTMGR
NTLDR
Boot
Configuration
Data (BCD)
A file in Windows 7 and Vista that contains options for starting different
versions of Windows installed on the computer.
Boot.ini
A file in Windows XP and Windows 2000 that contains options for starting
different versions of Windows installed on the computer.
Bootsect.dos
A file that contains information about the boot sector of the operating
system that was on the hard drive before Windows was installed (for dualboot computers). NTLDR uses this file to boot to an operating system, such
as Windows 9x or DOS.
Ntdetect.com
A 16-bit real-mode program that queries the computer for basic device and
configuration information, such as:
Ntbootdd.sys
Ntoskrnl.exe
193
File
Description
Hal.dll
System Registry
hive
A Registry hive that controls the drivers and services loaded during startup
for Windows.
Smss.exe
Pagefile.sys
A file that contains memory data that Windows cant fit into physical
RAM. During startup, the Virtual Memory Manager moves data in and out
of the paging file to optimize the amount of physical memory available to
the operating system and applications.
Winlogon.exe
The Windows login manager, which is responsible for managing user logon
and logoff. Winlogon is needed for user authorization.
Lsass.exe
194
195
7 The user logs on. A boot isnt considered good until a user successfully logs on
to the operating system.
8 The Clone control set is copied to the Last Known Good control set.
Do it!
A-1:
2 During what phase is the Hardware Abstraction Layer loaded? By which file?
4 Whats the purpose of bootsect.dos in the boot process for Windows 2000
Professional and Windows XP?
196
Objective
2.2
Given a scenario, explain and interpret common hardware and operating system
symptoms and their causes
OS related symptoms
Bluescreen
System lock-up
Input/output device
Application install
Start or load
2.5
3.2
3.3
Explain the process and steps to install and configure the Windows OS
Installation methods
Recover CD
Factory recovery partition
Operating system installation options
Repair install
3.4
197
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
2.1
Select the appropriate commands and options to troubleshoot and resolve problems
MSCONFIG
SFC
2.4
198
Cause
Resolution
Invalid boot or
non-system disk
error
Inaccessible boot
device
199
Boot error
Cause
Resolution
NTLDR is
missing, or
Couldnt find
NTLDR
Bad or missing
Command
interpreter
Cause
Resolution
Missing or corrupt
Himem.sys
Device/service has
failed to start;
Device/program in
Registry not found
Cause
Resolution
Explorer.exe is missing or
corrupt.
Windows Protection
Errorillegal
operation
1911
Cause
Resolution
User-modified
settings cause
improper operation
at startup
Application install,
start, or load failure
Startup messages
The first error messages you see when starting a computer are boot and startup
messages. These can give you good information about what might be wrong with a
computer.
With startup messages, the computer system boots successfully, but reports an error
message when loading the operating system. One of the more common messages youll
encounter is Device/service has failed to start. This message indicates that Windows
is trying to load a device or service, but it wont load properly. To resolve this issue:
1 Check the Event Viewer logs to determine which device or service failed to
load.
2 Check the installation or configuration of the device by using Device Manager,
or check the service by using the Services console.
3 Reinstall the device or service, if necessary.
Do it!
B-1:
1913
2 Youre configuring a Windows 7 computer for a user. When you start Windows 7,
an error message tells you that a device or service has failed to start. The GUI
loads and everything appears okay. What should you check?
3 You recently installed a new hard disk in a users computer. You installed
Windows 7 Professional and the needed applications, and then copied the users
data to the new drive. The computer was functioning just fine in your office. You
delivered it to the users office, and when you started it up, you received the
message NTLDR is missing. What is the likely cause?
4 If your first solution doesnt resolve the problem, what is another likely cause of
the Missing NTLDR message?
5 Youre installing Windows 7 on a computer for a user. When you start Windows
7, it loads the desktop, but then you receive a Windows Protection Errorillegal
operation message. Each time you restart the computer, the same thing happens.
What do you think the problem is, and how can you resolve it?
Description
Safe Mode
Boots to the command prompt. If Safe mode doesnt load the operating
system, you can try this startup mode. You can then use your MS-DOS-based
utilities to troubleshoot and resolve startup problems.
Loads the operating system normally. All files used during the boot process
are recorded in a file called Ntbtlog.txt. If youre having a problem with a
device, check Ntbtlog.txt to see which devices loaded successfully and which
didnt.
Enable low-resolution
video (640480)
(Windows 7/Vista); or
Enable VGA mode
(Windows XP/2000
Boots the operating system, using a generic VGA display driver. You can use
this mode to correct improper video or display settings or to fix a
nonfunctioning video driver.
Uses the boot settings stored in the Registry from the last successful boot. If
the system was configured incorrectly, you can use this option to reverse all
system setting changes made after the last successful boot.
Directory Services
Restore Mode
(Windows 7, Vista, and Server products) Restarts the domain controller and
takes it offline so that it isnt providing directory services to the domain.
Once the domain controller is offline, you can repair or recover the Active
Directory. Works with Windows 7 and Vista products running Remote Server
Administration Tools (RSAT).
Debugging Mode
Allows you to move system boot logs via a serial port from a failing
computer to another computer for evaluation. This option sends the boot
information to the serial port.
1915
Startup mode
Description
Boots the computer as if you hadnt entered the Advanced Boot Options
menu.
B-2:
Heres how
Heres why
Choose Restart
4 Click COMPADMIN##
In the Type your password box,
enter !pass1234 and
press e
5 Observe the desktop
7 Select Network
1917
Log on as COMPADMIN##
with a password of !pass1234
Enter shutdown s
10 Click Close
11 Turn the computer on, boot
Windows 7 normally, and log on
as COMPADMIN##
Exhibit 19-3: The Services tab in the System Configuration utility in Windows 7
Professional
Startup modes for troubleshooting
The General tab in the System Configuration utility allows you to start the computer in
any of three modes when troubleshooting:
Normal Startup Loads all device drivers and services.
Diagnostic Startup Loads only basic devices and services.
Selective Startup Loads only the files and services selected. The options are:
In Windows XP
System.ini
Win.ini
System services
Startup items
1919
To prevent individual lines or items in a specific configuration file from loading, select
the tab for the desired configuration file and clear the checkbox next to the line or item
that you dont want to load.
When youre done troubleshooting, you need to verify that all of the configuration files
and all of the items that are listed in those files are loaded. Then select the General tab
and select Normal Startup.
Note: If youve installed a Windows Vista Service Pack, youll find that the behaviors
of the startup modes will have changed from their initial behaviors. At the time of this
writing, there were no Microsoft Knowledge Base articles explaining this discrepancy.
B-3:
Heres how
1 Click Start
Heres why
Youll see how you can use the System
Configuration utility to troubleshoot startup
problems with Windows 7.
To start the System Configuration utility.
Click OK
3 Click Restart
Log on as COMPADMIN##
5 Click Start
In the Search box, type
msconfig and press e
Click Yes
1921
Click OK
When prompted, restart the
computer and log on as
COMPADMIN##
7 Run msconfig
8 Activate the Boot tab
1923
B-4:
Heres how
Heres why
1925
Use to
Startup Repair
Scan your computer for missing or damaged system files that might
be preventing Windows from starting correctly, and replace any
missing or damaged files with the originals from the installation disc.
System Restore
Windows Complete
PC Restore
Restore the contents of your hard disk from a backup. The Windows
Complete PC Backup and Restore utility is not available in Windows
Vista Starter, Windows Vista Home Basic, or Windows Vista Home
Premium.
Windows Memory
Diagnostic Tool
Command Prompt
Note: If any of the system files have been updated by Microsoft through a patch or
Service Pack, the system recovery options wont be providing you with the most recent
files. After youve done a system repair, you should reapply any patches and Service
Packs.
To use the System Recovery Options menu in Windows 7 or Windows Vista:
1 Insert the Windows installation disc.
2 Restart your computer.
3 When prompted, press any key to start Windows from the installation disc.
4 Choose your language settings and click Next.
5 Click Repair your computer.
6 Select the operating system you want to repair and click Next.
7 On the System Recovery Options menu, select the desired option.
If available you can also choose Restore Your Computer from the Advanced Startup
Menu.
1927
B-5:
1929
In this topic, you learned how to identify the stages of the Windows startup process.
When you can identify each of the stages, you can troubleshoot problems that occur
during startup.
Topic B
In this topic, you learned how to troubleshoot problems with Windows 7, Windows
Vista, Windows XP, and Windows 2000 computers. You identified common startup
problems, and you learned how to use various toolssuch as the System Configuration
Utility, the Recovery Console, the System Recovery Options menu, System File
Checker, Emergency Repair Disks, and Automated System Recoveryto recover from
these problems.
Review questions
1 Which file contains the majority of operating system instructions for Windows 2000
Professional or any version of Windows 7, Vista, or XP?
A Ntbootdd.sys
B Ntoskrnl.exe
C NTLDR
D Ntdetect.com
2 Which file controls the boot phase of the startup process for Windows 2000
Professional or any version of Windows 7, Vista or XP?
A Ntbootdd.sys
B Ntoskrnl.exe
C NTLDR
D SYSTEM Registry hive
3 If a computer successfully boots, but the operating system interface doesnt load
properly, what type of error has occurred?
A Startup error
B Boot error
C Operating system load error
4 What Windows 7 or Vista utility should you use if user-modified settings cause
improper operation at startup?
A Driver Rollback
B Recovery console
C System Configuration Utility
D System Recovery Options menu
E System Restore
10 In the System Configuration utility, which mode can you use to load only basic
devices and services while troubleshooting a problem?
A Normal
B Diagnostic
C Selective
D Debug
11 Youre troubleshooting a device driver failure on a Windows 7 computer, and the
failure is preventing the operating system from loading properly. Current drivers are
stored in a network share. What startup mode should you use to resolve the
problem?
Safe Mode with Networking
1931
13 Which Windows 7, Windows Vista, and Windows XP GUI utility allows you to
view, disable, and enable software and services that run at startup?
A ASR
B Boot.ini
C ERD
D Msconfig
E Recovery Console
F System Recovery Options menu
14 What are the four tasks performed by the ASR?
a Restores the disk configurations.
b Formats your system and boot volumes.
c Installs a bare-bones version of Windows.
d Runs Backup to rebuild your system and boot volumes from your ASR backup set.
201
Unit 20
Security
Unit time: 120 Minutes
authentication.
B Use Windows file encryption.
C Discuss biometric and other security
devices.
D Recognize and mitigate common security
threats.
E Manage the human aspects of computer
security.
202
Objective
3.1
Compare and contrast the different Windows operating systems and their features
Windows 2000, Windows XP 32bit vs 64bit, Windows Vista 32bit vs 64 bit
UAC
5.1
5.2
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objectives.
#
Objective
2.4
4.2
Security
203
Authentication technologies
Explanation
Operating system security begins with determining whos using a computer. There are
various ways to authenticate users. Some authentication methods are identity-based, for
example, the Windows security framework is based on user accounts. Others are
resource-based, where a service uses a fixed identity or impersonates a clients identify
to access services or resources. Others might be role-based, where roles are created for
various job functions and then permissions to perform certain actions are assigned to
those roles.
In Windows, once the user is identified, you can employ operating system features to
permit or deny access to resources. This basic authentication is enabled by user and
group accounts.
User accounts
A user account is a collection of settings and privileges associated with a person (or
persons, if multiple people choose to share the same account). When you log on to
Windows Vista (even if it logs you on automatically without prompting you for a
username and password), the operating system loads the settings and privileges defined
in your user account. The information might include a first and last name, password,
group membership information, and other data. Your experience with the PC is tailored
to you, thanks to the user account.
Any person who needs to use the computer needs a user account. By creating user
accounts, you can administer and maintain the security of the computer. Through
accounts you can:
Require authentication for users connecting to the computer.
Control access to resources, such as shared folders and printers.
Monitor access to resources by auditing the actions performed by a user.
Usernames and passwords
Your username uniquely identifies you to a computer or network system when you log
in. The username you are given is often very simple and might even be based on your
name; other times, it is a complex string of characters that you need to memorize. When
you provide a valid username and password, the computer can authenticate you.
Your password is your secret code. In some cases, it can be very simple, but this is not a
good practice because someone else could easily guess your password. Usually, you
will be required to create a complex password that consists of letters, numbers, and
possibly special characters. A minimum password length is also typically specified.
Most of us need passwords to many different locations, such as our computer, servers,
and various Web sites. There is a strong temptation to use the same password for all of
the locations, but doing so would leave you vulnerable to having your password stolen
and used in any or all of the locations.
204
User
Use programs.
Privilege
Add programs.
Security
205
These are the default privileges allowed. However, Administrators can delegate tasks to
normal user accounts as needed.
A Guest account is built in but is not active by default. The Guest account can use
installed programs, but has limited privileges and cannot even change the account
picture or password.
Windows XP and Windows 2000 also have Guest, Administrator, and Power User
accounts. Despite the name, Power Users dont really have any more administrative
control over the computer than standard users. However, they might have sufficient
permissions to run some applications that standard users cant.
206
Groups
Trying to configure permissions or rights for multiple users within their individual
accounts can quickly become unmanageable, especially in large environments. For this
reason, operating systems, including Windows Vista Business, Enterprise, and Ultimate,
Windows XP Professional, and Windows 2000, include the ability to aggregate user
accounts into entities known as groups.
When you use groups, you assign permissions to groups rather than to individual user
accounts. (Although you can still assign permissions to individual users when
appropriate, Microsoft recommends against it.) When you want to assign a certain set of
permissions to a user, you simply add his or her account to the appropriate group. For
example, you might add a new user to the West Coast Sales group in order to grant him
or her access to printers, storage, and other resources used by that team.
Windows supports multiple levels of groups and typically includes the following:
Users The standard group for regular users.
Administrators A group to which administrator users belong.
Power Users A group used to assign elevated permissions to a select set of
individuals.
Security
Do it!
A-1:
207
Heres how
Heres why
(If necessary.)
208
Passwords
You can easily improve security by requiring logon passwords. Windows provides tools
you can use to enable passwords, as well as set, change, and delete passwords.
Passwords require a user to enter a secret wordactually, any string of letters, numbers,
and charactersbefore he or she can log on or switch to another account. Standard
users can set and change their own passwords, and an administrator can set and change
passwords for any user on the system. You can add a password hint to remind yourself
of your password, but if a password is forgotten, an administrator must change the
password for you. Passwords are set in the User Accounts window.
Password rules
When using passwords, you must adhere to these Windows rules:
A password can contain letters, numbers, and characters, but it cannot start or
end with a space.
Passwords are case sensitive.
Passwords must be between 1 and 127 characters long.
In a business environment, the system or network administrator might have
implemented more restrictive rules. Check with him or her to determine the
complete set of rules that apply to you.
Password recommendations
Weak passwords are a major problem. Users need to create strong passwords and
protect them diligently in order to keep resources from being accessed or used by
unauthorized users. Although the preceding rules explain the limits, you should follow
these general guidelines when setting your passwords:
Match the strength of your password to your needs for security. For example,
home computer users can often use very simple passwords (or no password)
because there is little risk or potential for loss from unauthorized access to the
PC. (However, if that PC is connected to the Internet, its essential that you use a
strong password to help protect the computer from attack.) User accounts in a
business environment should be password-protected, but are likely to need less
secure passwords for standard users than for administrative users.
Set a password that is easy to remember, but hard to guess. It is not secure to use
your spouses name, kids names, pets names, and so forth as your password.
Create a password at least eight characters long. Longer passwords are more
secure than shorter passwords, with those more than 15 characters being the
most secure. Try using a phrase, such as DigitalPhotographyFan, to create an
easily remembered long password.
Use a mix of upper- and lowercase letters, numbers, and characters in your
password. Avoid common substitution schemes, such as replacing Os with zeros,
Es with threes, and so forth.
Memorize passwords rather than writing them down. Some security experts
suggest that writing down passwords is okay if you can store the written copy in
a secure place, such as a locked cabinet. Check with your corporate security
officer for the policy set by your company in this matter.
Use a different password for every account that requires a password.
Security
209
Security
Do it!
A-2:
2011
Creating a password
Heres how
1 Click Anne
Heres why
In the Manage Accounts window. Youll add a
password to this account.
Security
Do it!
A-3:
2013
Heres how
Heres why
1 Click Start
Right-click Computer and
choose Manage
6 Click OK
7 Close Computer Management
Log off your account and log on
as Anne
Change the password to
Pa$$321
Security
Do it!
A-4:
Questions
1 Logging on to a domain from the
console of a Windows 7 system is
which type of authentication?
Answers
A Interactive
B Network
C Domain
D Local
A NTLM
B Kerberos
C RADIUS
2015
Account policies
Account policies control how user accounts interact with the computer (or the domain).
Locally, the two security areas you can configure in account policies are Password and
Account Lockout.
Password policies
Password policies control the complexity and lifetime settings for passwords so that
users are forced to create more secure passwords. Your organizations security policy
should include the requirement to set password policies to reduce the likelihood of a
successful password attack. Here are the local password policies you can configure on
Windows 7 Professional, Ultimate, and Enterprise; Windows Vista Business, Ultimate,
and Enterprise; Windows XP Professional; and Windows 2000 Professional computers:
Enforce password history Specifies the number of unique new user account
passwords a user must create before reusing an old password.
Note: If you specify a low number for this setting, users can use the same
passwords repeatedly, thereby increasing the chances that an attacker can
determine the password.
Minimum password age Specifies the number of days that a user must keep
a password before being allowed to change it. The minimum password age value
must be less than the maximum password age value.
Note: Setting the number of days to 0 allows immediate password changes,
and this isnt recommended. For a strong security policy, you need to configure
the Minimum password age policy setting in conjunction with the Enforce
password history policy setting to prevent users from changing their passwords
as many times in a row as necessary in order to reuse their original passwords.
Be aware, however, that the security risk associated with implementing a strong
Enforce password history and Minimum password age policy is an
increased risk of encountering users who write down their passwords so they
dont forget them.
Maximum password age Specifies the number of days users can keep a
password before the system requires them to change it.
Note: Requiring that users change their passwords frequently might reduce the
risk of passwords being cracked and the risk of stolen passwords being used.
However, just as with a strong Enforce password history and Minimum
password age account policy, if you set the Maximum password age value
too low, your users have to change their passwords often, and you introduce the
security risk of users writing down their passwords to avoid forgetting them. A
reasonable length of time for a maximum password age in most corporate
environments is every 60 or 90 days (2 or 3 months).
Security
2017
Default
0 passwords
remembered
0 to 24.
Set to 24 to limit password reuse.
42 days
0 to 999.
Set to either 30 or 60 days.
0 days
0 to 998.
Set to 2 days; this disallows immediate changes.
0 characters
0 to 14.
Set to at least 6 to 8.
Disabled
Enabled or disabled.
Set to enabled.
Disabled
Enabled or disabled.
Set to disabled.
Default
Not Applicable
Not Applicable
Note: If you set the Reset account lockout counter after setting to a high value, it
presents an opportunity for a denial-of-service (DoS) attack. The purpose of a DoS
attack is to make a computer resource unavailable to its intended users. If you set the
Reset account lockout counter after setting to a low value, it opens up the computer to
brute-force attacks. A brute-force attack occurs when an attacker attempts to identify a
password by trying a large number of possibilities. You need to evaluate your risk and
select a value that creates a balance of risk for the two possibilities.
If you dont want user accounts to be locked out, set the Account lockout duration and
the Account lockout threshold policy settings to zero. The zero values in both policies
will prevent a DoS attack by locking out all or some accounts. Zero values in both of
these policies can help reduce help desk calls because users cant accidentally lock
themselves out of their accounts.
Security
Do it!
A-5:
2019
Heres how
Heres why
Click
System and Security
4 Double-click Minimum
password length
Click OK
8 Click Anne
9 Click Change the password
10 In the New password and
Confirmation boxes, type secret
Click Change password
11 Click OK
12 Click Cancel and close the User
Accounts window
13 In Local Security Policy, restore
the minimum password length to
zero
Click OK
14 Close all open windows
Security
2021
A-6:
Heres how
Heres why
Security
2023
Exhibit 20-4: The User Account Control consent prompt in Windows Vista
Exhibit 20-5: The User Account Control credential prompt in Windows Vista
When elevated permissions are required in Windows Vista, UAC will present one of the
alerts in the following table. Youll need to provide the appropriate administrative
credentials or speak to a computer administrator to continue.
Alert
The operating system wants to perform a function that will modify the
computer or operating system settings.
An unidentified
program wants access
to your computer
The computer administrator has blocked you from starting the program
youre trying to start.
In Windows 7, the UAC prompts you receive are more descriptive. You see a prompts
such as Do you want to allow the following program to make changes to this
computer? with the name of the program and the publisher listed, as shown in Exhibit
20-6. If youre logged in as a standard user, the prompt includes fields for you to enter
administrative credentials to continue.
Security
2025
Tasks that require administrative privileges in Windows 7 and Windows Vista include:
Running an application as an Administrator
Installing and removing applications
Installing a device driver, Windows updates, or an ActiveX control
Configuring Windows Update
Configuring Windows Firewall
Creating, modifying, and deleting local user accounts
Configuring Parental Controls
Scheduling tasks
Restoring backups
Modifying the configuration of User Account Control (by editing the local group
policy)
Changing system-wide settings or files in %SystemRoot% or %ProgramFiles%
Viewing or changing another users folders and files
Running Disk Defragmenter
Administrator accounts
Even though UAC is helpful, you or your system administrator might still assign
administrator accounts to you and others who use your PC. Having separate accounts
for each administrator helps track system changes. Also, when an administrator-level
user no longer needs access to the PC, you can simply delete his or her user and
administrator accounts. You wont have to change and distribute passwords to all of the
other administrative-level users of the PC.
UAC configuration
You can configure the behavior of UAC by using the Local Security Policy console
(part of the Microsoft Management Console, or MMC). This console, like Computer
Management, is a tool that administrators use to configure a Windows 7 and Windows
Vista computer. This console is used to modify the local security policy, which is a
collection of settings that cover all aspects of a computers security.
Security
2027
You can configure the following UAC settings in the Local Security Policy console. To
open it, click Start and type secpol.msc.
UAC policy
settings
Description
Default
settings
Disabled
Allow UIAccess
applications to prompt for
elevation without using
the secure desktop
(Windows 7)
Disabled
Prompt for
consent
Prompt for
credentials
Detect application
installations and prompt
for elevation
Enabled
Disabled
Disabled
Enabled
Enabled
Enabled
Security
2029
Disabling UAC
You can disable UAC altogether, but doing so would leave your computer exposed to a
variety of security threats. To disable UAC, in User Accounts, click Turn User
Account Control on or off. Provide the necessary administrative credentials or click
Continue. Clear the Use User Account Control (UAC) to help protect your computer
checkbox, and click OK.
Do it!
A-7:
Configuring UAC
Heres how
1 Click Start and enter
secpol.msc
Heres why
To open the Local Security Policy console.
Youre going to examine the UAC settings in
the local security policy.
To expand it.
