PC Hardware and Network Technical Support
PC Hardware and Network Technical Support
Lesson Objectives
In this lesson, you will identify the hardware components of a computer. You will:
• Identify computer system components.
• Identify storage devices.
• Identify personal computer device connection methods.
Lesson Introduction
A very large percentage of the work that most IT technicians do entails working with
hardware, including installing, upgrading, repairing, configuring, maintaining, optimizing,
and troubleshooting computer components. To install and configure computer hardware,
you need to recognize the basic components that constitute most personal computers, along
with the functionality that each component provides to the computing experience. In this
lesson, you will identify hardware components and how they function.
Preparing for a career in computer support and maintenance can be a daunting task. A good
place to start is with the basics: the essential hardware components that you find in most
computers. Identifying hardware components and their roles give you a solid base on which
to build the knowledge and skills you need to install, configure, and troubleshoot computer
hardware.
This lesson covers all or part of the following CompTIA® A+® (2012) Exam 220-801
certification objectives:
• Topic A:
• Objective 1.1
• Topic B:
• Objectives 1.5, 1.7, 1.12
• Topic C:
• Objectives 1.7, 1.11
1
TOPIC A
Computer System Components
In this lesson, you will identify the hardware components of a computer. The first step is to identify
the hardware that you will find in virtually all computer systems. In this topic, you will identify
computer system components.
If you are not familiar with the various components that a computer is made up of, it can seem like
a jigsaw puzzle. Like most puzzles, each part of a computer connects to other parts in a specific
place, but generally, you will find that the pieces fit together almost exactly the same way from one
system to another. To help you put the puzzle together, you need to understand what these pieces
look like and what they do.
This topic covers all or part of the following CompTIA® A+® (2012) Exam 220-801 certification
objectives:
• Objective 1.1: Configure and apply BIOS settings.
2
Component Description
In some newer computer models, the system unit is incorporated with the
display screen and referred to as an all-in-one computer. Similar to
laptops, the system unit is integrated into a smaller configuration, which
may make it harder to manage or replace the system unit components.
Display devices A display device is a personal computer component that enables users to
view the text and graphical data output from a computer. Display devices
commonly connect to the system unit via a cable, and they have controls
to adjust the settings for the device. They vary in size and shape, as well
as the technologies used.
Common terms for various types of display devices include display,
monitor, screen, cathode ray tube (CRT), liquid crystal display (LCD), and
flat-panel monitors.
Input devices An input device is a personal computer component that enables users to
enter data or instructions into a computer. Common input devices
include keyboards and computer mice. An input device can connect to
the system unit via a cable or a wireless connection.
External devices You can enhance the functionality of practically any personal computer
by connecting different types of external devices to the system unit. Also
called peripheral devices, external devices can provide alternative input or
output methods or additional data storage. You connect external devices
to the system unit via cable or a wireless connection. Some devices have
their own power source, while others draw power from the system.
Common examples of external devices include microphones, cameras,
scanners, printers, and external drives.
3
Component Description
Computer Cases
The computer case is the enclosure that holds all of the components of your computer. Computer
cases come in several sizes and arrangements. Some are designed to hold many internal components
and have a lot of room to work around those components. These are usually tower or desktop cases
and take up a good deal of room. Other cases are designed to use a minimum amount of space. The
trade-off is that the interior of the case is often cramped, with little room for adding additional
components. Because the tower proved to be popular, there are now several versions of the tower
model. These include:
• Full tower, which is usually used for servers or when you will be installing many drives and other
components.
• Mid tower, which is a slightly smaller version of the full-size tower.
• Micro, or mini tower, which is the size that replaces the original desktop case in most modern
systems.
• Slim line, which is a tower case that can be turned on its side to save room
The Motherboard
The motherboard is the personal computer component that acts as the backbone for the entire
computer system. Sometimes called the system board, it consists of a large, flat circuit board with chips
and other electrical components on it, with various connectors. Some components are soldered
directly to the board, and some components connect to the board by using slots or sockets.