7 Click Cancel
Security
2031
Full control
Users can view folder and file contents, modify files and folders, create
files and folders, and run programs. This permission applies to the
current folder and all folders below it unless another permission is set
to prohibit inheritance of the permission into subfolders.
Modify
Users can modify files and folders, but cannot create them.
Users can view the contents of files and folders. They can also run
programs located in the folder.
Read
Users can view folder contents, and open files and folders.
Write
Special permissions
Security
2033
Security
2035
Description
Read-only
Prevents inadvertent changes in a file. MS-DOS commands dont allow you to change
a read-only file. Some Windows applications allow it, although they might prompt you
first, letting you know that youre changing a read-only file.
Hidden
Hides the file from view in the default list display of the MS-DOS dir command and
in Windows Explorer.
System
Indicates that the file is used by the operating system and shouldnt be altered or
removed.
Archive
System files and folders are hidden by default in Windows, but you can use Folder
Options to display them.
Security
Do it!
A-8:
2037
Heres how
Heres why
Security
2039
Objective
5.1
5.2
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
4.2
Encryption
Explanation
Encryption is the scrambling of data so that only permitted people can unscramble and
read it. Encryption prevents data from being altered or replaced during transmission or
in storage.
Public key cryptography
Currently, the most powerful form of encryption is public key encryption. In public key
encryption, two keys are used to encrypt and decrypt data. These keys work in pairs: the
public key, which is typically used by the sender to encrypt data, and the private key,
which is used to decrypt it.
For example, with e-mail transmission, public key encryption works like this: Someone
wanting to send encrypted data to a user obtains the recipients public key, encrypts the
information, and sends it. By using the private key, the user can decrypt the message.
The public key cant be used to decrypt the message, so the message cannot be
decrypted by anyone other than the holder of the private key.
Security
2041
Folder encryption
You encrypt a folder or an individual file in Windows Explorer. To enable encryption:
1 Right-click the folder or file you want to encrypt and choose Properties.
2 On the General tab, click Advanced.
3 In the Advanced Attributes dialog box, check Encrypt contents to secure data,
as shown in Exhibit 20-11.
4 Click OK to close the Advanced Attributes dialog box, and then click OK to
close the folder or file Properties dialog box.
5 If you enabled encryption on a folder: In the Confirm Attribute Changes dialog
box, specify whether you want to encrypt only the files in the folder, or the
folder, its subfolders, and all files contained in them. Click OK.
If you enabled encryption on a file: In the Encryption Warning dialog box,
specify whether you want to encrypt the file and its parent folder, or only the
file. Microsoft recommends that you always encrypt the folder and not just the
file because its possible that Windows Vista might store an unencrypted
temporary version of the file when you open it. Click OK.
You can identify encrypted folders and files by color. Windows Explorer displays the
encrypted files and folders in green instead of the default black.
Security
2043
You can also enable BitLocker from an administrative command prompt. Using this
command, you can specify that the encryption key be stored on a separate disk. The
command is:
cscript c:\Windows\System32\manage-bde.wsf on {volume}: -rp
rk {drive}:
Parameter
Description
-on
{volume}:
-rp
-rk
{drive}:
Drive where recovery key is stored. Can be a floppy drive, USB drive, hard
drive, or network drive.
Description
Installation
Windows Vista Enterprise and Ultimate install BitLocker during the operating
system installation. For Windows Server 2008, BitLocker needs to be installed as an
option.
Initialization
Daily use
Computer
decommissioned
and recycled or
redeployed
You can leave the data encrypted and remove the keys to reduce the risk of data
being available after the computer has been decommissioned or redeployed. The
keys can be removed by formatting the encrypted volume. The updated Format
command supports this operation.
Recovery
A recovery key is created and stored on a USB drive when the disk is first encrypted
with BitLocker. This key is needed when certain actions necessitate the recovery
process. To recover data from an encrypted volume on a damaged hard disk, you use the
BitLocker Repair Tool, versions of which Microsoft has available on its download site
for both x86-based and x64-based Windows Vista systems.
During recovery, the user is prompted to insert the flash drive containing the recovery
key. These actions include moving the protected drive to a different computer, installing
a replacement motherboard containing a new TPM, turning off or clearing the TPM,
updating the BIOS, performing boot component updates that cause integrity validation
to fail, forgetting a PIN, or losing the USB drive that holds the startup key.
The recovery key is a randomly generated 48-digit number created during BitLocker
setup. During recovery, the user must enter this password, using the F0 to F9 function
keys.
Security
2045
Domain administrators can create a Group Policy that automatically generates recovery
passwords that are transparently backed up to an Active Directory domain server when
BitLocker is enabled. The administrator can also configure BitLocker to prevent it from
encrypting a drive if the computer isnt connected to the network and the Active
Directory backup wasnt successful.
Recovery can also be used as an access control device when a computer is
decommissioned or redeployed. The drive can be locked down in this manner. The user
would then have to contact an administrator to get the BitLocker recovery information
needed to unlock the drive.
During recovery, the volume master key is decrypted via a cryptographic key created
from a recovery password or via a recovery key stored on a USB flash drive. Because
the TPM isnt used in the recovery, the recovery can still take place even if the TPM is
removed, no longer works properly, or fails validation during bootup.
Windows 7 BitLocker adds Data Recovery Agent (DRA) support for all protected
volumes.
The Microsoft knowledge base article, How to use the BitLocker Repair tool to help
recover data from an encrypted volume in Windows Vista or Windows Server 2008 at
support.microsoft.com/kb/928201, describes the preparation and steps you
follow to use the BitLocker Recovery Tool.
B-1:
Encrypting a file
The files for this activity are in Student Data folder Unit 20\Topic B.
Heres how
Heres why
Click OK twice
3 In the Encryption Warning box,
select Encrypt the file only
Click OK
4 Observe the file name
Security
Do it!
B-2:
2047
Testing encryption
Heres how
1 Open Encryption File
Heres why
To verify that you can open this file and read its
contents.
Close Notepad
2 Log off and log back on as
Robert with a password of
p@ssword
4 Click OK
Close Notepad and Windows
Explorer
B-3:
Encrypting a folder
Heres how
1 Log back on as your COMPADMIN## user, and encrypt the Encryption folder,
subfolders, and files.
2 From the Student Data folder for this unit, copy the file Encryption Copy Test.txt
to C:\Encryption.
3 Is the file encrypted or not?
4 Switch to Robert
5 As Robert, can you view the contents of the encrypted Encryption folder?
Security
2049
Objective
1.8
5.1
5.2
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
4.2
Hardware-based security
Explanation
Security
2051
Voice verification
A users speech patterns can also be used for authentication. A phrase is spoken by the
user and recorded, and it is archived in a database. The users intonation, pitch, and
inflection are used to identify him to the system. If the user has a cold that affects his
voice, he might not be granted access. If you foresee such problems, you might want to
provide an alternate access method.
Signature verification
Signature cards have long been used by banks when their customers open accounts. You
sign a card, which the bank stores in a file cabinet. When you come in to make a
transaction, a teller can pull out your signature card to compare the signature to the one
you signed for the transaction.
This process can be moved to the digital arena by storing user signatures in a database
and having the user sign in by using a stylus to write her signature on a pad connected to
the computer. The software needs to account for the variations in a persons signature
because people often do not use the exact same strokes when signing their names.
Instead, the software looks for general characteristics in the way a name is signed.
DNA scan
DNA scanning is a promising biometric authentication method. A DNA samples
analysis is stored in a database. The user requesting access provides another DNA
sample for comparison. Each person has a unique DNA structure.
Pros and cons
Biometrics can provide strong authentication because they are unique to an individual.
However, these devices have been prone to producing both false negatives and false
positives. They have gotten better over time, but as soon as they are strengthened,
attackers come up with ways of thwarting the systems.
Biometric access is being included on portable devices. When the biometric device is
enabled, if someone steals the device, such as a laptop or a removable drive, the data
cannot be accessed without the biometric authentication. However, if alternate access is
allowed through a username and password, the attacker could still access the secured
information.
Most biometric systems store the data as clear text because encryption would result in
the stored data not being identical to the original scan. The lack of encryption leaves the
database vulnerable. One method created by Mitsubishi Electric Research Laboratories
solves this problem by transforming the data into a binary vector, which is then
multiplied by the parity-check matrix of a publicly known parity-check code. Mitsubishi
refers to this data as the biometrics syndrome, which is compressed and scrambled. The
syndrome doesnt contain all of the information from the original scan, so if just the
syndrome is stolen (without the original scan), the original biometric scan cant be
recovered.
One way that fingerprint and hand scanners are deceived is through the use of clear tape
or gel-filled devices that can mimic a fingerprint. Just as a paper check can be forged, so
can a digital signature. If someone obtains a DNA sample from a valid user, that sample
can be presented to fool the system into giving the attacker access to the secured
resource.
Security
2053
Fobs
The typical fob is a key-chain-sized device, shown on the left in Exhibit 20-14, that
creates a continually changing, seemingly random number, which is called a rolling
code. Sometimes the user must log on with a username and password and then enter the
number created by the fob. Sometimes the user simply uses the fob to unlock a secure
area. For example, a cars keyless entry system, shown on the right in Exhibit 20-14,
and garage door openers use fobs with rolling number generators.
The generated number isnt random, but instead follows a secret progression started
with a random seed number. Both the fob and the secure system know the sequence of
numbers, or know how to generate the next valid number in the sequence. As long as
the receiver receives the code it expects, it opens your car, garage door, and so forth.
C-1:
3 What types of scans can be used on eyes? What features do the scans measure and
record?
7 What type of memory is used to control the encryption of data on a smart card?
Security
2055
BIOS security
Many computer manufacturers build security features into their BIOS software. These
features can be helpful in securing the computers configuration data. For example, if
you are concerned about malicious software being introduced though a drive that
accepts external disks, you could use the BIOS to lock the drive or disable booting from
that drive. However, if the BIOS isnt secured with a password, anyone can simply boot
to the BIOS program and enable booting from the drive.
Some common BIOS security settings include:
Admin password Used to secure BIOS configuration settings. Without this
password, the computers BIOS settings cant be changed.
System password Used to prevent unauthorized users from booting the
computer.
Password changes Used to prevent the system password from being changed
without the correct administrative password.
The BIOS manufacturer for your specific computer might have provided additional
security settings. Many BIOS programs will alert you when an unsuccessful attempt is
made to access the BIOS. The next time the computer is booted, a warning is displayed.
Other systems will alert you if the cover was removed from the system. In order to clear
the warning messages, you must log into the BIOS as the administrator.
You must remember the administration password you set on a computers BIOS, or you
wont be able to make any changes, either. There are some ways to get around BIOS
security. One is to determine if the BIOS manufacturer has a backdoor password that
you can use to access the system. The second method is to remove the CMOS battery
until the power is drained and the BIOS settings reset to the manufacturers default
settings. Older systems sometimes have a set of physical jumpers on the motherboard
that you can move to reset the BIOS settings to the default.
C-2:
Heres how
Heres why
Security
2057
Objective
5.2
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
4.1
The goals of security are integrity, confidentiality, and availability. Threats to even the
most secure systems data challenge administrators and users every day. The cost of lost
assets must be balanced against the cost of securing the network; your company must
decide how much risk it is willing to take.
Security
2059
D-1:
TCP/IP
Operating systems
Network equipment
2 What is a crime called in which one person masquerades under the identity of
another?
A
Identity theft
Confidentiality
Integrity
Encryption algorithm
Technology weaknesses
Policy weaknesses
Configuration weaknesses
Human error
4 True or false? Trojan horses are destructive programs that masquerade as benign
applications.
Unsecured accounts
Viruses
Human ignorance
Security
2061
Description
Propagation method
Spam
E-mail.
Spyware
Adware
Grayware
Antivirus software
To stop viruses and worms, you should install antivirus software on individual
computers, servers, and other network devices, such as firewalls. Most antivirus
software runs a real-time antivirus scanner. A real-time antivirus scanner is software
thats designed to scan every file accessed on a computer and thereby catch viruses and
worms before they can infect the computer. This software runs each time a computer is
turned on.
The real-time scanner helps antivirus software stop infections from different sources,
including Web browsers, e-mail attachments, storage media, or local area networks.
You can also boot into Safe mode to gain access to files that might normally be locked
during normal Windows operation.
Most antivirus software works by using a checksum, a value that is calculated by
applying a mathematical formula to data. When the data is transmitted, the checksum is
recalculated. If the checksums dont match, the data has been altered, possibly by a
virus or worm. The process of calculating and recording checksums to protect against
viruses and worms is called inoculation.
Definition files
Antivirus software must be updated to keep up with new viruses and worms. The
software can find only those threats that it knows to look for; therefore, the
manufacturer constantly provides software updates, called virus definitions, as new
viruses and worms are discovered. Its important to use antivirus software that
automatically checks and updates its virus definitions, as well as the software engine
itself, from the manufacturers Web site. Having outdated virus definitions is the
number-one cause of virus or worm infection. Most programs allow you to configure
automatic downloads of new definition files on a schedule.
Security
2063
You can also check for and retrieve any updates manually. Its important to note that
antivirus software is reactive. It cant catch a virus or worm until the latter is discovered
and then its code added to the softwares definition files.
Antivirus products
The following table lists several antivirus software products and their manufacturers
Web sites. Most of these sites offer detailed information about common viruses and
worms. The sites even offer removal tools you can download for free and use to remove
worms and viruses from infected computers. One of the best ways to protect your
computers against viruses and worms is to stay informed. Web sites like
www.datafellows.com and www.symantec.com provide descriptions of the latest
threats.
Software
Web address
www.symantec.com
www.eset.com
www.mcafee.com
www.aladdin.com
www.f-prot.com
www.trendmicro.com
www.avast.com
E-mail servers should also have antivirus software installed to protect computers on
your local area network. Microsoft Forefront is an example of network antivirus
software that scans all inbound and outbound e-mail, filters e-mail based on attachment
type, and blocks spam.
Protecting systems from malicious software
Most large companies mandate the use of antivirus software on employee computers,
including home computers that connect to the company network. Typically, these
companies centrally manage updates to this software. Security policies typically
prohibit tampering with or disabling this software. Small companies should follow this
practice to safeguard their systems.
Security
Do it!
D-2:
2065
Heres how
Heres why
5 Log on to Windows
6 Open the avast! report file
Description
Severe
Especially malicious programs that will affect the privacy and security of your
computer and can damage your system. Windows Defender recommends that you
remove such software immediately.
High
Spyware programs that might affect the privacy and security of your computer and
could damage your system. The changes the program makes on your computer are
usually done without your consent. Windows Defender recommends that you remove
such software immediately.
Medium
Spyware programs that could potentially gather personal information or make system
changes and have a negative impact on your computers performance. The software
will not be automatically deleted. You will need to evaluate the way the software
operates and determine whether it poses a threat to your system. If the publisher of the
software is unfamiliar to you or is an untrusted publisher, you should block or remove
the software.
Low
This software was typically installed with your knowledge and according to the
licensing terms you agreed to, but it still might collect information or change the
configuration of the computer. If the software was installed without your knowledge,
review the alert details and determine whether you want to remove it.
Not yet
classified
These programs typically do no harm unless they were installed without your
knowledge. If a program is something you recognize and trust, go ahead and allow it
to be run. If you dont recognize the publisher or the software, evaluate the alert details
to determine your course of action.
Security
2067
If clients are running Windows XP with SP2, you can download Windows Defender
from Microsoft and install it on those systems to protect them. Windows Defender is
integrated into Windows 7 and Windows Vista. Microsoft no longer supports Windows
Defender on Windows 2000 Professional, as the company ended mainstream support of
Windows 2000 Professional in June 2005.
Another free product that is available for spyware removal is Spybot Search & Destroy.
It is available from www.safer-networking.org. Each time you want to scan and
remove spyware from your system with Spybot, you need to update the spyware
definitions first. You might want to consider running both Spybot and Windows
Defender; what one program might miss, the other might catch. It is often difficult for a
single product to find all of the spyware on a system.
D-3:
Heres how
Heres why
Security
2069
Security
Do it!
D-4:
2071
Heres how
Heres why
2 Click
4 Click
Objective
5.1
This topic covers the following CompTIA A+ Practical Application (2009 Edition)
version 2.0 exam objectives.
#
Objective
3.2
4.1
Security experts agree that the best approach to protecting computers is to apply security
measures in layers. To reduce some of the security risk, you can do the following:
Restrict physical access to sensitive systems and data.
Physically secure hardware.
Establish a firewall.
Manage data destruction.
Create a corporate security policy.
Manage social engineering attacks.
Security
2073
E-1:
3 What physical access restrictions that youve seen in spy movies would be
practical for a real business environment (if they werent too expensive)?
Security
2075
Firewalls
If your computer has an Internet connection, it is vulnerable to hackers, viruses, worms,
and other destructive intrusions. One of the most important things to do when setting up
a computer, server, or LAN is to install a firewall. A firewall is software, hardware, or a
combination of both, used to control information thats sent and received from outside
the network. The firewall resides on the networks gateway, which is the connection
point between the internal network and outside communication. The firewall ensures
that all communication received from outside users and computers is legitimate. A
firewall can be installed on several types of gateways, including routers, servers, and
computers. Firewalls can be used to help prevent denial-of-service (DoS) attacks and to
prevent infections from viruses, worms, or Trojan horses.
Various types of firewalls can function in several ways:
Firewalls can filter data packets, examining the destination IP address or source
IP address, or the type of protocol used by the packet, such as TCP or UDP.
Firewalls can filter ports so that outside clients cant communicate with inside
services listening at these ports.
Firewalls can filter applications, such as FTP, so that users inside the firewall
cant use this service over the Internet.
Some firewalls can filter information, such as inappropriate Web content for
children or employees.
Several variations of firewalls are available, from personal firewalls to protect a single
computer to expensive firewall solutions for large corporations. Windows Vista
provides a firewall to help protect your computer from these problems. When youre
selecting a firewall, know whats being filtered, how its filtered, and what options the
firewall offers. Your company should run firewalls in two locations to block attacks. At
the network level, where your network connects to the Internet or WAN, a firewall
blocks outside attackers. At the PC level, software firewalls block internal attacks.
You can configure some firewalls to trigger alarms when suspicious activities happen
and to track this activity in log files. Other firewalls allow you more control and can
shut down traffic to stop an attack.
Security
2077
Proxy servers
A proxy server is a server that acts as an intermediary between computers on a network
and the Internet. In the corporate environment, the main purpose of a proxy server is to
provide Web access for computers that are located behind a corporate firewall, as
illustrated in Exhibit 20-18.
Security
2079
Exhibit 20-20: The Windows 7 Action Center displaying Security status information
Security
2081
Exhibit 20-21: The Windows 7 Action Center indicating a problem with security in the
Windows Update utility
E-2:
Heres how
Heres why
Security
2083
Firewall configuration
Windows Firewall (known as Internet Connection Firewall before Windows XP SP2) is
turned on by default. Unless your computer is protected by another firewall, you should
leave Windows Firewall enabled. You can check with the network administrator about
the need for Windows Firewall inside a corporate network, but threats can come from
other computers inside your network, not just computers on the Internet.
Windows Firewall is automatically configured to block most rogue programs and to
pass requests by legitimate programs. You probably wont have to change many
settings. However, if a user is experiencing problems sending or receiving data, the
problem could be that the current firewall settings are preventing the communication
from passing through.
You might need to allow a specific type of communicationthats prohibited by
defaultto pass through the firewall. When you need to configure Windows Firewall,
open the Windows Security Center. Click Windows Firewall and then click Change
settings to open the Windows Firewall settings window. You can use this dialog box to
turn the firewall on and off, and you can use the Exceptions tab to allow or deny
specific types of network communication. Use the Advanced tab to configure firewall
protection for multiple network connections, manage the log file, and configure Internet
Control Message Protocol (ICMP) settings.
To configure Windows Firewall:
1 Open the Control Panel.
2 Click Security
3 Click Windows Firewall.
4 Click Change Settings.
5 If prompted, enter the administrators password and click OK.
In Windows Vista, click Continue (if youre logged on as an administrator).
Select to turn the firewall on or off. You can also block all incoming programs
for an even more secure connection.
6 On the Exceptions tab, specify firewall exceptions.
7 On the Advanced tab, control which network connections are protected by the
firewall.
8 Click OK.
Exceptions
To configure an exception for a specific program, select the program in the list of
exceptions. If the program isnt listed on the Exceptions tab, click Add Program, select
the program you want to add to the list, and click OK.
Some applications might require that you open a numbered port, which is a specific
channel through which the application communicates, using TCP/IP. For example, Web
page communication through HTTP uses port 80. To create an exception for a specific
port, select the Exceptions tab and click Add port. Enter the name and port number, and
specify whether its the TCP or UDP protocol. (You can obtain protocol information
from the programs documentation or from a network administrator.)
Exhibit 20-23: Windows Firewall with Advanced Security in Windows Vista Business
Troubleshooting
Remember, when youre troubleshooting a network connection, its important to check
the status of the firewall and the list of exceptions. You might find that you cant
connect to a shared resource or a program isnt functioning properly because of a
missing or incorrectly configured firewall exception.
Security
Do it!
E-3:
2085
Heres how
1 Click Change notification
settings
Heres why
To open the Windows Firewall Customize
Settings window. This is the same as clicking
Turn Windows Firewall on or off.
Firewall
Double-click Skype
Click Open
11 Click Customize
Select Apply to this service,
then select Remote
Procedure Call (RPC) from
the list
Security
2087
12 Click OK
Click Next
13 Click Yes
14 From the Protocol type list, select
TCP
Click Next
15 Observe the Scope page
Click Next
Click Next
Click Next
18 In the Name box type Custom
RPC
19 Click Finish
20 Close all open windows
Security
2089
Social engineering
Social engineering is the equivalent of hacking vulnerabilities in computer systems to
gain accessexcept that it occurs in the world of people. Social engineering exploits
trust between people to gain information that attackers can then use to gain access to
computer systems. These trust exploits usually, though not always, involve a verbal
trick, a hoax, or a believable lie. The goals of social engineering techniques include
fraud, network intrusion, industrial espionage, identity theft, and a desire to disrupt a
system or network.
Targets for social engineering techniques tend to be large organizations, where it is
common for employees who have never actually met to communicate with each other.
Other targets include employees who have information desired by attackers:
industrial/military secrets, personal information about specific individuals, or resources
such as long-distance or network access.
Social engineering techniques are often used when the attacker cannot find a way to
penetrate the victims systems with other methods. For example, when strong perimeter
security and encryption foil an attackers efforts to penetrate the network, social
engineering might be the only avenue left. A slip of words is all the attacker needs to
gain access to your well-defended systems.
Shoulder surfing
Shoulder surfing is a social engineering attack in which someone attempts to observe
secret information by looking over your shoulder (or using other methods, described
next). Imagine someone standing behind you as you log onto your workstation. By
watching your fingers, the person can determine your password, and then later log on as
you.