4
Figure 1-1: A motherboard.
The CPU
The central processing unit (CPU) is a computer chip where most of the computing calculations take
place. On most computers, the CPU is housed in a single microprocessor module that is installed on
the system board in a slot or a socket.
Multicore Processors
Since mid-to-late 2000, the trend has been to build processors with two or more individual CPUs
that work in parallel and that are contained in a single chip. Two or more individual processors can
share a workload more efficiently than a single processor. Dual-core and quad-core processors are
engineered to include two to four cores on a single chip, while hexa- and octa-core processors
include six and eight cores, respectively.
Multi-CPU Motherboards
Prior to the development of multicore processors, some hardware manufacturers offered additional
processing power by designing motherboards that could hold more than one CPU. With the advent
of the multicore processors, these are less common in personal computers, but they are still widely
used in server machines.
5
Memory
Memory is the computer system component that provides a temporary workspace for the processor.
Memory refers to modules of computer chips that store data in a digital electronic format, which is
faster to read from and write to than tape or hard drives. Memory chips each contain millions of
transistors etched on one sliver of a semiconductor. Transistors are nothing more than switches that
can be opened or closed. When a transistor is closed, it conducts electricity, representing the binary
number 1. When it is opened, it does not, representing the binary number 0.
There are two types of memory used in computer systems: Random Access Memory (RAM) and Read-
Only Memory (ROM). RAM is a computer storage method that functions as a computer's main
memory. This type requires a constant power source to access the data stored within the RAM.
However, data stored on ROM is saved and stored without a constant power source. Once data is
written to ROM, it cannot be modified easily.
Storage Devices
A storage device is a computer system component, such as a hard drive, that enables users to save data
for reuse at a later time, even after the personal computer is shut down and restarted. Storage
devices can save data magnetically, optically, or electronically, depending on their design.
Memory
6
Power Supplies
Power Supplies
A power supply is a computer system component that converts line-voltage alternating current (AC)
power from an electrical outlet to the low-voltage direct current (DC) power needed by other system
components. The power supply is often referred to as the power supply unit (PSU). The power
supply is typically a metal box in the rear of the system that is attached to the computer chassis and
to the system board. While the power supply is not itself a component of the system board, it is
required in order for system components to receive power. The power supply contains the power
cord plug and a fan for cooling, because it generates a lot of heat. Some power supplies have a
voltage selector switch that enables you to set them to the voltage configurations that are used in
different countries. AC adapters are generally built in to the power supply for desktop systems and
are external for laptops and other mobile systems.
7
Auto-switching power supplies do not have a manual voltage switch, but detect the voltage level
supplied by the outlet and set themselves to the correct voltage automatically. This can be
convenient and safe for people who travel to various countries with portable computers.
Cooling Systems
A cooling system is a computer system component that prevents damage to other computer parts by
dissipating the heat generated inside a computer chassis. The cooling system can consist of one or
more fans and other components such as heat sinks or liquid cooling systems that service the entire
computer as well as individual components, such as the power supply and CPU.
Expansion Cards
An expansion card is a printed circuit board that you install into an expansion slot on the computer’s
system board to expand the functionality of the computer. In standard desktop systems, cards have
connectors that fit into an expansion slot on a system board and circuitry to connect a specific
device to the computer. Laptops, on the other hand, typically have slots located on the outside of
the case for inserting expansion cards. These cards are often referred to as laptop expansion cards.
Cooling Systems
8
Figure 1-7: An expansion card.
Note: An expansion card is also known as an adapter card, I/O card, add-in, add-on, or simply
as a board.
Riser Cards
A riser card is a board that plugs into the system board and provides additional expansion slots for
adapter cards. Because it rises above the system board, it enables you to connect additional adapters
to the system in an orientation that is parallel to the system board and thus saves space within the
system case. Riser cards are commonly found within rackmount server implementations to provide
additional slots for expanding the features of a server and in low rise smaller cases to fit larger
expansion cards.
Note: A riser card expands motherboard capabilities the way a power strip increases the
capabilities of electrical outlets.
Daughter Boards
Daughter board is a general computing and electronics term for any circuit board that plugs into
another circuit board. In personal computing, a daughter board can be used as a more general term
for adapter cards. Sometimes, in casual usage, the term “daughter board” is used interchangeably
with the term “riser card,” but technically they are not the same.
9
Firmware
Firmware Firmware is specialized software stored in memory chips that stores OS-specific information whether
or not power to the computer is on. It is most often written on an electronically reprogrammable
chip so that it can be updated with a special program to fix any errors that might be discovered after
a computer is purchased, or to support updated hardware components.
Note: Updating firmware electronically is called flashing.
Figure 1-9: The system BIOS resides on ROM chips, and sets the computer's configuration and
environment at startup.
The POST
The POST The Power-On Self Test (POST) is a built-in diagnostic program that runs every time a personal
computer starts up. The POST checks your hardware to ensure that everything is present and
functioning properly, before the system BIOS begins the operating system boot process. If there is
an error, then an audible beep will alert you that something is wrong.
The POST process contains several steps to ensure that the system meets the necessary
requirements to operate properly.
Note: The POST process can vary a great deal from manufacturer to manufacturer.
10
Hardware Component POST Test Criteria
Power supply Must be turned on, and must supply its "power good" signal.
CPU Must exit Reset status mode, and must be able to execute instructions.
BIOS Must be readable.
BIOS memory Must be readable.
Memory Must be able to be read by the CPU, and the first 64 KB of memory
must be able to hold the POST code.
Input/output (I/O) bus Must be accessible, and must be able to communicate with the video
or I/O controller subsystem.
11
ACTIVITY 1-1
Identifying Personal Computer Components
Scenario
In this activity, you will identify personal computer components.
Consider asking
participants to identify
the major components 1. Your instructor might provide you with examples of computer components and ask you or other
(system unit, display participants to identify them.
device, input devices,
and peripheral devices) 2. Identify the computer components in this graphic.
of their computers. This
can be an opportunity to
generate discussion on
the differences between
the various types of
components and their
uses.
A. System unit
B. Display device
C. Input device
D. Peripheral device
12
A. Motherboard
B. Power supply
C. Adapter card
D. Storage device
E. Memory
F. CPU
6. How many fans would you expect to find in a computer? How many do you think are in the computer
you are using for this course?
A: Answers will vary, but should indicate at least one fan for the power supply. A case fan and a fan
for the CPU might also be present, as well as fans on some expansion cards.
13
TOPIC B
Storage Devices
In the previous topic, you identified the main components of a personal computer. One of the
primary reasons for using a computer is to electronically store data. In this topic, you will identify
the types of storage devices used in personal computers.
As a computer technician, your responsibilities are likely to include installing and maintaining many
different types of computer components, including storage devices. By identifying the various types
of storage devices that can be found in most personal computers, you will be better prepared to
select, install, and maintain storage devices in personal computers.
This topic covers all or part of the following CompTIA® A+® (2012) Exam 220-801 certification
objectives:
• Objective 1.5: Install and configure storage devices and use appropriate media.
• Objective 1.7: Compare and contrast various connection interfaces and explain their purpose.
• Objective 1.12: Install and configure various peripheral devices.
Floppy Drives
Floppy Drives A floppy disk drive (FDD) is a storage device that reads data from, and writes data to, floppy disks.
Floppy disks are removable disks that are made of flexible Mylar plastic that is covered with
magnetic coating and enclosed in stiff, protective plastic cases. The vast majority of floppy drives are
internal devices that connect to the system board through a floppy disk controller, and they get their
power from the personal computer's power supply. The form factor is usually 3.5 inches; 3.5-inch
floppy disks can hold up to 1.44 MB of data. Floppy disk drives are not used much anymore and are
considered a legacy technology, but you might still encounter them on older machines.