Shoulder surfing has forms that dont directly involve PCs. Consider the old longdistance calling-card attackbefore cheap long distance and cell phones, people often
subscribed to calling-card plans. By entering a long code number before dialing a phone
number, you could get cheaper rates or bill the call to a third party. Spies would
reportedly watch public telephones from afar through a telescope to watch as you
entered the number, hoping to record your calling-card number. Theyd then use that
number to place long-distance calls.
A modern version of the calling-card attack involves learning your credit or debit card
number and your PIN (personal identification number). With these numbers, an attacker
could bill catalog or online purchases to your card. Cases have been reported of thieves
using digital cameras to snap photos of the front and back of cards as people pay for
merchandise in a store.
Phishing
Phishing, a growing problem on the Internet, is an example of a social engineering
attack. In phishing, hackers send e-mail messages or create Web sites that mimic a
legitimate site to gather usernames and passwords. For example, an e-mail message
might purport to come from a persons bank and request the user to log onto a Web site
to perform account maintenance. In reality, the Web site would simply collect the
persons username and password and present fake messages about the account
maintenance. Later, the hackers would drain the persons account by logging into the
banks real Web site.
Description
Organizational charts
Policy manuals
Calendars
Outdated hardware
Provides all sorts of useful information; for example, hard drives might be
restored, with data still accessible.
Include the exact information that attackers might seek, including the IP
addresses of key assets, network topologies, locations of firewalls and
intrusion detection systems, operating systems, applications in use, and
more.
Online attacks
Online attacks use instant-messaging chat and e-mail venues to exploit trust
relationships. Attackers might try to induce their victims to execute a piece of code by
convincing them that they need it (We have detected a virus, and you have to run this
program to remove itif you dont run it, you wont be able to use our service) or
because it is something interesting, such as a game. While users are online, they tend to
be more aware of hackers, and are careful about revealing personal information in chat
sessions and e-mail. If a user installs the attacking program from a link, the attackers
code tricks the user into entering a username and password in a pop-up window.
Security
2091
E-4:
Add a firewall.
2 How can you help system users avoid social engineering attacks?
3 Give examples of shoulder surfing in the context of both corporate and individual
security.
4 List some items that might be found in a companys trash that would be useful to
a hacker
5 If you were a hacker planning to call someone to convince them to divulge their
password, whom would you impersonate? (Give a job title or role.)
6 Have you ever been the victim of a social engineering attack? If so, describe the
experience.
Security
2093
Data security
Providing for data security extends beyond the measures you might take with user
accounts, file system permissions, and so forth. You must remember that your data is
stored on a physical device. If you no longer need a device, you must consider how to
destroy those bits and bytes permanently so no one can recover the information.
Data destruction
Data stored on magnetic media presents a serious security risk. For example, a 2003
study by the Massachusetts Institute of Technology found 5000 credit card numbers and
other sensitive data on discarded hard drives.
Erasing or formatting the drive isnt sufficient to destroy data. Unerasing and
unformatting utilities abound, and services exist that recover old data from the traces
left over, even after new files are written to the disk. The conspiracy-minded are
probably not that far off base in thinking that government and law enforcement agencies
have even greater capabilities at recovering data.
To truly destroy data, you need to use a utility designed to repeatedly write random data
to the medium. Only by writing data several times, or perhaps hundreds of times, can
you be sure that all traces of the old data are destroyed. Here are some utilities that
include this capability:
OnTrack Eraser, www.ontrack.com, commercial
Norton System Works, www.symantec.com, commercial
Eraser, eraser.heidi.ie/, open source
Wipe, sourceforge.net/projects/wipe, open source for Linux and UNIX
platforms
Removable media
Sensitive data stored on removable media, such as USB drives, tapes, or CDs, is a
serious security risk. These items are small and easily spirited out of a building or
secure area. When the data is no longer needed, the media should be destroyed. The
following table describes ways to destroy various media.
Item
Destruction method
Tapes
Tapes should be erased with a bulk eraser, a large powerful magnet that removes
all traces of magnetic encoding, or you can shred the cartridges to destroy the
tape within.
Floppies
Like tapes, floppies should be bulk erased or shredded. Many office shredders
can handle shredding floppies and optical media.
Optical media should be shredded. Bending and breaking or cutting into multiple
pieces with scissors is probably sufficient unless your data is ultra-sensitive.
USB, cartridge,
removable, and
external hard drives
Smashing these devices is probably the surest way to destroy their contents. Short
of that, file destruction applications are sufficient for most data destruction needs.
Data migration
You must manage archival data, such as business records that you must keep to comply
with IRS requirements. Such data must be kept available but doesnt need to be
regularly accessible. You should consider migrating such data off of your network or
out of your office.
Paper records should be stored at a records storage company. Such companies offer
secure, climate-controlled vaults and keep your records for the period you specify. Most
of these companies pick up such records at your site and return them if you need access.
Digital records should be migrated to tape or optical storage. Then the media should be
stored by a records storage company skilled in handling digital media.
Do it!
E-5:
4 What should your company do differently to ensure that old data isnt
recoverable?
5 Does your company use a records storage company to store archived data?
Security
2095
Security classifications
The United States Department of Defense issued a security evaluation specification
called the Trusted Computer Security Evaluation Criteria (TCSEC). You might also
hear this referred to as the orange book. The DoD document defines four broad
categories of security:
D Minimal Security
C Discretionary; includes two subclasses: C1 Discretionary Security
Protection and C2 Controlled Access Protection
B Mandatory Protection; includes three subclasses: B1 Labeled Security
protection, B2 Structured Protection, and B3 Security Domain
A Verified protection
In 2005, this specification was replaced with an international standard called the
Common Criteria. This standard has three components:
Specifications Users specify their security requirements.
Implementation Vendors implement the security attributes in their products.
Testing Laboratories test the security features of vendor products to
determine if they meet the claims.
Evaluation Assurance Levels (EALs) of the Common Criteria range from 1 to 7, with
EAL 7 being the most secure and EAL 4 about the highest level that a complex,
commercially developed product can achieve. However, if a product is Common
Criteriacertified, that doesnt mean that its completely secure. For example, six
versions of Microsoft Windows Server 2003, Windows XP Professional with Service
Pack 2, and Windows XP Embedded with Service Pack 2, Windows Vista Enterprise,
Windows Server 2008 Standard Edition, Enterprise Edition and Datacenter Edition, all
meet EAL 4+ of the Common Criteria, but security patches for security vulnerabilities
are regularly published by Microsoft for these operating systems.
Security
2097
E-6:
2 If so, when did you sign it and have you had to sign it again?
5 Are you required to use a password-protected screen saver or lock your PC when
you leave your desk?
In this topic, you learned that operating system security depends on authenticating users,
that is, determining who they are. You learned how users and groups are used in
Windows basic authentication to control access and to permit or deny access to
resources. You also learned how to use local security policies to control aspects of user
authentication, such as password length, expiration, and reuse.
Topic B
In this topic, you learned how to use Windows file encryption to secure the files on
your computer. You learned how to encrypt individual files or entire folders and their
contents.
Topic C
In this topic, you learned about hardware security devices, such as fingerprint scanner,
smart-card readers, and fobs. You identified how these devices add another layer of
security to the user authentication process, making your system more secure.
Topic D
In this topic, you learned about common security threats. You learned about the areas
of weakness that can give rise to security threats, and you learned about viruses, Trojan
horses, worms, and social engineering. You also learned how to combat these problems
by installing antivirus software and scanning your computer with Windows Defender.
Topic E
In this topic, you learned how to manage the human aspects of computer security. This
process includes implementing physical access restrictions to keep unauthorized
people out of sensitive areas and physically securing computers and peripherals. You
learned why a corporate security policy is an effective tool for ensuring security
within your organization. You also examined various social engineering attacks, which
are used to gain access to systems or secure areas.
Review questions
1 Which of the following items does a user account not include?
A Account type
B Account policies
D Password
3 True or false? Its a good idea to use the same password wherever you need one so
that you can remember it without writing it down.
False. There is a strong temptation to use the same password for all locations, but doing so
leaves you vulnerable to having your password stolen and used in any or all of the locations.
4 Whats the general rule for when you should change your password?
A Less than 30 days
B Between 30 to 60 days
D At 180 days
5 Most of the user accounts in your Windows environment will be which type?
A Administrator
B Guest
C User
Security
2099
6 When performing day-to-day activities, you should log on with a ___-level account.
User
7 The _______ Users group is used to assign elevated permissions to a select set of
individuals.
Power
12 In public key encryption, how many keys are used to encrypt and decrypt data?
A One
C Three
B Two
D Four
13 True or false? If you encrypt a file using EFS, anyone who logs onto your computer
can see the file on the drive, but cant open it.
True.
14 A biometric security device can log you into which of the following?
A An application
C A Web page
15 True or false? Biometric security hardware is always used in place of basic user
authentication (username and password).
False. Biometric devices can be used in combination with usernames and passwords. Sometimes
they are used in place of the user entering a username and password.
D Spam
B Phishing
E Trojan horse
C Shoulder surfing
22 Which type of malicious software is a self-propagating program meant to disrupt the
operation of a PC?
A Adware
D Virus
B Spam
E Worm
C Spyware
23 Which type of storage media presents the greatest security risk?
A Hard drives
B Tapes
C USB flash drives
24 True or false? Youve completed your corporate security policy and had all
employees read and sign it. You are now finished with the security policy.
False. You should regularly review and update your corporate security policy, as well as provide
user training.
25 What are the Evaluation Assurance Levels (EALs) of the Common Criteria?
A 0 to 6
C 1 to 7
B 1 to 5
D 1 to 10
Security 20101
26 Which is the most secure EAL?
A 0
D 7
B 1
E 10
C 5
27 List some of the items that a dumpster diver looks for.
Internal phone directories, organizational charts, policy manuals, calendars, outdated hardware,
systems manuals, network diagrams, and other technical information sources.
28 What kind of program poses as something else, causing the user to willingly
inflict the attack on himself or herself?
A Trojan horse
30 How do you keep your antivirus software updated to recognize new viruses and
worms?
You download updated virus definitions
37 True or false? Passwords for Windows user accounts arent case sensitive.
False
211
Unit 21
Windows installation and upgrades
Unit time: 180 Minutes
another.
212
Objective
2.5
3.1
Compare and contrast the different operating systems and their features
Windows 2000, Windows XP 32bit vs. 64bit, Windows Vista 32bit vs. 64bit, Windows 7
32-bit vs. 64-bit
Minimum system requirements, system limits
Windows 2000 and newer upgrade paths and requirements
Windows OS Upgrade Advisor
3.3
Explain the process and steps to install and configure the Windows OS
File systems
FAT32 vs. NTFS
Verification of hardware compatibility and minimum requirements
Installation methods
Boot media such as DVD, CD, floppy, or USB
Network installation
Install from image
Operating system installation options
File system type
Network configuration
Disk preparation order
Format drive
Partition
Start installation
Device Manager
Verify
Install and update device drivers
Driver signing
User data migration User State Migration Tool (USMT)
213
This topic covers the following CompTIA A+ Practical Application version 2.0 exam
objective.
#
Objective
2.3
Given a scenario, select and use system utilities / tools and evaluate the results
Device Manager
Enable
Disable
Warnings
Indicators
Windows installations and upgrades arent necessarily something youll do every day,
but knowing how to do them correctly will prevent a lot of headaches later when you
have a properly installed and configured operating system.
The process of moving from one operating system to a new operating system is called
migrating or migration. When migrating from a previous version of Windows to
Windows 7, for example, you have three options:
Upgrade Installation of Windows 7 over a previous Windows operating
system. This method updates system files and retains user accounts,
applications, and most (if not all) system settings.
Custom Installation of Window 7 by replacing the previous operating
system. It doesnt retain any user accounts, applications, or system settings.
Multibooting Installation of your chosen version of Windows, along with
another operating system or version of Windows
When migrating from a previous version of Windows to Windows Vista, for example,
you have three options:
In-place upgrade Installation of a new operating system over a previous
operating system, updating system files and retaining user accounts,
applications, and most (if not all) system settings.
Clean install Installation on a computer where none of the current settings
and files are retained.
Multibooting Installation of your chosen version of Windows, along with
another operating system or version of Windows
Most of your new installations will be a version of Windows 7 or Windows Vista. You
arent likely to complete any new installations of earlier operating systems, especially
on new computers, unless your company has a corporate policy that all computers run
an earlier operating system, such as Windows XP. However, you might be asked to
reinstall an older operating system, such as Windows XP or Windows 2000
Professional, to fix configuration problems. When youre installing these operating
systems, you have two options: a clean install or an upgrade.
214
215
Pre-installation tasks
Once youve chosen the appropriate Windows operating system for your needs and
decided whether youre going to do a clean installation or an upgrade, you cant just pop
the installation disc in the computer and start. Before you start the actual operating
system installation, there are several steps you must take to gather necessary
information and make decisions. Pre-installation tasks you should complete include:
Backing up files
Verifying that hardware requirements are met
Checking for hardware compatibility with the new operating system
Identifying the appropriate partition size and file system format
Choosing an installation method
Hardware requirements
Not all computers can run all Windows operating systems. As you might expect, each
edition of Windows has different hardware requirements. This makes sense because, for
example, most Vista Home Basic users wouldnt necessarily need the processing power
that an Vista Ultimate user might need to run a complex computer-aided design (CAD)
application. You need to match the computers hardware capabilities with the hardware
requirements of the Windows operating system youve chosen to install.
216
Minimum
Processor
Memory
1 GB 32-bit
2 GB 64-bit
Hard disk
Graphics
Minimum
Recommended
Processor
Memory
512 MB
512 MB
Hard disk
20 GB with 15 GB
available
20 GB with 15 GB available
Graphics
Super VGA
Optical drive
Internal or external
DVD-ROM
217
Minimum
Recommended
Processor
Memory
1 GB
1 GB
Hard disk
40 GB with 15 GB
available
40 GB with 15 GB available
Graphics
Super VGA
CD/DVD drives
Internal or external
DVD-ROM
Minimum
Recommended
Processor
300 MHz
Memory
64 MB
128 MB
1.5 GB
Graphics
Super VGA
Optical drive
Minimum
Recommended
Processor
Memory
64 MB
1 GB free space
Graphics
VGA
SVGA
Optical device
218
Windows XP/Vista
Screen size
Memory
1 GB RAM
Storage
Graphics
Touch
CPU
A-1:
219
2 You have a computer with 512 MB of RAM and a 1.5 GHz processor, and you
use the computer mostly for Internet access and e-mail. Which edition of
Windows Vista might you recommend? Why?
2 GHz processor
1 GB of memory
DVD-ROM drive
4 Which of the following doesnt meet minimum requirements for Windows Vista
Business?
A
2 GHz processor
256 MB of memory
DVD-ROM drive
5 Which of the following doesnt meet minimum requirements for Windows Vista
Ultimate?
A
1 GHz processor
2 GB of memory
DVD-ROM
6 Whats the minimum required free disk space for a Windows XP installation?
A
1 GB
1.5 GB
2.0 GB
2.5 GB
2111
A-2:
2113
Heres how
Heres why
3 Click Yes
4 Select I accept the license
terms and click Install
5 Click Close
Click Yes
7 In the Windows 7 Upgrade
Advisor, click Start check
11 Click
12 Click Close
2115
A-3:
2 You have a computer with a 1 TB hard drive. Can you create and format one
single partition by using Windows 7 Setup?
3 What is the largest installation partition you can create by using Windows Setup
in Windows XP prior to SP1?
2117
Installation methods
Several methods are available for installing Windows, depending on which operating
system, if any, is already on the computer.
Windows 7 and Vista installation
The easiest way to install Windows 7 or Windows Vista is from the installation DVD.
When you insert the DVD into a computer, a window opens and presents you with a
variety of options, including checking for compatibility, installing Windows 7 or Vista,
and transferring files and settings from one computer to another. When you click Install
now, Setup begins, and you can either upgrade to Windows 7 or Vista (if an upgrade is
supported) or perform a clean installation.
You can also access the Windows 7 or Vista installation files from a network share. To
start Setup from across the network, access the network share that contains the
installation files, and double-click Setup.exe.
Windows 2000 and Windows XP installation
To install Windows 2000 Professional or any version of Windows XP, use one of the
following methods:
If the installation CD- or DVD-ROM is bootable, then when you insert it,
Windows Setup starts automatically. You can use this method regardless of the
operating system installed.
If the computer has DOS installed, insert the CD-ROM (assuming youve
installed appropriate optical drivers), access the CD-ROM, and double-click
Winnt.exe.
If the computer is running Windows 9x, Windows Me, Windows NT
Workstation, Windows 2000 Professional, or Windows XP, insert the CD-ROM
and double-click Winnt32.exe to start setup for Windows 2000 Professional or
Windows XP.
You can also boot a computer from a USB device and start the installation that
way.
Network installation
You can also perform a network installation of Windows. You copy the contents of the
installation disc to a network server or place the disc in an optical drive on the network
server, and then share the folder or drive. From the client, you access the share and run
the appropriate setup file: Winnt.exe or Winnt32.exe for Windows XP or Windows
2000, and setup.exe for Windows 7 or Vista. The appropriate files are copied to the
local computer, just like they would be if you had the installation disc in a local optical
drive. Because the client needs network drivers installed for this method to work, its
most useful for upgrades.
Note that a network installation is not the same as a remote installation using
Microsofts Remote Installation Services from a Windows server or a third-party
cloning application. These programs use an image of the original cloned computer and
copy it down to the client. This image contains the hardware drivers of the original
system, so the image must be installed on similar computers. For example, you cant use
an image created from a computer with an Intel Pentium Extreme Edition processor on
one with an AMD Athlon processor.
Windows installation
After youve installed one version of Windows, you can make your way through the
installation of any other version. Setup takes care of just about everything and presents
you with an operational computer when its done.
Installing Windows 7 and Vista
To perform a clean installation of Windows 7 or Windows Vista by booting from the
DVD:
1 Back up any files and folders you want to save from the computer on which
youre installing Windows 7 or Windows Vista. (This wont be necessary if its
a new computer.)
2 If necessary, save user system settings by running the User State Migration Tool
(USMT) and saving them to a network location. Alternatively, you can use the
Windows Easy Transfer Wizard to save your user system settings to a network
location, a local optical medium (such as a DVD), or a removable hard disk or
flash drive. For more information about USMT and the Windows Easy Transfer
Wizard, see Windows 7 or Windows Vista Help and Support. Back up any
important data.
3 If necessary, obtain a product key. Youll need to enter it during setup.
4 Verify that you have Internet access if you plan to download and install updates
to Windows 7 or Windows Vista later.
5 Insert the installation DVD and restart the computer. When prompted, press any
key to boot from the DVD.
6 In Windows Vista setup, select a language, time and currency format, and
keyboard or input method.
7 Click Install now.
8 Click Go online to get the latest updates for installation (recommended) or Do
not get the latest updates for installation.
2119
2121
Network locations
When installing Windows 7 or Windows Vista, you are prompted to choose the location
of the network to which the computer is connected. Depending on your choice,
Windows Vista will apply a predetermined collection of settings to help secure your
computer on that network. You have three options:
Home The computer is discoverable (that is, other computers can find it on
the network), and you can see other computers.
Work The computer is discoverable and you can see other computers.
Public location There is limited discovery and tighter security.
To change the network location setting (if the computer is not a member of a domain),
open the Control Panel and click Network and Internet. Then click Network and Sharing
Center. Next to Network, click Customize, and select either Public or Private.
Installing Windows XP and Windows 2000
The installation process for Windows XP and Windows 2000 generally follows these
steps:
1 Insert the installation CD-ROM.
2 Access and run the appropriate installation file (Winnt or Winnt32). The textmode Setup begins. (Winnt.exe is for 16-bit operating systems; Winnt32.exe is
for 32-bit operating systems.)
3 f necessary, partition and format the hard disk during text mode. Setup then
copies necessary files to the hard disk.
4 fter the text-mode part of the process, Setup reboots the computer and starts the
GUI portion of Setup. During this portion, youre prompted for some or all of
the following:
a Language and locale settings
b Product key
c Installation directory
d Administrator password
e Floppy disk to create a Startup Disk
f Networking configuration (DHCP or custom configuration)
Setup incorporates your input, copies the necessary files from the CD-ROM,
configures the files, detects hardware and installs drivers, and configures
networking. When Setup is complete, youre ready to log on and complete the
post-installation tasks.
Possible cause
Resolution
CD or DVD wont
launch
Defective CD or DVD;
autoplay not configured on
CD or DVD drive
Hardware error
messages
Incompatible hardware
Setup cant
download updates
Disk space
CD or DVD errors
Blue screen
A-4:
2123
Heres how
Heres why
Click Yes
3 Click Install Now
Click Next
6 Click Custom (advanced)
If necessary.
Click Next
10 In the Type a user name box,
type MYCOMPADMIN##
Click Next
12 In the Type a password box, type
!pass1234
settings
2125
21 Click Cancel
22 View the contents of the
Windows.old folder
23 Delete the Windows.old folder
When prompted, click Continue
24 Close Windows Explorer
2127
A-5:
Heres how
Heres why
2129
Driver signing
Microsoft introduced the concept of driver signing in Windows 2000. Device drivers
that have been tested and approved by the Windows Hardware Quality Lab are issued
digital signatures to advertise their suitability for installation on a Windows system.
You can configure Windows 2000 Professional and Windows XP computers to accept
only signed drivers to help protect your computers from untested drivers that could
cause significant system disruption. Unsigned drivers arent necessarily bad; just be
aware that some drivers are signed and some are unsigned.
To configure driver signing in Windows 2000 Professional or Windows XP:
1 Right-click My Computer and choose Properties.
2 Select the Hardware tab.
3 Click Driver Signing to open the dialog box shown in Exhibit 21-3.
4 Choose one of three actions:
Ignore Install the software anyway and dont ask for my approval
Warn Prompt me each time to choose an action
Block Never install unsigned driver software
5 Click OK twice.
A-6:
2131
Heres how
Heres why
4 Select Enabled
5 From the When Windows detects
a driver file without a digital
signature list, select Block
6 Click OK
7 Close the Local Group Policy
Editor
Topic B: Upgrades
This topic covers the following CompTIA A+ Essentials (2009 Edition) version 2.0
exam objective.
#
Objective
3.1
Compare and contrast the different operating systems and their features
Windows 2000, Windows XP 32bit vs. 64bit, Windows Vista 32bit vs. 64bit
Windows 2000 and newer upgrade paths and requirements
Windows OS Upgrade Advisor
Microsoft Assessment and Planning Toolkit
Application compatibility, installed program locations (32-bit vs. 64-bit), Windows
compatibility mode
You cant just upgrade any Windows operating system to any other Windows operating
system. The new operating system must support an upgrade from the older operating
system. The tables in this section show supported Windows upgrade paths. If an
upgrade isnt supported, you have to perform a clean installation. Make sure you have
any necessary service packs installed on the previous operating system before you start
the upgrade.
Windows 7 upgrade paths
The following table outlines Windows 7 upgrade options, indicating Install when a
clean installation is required, and Upgrade when an upgrade is possible.
Previous Windows version
Home
Basic
Home
Premium
Professional
Ultimate
Windows 2000
Install
Install
Install
Install
Upgrade
Upgrade
Install
Upgrade
Install
Upgrade
Install
Upgrade
Install
Install
Upgrade
Upgrade
Install
Install
Install
Upgrade
2133
Can be upgraded to
Home Basic
Home Premium
Professional or Ultimate
Professional
Ultimate
Home
Basic
Home
Premium
Business
Ultimate
Windows 2000
Install
Install
Install
Install
Windows XP Home
Upgrade
Upgrade
Upgrade
Upgrade
Windows XP Professional
Install
Install
Upgrade
Upgrade
Install
Upgrade
Install
Upgrade
Windows XP Tablet PC
Install
Install
Upgrade
Upgrade
Install
Install
Install
Install
In addition to the limitations on the upgrades mentioned in the previous table, you cant
upgrade some foreign-language versions of Windows XP, Windows XP Media Center
Edition, or Windows XP Tablet PC Edition to Windows Vista. Microsoft Windows XP
Media Center Edition is available only on Media Center PCs. With the special hardware
requirements, Windows XP Media Center Edition PCs are available only from
Microsoft PC Manufacturer partners, so you wont be upgrading any existing Windows
systems to Windows XP Media Center Edition. Windows Vista Enterprise has its own
unique requirements for installation and licensing. If you need to upgrade to Vista
Enterprise, youll need to contact a Microsoft Volume Licensing Specialist.
Can be upgraded to
Home Basic
Home Premium
Ultimate
Business
Ultimate or Enterprise
Enterprise
Ultimate
Upgrades supported
Windows 95
Windows 98
Windows Me
Windows XP Professional
B-1:
2135
2 True or false? You can upgrade from Windows Home Premium to Windows Vista
Ultimate.
3 Youve been using Windows Vista Home Basic, but would like to upgrade to get
more Vista features. This computer is not used for work. What would be the best
upgrade choice?
2137
7 Insert the DVD, and in the Install Windows window, click Install now.
Or access the installation files over the network, double-click Setup.exe. In
Windows 7, click Yes. In the Install Windows window, click Install now.
8 Choose whether to connect to the Internet to get installation updates.
9 In Windows Vista, if necessary, enter your product key. Choose whether to
automatically activate Windows when youre online. (Clear the checkbox if you
dont want to activate automatically.)
10 Accept the license agreement.
11 Click Upgrade.
12 If Setup detects compatibility issues, click Click here for more information to
see what issues were discovered. (These may be the same issues you saw in the
Windows 7 or Windows Vista Upgrade Advisor.)
Setup takes over and completes the upgrade. Setup will restart the computer at
least twice.
13 Choose how you want to handle automatic updates, and then confirm time zone
settings.
14 In Windows 7, enter your product key.
15 Select a network type, and in Windows Vista, click Start.
16 Install any necessary device drivers that werent installed during the Windows 7
or Vista installation.
17 If necessary, activate Windows 7 or Windows Vista.
Upgrades within Windows 7
To upgrade from one version of Windows 7 to another you use the Windows Anytime
Upgrade utility. The Windows Anytime Upgrade utility in Windows 7 doesnt require
physical media or access to the original installation files, but you must purchase an
upgrade key, which you can purchase using the Windows Anytime Upgrade utility at
the beginning of the upgrade process. Windows Anytime Upgrade installs components
from the Component-based servicing (CBS) store located on the local computer. Total
time for an upgrade is approximately 10 minutes.
1 Click Start and choose Windows Anytime Upgrade. (If you dont see it on your
Start menu, you can search for it.)
2 Choose either to go online to purchase an upgrade or to enter an upgrade key.
3 Accept the license agreement.
4 Click Upgrade.
Upgrades within Windows Vista
The upgrade process is very similar, and if youre already running Windows Vista, you
know that your devices and applications are already supported. If you have Windows
Vista Home Basic installed, you should verify that your computer meets the hardware
requirements for Windows Vista Home Premium or Ultimate.
Possible cause
Resolution
B-2:
2139
Heres how
Heres why
4 Click Upgrade
5 Log in as your
MYCOMPADMIN## user with
a password of !pass1234
2141
9
10
11
12
13
14
2143
Program locations
Most 32-bit applications will run on 64-bit versions of Windows operating systems. The
64-bit versions of Windows 7 and Windows Vista run 32-bit applications in a 32-bit
operating system emulation environment called Windows on Windows 64 (WOW64).
For each 32-bit operating system call the application makes, WOW64 generates a
corresponding 64-bit operating system call to pass on to the OS kernel. WOW64 then
converts the 64-bit OS response back into a 32-bit data structure that the application
understands.
WOW64 runs in user mode, because all 32-bit application code must run in user mode
under Windows 7 and Windows Vista. Because WOW64 runs in user mode, 32-bit
kernel mode device driver and applications that rely on those 32-bit device drivers
wont run on the 64-bit version of Windows 7 and Windows Vista.
WOW64 also ensures that files for 32-bit applications are separate from 64-bit
applications by using File Redirection. The 32-bit folders are:
Application files C:\Program Files(x86)
System files C:\Windows\SysWOW64
The 64-bit folders are:
Application files C:\Program Files
System files C:\Windows\System32
WOW64 uses Registry Redirection to keep 32-bit application Registry settings separate
from 64-bit application Registry settings. The Registry location for 32-bit applications
is:
HKEY_LOCAL_MACHINE\Software\WOW6432Node
The corresponding 64-bit application Registry key is:
HKEY_LOCAL_MACHINE\Software
Occasionally, you might see 32-bit application Registry entries under
HKEY_CURRENT_USER\Software\WOW6432Node.
This configuration allows both the 32- and 64-bit versions of a particular application to
be installed on the same 64-bit operating system without overwriting each others
settings.
B-3:
2145
Heres how
1 Install the Windows XP
application
Heres why
Your instructor will provide you with an
application written for Windows XP that you
will install on your Windows 7 Ultimate
computer.
3 Click Programs
4 Under Programs and Features,
click Run programs made
5 Click Next
6 Select the application you just
installed and click Next
7 Click Try recommended
settings
Click Yes
Click Next
Click Close
9 Close the legacy application
10 Close Control Panel
In this topic, you learned how to perform a clean installation of a Windows operating
system. You learned which pre-installation tasks to perform to make the installation
easier. You also learned about what you need to do after the installation, and you
learned how to troubleshoot installation problems.
Topic B
In this topic, you learned how to upgrade from one Windows version to another. You
learned how to verify software and hardware compatibility with the Upgrade Advisor.
You also learned how to change compatibility settings to run legacy applications on
your Windows 7 or Windows Vista computer.
Review questions
1 In Windows 7 and Windows Vista, what utility do you use to copy all your files and
settings to an extra hard drive or other storage device, before doing a clean install?
A Files and Settings Transfer Wizard
B Upgrade Advisor
2 Which Windows operating systems will run on a Pentium 233 processor? [Choose
all that apply.]
A Windows 2000 Professional
C Windows XP Professional
G Windows 7 32-bit
H Windows 7 64-bit
B Windows XP Professional
G Windows 7 32-bit
H Windows 7 64-bit
4 True or false? To run the Windows Vista Upgrade Advisor, you must have the
Windows .NET Framework 2.0 and MSXML version 6 (MSXML6) installed on
your computer.
True. If these arent installed, Windows Vista Upgrade Advisor Setup detects their absence and
prompts you to download and install them.
5 True or false? The Windows XP Upgrade Advisor is available for all versions of
Windows XP.
False. On Windows XP systems, you need Service Pack 2 installed.
2147
6 What is the partition size limit on Windows XP computers without SP1 or later?
A 128 GB
D 500 GB
B 137 GB
E 1 TB
C 256 GB
7 True or false? You can install Windows 7, Windows Vista, and Windows XP from a
network share, but not Windows 2000 Professional.
False. You can install all four Windows operating systems from a network share.
8 Which network location is configured for limited discovery and tighter security?
A Home
C Public
B Office
D Work
C Windows XP Professional
B Windows XP Home
13 Which is the only version of Windows Vista that can be upgraded to Vista
Enterprise?
A Windows Vista Home Basic
221
Unit 22
Safety and maintenance
Unit time: 60 Minutes
computer environment.
B Identify preventative maintenance tasks for
personal computers.
C Identify ways to avoid injury and strain
computer equipment.
222
Objective
2.5
6.1
Outline the purpose of appropriate safety and environmental procedures, and given a
scenario, apply them
ESD
EMI
RFI
Cordless phone interference
Microwaves
Electrical safety
CRT
Power supply
Laser printers
Cable management
Avoiding trip hazards
Physical safety
Heavy devices
Hot components
Office hazards
Explanation
Part of keeping your computers safe is making sure that the environment in which
theyre used is free of potential hazards and operationally safe. Most of the time, this
involves a simple physical inspection of the work area. Lets take a look at some of the
factors you should consider when examining office hazards.
Floor surfaces
The following guidelines will help you maintain a safe floor surface:
Floors should be level and dry.
Carpets should be secured to the floor.
Cables and power cords should not cross walkways.
Equipment should be protected from static electricity. Use antistatic floor mats,
and if necessary, place antistatic mats under the users keyboard and/or
computer.
223
224
Used for
Description
Ordinary
combustibles
Puts out fires involving wood or paper. The label shows either a green
triangle with an A inside it or a wastebasket and a pile of logs on fire.
Flammable
liquids
Puts out fires involving grease, oil, gasoline, or similar liquids. The label
shows a red square with a B in it or a gas can on fire.
Electrical
equipment
Puts out fires involving electrical equipment. The label shows a blue circle
with a C in it or a plug and cord on fire.
Flammable
metals
Fire extinguishers are filled with one of four substances for putting out fires. These
substances are described in the following table.
Type
Description
Dry
chemicals
These are designed for putting out fires from multiple types of flammable materials by
using an extinguishing chemical along with a non-flammable gas propellant.
Halon
Halon gas interrupts the chemical reaction of burning materials. Its designed for use on
electrical equipment.
Water
Class A fire extinguishers use water, along with compressed gas, as a propellant.
CO2
Carbon dioxide fire extinguishers are designed for Class B and Class C fire extinguishers.
CO2 cools the item and the surrounding air.
More information about fire extinguishers, including how to use them, can be found at
www.hanford.gov/fire/safety/extingrs.htm.
Electrical safety
To keep your work area free from electrical hazards, follow these guidelines:
Avoid overloading electrical circuits, which can lead to tripped breakers and
fires.
Label the breakers in the electrical box so you know which outlets are serviced
by which breakers.
Use surge protectors and uninterruptible power supplies (UPSs) to protect
computer equipment from surges and spikes. The delicate connections in a
computer circuit board can easily be damaged by the surges and spikes produced
by inadequate electric circuits.
Avoid stringing together or overloading power strips, as shown in Exhibit 22-3.
Dont run electrical cords or network cables across walkways. If the wires inside
the cable or cord become frayed, power cords wont work properly and network
cables will fail.
225
If theres no alternative, and power cords must be run across a walkway, they
should be encased in cord protectors. These are most often made of a rubber or
plastic strip through which the cords and cables can be easily inserted. The top
of the strip is slightly domed so that people wont trip over it, and it contains
ample room for the cords and cables to be protected.
Provide good ventilation for computer equipment so it doesnt overheat.
Overheating can lead to melted components.
Phone cords, network cables, and electrical lines should be secured out of the
way. You can use cable ties, which are commonly available in nylon and Velcro.
Some cable ties include a small tag that you can use to label the cables youve
secured together.
226
Computer hazards
Computers can be hazardous to your health. The two major types of hazards are
physical and electrical. In addition, toner and ozone emissions from laser printers and
photocopiers can be hazardous.
Physical hazards
Computer equipmentespecially laser printers, servers, and large CRT monitorscan
be heavy and bulky. Use care when lifting and moving equipment, not only for the sake
of the equipment, but also for the sake of your back and other muscles. When lifting
equipment, take a balanced stance. If the item is on the floor, squat close to it and use
your leg muscles to lift it as you stand up. Keep your back straight with your chin
tucked in. Grip the equipment, using your entire hand rather than just your fingers, and
bring the equipment close to your body, keeping your elbows close to your body as
well. With CRT monitors, keep the glass face towards your body. It is the heaviest part
of the monitor and is easier to carry when placed closer to your center of gravity. Also,
make sure that you can see where youre going with the equipment! Crashing into
another person, a wall, or other equipment can also be hazardous.
Its also important to restrain or remove neckties, loose clothing, dangling jewelry, and
long hair so that such things dont become entangled with components.
The electronic components of computers generate heat. Many times the heat generated
by these components is enough to cause a serious burn if theyre touched. For example,
while a notebook computer is often referred to as a laptop, if placed on your lap
covering the bottom air vents, youll find that, after a while, the heat becomes quite
uncomfortable and can actually burn your skin. If youll be working with a notebook
computer on your lap, its best to purchase a lap desk. These allow air to circulate
through the air vents on the bottom of the notebook as if on a desk.
227
They also protect your skin from the hot air moving away from the components. You
should exercise caution working on the internal components of a computer, as they can
retain heat. Even if you arent working on a component that generates heat itself, you
are working in close quarters and can accidently brush up against a component that is
hot.
Electrical hazards
Some componentsnotably CRTs, power supplies, and laser printerscontain highvoltage components. When working around these pieces of equipment, take special care
by following these guidelines:
Always use care when working with any electrical equipment. Be sure that its
turned off and unplugged before you begin to make repairs, unless you dont
have an ESD strap. Without an ESD strap, you need to leave it plugged in for the
electrical ground. Otherwise, you could fry internal components.
Visually inspect the equipments wiring for defects, such as faulty insulation or
loose connections, before each use.
Dont use damaged or frayed electrical cords.
Remove metal jewelry, watches, rings, etc., before working on computer
components.
Dont place containers of liquid, including beverages, on or near computer
equipment.
Always know the electrical ratings of the computers and other equipment in your
work area so that you dont overload electrical circuits.
Only specially trained technicians should attempt to repair a CRT or the high-voltage
components in a laser printer. Such training is beyond the scope of this course.
Laser printer and copier toner
The toner used in laser printers and photocopiers is usually a mixture of plastic resin,
iron powder, and carbon black. The particles are about 10 microns or smaller. Toner
dust can irritate your respiratory tract, causing you to cough or sneeze. To protect
yourself from inhaling airborne dust, wear a protective face mask.
In addition, the components in toner can cause an allergic reaction if they come in
repeated contact with your skin. Symptoms of an allergic reaction include rashes on
your skin and burning sensations in your eyes. To prevent exposure, you should handle
toner cartridges with disposable gloves and face masks, and always wash your hands
after you handle a toner cartridge or work on a photocopier or laser printer.
Clean up spilled toner with a vacuum specially designed to clean up material this small.
Other vacuums can let the toner through the bag onto the motor, where the toner can
melt onto it or put the dust particles into the air.
Always send used toner cartridges to a recycler for proper disposal. Never send them to
the landfill. Chemicals in the toner cartridges can contaminate the environment.
Youll remember that the charged corona wire in a laser printer creates ozone, an air
pollutant capable of causing respiratory illness. To keep the concentrations of ozone
below the currently regulated standard, many newer laser printers employ replaceable
ozone filters. Make sure you follow the manufacturers instructions for replacing the
ozone filter at proper intervals to protect against unsafe levels of ozone emissions.
228
Incident reporting
An organization should have policies in place for handling accidents. The policy should
include the procedure for reporting incidents. Proper documentation in a timely manner
is necessary for OSHA, workers compensation claims, and insurance purposes.
Do it!
A-1:
4 If a physical injury were sustained during the service call, what would your
companys policy be for reporting the incident?
229
High-voltage interference
High-voltage interference in a LAN can originate from a number of sources and affect
several parts of a network.
Outside interference
Outside interference can be caused by lightning and the atmospheric conditions that
produce it. Wind can also generate static electricity, either by the friction of air moving
over stationary objects or by the motion that wind pressure produces in everything from
tree leaves and flags to tumbleweeds and windmill blades. Other sources of interference
from outside the building include radio stations, citizens band (CB) radios, and police
radios.
Inside interference
Inside interference is mainly produced by differences in electrical potential in various
parts of the building or between objects in the building. These differences cause electric
currents to flow for very short periods of time and with differing potential between some
of the points. The brief electrical flows tend to neutralize the potential between the
various points, but the current flow often passes through wires, metal components, and
other conductors that form part of the network structure. When this happens, the high
voltage of the current flow disrupts the low-voltage flow of data in the network or may
even entirely obliterate it for a time.
Interference can also be caused by the operation of pieces of electrical equipment that
create electromagnetic fields around themselves. Imperfectly wired electrical
connections can produce tiny current arcs. These arcs generate interference around the
circuit.
Inside the building, sources of interference include fluorescent lights, any item with a
motorfor example, fans, refrigerators, generators, microwaves, and other household
appliances.
Finally, almost any movement of an object through the air or while in contact with
another object can generate a static electric charge on the object, which produces
interference when discharged. This movement can be anything from feet walking on a
nylon carpet (and discharging with a painful spark when the walker touches a metal
object) to clothes tumbling in the drum of an automatic dryer.
Static electricity is the buildup of an electrical charge on the surface of an object.
Typically, objects that arent good conductors of electricity, such as rubber, plastic, or
glass, are good at holding the surface charge. This static charge remains on the object
until it bleeds off to ground or is neutralized by a discharge, termed electrostatic
discharge (ESD).
With ESD, when two objects of different electrical charge touch, there is a brief and
sudden electrical current which flows between them. Static discharges can attain very
high voltages. If you touch a metal object and feel an electrical discharge, the static
charge (that is, the voltage difference between you and the object) was 3,000 volts or
more. If you saw a spark when the discharge occurred, the voltage difference was at
least 8,000 volts.
Such voltage discharges can produce high levels of interference and can damage or
destroy low-voltage electrical circuits and parts that normally function in a range of five
volts or less. Even a mild static discharge of a few hundred volts can wipe out a data
packet running in a low-voltage wire or completely fry a millivolt-rated capacitor or
other electronic part.
2211
A-2:
2 How could you silence the static and stop the network interference?
2213
Objective
2.5
6.1
Outline the purpose of appropriate safety and environmental procedures, and given a
scenario, apply them
Material Safety Data Sheets (MSDS)
Preventive measures
Explanation
As with most things, if you take care of your computer equipment, it will last longer.
Taking care of it includes keeping it clean and doing some periodic maintenance to
prevent future problems. Many manufacturers identify maintenance tasks that you
should complete for their products. You should familiarize yourself with those
recommendations and incorporate them into your maintenance schedule.
Ventilation, dust, and moisture control
Recall that two primary factors contribute to hardware device and computer peripheral
failure: dirt and heat. Most equipment has ventilation holes, and many computers have
fans that help cool them. Keeping the fan openings and ventilation holes clear helps the
airflow and prevents overheating. Keeping the fans clean helps prevent dust and foreign
matter from getting inside the device.
Hard disk drives, for example, are prone to failure in high-heat environments. Their
mechanical nature causes a great deal of friction, as the platters can spin in excess of
15,000 revolutions per minute (rpm). Stack several disks inside of a single computer
without proper ventilation, and the combined heat of several drives can damage the
electrical components, leading to drive failure. If a drive fails and data is lost prior to a
timely backup, an expensive data recovery service bureau needs to be employed to open
the disks and attempt to extract the data from the failed device.
You should periodically inspect the ventilation holes and components for dust. Using
compressed-air canisters or computer-equipment vacuums that can blow air is useful for
pushing dust and other matter off of sensitive components. Try to blow the dust out of
the case, or tip the case so the dust is pushed to a corner without either the power supply
or drives in it. Then either use a vacuum to remove the accumulated debris, or use
tweezers to pick up the larger pieces and try to blow the rest out. Some Web sites
recommend using an air compressor instead of compressed-air canisters if the dust and
debris is caked on. An air compressor provides a more powerful air stream but can
cause damage to components if not used correctly.
B-1:
3 What is the best measurement to use for deciding when to complete printer
maintenance tasks?
2215
B-2:
2217
Heres how
Heres why
If necessary.
Description
None
A slight hazard.
A moderate hazard.
Highly hazardous.
Extremely hazardous.
2219
The MSDS might also include codes for personal protective devices that should be worn
or used when handling the product. Examples are shown in the following table.
Rating
Description
Wear goggles and gloves and other protective gear when using this product.
There are many Web sites with links to MSDSs. Product manufacturers also usually
post MSDSs somewhere on their Web sites. One location you might check is
msdssearch.com/find.htm. You can search by manufacturer or search for a specific
MSDS.
Do it!
B-3:
Heres how
Heres why
Objective
2.5
Computer technicians are often asked to carry large pieces of equipment to user
workstations. Technicians also sometimes spend hours over a computer trying to figure
out why it isnt working. Be sure to take frequent breaks to give your eyes and body a
rest from such tasks.
Ergonomic workstations
The media have covered the potential hazards usually referred to as repetitive strain (or
stress) injuries (RSIs). RSIs occur when stress is placed on the neck, arm, wrist, and
eyes of a computer user who spends hour upon hour on a computer that isnt
ergonomically configured to that particular users needs. (Even when a system is set up
correctly, working for hours without breaks can cause an RSI.) The following Web sites
contain information that can be useful in setting up workstations to best suit user needs:
office-ergo.com/index.html and ergo.human.cornell.edu.
The computer user should be able to sit comfortably on a chair, with feet flat on the
floor. The users back should be either straight or slightly reclined, never leaning
forward to reach the keyboard or to see the monitor. The monitor should be at eye level
so that theres no need to look down or up. The top of the monitor case should usually
be about two or three inches above eye level, thus placing the screen at eye level, with
the top tipped back slightly and about arms distance from the user.
The keyboard should allow the user to keep arms close to his or her body and keep the
forearm at approximately a 90 angle. Some keyboards come with a built-in wrist rest,
on which users can rest the lower part their hands to relieve some stress on the wrists.
You can also purchase wrist rests separately to place at the bottom of a keyboard that
doesnt have one. Eye strain can be lessened by using LCD monitors rather than CRT
monitors.
If the workstation needs to be altered, you can use risers to bring the monitor up to the
desired level. Be sure not to block any ventilation slots, though. This might happen if
the equipment is in an armoire, or if the monitor is right up against a shelf above it in an
office cubicle, or is in a corner with other things right next to its sides. If the desk itself
needs to be raised, be sure that its still stable afterward. A monitor or other piece of
equipment falling onto a user would be another hazard if the desk were unstable.
2221
Laptops
Laptops are convenient for many users, but they can be uncomfortable to use. Some
laptops weigh only about 3 to 5 pounds; others weigh 8 to 10 pounds. Add to that the
weight of the laptop bag and the papers and other things users often travel with, and
youre looking at 5 to 20 pounds in the laptop bag to be carried in hand, over the
shoulder, or on your back in a backpack.
The cramped keyboard can cause the user to type in unnatural positions. The monitor
and keyboard cannot usually both be placed in the optimal ergonomic positions. Usually
you can get one or the other in a good position, but its hard to get both correct.
Laptops are hot, particularly if theyre on your lap. Most laptops are designed to operate
at 35 C to 40 C (95 to 104 Fahrenheit). Placing them on your lap inhibits airflow
through the openings on the underside, resulting in higher operating temperatures.
These often rise to 40 C to 50 C (104 to 122 Fahrenheit) or even higher. At such
temperatures, the laptop often crashes when the processor becomes too hot. The hard
drive can also crash at these temperatures. Users have also been burned right through
their clothing when using a laptop directly on their laps.
Use a laptop cooling pad beneath your laptop, when traveling, to help protect the laptop
from overheating and protect yourself from burns. These pads usually contain fans to
help cool the laptop. Some pads also contain thermal gels to help cool the laptop. The
pad fans are usually powered through the USB port on the laptop. Other cooling pads
are simply flat or wedge-shaped plastic pads with ridges that enable air to flow through
between the work surface and the laptop.
Do it!
C-1:
Heres how
1 Adjust your chair so that your feet
are flat on the floor
2 Is your monitor too high or too
low?
3 Does the height of the keyboard
allow you to keep your arms at
approximately a 90-degree angle,
and your elbows in close to your
body?
4 Does your workstation have a
wrist rest?
Heres why
Youll adjust your workstation to the optimum
ergonomic position.
Objective
6.1
Outline the purpose of appropriate safety and environmental procedures, and given a
scenario, apply them
Environmental consider proper disposal procedures
Disposal of electronics
Explanation
Its often more cost-effective to replace a component or even an entire computer than to
fix it or upgrade it. Home users and companies alike often end up with large piles of
broken or outdated computers and other electronic equipment that needs to be disposed
of properly.
Electronic components and equipment cant just be sent to the landfill along with the
rest of the trash. They contain many hazardous materials, a number of which can be
reclaimed. To help prevent environmental damage, you need to remove hazardous
materials before sending items to the landfill. Be sure to check the MSDS for
information on how to handle and dispose of the equipment.
Hazardous materials
Hazardous materials in electronic equipment often include lead, which is used in the
solder joints in electronics. CRT monitors contain phosphorous. Both of these materials
must be disposed of in accordance with OSHA and EPA guidelines. The MSDS lists
any hazardous materials in equipment, along with measures to take when disposing of
it.
2223
CRTs contain phosphorous and sometimes mercury switches, as well as lead and other
precious metals, in their components. These cant be thrown into the landfill, so they
need to be disposed of properly. When sending CRTs for recycling, be sure that theyre
packaged so that the screen doesnt break. Most recyclers cant reclaim anything from a
CRT with a broken screen.
The computer itself has many components that can be reclaimed. Precious metals can
often be extracted from circuit boards. The case can be recycled. The metals can then be
sold back to manufacturers for use in new products. If youre disposing of a storage
disk, its important that you physically destroy the area where data is stored. Even if you
use software to erase the disk, your data could be retrieved by a savvy thief.
There are companies that specialize in the disposal of electronic and computer
equipment. They sort the equipment by type and then begin manually dismantling the
equipment. They divide it into plastic, metal, and electronic components and CRTs. The
electronics boards are sent on for recapturing precious metals. A breakdown of the
materials found in one ton of electronics boards can be found at
www.thegreenpc.com/the.htm.
Reusing equipment
The first choice when your computer equipment no longer meets your needs should be
to donate the equipment to an organization that can use it. This might be a local school
or other charitable organization. Many PC recyclers attempt to send usable equipment
back out for use rather than dismantling it for materials reclamation.
Methods of disposal
Some municipalities offer local electronic-equipment recycling services. These might be
available year round or offered periodically. Theres often a small fee for disposing of
the equipment. Considering the amount of manual labor involved in recycling these
materials, the fees arent exorbitant.
If no local service is offered, you can check the Web for recyclers. If you have pallet
upon pallet of equipment, a recycler might be able to pick it up from you or arrange to
have it picked up.
D-1:
Heres how
1 Open your Web browser
2 Search for computer recyclers
3 Determine if the recycler you find
offers equipment for reuse
4 Determine if the organization
recycles other electronic
components or batteries
5 Determine how to get the
equipment to the recycler
When youre done, close the
browser window
Heres why
Youll locate a computer recycler on the Web.
2225
In this topic, you identified safety issues and hazards in the computer environment. You
examined office hazards, including floor surfaces, fire safety, electrical safety, and air
quality. You also examined computer hazards, including physical and electromagnetic
hazards. Next, you examined high-voltage interference sources and the need to be
careful when working around high-voltage equipment. Finally, you learned about
MSDSs and why theyre needed, and you examined some examples.
Topic B
In this topic, you identified the preventative maintenance tasks you should complete
on your computer equipment and peripherals, such as printers, keyboards, and mice, to
keep them functioning properly. You examined the different types of cleaning
materials designed specifically for use on sensitive computer electronic components.
Topic C
In this topic, you identified ways to avoid injury and strain, often referred to as a
repetitive stress injury (RSI), when working with computers. You examined ways to
make a users workstation comfortable and to alleviate as much stress as possible to the
back, arms, wrists, and neck.
Topic D
In this topic, you identified the proper methods for disposing of computer equipment.
You identified why electronics and computer equipment cant be sent to a landfill. You
also identified ways of recycling or reusing the equipment.
Review questions
1 What type of fire extinguisher should you keep handy for computer fires?
A Class A
B Class B
C Class C
D Class D
2 What type of fire extinguishing substance interrupts the chemical reaction of
burning materials?
A CO2
B Dry chemicals
C Halon
D Water
3 True or false? Air-quality safety measures are for the benefit of computer users
only.
False. Sensitive computer equipment can be damaged by air pollutants such as cigarette smoke.
4 True or false? Any vacuum cleaner can be used to pick up spilled toner.
False. You should clean up spilled toner with a vacuum specially designed to clean up material
this small. Other vacuums can put the dust particles into the air or let the toner through the bag
onto the motor, where the toner can melt onto it.
5 True or false? Only specially trained technicians should attempt to repair problems
inside a CRT or power supply.
True
2227
14 Most liquid cleaning compounds for computer equipment are based on which of the
following?
A Alcohol
B Ammonia
C Mist in the form of compressed air
D Water
15 Which of the MSDS hazard ratings is least hazardous?
A 0
B 1
C 2
D 3
E 4
16 Which MSDS personal protection rating recommends goggles, gloves, and other
protective wear?
A Rating A
B Rating B
C Rating C
D Rating D
17 When youre properly setting up a users workstation, the angle of the users
forearm to his body should be approximately what?
A 10 degrees
B 45 degrees
C 90 degrees
D 180 degrees
18 True or false? Laptops are meant to be used on your lap.
False. Laptops are hot, particularly if they are placed on your lap. Components can overheat due
to the lack of airflow through the underside openings, and users can get burned when the laptop
is placed on their laps.
19 True or false? Batteries, toner cartridges, and ink cartridges can be disposed of in
landfills without any consequences.
False. Many batteries contain heavy metals that cant be sent to the landfill. Batteries in the
equipment might contain nickel, mercury, or cadmium. Toners are usually a mixture of plastic
resin, iron powder, and carbon black. Chemicals in the toner cartridges can contaminate the
environment. Ink cartridges arent usually as toxic as toner cartridges, but they still contain
electronic and metal components that can be reclaimed.
A1
Appendix A
The Open Systems Interconnection model
This appendix covers these additional topics:
A Describe the layers of the Open Systems
A2
A3
A4
B1
Appendix B
System cases
This appendix covers these additional topics:
A Describe the various types of system cases.
B2
Computer cases enclose a computers components. Cases help protect sensitive parts
and keep dangerous componentsthose that get hot or could give electrical shocks
out of reach. A case also packages the various components into a single unit that can be
moved about easily. Most cases enclose the motherboard, power supply, disk drives,
expansion cards, and so forth. A few cases, especially those from non-Windows-based
personal computers, also encase the monitor. A notebook computers case encloses
everything, though you can typically also use external devices, such as mice and
keyboards, with notebooks.
The following table describes the common form factors for computer cases.
Form factor
Description
Desktop
Once the most popular form factor, but rare today. The case was designed
to lie horizontally on a desk, with the monitor sitting atop it. Floppy and
CD drives were mounted horizontally so they would work correctly in a
case in this orientation.
Tower
Mid-tower
A smaller version of the tower style case. Dimensions are in the range of
18" tall by 8" wide by 18" deep.
Mini-tower
A still smaller version of the tower case. Dimensions are in the range of 16"
tall by 8" wide by 16" deep or smaller.
A small case, more cube-shaped than a typical tower case. This case style
was introduced many years ago, but is regaining favor among some users
and manufacturers. Dimensions are in the range of 8" tall by 12" wide by 8"
deep or smaller.
C1
Appendix C
Binary and hexadecimal numbering
This appendix covers these additional topics:
A Understanding the binary and hexadecimal
numbering systems.
C2
As a computer support technician, youll sometimes need to interact with the computer
by using numbers or symbols that the computer can understand. To do so, youll
sometimes need to enter numerical values using a numbering system that the computer
can interpret.
Numbering systems
A numbering system is a method of recording numbers. It follows a particular paradigm
for recognizing and manipulating numerical values.
Numbering systems define a limited set of symbols with which you can represent the
individual digits of a number. Numbering systems also define the concept of positions
or places, which are the means by which you can construct numbers larger than the
base.
The numbering systems base is the number of digits available. For example, in the
decimal or base-10 numbering system, there are ten digits with which we can construct
any number.
To construct numbers larger than ten digits allow, you must add digits. All the digits of
a number are written next to each other, with the position or place of each digit
representing the base raised to the digit position minus one.
Base-10 numbering
For example, in the decimal system, the first place (the rightmost) represents multiples
of 10 raised to the zero power. These are the single-digit values. The second place
represents multiples of 10 raised to the first power, or multiples of 10.
In the base-10 system, the places are:
, 1000 (or 103), 100 (or 102) , 10 (or 101) , 1 (or 100)
The number 23 is thus represented by two tens plus three ones.
2 * 101 + 3 * 100 = 20 + 3 = 23
Other numbering systems use different bases and places.
The following table provides a quick overview of how numbers larger than a single digit
are constructed from powers of 10. The powers of 10 are sometimes called places, as
in the ones place or the tens place.
Number
10 (or 101)
1 (or 100)
23
287
C3
16 (or 24)
8 (or 23)
4 (or 22)
2 (or 21)
1 (or 20)
14
31
As you can see, many places are required to represent even small numbers when using
the binary system.
Computers are constructed of millions of tiny switches. These switches can be either on
or off. Thus, the binary system is well-suited for computers. In fact, everything that a
computer works with or does has a representation as a binary digit.
Binary notation
Often, context makes it clear whether youre working with binary or decimal numbers.
Sometimes, though, you must take extra care to be clear which youre using.
One binary notation style includes a subscript 2 following the number. Thus, you would
be able to know that 102 is the binary number representing two, not the decimal number
10.
Another notation style involves writing the decimal digits in groups of four or eight
digits, with zeros added as needed on the left to make equal groups. For example, you
would write the binary number 10000000000 (1024 in base 10) as 00000100 00000000.
Conversion from base 10
A useful trick for converting base-10 numbers to binary is to construct a table like the
following one. Write the base-10 number on the left. Then, starting with the leftmost
binary place, put a 1 in each column, if that value is smaller than the number at the left.
Then subtract the number in the column from the number at the left. This is your new
base number, and you can move on to the next column; otherwise, put a 0 in the
column.
# to convert
1024
512
256
128
64
32
16
C4
16 (or 161)
1 (or 160)
15
17
453
1024
62331
Even very large numbers can be represented with just a few hexadecimal digits.
Hex numbering is often used with computers because each hex digit compactly
represents four binary digits. Thus, instead of writing 11111111 to represent the number
255, you can simply write FF.
Hex notation
When you see a number containing the letters A through F, it should be obvious that
youre looking at a hexadecimal number. For numbers that dont include letters, you
need to include a clue that youre representing a hex value.
Matching the other notations, you can include a subscript 16 following the number to
indicate that it is a hexadecimal number. For example, you might write 1116 to represent
decimal 17 in hex.
The more common technique is to precede the number with a zero and a lowercase x.
Thus, the hex equivalent of decimal 1024 would be written 0x400.
D1
Appendix D
CompTIA A+ acronyms
This appendix covers the following
information:
A Acronyms and abbreviations appearing on
D2
The following is a list of acronyms and abbreviations that appear on the CompTIA A+
exams covering 2009 objectives. Candidates are encouraged to review the complete list
and attain a working knowledge of all listed items as part of a comprehensive exam
preparation program. Relevant exams include:
CompTIA A+ Essentials, 220-701, version 2.0
CompTIA A+ Practical Application, 220-702, version 2.0
CompTIA A+ Acronyms. Copyright 2008 by CompTIA. All rights reserved.
Acronym
Spelled out
AC
alternating current
ACL
ACPI
ACT
activity
ADF
ADSL
AGP
AMD
APIPA
APM
ARP
ASR
ATA
ATAPI
ATM
ATX
BHO
BIOS
BNC
BTX
CD
compact disc
CompTIA A+ acronyms
Acronym
Spelled out
CD-ROM
CD-RW
compact disc-rewritable
CDFS
CFS
CMOS
COMx
CPU
CRT
cathode-ray tube
DAC
DB-25
DB-9
DC
direct current
DDOS
DDR
double data-rate
DDR RAM
DDR SDRAM
DFS
DHCP
DIMM
DIN
DIP
DLT
DLP
DMA
DMZ
demilitarized zone
DNS
DOS
denial of service
D3
D4
Spelled out
DRAM
DSL
DVD
DVD-RAM
DVD-ROM
DVD-R
DVD-RW
DVI
ECC
ECP
EEPROM
EFS
EIDE
EMI
electromagnetic interference
EMP
electromagnetic pulse
EPROM
EPP
ERD
ESD
electrostatic discharge
EVGA
EVDO
FAT
FAT12
FAT16
FAT32
FDD
CompTIA A+ acronyms
Acronym
Spelled out
Fn
FPM
fast page-mode
FRU
FSB
FTP
FQDN
Gb
gigabit
GB
gigabyte
GDI
GHz
gigahertz
GUI
GPS
GSM
HAL
HCL
HDD
HDMi
HPFS
HTML
HTTP
HTTPS
I/O
input/output
ICMP
ICR
IDE
IDS
IEEE
D5
D6
Spelled out
IIS
IMAP
IP
internet protocol
IPCONFIG
IPP
IPSEC
IPX
IPX/SPX
IR
infrared
IrDA
IRQ
interrupt request
ISA
ISDN
ISO
ISP
JBOD
Kb
kilobit
KB
LAN
LBA
LC
Lucent connector
LCD
LDAP
LED
Li-on
lithium-ion
LPD/LPR
LPT
CompTIA A+ acronyms
Acronym
Spelled out
LPT1
LVD
MAC
MAPI
MAU
Mb
megabit
MB
megabyte
MBR
MBSA
MFD
multi-function device
MFP
multi-function product
MHz
megahertz
MicroDIMM
MIDI
MIME
MMC
MMX
multimedia extensions
MP3
MP4
MPEG
MSCONFIG
Microsoft configuration
MSDS
MUI
NAC
NAS
network-attached storage
D7
D8
Spelled out
NAT
NetBIOS
NetBEUI
NFS
NIC
NiCd
nickel cadmium
NiMH
NLX
NNTP
NTFS
NTLDR
NTP
OCR
ODBC
OEM
OS
operating system
PAN
PATA
PC
personal computer
PCI
PCIe
PCIX
PCL
PCMCIA
PDA
PGA
PGA2
CompTIA A+ acronyms
Acronym
Spelled out
PIN
PKI
PnP
POP3
POST
POTS
PPP
point-to-point protocol
PPTP
PRI
PROM
PS/2
PSTN
PSU
PVC
PXE
QoS
quality of service
RAID
RAM
RAS
RDRAM
RDP
RF
radio frequency
RFI
RGB
RIMM
RIP
RIS
RISC
D9
D10
Spelled out
RJ
registered jack
RJ-11
RJ-45
RMA
ROM
RS-232 or
RS-232C
RTC
real-time clock
SAN
SATA
SC
subscription channel
SCP
SCSI
SCSI ID
SD card
SDRAM
SEC
SFC
SGRAM
SIMM
SLI
S.M.A.R.T.
SMB
SMTP
SNMP
SoDIMM
SOHO
CompTIA A+ acronyms
Acronym
Spelled out
SP
service pack
SP1
service pack 1
SP2
service pack 2
SP3
service pack 3
SP4
service pack 4
SPDIF
SPGA
SPX
SRAM
SSH
secure shell
SSID
SSL
ST
straight tip
STP
SVGA
SXGA
TB
terabyte
TCP
TCP/IP
TDR
TFTP
TPM
UAC
UART
UDF
UDMA
UDP
D11
D12
Spelled out
UNC
UPS
URL
USB
USMT
UTP
UXGA
VESA
VFAT
VGA
VoIP
VPN
VRAM
WAN
WAP
WEP
WIFI
wireless fidelity
WINS
WLAN
WPA
WUXGA
XGA
ZIF
zero-insertion-force
ZIP
E1
Appendix E
Certification exam objectives map
This appendix covers these additional topics:
A CompTIA A+ Essentials (2009 Edition)
E2
This section lists all CompTIA A+ Essentials (2009 Edition) exam version 2.0
objectives and indicates where each objective is covered in conceptual explanations,
activities, or both.
1.0 Hardware
Objective
1.1
Conceptual
information
Supporting
activities
FDD
HDD
B-1
B-1
C-1, C-2
Tape drive
D-5
D-1
D-1
ATX / BTX
Unit 4, Topic C
C-1
micro ATX
Unit 4, Topic C
C-1
NLX
Unit 4, Topic C
C-1
I/O interfaces
Unit 4, Topic C
Unit 7, Topic A
C-1
A-1A-5
Sound
Unit 7, Topic B
Unit 8, Topic B
Unit 9, Topic E
B-1
B-1, B-2
E-1, E-2
Video
Unit 7, Topic B
Unit 8, Topic A
Unit 9, Topic E
B-1, B-2
A-1, A-2
E-2
Unit 9, Topic C
Unit 10, Topic A
C-1
A-1
Serial
Unit 9, Topic A
Unit 10, Topic A
A-1
A-1
Unit 9, Topic D
Unit 10, Topic A
D-1
A-1
Parallel
Unit 9, Topic A
Unit 10, Topic A
A-2
A-1
NIC
B-4
1.2
Conceptual
information
Supporting
activities
Unit 7, Topic A
Unit 8, Topic C
Unit 9, Topic A
Unit 13, Topic B
A-1
C-1
A-1
B-5
PS/2
Unit 9, Topic B
B-1
RIMM
Unit 6, Topic B
B-1
DIMM
Unit 6, Topic B
B-1
SODIMM
Unit 6, Topic B
B-1
SIMM
Unit 6, Topic B
B-1
Processor sockets
Unit 4, Topic A
A-2
Bus architecture
Unit 7, Topic A
A-1A-5
PCI
Unit 7, Topic B
B-1, B-2
AGP
Unit 7, Topic B
B-2
PCIe
Unit 7, Topic B
B-1, B-2
AMR
Unit 7, Topic A
Unit 8, Topic C
A-1
C-1
CNR
Unit 7, Topic A
Unit 8, Topic C
A-1
C-1
PCMCIA
C-1, C-2
IDE
A-1
EIDE
A-1
SATA, eSATA
A-1
B-4
Chipsets
Unit 4, Topic A
A-2
Unit 5, Topic A
A-1
POST
Unit 5, Topic B
B-1
CMOS battery
Unit 5, Topic A
A-3
Unit 4, Topic C
C-1
AC adapter
A-1
ATX proprietary
Unit 3, Topic B
B-1
Unit 3, Topic A
A-1
Unit 3, Topic B
B-2
Unit 3, Topic B
B-1
Memory slots
Bus slots
PATA
E3
E4
Conceptual
information
Supporting
activities
AMD
Unit 4, Topic A
A-1
Intel
Unit 4, Topic A
A-1
Hyperthreading
Unit 4, Topic A
A-1
Multi-core
Unit 4, Topic A
A-1
Dual core
Unit 4, Topic A
A-1
Triple core
Unit 4, Topic A
A-1
Quad core
Unit 4, Topic A
A-1
On-chip cache
Unit 4, Topic A
A-1
L1
Unit 4, Topic A
A-1
L2
Unit 4, Topic A
A-1
Unit 4, Topic A
A-1
Unit 2, Topic A
A-1
Heat sinks
Unit 4, Topic B
B-1
Unit 4, Topic B
B-1
Unit 4, Topic B
B-1
Thermal compound
Unit 4, Topic B
B-1
DRAM
Unit 6, Topic A
A-1
SRAM
Unit 6, Topic A
A-1
SDRAM
Unit 6, Topic A
A-1
Unit 6, Topic A
A-1
RAMBUS
Unit 6, Topic A
A-1
Unit 6, Topic B
B-1
Unit 6, Topic B
B-1
Unit 6, Topic B
B-1
Unit 6, Topic A
A-1
PC100
Unit 6, Topic A
A-1
PC133
Unit 6, Topic A
A-1
PC2700
Unit 6, Topic A
A-1
PC3200
Unit 6, Topic A
A-1
DDR3-1600
Unit 6, Topic A
A-1
DDR2-667
Unit 6, Topic A
A-1
1.5
1.6
Speed
Conceptual
information
Supporting
activities
A-1A-4
A-3A-4
Contrast ratio
A-3A-4
Native resolution
A-3A-4
VGA
Unit 8, Topic A
Unit 11, Topic A
A-1
A-2
HDMI
Unit 8, Topic A
A-1
S-Video
Unit 9, Topic E
E-2
Component / RGB
Unit 9, Topic E
E-2
Unit 8, Topic A
Unit 11, Topic A
A-1
A-4
Refresh rate
A-1A-4
Resolution
A-1A-4
Multi-monitor
IPA
Degauss
A-1, A-2
Connector types
Settings
1.8
E5
Unit 9, Topic A
Mouse
Unit 9, Topic B
Unit 9, Topic C
B-1, B-2
C-1
Keyboard
Unit 9, Topic B
Unit 9, Topic C
B-1, B-3
C-1
Unit 9, Topic B
Unit 9, Topic C
C-1
Unit 9, Topic C
Unit 9, Topic D
Unit 9, Topic E
Unit 11, Topic B
C-1
D-1
E-1, E-2
B-1, B-2
Biometric devices
Unit 9, Topic C
Unit 20, Topic C
C-1
Touch screen
Unit 9, Topic C
Unit 11, Topic A
C-1
A-3
KVM switch
Unit 9, Topic B
Unit 9, Topic C
B-4
C-1
E6
Conceptual
information
Supporting
activities
PCI
Unit 7, Topic B
B-1, B-2
PCIe
Unit 7, Topic B
B-1, B-2
AGP
Unit 7, Topic B
B-2
Sound card
Unit 8, Topic B
Unit 9, Topic E
B-1
E-1
TV tuner cards
Unit 9, Topic E
E-2
Capture cards
Unit 9, Topic E
E-2
SCSI
A-1
Serial
Unit 9, Topic A
Unit 10, Topic A
A-1
A-1
USB
Unit 9, Topic C
Unit 10, Topic A
A-1
Unit 9, Topic A
Unit 10, Topic A
A-2
A-1
NIC
B-4
C-2
Modem
Unit 8, Topic C
Unit 9, Topic A
Unit 13, Topic B
Unit 16, Topic C
C-2
A-1
B-5
C-2
PCMCIA cards
C-1
C-1
Docking station
C-4
Bluetooth
A-2
Infrared
Multimedia
I/O
Parallel
Communication
1.10
Communication connections
A-2
Cellular WAN
A-2
Ethernet
B-1, B-2
A-1, A-2
E7
Conceptual
information
Supporting
activities
B-7, B-8
A-1
Stylus / digitizer
A-1
Function keys
A-1
A-1
Unit 9, Topic A
Unit 9, Topic C
Unit 9, Topic D
Unit 12, Topic B
Unit 12, Topic C
A-2
Laser
A-3
Inkjet
A-2
Thermal
A-4
Impact
A-1
B-2
B-2
Consumables
C-3
Batteries
Input devices
1.11
D-1
B-2
C-1, C-2
E8
Conceptual
information
Supporting
activities
Unit 1, Topic A
A-1, A-2
Unit 1, Topic A
A-1, A-2
Unit 1, Topic A
A-1, A-2
Unit 1, Topic A
A-1
Unit 1, Topic A
A-1
Unit 1, Topic A
A-1
Unit 1, Topic A
A-1, A-2
Unit 1, Topic A
A-1
Unit 1, Topic A
A-1
2.2
B-1
System lockup
B-1
Input/output device
B-1
Application install
B-1
Start or load
B-1
D-1
D-1
Excessive heat
Unit 4, Topic D
Unit 16, Topic D
D-1
D-1
Noise
Unit 3, Topic C
Unit 4, Topic D
Unit 10, Topic F
Unit 12, Topic D
C-3
D-1
F-1
D-1
Hardware-related symptoms
Conceptual
information
Supporting
activities
Unit 4, Topic D
Unit 10, Topic F
D-1
F-1
Unit 3, Topic C
Unit 4, Topic D
Unit 10, Topic F
Unit 12, Topic D
Unit 16, Topic D
C-3
D-1
F-1
D-1
D-1, D-2
Alerts
Unit 4, Topic D
Unit 10, Topic F
Unit 12, Topic D
D-1
F-1
D-1
F-1
D-1
Unit 1, Topic A
A-2
Unit 1, Topic A
A-2
Training materials
Unit 1, Topic A
A-2
C-1
Print spooler
B-1
C-1
B-2
C-1
B-2
2.3
E9
E10
Conceptual
information
Supporting
activities
Power conditions
D-2
Video
D-1
Keyboard
D-1
Pointer
D-1
Stylus
D-1
D-1
D-2
D-1
D-1
D-1
D-1
D-1
D-1
A-1, A-2
B-1
Driver
Unit 8, Topic D
Unit 12, Topic B
Unit 21, Topic A
D-1
B-2
A-5
Firmware
Unit 5, Topic A
A-2
OS
A-4
Security
A-6
Defrag
E-4, E-5
ScanDisk
E-2
Check disk
E-3
Startup programs
B-3
Compressed air
B-1
Lint-free cloth
B-2
Methods
2.5
E11
Conceptual
information
Supporting
activities
B-2
Unit 3, Topic C
C-1
A-1, A-2
C-1, C-2
Backup procedures
C-1
E12
Conceptual
information
Supporting
activities
Unit 2, Topic A
A-1
Unit 2, Topic A
Unit 17, Topic A
Unit 20, Topic A
Unit 21, Topic A
A-2
A-3, A-4, A-5
A-7
A-1, A-2
B-1, B-2
A-2
3.2
Unit 2, Topic A
A-1
B-3
Unit 2, Topic A
Unit 17, Topic A
A-2, A-3
Unit 2, Topic A
A-2
Unit 2, Topic A
A-2
My Computer
Unit 2, Topic A
A-2
Control Panel
Unit 2, Topic A
Unit 2, Topic D
A-3
D-2
Unit 2, Topic A
Unit 2, Topic B
A-1A-5
Unit 2, Topic C
B-3
ping
A-3
B-3, B-5
ipconfig
A-2
B-3, B-4
Msconfig
B-3
Msinfo32
A-1, A-2
telnet
E13
Conceptual
information
Supporting
activities
Dxdiag
A-3
Cmd
Unit 2, Topic A
Unit 14, Topic A
A-3
A-2, A-3
REGEDIT
Unit 2, Topic A
Unit 2, Topic D
A-3
D-2
Taskbar / systray
Unit 2, Topic A
A-2
Unit 2, Topic A
Unit 10, Topic B
Unit 17, Topic C
Unit 18, Topic A
Unit 18, Topic B
A-3
B-2, B-3
C-2, C-3
A-6, A-9, A-10
B-2, B-3, B-4
Unit 2, Topic A
A-3
Task Manager
Unit 2, Topic A
Unit 6, Topic D
Unit 18, Topic A
A-3
D-1
A-4A-8
Start Menu
Unit 2, Topic A
A-2, A-3
B-2
A-3
Create folders
Unit 2, Topic B
B-4B-7
Unit 2, Topic B
B-1, B-3
Creation
Unit 2, Topic C
C-1, C-3
Extensions
Unit 2, Topic C
C-1
Attributes
Unit 2, Topic C
C-4, C-5
Permissions
Unit 2, Topic D
D-3
A-1, A-2
A-4
Network installation
A-4
A-4
Recovery CD
B-5
B-5
Administrative tools
Performance Monitor, Event Viewer, Services,
Computer Management
MMC
3.2
3.3
Files
E14
Conceptual
information
Supporting
activities
A-3
Network configuration
A-4
Repair install
B-5
Format drive
A-3
Partition
A-3
Start installation
A-4
Verify
A-2, A-5
A-5
Driver signing
A-6
Device Manager
3.3
Virtual memory
Unit 6, Topic D
D-2
Suspend
B-2
A-6, A-7, A-8
Wake on LAN
A-8
Sleep timers
Hibernate
B-2
A-6, A-7, A-8
Standby
B-2
A-6, A-7, A-8
C-3
A-1
Unit 5, Topic A
A-1
Unit 5, Topic B
B-2
Safe mode
B-2
C-3, C-4
B-5
B-5
B-5
Recovery console
B-5
3.4
Recovery options
E15
4.0 Networking
Objective
4.1
4.1
4.2
Conceptual
information
Supporting
activities
A-1, A-2
B-1, B-2
A-5
Status indicators
B-4
A-1, A-4
Full-duplex, half-duplex
A-3
A-1, A-2
A-5
B-7
LAN / WAN
C-2
A-1
A-2
A-1
Address conventions
A-1
Plenum / PVC
A-4
A-3, A-4
B-2
STP
A-3, A-4
B-2
Fiber
A-3, A-4
B-1
Coaxial cable
A-3, A-4
B-3
RJ45
B-2
RJ11
Unit 8, Topic C
Unit 13, Topic B
C-2
B-2
Connectors
E16
Conceptual
information
Supporting
activities
DSL
A-7
Cable
A-7
Satellite
A-7
Fiber
A-7
Dial-up
A-7
B-5
B-7, B-8
Wireless
A-6, A-7
A-6
WEP
WPA
SSID
MAC filtering
DHCP settings
B-2B-5
Bluetooth
A-6
Cellular
A-7
E17
5.0 Security
Objective
5.1
Conceptual
information
Supporting
activities
Encryption technologies
E-5
Software firewall
C-2
E-2, E-3
Port security
B-7
E-3
Exceptions
B-7
E-3
User name
A-1, A-2
Password
Biometrics
C-1
Smart cards
C-1
Compliance
E-6
Classifications
E-6
Social engineering
E-4
B-4, B-6
Viruses
Trojans
Worms
Spam
Spyware
D-1D-4
Adware
Grayware
Drive lock
C-2
Passwords
C-2
Intrusion detection
C-2
TPM
Authentication technologies
5.2
BIOS Security
Locking workstation
E18
Conceptual
information
Supporting
activities
Hardware
C-1, C-2
E-1, E-5
Operating system
A-1A-8
B-1B-3
D-2, D-3, D-4
E-2, E-3
C-1
Conceptual
information
Supporting
activities
ESD
Unit 3, Topic A
Unit 22, Topic A
A-3
A-2
EMI
A-2
A-1, A-2
Network interference
A-3
Magnets
Biometrics
Fingerprint scanner
RFI
Cordless phone interference
A-2
A-2
Unit 3, Topic A
Unit 22, Topic A
A-2
A-1
CRT
A-2
A-1
Power supply
Unit 3, Topic B
Unit 22, Topic A
B-2
A-1
Inverter
Unit 3, Topic C
C-1
Laser printers
C-3
A-1
Unit 3, Topic C
C-1
B-3
Cable management
A-1
A-1
Microwaves
Electrical safety
Conceptual
information
Supporting
activities
A-1
A-1
A-1
D-1
Unit 1, Topic B
B-1, B-2
Unit 1, Topic B
Unit 1, Topic B
Be culturally sensitive
Unit 1, Topic B
Be on time
Unit 1, Topic B
B-1
Unit 1, Topic B
B-1
Unit 1, Topic B
B-1
Personal calls
Unit 1, Topic B
B-1
Unit 1, Topic B
B-1
Personal interruptions
Unit 1, Topic B
B-1
Unit 1, Topic B
Unit 1, Topic B
Unit 1, Topic B
Unit 1, Topic B
Unit 1, Topic B
B-1, B-2
Unit 1, Topic B
B-1, B-2
Unit 1, Topic B
B-1, B-2
Unit 1, Topic B
B-1, B-4
Unit 1, Topic B
B-1, B-4
Unit 1, Topic B
B-1, B-4
Unit 1, Topic B
B-1, B-4
Unit 1, Topic B
B-1
Unit 1, Topic B
B-1
Physical safety
Heavy devices
Hot components
Environmental consider proper disposal procedures
6.2
E19
E20
This section lists all CompTIA A+ Practical Application (2009 Edition) exam version
2.0 objectives and indicates where each objective is covered in conceptual explanations,
activities, or both.
1.0 Hardware
Objective
Conceptual
information
Supporting
activities
B-1
SATA
B-1
PATA
B-1
Solid state
FDD
D-3
Optical drives
C-1
C-1
Removable
D-1
External
D-1
CD / DVD / RW / Blu-Ray
Motherboards
Jumper settings
Unit 4, Topic A
Unit 4, Topic C
C-2
CMOS battery
Unit 5, Topic A
A-3
Unit 5, Topic A
A-1
Bus speeds
Unit 4, Topic A
A-2
Chipsets
Unit 4, Topic A
A-2
Firmware updates
Unit 6, Topic C
Unit 5, Topic A
A-1, A-2
Unit 4, Topic A
A-2
Unit 4, Topic C
C-1, C-2
Expansion slots
Unit 4, Topic C
C-1, C-2
Memory slots
Unit 4, Topic C
C-1, C-2
Unit 4, Topic C
C-1, C-2
I/O ports
Unit 4, Topic C
Socket types
Conceptual
information
Supporting
activities
Unit 8, Topic A
A-1, A-2
Unit 8, Topic B
B-2
Unit 8, Topic C
C-1, C-2
Unit 9, Topic A
A-1, A-2
Unit 9, Topic B
B-1
Unit 9, Topic C
C-1
Unit 9, Topic D
D-1
Unit 3, Topic B
B-1, B-2
Unit 3, Topic B
B-1
Output voltage
Unit 3, Topic B
B-1, B-2
Socket types
Unit 4, Topic A
A-2, A-3
Speed
Unit 4, Topic A
A-1, A-3
Number of cores
Unit 4, Topic A
A-1, A-3
Power consumption
Unit 4, Topic A
A-1, A-3
Cache
Unit 4, Topic A
A-1, A-3
Unit 4, Topic A
A-1, A-3
Unit 4, Topic A
A-1, A-3
Unit 6, Topic C
C-1, C-2
Power supplies
Processors
Memory
E21
E22
Conceptual
information
Supporting
activities
Adapter cards
Graphic cards
Unit 8, Topic A
A-2
Sound cards
Unit 8, Topic B
B-2
Storage controllers
A-1
B-1
B-4
eSATA cards
Unit 8, Topic A
A-1
FireWire
Unit 8, Topic A
A-1
USB
A-1
Parallel
Unit 8, Topic A
A-1
Serial
Unit 9, Topic A
A-1
I/O cards
Unit 8, Topic A
A-1
Unit 8, Topic A
A-1
Media reader
Unit 8, Topic A
A-1
Heat sinks
Unit 4, Topic B
B-1
Thermal compound
Unit 4, Topic B
B-1
CPU fans
Unit 4, Topic B
B-1
Case fans
Unit 4, Topic B
B-1, B-2
Cooling systems
F-1
SATA
F-1
PATA
F-1
Solid state
FDD
F-1
Optical drives
F-1
F-1
Removable
F-1
External
F-1
CD / DVD / RW / Blu-Ray
Conceptual
information
Supporting
activities
Motherboards
Jumper settings
Unit 4, Topic D
D-1
CMOS battery
Unit 5, Topic A
A-3
Unit 5, Topic B
B-3
Unit 5, Topic A
A-1
Unit 5, Topic B
B-3
Bus speeds
Unit 4, Topic D
D-1
Chipsets
Unit 4, Topic D
D-1
Firmware updates
Unit 4, Topic D
Unit 5, Topic A
A-3
Unit 5, Topic B
B-3
Socket types
Unit 4, Topic D
D-1
Expansion slots
Unit 4, Topic D
D-1
Memory slots
Unit 4, Topic D
D-1
Unit 4, Topic D
D-1
Unit 4, Topic D
D-1
Unit 3, Topic C
C-2, C-3
Unit 3, Topic C
C-3
Output voltage
Unit 3, Topic C
C-2, C-3
Socket types
Unit 4, Topic D
D-1
Speed
Unit 4, Topic D
D-1
Number of cores
Unit 4, Topic D
D-1
Power consumption
Unit 4, Topic D
D-1
Cache
Unit 4, Topic D
D-1
Unit 4, Topic D
D-1
Unit 4, Topic D
D-1
Unit 6, Topic E
E-1, E-2
Processors
Memory
E23
E24
Conceptual
information
Supporting
activities
Adapter cards
Graphic cards - memory
Unit 8, Topic D
D-2
Sound cards
Unit 8, Topic D
D-2
Storage controllers
Unit 8, Topic D
D-2
RAID cards
Unit 8, Topic D
D-2
eSATA cards
Unit 8, Topic D
D-2
Unit 8, Topic D
D-2
Unit 9, Topic F
F-1
Unit 8, Topic D
D-2
Unit 9, Topic F
F-1
Unit 8, Topic D
D-2
Unit 9, Topic F
F-1
Unit 8, Topic D
D-2
Unit 9, Topic F
F-1
Unit 8, Topic D
D-2
Unit 8, Topic D
D-2
Media reader
Unit 8, Topic D
D-2
I/O cards
FireWire
USB
Parallel
Serial
Wired and wireless network cards
1.2 Given a scenario, detect problems, troubleshoot, and
repair/replace personal computer components (continued)
Cooling systems
Heat sinks
Unit 4, Topic B
Thermal compound
Unit 4, Topic B
CPU fans
Unit 4, Topic B
Case fans
Unit 4, Topic B
B-2
C-1, C-2
D-1, D-2
Unit 6, Topic C
C-2
Unit 6, Topic E
E-1
C-1, C-2
D-1
Conceptual
information
E25
Supporting
activities
D-1
D-1
D-1
D-1
C-1, C-2
D-1
C-1, C-2
Multimeter
Unit 3, Topic C
C-2
Unit 3, Topic C
C-2
Unit 3, Topic C
C-1
C-2, C-3
A-1
B-1
A-1
B-1
Loopback plugs
Unit 9, Topic F
F-1
Unit 3, Topic A
A-2, A-3
Extension magnet
C-3
D-1
Organize parts
Refer to manufacturer documentation
Use appropriate hand tools
Recognize internal laptop expansion slot types
Cable tester
E26
Conceptual
information
Supporting
activities
D-1
Blank paper
D-1
Error codes
D-1
Out-of-memory error
D-1
D-1
Garbage printout
D-1
Ghosted image
D-1
No connectivity
D-1
D-1
Replace fuser
D-1
Replace drum
D-1
D-1
Power cycle
D-1
C-3
D-1
Set IP on printer
D-1
Clean printer
C-3
D-1
Issue resolution
E27
Conceptual
information
Supporting
activities
B-3
DIR
Unit 2, Topic B
B-3
E-3
EDIT
Unit 2, Topic C
C-1, C-2
Unit 2, Topic B
B-7
XCOPY
Unit 2, Topic B
B-7
FORMAT
A-2
B-4
A-3
B-3
MD / CD / RD
Unit 2, Topic B
NET
C-3
TRACERT
B-6
NSLOOKUP
B-6
[command name] /?
Unit 2, Topic B
B-2
SFC
B-4
PING (-t l)
Unit 2, Topic B
Unit 2, Topic B
Unit 2, Topic B
Fonts
Unit 2, Topic B
Temporary files
Unit 2, Topic B
Program files
Unit 2, Topic B
Unit 2, Topic B
E28
Conceptual
information
Supporting
activities
E-4, E-5
NTBACKUP
C-1, C-2
Check Disk
E-3
B-2
Mount points
B-3
Mounting a drive
B-3
B-2
Disk Manager
Flash drives
Drive status
Foreign drive
B-2
Healthy
B-2
Formatting
B-2
Active unallocated
B-2
Failed
B-2
Dynamic
B-2
Offline
B-2
Online
B-2
B-3
Event Viewer
A-9, A-10
Computer Management
Unit 2, Topic A
A-3
Unit 7, Topic A
A-2A-5
B-2
Services
C-2, C-3
Performance Monitor
B-3, B-4
System monitor
Administrative tools
Conceptual
information
E29
Supporting
activities
A-5
Disable
A-5
Warnings
A-5
Indicators
A-5
Process list
A-5
Resource usage
Unit 6, Topic D
D-1
A-5, A-7
Process priority
A-5
Termination
System Information
A-1, A-2
System restore
C-3, C-4
D-1D-4
Task Scheduler
B-1, B-2
A-1
D-1
D-1
D-1
Auto-restart errors
B-1
B-1
System lockup
B-1
B-1
B-1
B-1
Task Manager
E30
Conceptual
information
Supporting
activities
B-1
B-1
Missing NTLDR
B-1
B-1
B-1
A-9, A-10
Aero settings
A-4
Indexing settings
A-2
UAC
A-7
Sidebar settings
A-3, A-5
B-2, B-3
Background processes
B-1, B-3
Startup
E31
3.0 Networking
Objective
Conceptual
information
Supporting
activities
Subnet mask
DNS
A-2, A-3
A-2, A-3
B-7
Characteristics of TCP/IP
Loopback addresses
Automatic IP addressing
B-5
A-3
A-4
B-7
A-4
B-7
A-4
B-7
A-6
B-7
A-6
B-5
A-6
B-7
A-6
B-7
E32
Conceptual
information
Supporting
activities
B-7
IP addresses
B-5
Exceptions
B-7
Programs
B-7
A-4
B-3
Tracert
B-6
Nslookup
B-6
Netstat
B-3
Net use
C-1
Net /?
C-1
Ipconfig
A-2
B-4
telnet
B-3, B-7
SSH
A-6
B-3, B-7
A-6
B-3, B-7
A-6
B-3, B-7
B-7
Program filters
B-7
Conceptual
information
Supporting
activities
A-7
B-5
DSL
A-7
Cable
A-7
Satellite
A-7
ISDN
A-7
Wireless
A-6
Broadband
All 802.11
WEP
B-3, B-4
WPA
B-3, B-4
SSID
B-5
MAC filtering
B-5
DHCP settings
B-3, B-4
C-2
Disable DHCP
B-5
Use static IP
B-5
B-5
B-5
MAC filtering
B-5
B-5
Update firmware
B-5
Firewall
C-2
A-5
B-4
A-6
Cellular
A-7
E33
C-2
E-2, E-3
E34
Conceptual
information
Supporting
activities
E-2, E-3
E-2, E-3
C-1
A-6
Physical installation
Wireless router placement
4.0 Security
Objective
Conceptual
information
Supporting
activities
D-4
Unit 20 IPA
D-4
D-1
D-2
D-2
Schedule scans
D-2
D-2
D-2
Boot environment
D-2
Conceptual
information
Supporting
activities
A-1A-6
A-7
A-8
A-8
File attributes
Unit 6, Topic C
C-4, C-5
A-8
Permission propagation
A-8
Inheritance
A-8
B-1B-3
User authentication
A-1A-8
System
BIOS security
Unit 5, Topic A
Unit 20, Topic C
E35
C-2
Drive lock
Passwords
Unit 5, Topic A
A-1
Intrusion detection
Unit 5, Topic A
A-1
TPM
E36
S1
Course summary
S2
Unit summaries
Unit 1
In this unit, you learned about the CompTIA A+ troubleshooting methodology you
can apply to hardware and software problems you encounter with personal computers.
You also learned how to maintain professionalism and communicate appropriately
when interacting with users.
Unit 2
In this unit, you learned the fundamental concepts and features of client operating
systems, including Windows 7, Windows Vista, Windows XP, Windows 2000, Mac OS
X Snow Leopard, and Linux. You also learned how to manage folders and files on a
Windows-based client computer.
Unit 3
In this unit, you learned how to work safely with electricity and computer power
systems. Following ESD safe practices, you examined power supplies and connectors,
and installed a new power supply in a PC. You also compared types of power
conditioning equipment and troubleshot faulty power supplies.
Unit 4
In this unit, you learned the fundamental concepts of CPUs and motherboards. You
classified CPUs according to their specifications, and identified the packaging options
and related slot and socket technologies used in CPUs. You installed a motherboard.
You also troubleshot motherboard- and CPU-related problems. You also learned about
the different technologies used to cool CPUs in a PC.
Unit 5
In this unit, you accessed the system BIOS to make hardware configuration changes.
You learned how to flash the system BIOS to install an update. You also identified the
stages in the POST and boot processes.
Unit 6
In this unit, you differentiated between the different types of memory chips and
packages, installed RAM into a system, and troubleshot memory problems. You
learned how to monitor memory usage and change the size of the Windows page file.
Unit 7
In this unit, you defined bus structures and learned how buses use interrupts, IRQs, I/O
addresses, DMA, and base memory addresses. You examined the features and functions
of the PCI bus.
Course summary
S3
Unit 8
In this unit, you learned about expansion cards for drive interfaces, such as IDE and
SCSI; video adapters; sound cards; and modems. You examined the components of a
sound card and the connections on a modem. You also installed expansion adapters,
including video and sound cards. You then learned how to update hardware device
drivers, and you troubleshoot expansion cards.
Unit 9
In this unit, you identified the different types of ports, connectors, and cables
including serial, parallel, PS/2, USB, IEEE 1394 (FireWire), and multimedia, and
troubleshoot ports, connectors, and cables.
Unit 10
In this unit, you learned the fundamental concepts about different types of data storage
devicesincluding hard drives (IDE and SCSI), optical drives (CD and DVD), and
removable storage devices such as floppy drives and USB flash drives. You learned
about file systems, partitions, the Disk Management utility, and RAID levels. You
installed hard drives, optical drives, and floppy drives, and then you troubleshot
drive-related problems.
Unit 11
In this unit, you learned how to select and use video and image input devices,
including CRT and LCD displays, and digital and Web cameras.
Unit 12
In this unit, you distinguished between the different printing technologies and
processes. You also installed, optimized, and performed maintenance on a local
printer. You performed routine maintenance tasks on inkjet and laser printers. You
also learned how to troubleshoot common problems that affect printing, including
problems with software, the operating system, and the printer itself.
Unit 13
In this unit, you learned how to connect computers to form a network. You identified
the components that make up a networkboth wired and wirelessand described the
various network standards that can be used to create a network. You identified
common connection methods for SOHO networks.
Unit 14
In this unit, you learned how to establish connectivity, both wired and wireless,
between networked computers and the Internet. You learned how to use the TCP/IP
protocol and utilities to establish communication between network nodes.
Unit 15
In this unit, you learned the basic tools needed to diagnose network problems. You
learned how to use the TCP/IP protocol and utilities to troubleshoot client-side
network communication problems.
S4
Course summary
S5
S6
G1
Glossary
802.11a
An improved version of the original Wi-Fi 802.11b
technology, based on the same IEEE 802 standard.
Aspect ratio
The relationship between the horizontal size and
the vertical size of the screen.
AC (alternating current)
Current that flows repeatedly back and forth
through the circuit at a constantly varying voltage level.
Authentication
The process by which your identity is validated
against a database that contains your account.
Active Directory
Microsofts directory service, included with
Windows servers, that provides a single point of
administration and storage for user, group, and
computer objects.
Backbone
The main network cable to which other network
segments connect.
Active matrix
Flat-panel monitor technology that uses TFT to
produce sharp images.
Address bus
The bus that transmits memory addresses between
the CPU and RAM.
ADRAM (Asynchronous DRAM)
Memory that isnt synchronized to the system
clock.
Adware
Software that displays advertisements, which might
or might not be targeted to your interests.
AGP (Advanced Graphics Port)
A video port used with Pentium-based computers.
Amp (ampere)
The unit of measure of amperage (the strength of a
current of electricity).
Anycast address
A new, unique type of IPv6 address that is a cross
between IPv4 unicast and multicast addressing. An
anycast address identifies a group of interfaces,
typically on separate nodes. Packets sent to an anycast
address are delivered to the nearest interface as
identified by the routing protocols distance
measurement.
APIPA (Automatic Private IP Addressing)
An IPv4 address from the network 169.254.0.0 that
is self-assigned by a Windows computer if it cant
contact a DHCP server.
AppleTalk
A routable network protocol supported by Apple
Macintosh computers.
Bandwidth
The amount of data that can travel over a
communication line or wireless connection in a given
amount of time.
Bank
A group of memory slots. You must fill all of the
slots within a bank when installing memory. Typically,
you must also use the same type and speed of memory
within a bank.
Base memory addresses
A range of addresses that designate an area of
memory in which extensions to the BIOS are stored.
Basic partition
A standard, or classic, partition. Compare to
dynamic partition.
Baud
A measure of signal changes per second. The baud
rate is analogous to the frequency of an analog wave.
Binary
The base-2 numbering system.
Binary file
A file that can be read by a computer, but not by
humans.
Biometric
A type of security device that authenticates
(identifies) a user by examining a biological trait, such
as a fingerprint, retinal vein pattern, and so forth.
BIOS (Basic Input/Output System)
The computers firmwarea set of software
instructions that are stored on a chip on the
motherboard and that enable basic computer functions,
such as getting input from the keyboard and mouse.
G2
Bluetooth
A standard for short-range wireless communication
and data synchronization between devices.
Color depth
A value that specifies how many bits are used to
describe the color of a single pixel on a monitor.
COM ports
Serial ports, which are named COM1, COM2, and
so forth.
Brightness
The measurement in candelas per square meter
(cd/m2) of the light produced by an LCD monitor.
Command-line utility
In Windows, a program that enables the user to
interact with the operating system through a nongraphical user interface.
Bus
A communication pathway within a computer.
Cable modem
A device that connects a LAN to an ISP via the
cable television connection.
Card Services
An API that enables the sharing of device drivers
and other software by PC Cards and sockets.
CardBus
A PC Card bus that provides 32-bit bus mastering.
Central gateway
A connection device between a LAN and the
Internet.
Chipset
One or more chips, packaged into a single unit and
sold together, that perform a set of functions in a
computer.
Circuit
A path from the electrical source through
intervening components and back to ground.
CIS (Card Information Structure)
One of the software layers in the PC Card
specification. It provides a method of data organization
and data-recording-format compatibility for a variety of
PC Cards.
Client/server network
A network in which a server controls which
resources on the LAN are shared by clients and who
can access these resources.
Clusters
Logical collections of one or more sectors. Data
storage is managed at the cluster level, rather than the
sector level.
CMOS
An area of memory that stores BIOS configuration
information.
Coax (coaxial) cable
Cable that contains a layer of braided wire or foil
between the core and the outside insulating layer.
Compact Flash
A flash memory card used in portable devices,
especially digital cameras. Roughly the size of a book
of matches.
Compression
The use of an algorithm to make data take up less
space.
Computer Management console
A group of tools you can use to manage the local
computer or a remote computer in Windows Vista,
Windows XP, and Windows 2000 Professional.
Conductor
A material that permits the flow of electricity.
Contrast ratio
The ratio between a monitors brightest white and
darkest black.
Control Panel
A group of utilities, called applets, that you can use
to control your computers system settings in Windows
Vista, Windows XP, and Windows 2000 Professional.
Controller
The adapter board that plugs into a PCs expansion
slot and is used to interface with a hard drive or other
storage device.
Cooling fins
Metal protrusions that dissipate heat through
convection.
CPU (central processing unit)
A computer chip that processes instructions,
manipulates data, and controls the interactions of the
other circuits in the computer.
Crosstalk
Interference that occurs when two wires are
running parallel to each other, and one wire carries a
signal intended for the other wire.
CRT (cathode ray tube)
A monitor that use three electron beamsred,
green, and blueto produce images.
Glossary
Current
A measure of the flow of electrons past a given
point; measured in amps, or amperes.
Cylinder
The logical collection of all of the tracks at a given
distance from the axis.
CYMK
Cyan, yellow, magenta, and black; the colors used
in inkjet printers.
Data bus
The bus that transfers data between the CPU and
RAM.
Daughter board
A circuit board that connects to another circuit
board (sometimes a motherboard) to provide additional
functions or assist with its functions.
DC (direct current)
Current that flows in a single direction at a constant
voltage through a circuit.
Decimal
The normal base-10 numbering system.
Default gateway
A router on a TCP/IP network.
Defragging
Defragmenting a disk, optimizing file access
speeds by relocating the clusters that make up a file to
contiguous locations on the disk.
Demodulation
The process by which a modem electronically
subtracts the carrier analog wave, revealing the digital
signal it carries.
Desktop
The screen that is the main work area and starting
point for beginning all tasks in Windows.
DHCP (Dynamic Host Configuration Protocol)
A method of automatically assigning IP addresses
to nodes on a LAN.
DIP switches
Small, typically rocker-style switches that were
used with older hardware components to configure
various options.
Direct thermal printer
A printer that produces images by using a row of
heating elements to burn dots directly onto a special
coated paper.
G3
G4
Extended partition
A partition that contains one or more logical drives,
which the operating system accesses for file storage.
Fault tolerance
The ability of a system to gracefully recover from
hardware or software failure.
Fiber optic cable
Cable that carries light-based data through strands
of glass or plastic no thicker than a human hair.
Firewall
Hardware or software that controls the data
entering or leaving a computer system. Used to
maintain the security of the system.
FireWire
Apple Computers proprietary name for the IEEE
1394 peripheral interconnection bus.
Firmware
Software written permanently or semi-permanently
to a computer chip.
Flashing
The process of updating the BIOS in a PC by using
a special program provided by the motherboards or
PCs manufacturer.
Electrophotographic
A printing process that combines electrostatic
charges, toner, and laser light to produce high-quality
images one page at a time.
Flat-panel monitor
An LCD monitor that uses TFT technology.
Form factor
A description or label denoting the size and shape
of a computer component. The term is used most often
with cases, motherboards, and power supplies.
Fusing assembly
The set of components in a laser printer that heat
the toner to melt it into the paper.
Global unicast address
An IPv6 public address.
Grayware
A general name for software that has annoying,
undisclosed, or undesirable behaviors.
GUI (graphical user interface)
An interface that provides icons and menus that
you can click or select to perform a function or run a
program.
Hardware
Any physical component of a computer or
peripheral device.
HBA
Host bus adapter; a SCSI drive controller.
Glossary
G5
Heat pipes
Small tubes, typically built into cooling fins, filled
with a small amount of fluid.
Impedance
A force that opposes the flow of AC through a
conductor; measured in ohms.
Heat sink
A cooling mechanism that absorbs and transfers
heat better than its surroundings.
Infrared
A wireless connection technology that uses pulses
of invisible infrared light to transmit signals between
devices, offering relatively low-speed, line-of-sight
connections between devices.
Hertz
A count of cycles per second. Hertz is used to note
how many times per second alternating current switches
directions (polarities).
Hex
Shorthand notation for hexadecimal numbers or the
hexadecimal numbering system.
Hexadecimal
The base-16 numbering system.
Hibernate mode
An ACPI-defined power state in which the
computer takes all current applications running in
RAM, saves them to the systems swap file on the hard
disk, and then turns the systems power off.
Host
A computer on a network.
Hot-swapping
Changing a drive in an array, or adding or
removing a device, without shutting down and
powering off the system.
HTTP (Hypertext Transfer Protocol)
Protocol used to send and receive Web pages over
the Internet.
Hub
A network device that can be used to connect
devices that use a BNC or RJ-45 connector.
HVPS
A high-voltage power supply in laser printers that
creates the high voltages required in the printing
process.
I/O address
A section of memory shared between the CPU and
a device and through which those components can
transfer data.
IEEE 1394
A high-speed peripheral interconnection bus, better
known as FireWire.
Impact printer
A printer that uses a mechanical method to press
ink from a ribbon onto the page.
Infrared port
A line-of-sight wireless technology for connecting
computing devices. It sends infrared light, which is
invisible to human eyes.
Inkjet printer
A printer that produces images by forcing ink
through tiny nozzles and onto the paper. Also known as
ink dispersion printing technology.
Instruction
A low-level, hardware-specific command to be
acted upon by a processor.
Insulator
A material that inhibits the flow of electricity.
Interface
A communications standard that defines how data
flows to and from the disk drive. In practice, an
interface is implemented as a circuit board attached to
the drive unit.
Internetworking
The technology and devices by which computers
can communicate across networks.
Interrupt
A signal sent by a device to the CPU to gain its
attention.
Inverter
A device that converts DC to AC.
IPCONFIG
A TCP/IP utility that displays the computers
adapter address, IP address, subnet mask, and default
gateway, and allows the DHCP lease to be renewed or
released by the user.
IPv4 address
A 32-bit address consisting of a series of four 8-bit
numbers, separated by periods, used to identify a
computer, printer, or other device on a TCP/IP network.
IPv6 address
A 128-bit address used to identify a computer,
printer, or other device on a TCP/IP network.
IPX (Internet Packet eXchange)
A protocol that handles moving information over
the network. It is a connectionless protocol.
G6
Local accounts
User accounts stored in the computers local
security database and available only on the computer on
which they were created.
IRQ
Low-level formatting
The preparation step that divides the disk into
tracks and divides each track into sectors. With hard
drives, this step is performed at the factory.
LPT ports
Line printer (parallel) ports, which are named
LPT1, LPT2, and so forth.
MAC (Media Access Control) address
A unique address permanently embedded in a NIC
by the manufacturer and used to identify the device on a
LAN.
MBR (master boot record)
The first sector on a bootable hard disk.
Memory card
Solid-state flash memory in a card format.
Memory effect
A process by which batteries can gradually lose
power because they remember how full they were the
last time they were charged and then dont charge past
that point when recharged.
Memory Stick
A flash memory card developed by Sony and used
in portable devices, especially digital still and video
cameras. Roughly the size of a pack of gum.
Metaformat
See Card Information Structure.
MICRODIMM
A memory standard for notebooks that uses CSP
architecture, grid ball array, or other technologies.
Link-local address
An IPv6 address that is self-assigned through the
Neighbor Discovery process.
Microprocessor
A CPU contained on a single chip.
Glossary
Modem
A device that enables you to connect your
computer to another computer through a phone line.
Modulation
The process through which a modem converts a
digital signal into an analog one.
Motherboard
The main circuit board in a personal computer.
Multicast address
An IPv6 address used to send information or
services to all interfaces that are defined as members of
the multicast group.
Multimeter
A meter that can be used to measure various
electrical properties.
My Network Places
A utility for browsing network resources such as
shared file folders on other computers, networked local
printers, and Web links. Provided in Windows XP and
Windows 2000 Professional.
NAT (Network Address Translation)
A service that allows multiple computers to access
the Internet by sharing a single public IP address.
Native resolution
The number of individually addressable pixels in
the screen matrix of a monitor.
NetBEUI
A non-routable, proprietary Microsoft protocol
thats supported in Windows 9x/Me, Windows NT, and
Windows 2000.
NetBIOS
A protocol that provides name resolution and
session management between computers.
Netbooks
A class of notebook computers, much smaller than
their regular counterparts, that are designed for wireless
Internet use, such as Web browsing, e-mail, and cloud
computing.
Network
In Windows Vista, an auto-discovery utility that
uses the Link-Layer Topology Discovery (LLTD)
protocol to identify and display the computers, routers,
and switches on a network.
Network protocols
The languages that computers, servers, and
network devices use to communicate with each other.
G7
G8
Parallel transmission
A technique by which the 8 bits in a byte are
transmitted simultaneously, with each bit traveling over
its own path in the transmission medium.
Ping
A TCP/IP utility that enables a user at one
computer to determine if that node can communicate
with another computer on the network.
Parity
A scheme that enables the detection of a memory
error.
Pixel
The smallest addressable unit of a picture.
Partition
The usable storage space that a hard disk is divided
into.
Partitioning
Dividing a disk into one or more logical drives,
which are also called volumes.
Patch panel
A device consisting of a row or block of jacks,
used for connecting all components on a network.
PC Card
An expansion card for portable computers;
approximately the size of a credit card.
PCI bus
Peripheral Component Interconnect bus, a 32- or
64-bit expansion bus used in Pentium-based and other
modern PCs.
PCMCIA
Personal Computer Memory Card International
Association, the group responsible for establishing the
standards for expansion cards for portable computing
devices.
PDA (personal digital assistant)
Handheld computing device. Most often used for
organizing address books, schedules, and notes.
Peer-to-peer network
A network that consists of several client computers
that are connected for simple file and printer sharing in
a small office or home office. Each host on the LAN
has the same authority as the other hosts.
Peltier device
(Pronounced PELT-ee-y) An electronic
component that gets colder when voltage is applied.
Peripherals
External computer components, such as printers,
keyboards, and mice.
Piezoelectric
An ink dispersion print technology in which a
bubble is created with a piezo crystal behind each
nozzle. An electrical current sent to the crystal causes it
to vibrate. When it vibrates inward, it releases ink onto
the paper; when it vibrates outward, it pulls ink from
the cartridge.
Pixel depth
The number of bits per pixel devoted to each shade
of a color.
Plenum
An enclosure thats used to move air for heating,
cooling, or humidity control in a building.
Plotters
Pen-based printers that create line images.
PnP (Plug and Play )
A system through which devices in a PC are
discovered automatically and configured to use system
resources without causing conflicts. PnP requires
cooperation between hardware and software (operating
system) components.
Port
A connector into which you can plug cables from
external devices, or in some cases, plug in the devices
themselves.
Port address
A number between 0 and 65,535 that identifies a
program running on a computer.
POST (power-on self test)
A series of basic checks that the computer runs at
startup to make sure the system components are in
proper working order.
POTS (plain old telephone service)
The analog phone service used in most homes; can
be used for dial-up Internet connections.
Power supply
The internal component that converts wall voltage
(110 V or 220 V) to the various DC voltages used by
the computers other components.
PRI (Primary Service Interface)
An ISDN configuration intended for large
organizations.
Primary partition
A partition that is directly accessed by the
operating system as a volume.
Protocol
A set of rules and standards that a network uses to
communicate among its nodes.
Glossary
Protocol suite
A group of protocols that work together to provide
services.
RG-59
Coaxial cable used for cable television
transmission.
RAID
A set of standards for lengthening disk life,
preventing data loss, and enabling relatively
uninterrupted access to data.
RG-6
Coaxial cable used for long-distance cable
television transmission.
RAID level 0
Striping with no other redundancy features.
RAID level 1
Simple disk mirroring.
RAID level 2
An array of disks in which the data is striped across
all disks in the array.
RAID level 3
A setup that uses disk striping and stores errorcorrecting information, but writes the information to
only one disk in the array.
RAID level 4
A setup that uses disk striping and stores errorcorrecting information on all drives, with the ability to
perform checksum verification.
RAID level 5
A setup that provides striping, error correction, and
checksum verification and that spreads both errorcorrection and checksum data over all of the disks, so
there is no single point of failure.
RAM (random access memory)
The hardware component that stores data as the
CPU works with it.
Registry
A hierarchical database, created during the
installation of Windows, containing binary files that
hold system configuration information about all aspects
of a Windows computer, including security settings,
user profiles, installed applications, attached hardware,
and system properties.
Resistance
A force that opposes the flow of DC through a
conductor; measured in ohms.
Resolution
The number of pixels across and down that a video
adapter can create.
Response rate
A value that identifies how quickly the pixels can
change colors on a monitor.
RG-58
Coaxial cable used for Ethernet networks. Also
known as Thinnet.
G9
RG-8
Coaxial cable used for Ethernet networks. Also
known as Thicknet.
Riser card
A circuit board that connects to a motherboard to
provide additional expansion slots or sockets.
RJ-11 connectors
Square, 6-pin connectors used with phone, modem,
and LocalTalk connections.
RJ-45
A terminating 8-pin connector on a twisted-pair
cable used for network connections.
Root directory
The highest-level folder on the disk.
Routable protocol
A protocol that allows data to be sent to
interconnected networks on the Internet.
Router
An internetworking device used to create a path
between individual networks.
SDRAM (synchronous DRAM)
Memory that is tied to the system clock.
Sectors
Divisions of tracks in which data is written.
Secure Digital
A flash memory card used in portable devices,
especially digital cameras.
Security Accounts Manager (SAM) database
The local security and account database on a
Windows server.
Serial transmission
A technique in which bits of data are sent, one at a
time, across the transmission medium.
Server
A computer or device that provides network
services or manages network resources.
Service set identifier (SSID)
The network name for a wireless LAN.
G10
Shadowing
A process in which the computer copies the
contents of the BIOS into standard memory at startup to
improve performance.
Site-local address
An IPv6 private address.
Standby mode
A user-configurable mode thats activated in order
to conserve power and (on a notebook) extend battery
life.
Start menu
In Windows, a cascading menu from which the
user can open programs.
Sleep mode
An ACPI-defined power state in which system
configuration information, open applications, and files
are stored in RAM, while the screen, hard disk, and
most other components are turned off.
Static electricity
A phenomenon that occurs when the charges on
separate objects are unequal and the charge imbalance
creates an electrical field that can cause objects to
attract or repel each other.
SmartMedia
A flash memory card developed by Toshiba and
used in portable devices, especially digital cameras.
STP
Shielded twisted-pair cable used for LANs.
Socket Services
BIOS-level software that manages PC Cards and
detects their insertion and removal.
SODIMM (small outline dual inline memory
module)
A memory standard, with 144-pin dual inline
memory, used in notebook computers.
Software
A set of instructions processed by the central
processing chip in the computer.
Striping
A RAID implementation in which data is divided
into blocks and the blocks are distributed across the
drives in the array.
Stylus
A pointing device used to interact with touchscreen devices.
Subnet mask
The part of an IP address that designates the
network ID.
Solid-ink printer
A printer that melts sticks of wax to create the ink
for printing.
Subpixels
Components of a pixel. Each pixel on an LCD
monitor is composed of three subpixels, each covered
by a red, blue, or green filter.
Surge protector
A device that protects computers and other
equipment from electrical surges and spikes.
Spam
Junk e-mail, officially known as unsolicited
commercial e-mail (UCE).
Switch
A device used in a LAN to direct data traffic
among the nodes.
Task Manager
In Windows, a program that provides information
on processes and applications that are running on a
computer.
Spyware
Software that monitors a system and gathers
information without the users knowledge.
SRAM (static RAM)
Memory that holds its contents until power is
removed.
Taskbar
In Windows, a bar that contains buttons and icons
that can be used to monitor, control, and switch among
running programs.
Glossary
TCP/IP (Transmission Control Protocol/Internet
Protocol)
A routable, non-proprietary protocol thats the
predominant Windows network protocol and is also the
protocol of the Internet.
Telnet
A TCP/IP utility that allows a user in one location
to access a computer in a remote location as if the user
were physically sitting in front of the remote machine.
Termination
The process of adding terminators to the bus. Both
ends of a SCSI bus must be terminated. You cannot
have terminators in the middle of the bus.
Terminators
Devices, basically electrical resistors, that serve to
absorb signals that reach the end of the SCSI bus.
Text file
A file, typically in ASCII format, that can be read
by humans using a text editor, such as Notepad.
TFT (thin-film transistor)
A type of active matrix LCD monitor containing
metallic contacts composed of thin film, a layer of
semiconductive material, and a layer of insulating
material.
Thermal autochrome printer
A printer that produces images by using special
paper in which cyan, magenta, and yellow pigments are
embedded. Each page passes three times under the
thermal print head at varying temperatures. Each color
is processed at a different temperature.
Thermal bubble
An ink dispersion printing technology in which the
ink is heated, vaporizing it and creating a bubble. The
bubble protrudes through the nozzle and sprays onto the
paper. When the bubble bursts, it creates a vacuum that
draws more ink from the cartridge into the print head,
readying it to create another dot.
Thermal compound
Glue that transmits heat well and is used between
components to improve heat flow.
Thermal wax transfer printer
A printer that produces images by using a heating
element in the print head to melt ink in a wax base from
the transfer ribbon. Separate cyan, yellow, magenta,
and black transfer ribbons are used to create the image.
The cooled wax becomes a permanent image on the
paper.
Thinnet
Another name for RG-58 Ethernet cables.
G11
Toner
Fine particles composed of carbon, polyester, and
iron oxide, held in a cartridge and used in laser printers
to produce images.
Toner cartridge
A container filled with toner, an EP drum, a blade
to remove used toner from the drum, and a corona
charging assembly used to apply a static charge to the
drum after the image has printed.
Tracks
On the disk medium, concentric or spiral rings that
are divided into sectors, which store data.
Transfer corona assembly
The components in a laser printer that transfer the
image from the drum to the paper.
Trojan horse
Software that includes undisclosed functions.
Troubleshooting
The process of determining the cause of, and
ultimately the solution to, a problem.
Twisted-pair cable
Cable composed of four pairs of wires, with each
pair twisted around each other, and with the pairs
twisted together and bundled within a covering.
Type I PC Card
A PC Card, 3.3 mm thick, most often used for
memory.
Type II PC Card
A PC Card, 5 mm thick, most often used for
network adapters, modems, and other communications
channels, such as SCSI, USB, or FireWire.
Type III PC Card
A PC Card, 10.5 mm thick, most often used for
additional storage.
UDC (Universal data connector)
A connector used on token ring networks to
connect the computer to the network.
UDF (universal disk format)
An ISO 13346 standard implementation used for
flash media, REV discs, and rewritable CD and DVD
discs.
UPS (uninterruptible power supply)
A device that protects computers and other
equipment from brownouts and blackouts.
USB (Universal Serial Bus)
A peripheral specification developed by a
consortium of companies. It defines a bus architecture
to which you can connect one or more expansion
devices.
G12
UTP
Unshielded twisted-pair, a type of wiring that is
used for LANs and does not contain any shielding.
VESA local bus (VLB)
The Video Electronics Standard Association video
bus developed for 80486-based computers.
Video bus
The bus that transmits display information between
the CPU and the video circuitry.
Viewing angle
The maximum angle at which the image remains
intact (isnt distorted) when someone is looking at a
monitor.
Virtual memory
A Windows memory-management scheme that
uses hard disk space to deceive applications into
functioning as if there were more RAM available than
the amount that is installed in the computer.
Virus
Destructive or damaging software meant to disrupt
the operation of a PC, destroy data, or even destroy
hardware.
Volatile memory
Memory that loses its contents when power isnt
present.
Volt
The unit of measure of voltage. Officially
abbreviated with an uppercase V, but often written as a
lowercase v.
Voltage
The force of electricity caused by a difference in
charge, or electrical potential, at two locations;
measured in volts.
VPN (virtual private network)
A network connection that uses encryption and
security protocols to create a private network over a
public network.
VRM (voltage regulator module)
Internal component that receives power from the
power supply and sends the correct voltages to the
CPU.
WAN (Wide area network)
A network covering large geographic areas, such as
counties, states, or countries, or the world.
WAP (Wireless access point)
A device that wireless computing devices use to
communicate and connect with network services.
War driving
The act of driving around in a car and using a
laptop with a wireless network card to see which
networks can be connected to.
Watt
The measure of electrical power. Power is a
derived quantity: 1 watt = 1 volt 1 amp.
WEP (Wired Equivalent Privacy)
A protocol, built into the 802.11 standards, that
governs how data can be encrypted while in transit on
the wireless network.
Wi-Fi (Wireless Fidelity)
The most widely used wireless technology at
present. It began as an IEEE 802.11b wireless standard
and is being replaced with the faster IEEE 802.11g
standard.
WiMAX (IEEE 802.16 Air Interface Standard)
A point-to-multipoint broadband wireless access
standard, operating in the frequency ranges of 1066
GHz for licensed communications and 211 GHz for
unlicensed communications, providing bandwidth in
excess of 70 Mbps. An emerging wireless connection
standard for long distances, WiMAX services wide area
and metropolitan area networks, allowing wireless users
with 802.16e devices to roam between current wireless
hot spots.
Windows Aero
The name of the new user interface Microsoft
introduced with Windows Vista.
Windows print processes
The processes involved in getting the print request
from the user to the printer.
WinModem
A Windows-based combination of simple hardware
(basically, just physical components to interface with
the motherboard and phone lines) and modem-function
emulation software.
WINS (Windows Internet Naming Service)
A service used to resolve NetBIOS names to IP
addresses and to store NetBIOS service information.
Wireless router
A device to which nodes in a wireless LAN can
connect, using radio waves.
WLAN (wireless LAN)
A network that uses radio waves or infrared light
instead of cables to connect network nodes.
Workgroup
A logical group of computers characterized by a
decentralized security and administration model.
Glossary
Workstation
A computer connected to a network.
Worm
A self-propagating program meant to disrupt the
operation of a PC.
WPA (Wi-Fi Protected Access)
A wireless communication protocol that is
replacing WEP. It uses a shared key for security.
xD-Picture Card
A flash memory card developed by Olympus and
Fujifilm and used in portable devices, especially digital
cameras.
Zinc air batteries
Batteries that use a carbon membrane to absorb
oxygen, contain a zinc plate, and use potassium
hydroxide electrolyte. Used in portable computing
devices.
ZV (Zoomed Video)
A technology that provides direct communication
between the PC card and the video controller.
G13
G14
I1
Index
A
AC signals, 3-23
Access control, 14-44
Access control list (ACL), 20-31
Access Denied errors, troubleshooting, 20-36
Account lockouts, 20-18
Active Directory, 20-14
Address bus, 4-6
Addresses
Leasing, 14-36
Network, types of, 14-5
Adware, 20-66
AGP standard, 7-16
AIT tapes, 10-66
Alternating current, 3-3
Antivirus software, 20-62
Anycast address, 14-8
AP isolation, 14-45
APIPA, 14-7
AppleTalk, 14-4
Application layer, 14-21
Applications, managing in Task Manager, 18-13
Archive bit, 18-47
ASCII format, 2-58
Aspect ratio, 11-4
Asynchronous DRAM, 6-5
Asynchronous Transfer Mode, 13-37
ATA, 10-4
Attenuation, 13-13, 15-8
Attrib command, 2-67
Authentication
Biometric, 20-50
Interactive, 20-14
Network, 20-14
On client/server networks, 13-7
On peer-to-peer networks, 13-6
On wireless LANs, 14-44
Protocols, 20-14
Two-factor, 20-53
Autoconfiguration, 14-37
Automated System Recovery (ASR), 19-27
B
Backups
Strategies for, 18-51
Bandwidth, 6-7
Base 10 numbering, C-2
Base memory addresses, 7-11
Batch files, 2-63
C
Cable modems, 13-32
Cable testing devices, 15-9
Cables
Coax, 13-16
Composite, 13-16
Fiber optic, 13-11
Printer, parallel, 9-10
RG standards, 13-18
Serial, 9-6
Solid vs. stranded, 13-15
UTP vs. STP, 13-13
Caches, 4-6
Cases, B-2
CD drives
Installing, 10-46
Troubleshooting, 10-85
CDs
Capacity of, 10-41
Types of, 10-42
I2
D
Data
Backing up, 18-47
Protecting, 20-93
Restoring from backups, 18-55
Restoring with System Restore, 18-60
Data bus, 4-6
Data transmission
Duplex vs. simplex, 13-19
Daughter boards, 4-31
DDR RAM, 6-6
DDS tapes, 10-64
Decimals, C-2
Deleted files, recovering, 10-82
Device Manager, 7-7
DHCP, 14-10
Dial-up connections, 14-57
Properties of, 14-61
Digital cameras, 11-22
DIMMs, 6-12
Dir command, 2-46
Direct current, 3-3
Directories
Copying, 2-52, 2-53
Creating, 2-49, 2-50
Navigating in, 2-43
Removing, 2-56, 2-57
Directory trees, 10-26
DirectX Diagnostic Tool, 18-8
Disk Cleanup utility, 10-68
Disk duplexing, 10-35
Disk Management utility, 10-23, 10-28
Disk mirroring, 10-35
Disks
Checking, 10-74
Defragmenting, 10-77
Index
Encrypting, 20-41, 20-45
Scanning for errors, 10-72
Display projectors, 11-19
Display properties, 11-7
DisplayPort technology, 11-19
Dithering, 12-6
DLT tapes, 10-65
DMA, 7-10, 10-6
DNS, 14-11
Docking stations, 16-41
Documents library, 2-21
DoS attacks, 20-59
Dot pitch, 11-5
Dot-matrix printers, 12-2
DRAM, 6-5, 6-6, 6-11
DRDRAM, 6-6
Drive power connectors, 3-16
Driver signing, 21-29
Drivers, 8-11
Updating, 8-25
Drivers, updating, 21-26
Drives
ATA, 10-4
Capacities, 10-8
CD, 10-42
DVD, 10-44
Floppy, 10-57
IEEE 1394, 9-31
Interfaces, 10-4
Optical, 10-41
SCSI, 10-10
Tape, 10-64
USB, 10-12
USB flash, 10-53
DSL, 13-31
Dual Independent Bus, 4-6
Dual-channel architecture, 6-16
Dumpster diving, 20-90
DVD drives
Troubleshooting, 10-86
DVDs
Capacity of, 10-44
Types of, 10-45
DVI connectors, 8-7, 11-16
Dynamic tables, 13-71
E
E-carrier lines, 13-35
ECC, 6-14
ECP mode, 9-8
Edit command, 2-60, 2-62
EDO RAM, 6-6
Effective permissions, 2-80, 20-31
Effective Permissions
Determining, 20-32
Electricity
Characteristics of, 3-2
Safety precautions, 3-6
F
Fast Page Mode RAM, 6-6
FAT, 10-24
FAT32, 10-24
Fault tolerance, 10-34
FDDI networks, 13-62
Fiber optic cable, 13-11
Fiber optic connectors, 13-44
File attributes, 2-66, 20-36
File systems, 10-23
File-name extensions, 2-59
Files
Batch, 2-63
Binary vs. text, 2-58
Sharing, 2-69
Fire extinguishers, types of, 22-4
Firewalls, 13-72, 20-75
FireWire, 9-31
Firmware, 5-2
Flash drives, 10-53
Flat-panel monitors, 11-10
Connections, 11-16
Floppy disks, 10-57
Floppy drives
Troubleshooting, 10-84
Flow control, 9-4
I3
I4
Folders
Adding to a library, 2-22
Removing from library, 2-23
Setting as default save location, 2-23
Folders, encrypting, 20-41
Form factors, 3-18, 4-31
Format command, 10-62
Formatting
Low-level, 10-21
Frame relay protocol, 13-36
Front-side bus, 4-6
FTP, 15-28
Fully qualified domain names, 14-11
G
Gateways, 14-9
Generators, 3-27
Global unicast address, 14-8
Grandfather-Father-Son backup strategy, 18-52
H
Handheld devices
Maintaining power for, 16-51
Memory in, 6-21
Hard drives
Components of, 10-15
Encrypting, 20-42
Formatting, 10-28
Installing, 10-18
Magnetic vs. solid-state, 10-16
Partitioning, 10-22
Preparing for use, 10-21
Tracks, sectors, and clusters, 10-17
Troubleshooting, 10-84
Hardware Abstraction Layer (HAL), 19-3
Hardware Compatibility List, 21-10
Hardware toolkit, 15-2
HDMI connectors, 8-8
Heat pipes, 4-24
Heat sinks, 4-24
Hexidecimals, C-4
Hibernate mode, 16-22, 17-24
Host IDs, 14-6
Hosts, on networks, 13-3
Hot-swapping, 16-27
HTTP, 15-28
Hubs, 13-65
Human error, security, 20-59
Hybrid topology, 13-64
Hyperthreading, 4-6
I
ICMP, 14-18
IDE, 10-4
IDE channels, 10-10
IEEE 1394, 9-31
IEEE 1394 ports, troubleshooting, 9-48
K
Keyboards, 9-11
Setting properties of, 9-19
KVM swtiches, 9-21
L
LANs, 13-3
Laser printers, 12-9
Printing process, 12-11
Laser printers, maintaining, 12-37
Latency, 13-67
Latency sensitivity, 15-11
Layer 2 switches, 13-67
LCD monitors, 11-10
Characteristics of, 11-10
Technologies, 16-10
Workings of, 11-10
Libraries
Adding folders to, 2-22
Creating, 2-22
Removing folders from, 2-23
Specifying a default save location in, 2-23
Link-local address, 14-8
Linux, 2-4
LLTD protocol, 2-32
Local area networks (LANs)
Peer-to-peer, G-8
Local Security Policy console, 20-26
Logic bombs, 20-61
Logical block addressing, 10-8
Index
I5
I6
O
Online attacks, 20-90
Open Systems Interconnection (OSI) model, A-2
Operating systems
Defined, 2-2
Linux, 2-4
Mac OS, 2-3
Windows, 2-3, 2-5
Operating-system load errors, 19-10
Optical drives, 10-41
Optical drives, installing, 10-46
Overclocking, 4-7
P
Packet filtering, 13-73
Page files, 6-2, 6-28
Parallel ports, troubleshooting, 9-46
Parallel transmission, 9-3
Parity, 6-14, 9-4
Partitions, 10-22
Creating, 10-23, 21-15
Primary vs. extended, 10-22
Password policies, 20-16
Passwords, 20-3, 20-8
Requiring, 20-12
PC Cards, 16-27
Installing, 16-30
PCI bus, 7-13
PCI Express specification, 7-14
Peer-to-peer networks, 13-5
Peltier coolers, 4-25
Performance console
Logs and Alerts, 18-45
Performance Monitor, 18-37
Configuring, 18-42
Performance tab, Task Manager, 6-24
Permanent virtual circuits, 13-36
Permissions, 2-76
Effective, 2-80
NTFS, 2-76
Piezoelectric technology, 12-5
Ping command, 14-18
PIO modes, 10-6
Pipelining, 4-7
Pixel depth, 8-4
POP3, 14-24
Port addresses, 14-25
Port replicators, 16-41
Port scanning, 20-77
Ports, 9-2
Keyboard, 9-11
Mice, 9-13
Microphone, 9-38
On notebooks, 16-12
Parallel, 9-7
Printer, 9-8
Serial, 9-3
Speaker, 9-37
USB, 9-27
POST, 5-12
POST troubleshooting, 5-18
POTS/PSTN, 13-30
Power conditioning, 3-24
Power saving
Configuring, 17-20
Modes, 16-7, 17-20, 17-24
Power supplies, 3-14
Installing, 3-19
Requirements for common PC components, 3-15
Troubleshooting, 3-33
Power_Good signal, 3-34
Power-saving modes, 16-22
Printers
Configuring and optimizing, 12-26
Dot-matrix, 12-2
Dye sublimation, 12-13
Inkjet, 12-4
Inkjet, photo, 12-7
Installing, 12-18, 12-20
Laser, 12-9
Maintaining, 12-35
Multifunction, 12-32
Options for, 12-32
Plotters, 12-14
Snapshot, 12-14
Solid ink, G-10
Solid-ink, 12-13
Thermal, 12-14
Troubleshooting, 12-41
Printing processes, 12-16
Processes, monitoring, 18-15
Processors
Single-core vs. multi-core, 4-4
Specifications of, 4-8
Product keys, 21-20
Protocols
802.11a, 16-17
AppleTalk, 14-4
Bluetooth, 14-30, 16-17
Frame relay, 13-36
FTP, 15-28
HTTP, 15-28
IMAP4, 14-25, 15-29
IPX/SPX, 14-4
LLTD, 2-32
NetBEUI, 14-4
POP3, 14-24, 15-29
Secure HTTP, 14-23
SMTP, 14-24, 15-29
SONET, 13-39
SSH, 15-28
SSL, 14-23, 15-28
TCP/IP, 14-4, 14-21
TDMS, 8-8, 11-16
Telnet, 14-24
TFTP, 14-24
Index
Wi-Fi, 16-17
WiMAX, 14-30, 16-17
X.25, 13-36
Proxy servers, 13-74, 15-33, 20-77
PS/2 ports, troubleshooting, 9-47
Public folder, 2-70
Q
QIC tapes, 10-64
QoS mechanisms, 15-11
R
Radio networking technologies, 16-15
RADIUS, 14-46
RAID
Software vs. hardware, 10-39
RAM, 6-2
Access time, 6-7
Addressable, 4-6
How CPUs access it, 6-6
Installation requirements, 6-16
Package types, 6-12
Speed of, 6-7
Types of, 6-4
RCA connectors, 9-41
Recovery Console, 19-24
Refresh rate, 8-3, 11-5
Registers, 4-4
Registry, 17-48
Backing up, 17-52
Editing, 17-48
Searching, 17-51
Reliability and Performance Monitor, 18-35
Reliability Monitor, 18-32
Remote Assistance, 17-55
Remote Desktop, 17-58
Repetitive strain (or stress) injuries (RSIs), 22-20
Resistance, 3-3
Measuring, 3-30
Resolution, 8-3, 11-4
Native, 11-11, 16-10
Resource Overview, 18-35
Response rate, 11-11
Restore points, creating, 18-57
RFI, 22-12
RG cable standards, 13-18
RIMMs, 6-12
Ring topology, 13-62
Riser buses, 7-3
Riser cards, 4-31, 8-20
Rmdir/rd command, 2-57
Rollover TP cable, 13-47
Routers, 14-9
Types of, 13-71
S
S/PDIF connectors, 9-43
I7
Safety considerations
Air quality, 22-6
Electricity, 22-4, 22-7
Fire, 22-3
Floors, 22-2
Toner, 22-7
SAIT tapes, 10-66
SATA connector, 3-16
Satellite Internet access, 13-33
ScanDisk utility, 10-72
SCSI drives, 10-10
SDRAM, 6-6
Secure HTTP, 14-23
Secure Shell (SSH), 15-28
Secure Sockets Layer (SSL), 14-23, 15-28
Security
BIOS settings, 20-55
Classifications, 20-96
Firewalls, 20-75
Hardware-based, 20-49
Malicious software, 20-62
Of data, 20-93
Phishing, 20-89
Physical access restrictions, 20-73
Security devices
Biometric, 20-50
Fobs, 20-53
Security policies, 20-16, 20-95
Security threats, types of, 20-57
Serial ports, 9-3
Cables, 9-6
Connectors, 9-5
Serial ports, troubleshooting, 9-46
Serial transmission, 9-2
Service-level agreements, 1-20
Services and Applications utility, 17-41
Services console, 17-42
Services, monitoring, 18-16
Share permissions, 2-76, 20-33
Shared Documents folder, 2-71
Shared video memory, 6-19
Shoulder surfing, 20-89
SIMMs, 6-12
Simple File Sharing, 2-79
Simultaneous multi-threading technology (SMT), 4-4
Site-local address, 14-8
Sleep mode, 16-22, 17-24
Smart cards, 20-52
SMTP, 14-24, 15-29
Social engineering, 20-89
Countermeasures, 20-91
Socket types, 4-16
SODIMMs, 6-12
Software toolkits, 15-4
Solid-state drives, 10-16
SONET protocol, 13-39
Sound cards, 8-14
Connectors on, 9-36
Troubleshooting, 8-27
I8
T
Tape drives, 10-64
Tape heads, cleaning, 10-66
Task Manager, 2-33, 6-22, 18-12
Applications tab, 18-13
Networking tab, 18-17
Processes tab, 18-15
Services tab, 18-16
Users tab, 18-19
Task Scheduler, 17-29
T-carrier lines, 13-35
TCP/IP, 14-4, 14-21
Configuring, 14-33
TDMS protocol, 8-8, 11-16
Technology weaknesses, 20-58
Telnet, 14-24
Text files
Creating, 2-60
Editing, 2-62
TFT technology, 11-10, 16-10
TFTP, 14-24
Thermal bubble technology, 12-4
Thicknet cables, 13-17
Thinnet
Connecting, 13-51
Thinnet cables, 13-18
Throttling, 4-7
TMP chips, 20-42
Token Ring networks, 13-62
Toner cartridges, disposing of, 22-22
Topologies
Bus, 13-61
Hybrid, 13-64
Logical vs. physical, 13-4
Mesh, 13-63
Ring, 13-62
Star, 13-60
Token Ring, 13-62
Touchpads, 16-11
Touch-screen monitors, 11-12
Tracert command, 15-26
Transport layer, 14-21
Trojan horses, 20-61
Troubleshooting
Access Denied errors, 20-36
BIOS, 5-17
Boot errors, 19-8
CD drives, 10-85
CMOS, 5-19
DVD drives, 10-86
Hard and floppy drives, 10-84
IEEE 1394 connections, 9-48
Memory, 6-33
Modems, 8-28
Motherboard and CPU, 4-38
Multimedia ports, 9-48
Networks, wired, 15-8
Networks, wireless, 15-13
Notebooks, 16-44, 16-50
Operating-system load errors, 19-10
Parallel connections, 9-46
POST, 5-18
Power supplies, 3-33
Printers, 12-41
PS/2 connections, 9-47
Serial connections, 9-46
Sound cards, 8-27
Startup errors, 19-10
Startup messages, 19-12
TCP/IP problems, 15-16
Tools for, 15-2
USB connections, 9-47
Video cards, 8-26
Windows installations, 21-22
Windows upgrades, 21-38
Wireless connections, 15-14, 16-47
Tunneling, 13-9
Twisted pair connectors, 13-46
Two-factor authentication, 20-53
U
UDMA, 10-6
UPSs, 3-24, 3-27
USB, 9-24, 10-12
Classes, 9-25
Flash drives, 10-53
Versions of, 9-26
USB ports, troubleshooting, 9-47
User Account Control (UAC), 20-23
Index
Working with, 20-26
User accounts, 13-6
Creating, 20-5
Deleting, 20-21
Disabling, 20-21
Groups, 20-6
User names, 20-3
Users, viewing in Task Manager, 18-19
Utilities
IPCONFIG, 14-16
Ping, 14-18
UTP cables, 13-13
V
Video adapters, 8-3
Troubleshooting, 8-26
Video buses, 7-15
Video connectors, 11-7
Video RAM, 6-6
Virtual circuits, 13-37
Virtual memory, 6-28
Virtual private networks, 13-8
VoIP, 13-40
Volatile memory, 6-4
Voltage, 3-2
Measuring, 3-30
Setting on power supply, 3-19
Voltage regulator modules (VRMs), 4-8
Volumes
Mounting, 10-32
W
Wake on LAN, 17-27
War driving, 14-43
Water pumps, 4-25
Watts, 3-3
Webcams, 11-26
WEP, 14-46
Wide area networks, 13-29
Wi-Fi protocol, 16-17
WiMAX, 14-30, 16-17
Windows
Activation, 4-34
Appearance settings, 17-10
Desktop components, 2-13
Hardware requirements for, 21-5
Indexing settings, 17-5
Installing, 21-17
Network installation, 21-17
I9
X
X.25 protocol, 13-36
Xcopy command, 2-54
I10