Note: Although 3.5 inches is the most recent standard for floppy disks and drives, 5.25-inch
floppy disks and drives were once the standard, and before that, 8-inch disks and drives were the
standard. You will probably never encounter either of these, and even 3.5-inch models are
essentially obsolete.
14
Hard Drives
A hard disk drive (HDD) is a storage device that reads data from, and writes data to, a hard disk. A Hard Drives
hard disk consists of several metal or hard plastic platters with a magnetic surface coating. Data is
stored magnetically and can be accessed directly. Although the HDD and the hard disk are not the
same thing, they are packaged together and are often referred to interchangeably. HDDs are also
referred to as hard drives, and they can be internal or external devices. Internal hard drives are
mounted inside the chassis and connect directly to the system board through at least one cable for
data and one for power, while external hard drives generally connect to the system by means of an
expansion card or a port.
Disk Controllers
Both floppy drives and hard drives require circuitry to communicate with the CPU. This circuitry is
known as the disk controller. Disk controllers can be built into the drive itself, or they can be
contained on an expansion card. In most modern floppy drives and hard drives, the controller is
built into the drive.
Jumpers
Jumpers are used to configure older hardware by shutting off an electrical circuit located on the
component. Using jumpers, this is accomplished by sliding a jumper shunt over the jumper pins on
the jumper block of the motherboard.
Parallel Advanced Also known as Integrated Drive Electronics (IDE), Enhanced IDE (EIDE),
Technology Attachment Ultra Direct Memory Access (UDMA), and Advanced Technology Attachment
(PATA) (ATA) drives, PATA drives have the following characteristics:
• The controller is built into the drive.
• PATA drives are limited to two channels, each with up to two devices.
15
Hard Drive Type Characteristics
PATA Configuration
Each PATA interface can support up to two drives. Because the controller is integrated with the
drive, there is no overall controller to decide which device is currently communicating with the
CPU. This is not a problem as long as each device is on a separate interface, but to support two
devices on the same channel, the master/slave configuration was developed. This configuration
allows one drive's controller (the master) to tell the other drive's controller (the slave) when it can
transfer data to or from the computer. Some drives feature an option called Cable Select (CS). With
the correct type of connecting cable, these drives can be automatically configured as master or slave.
Most drives today come preset for CS, which allows the BIOS to configure itself as needed.
16
Standard and Other Description
Common Names for It
IDE, ATA, ATA-1, or The original PATA specification supported one channel, with two
PATA drives configured in a master/slave arrangement. A second channel was
added later.
EIDE, Fast ATA, Also known as ATA Interface with Extensions ATA-2, Western Digital
ATA-2, or Fast ATA-2 called its implementation EIDE. Seagate’s was called Fast ATA or Fast
ATA-2. It could implement power-saving mode features, if desired.
ATA-3 A minor enhancement to ATA-2, this standard improved reliability for
high-speed data transfer modes. Self Monitoring Analysis And
Reporting Technology (SMART) was introduced. This is logic in the
drives that warns of impending drive problems. Password protection
was available as a security feature of the drives.
ATA/ATAPI-4, ATA-4, This standard doubled data transfer rates. ATA Packet Interface
Ultra ATA/33, Ultra (ATAPI) is an EIDE interface enhancement that includes commands
DMA, UDMA, or used to control tape, CD-ROM, and other removable drives.
UDMA/33
ATA/ATAPI-5, ATA-5, The ATA-5 specification introduced UDMA modes 3 and 4, as well as
Ultra ATA/66, or mandatory use of the 80-conductor (40-pin), high-performance IDE
UDMA/66 cable with UDMA modes higher than 2. Additional changes to the
command set were also part of this specification. This standard supports
drives up to 137 GB.
ATA/ATAPI-6, ATA-6, This standard supports data transfers at up to 100 MBps and supports
Ultra ATA/100, or drives as large as 144 petabytes (PB), which is approximately 144 million
UDMA/100 GB or 144 quadrillion bytes.
PIO Programmed Input/Output (PIO) is a data transfer method that
includes the CPU in the data path. It has been replaced by DMA and
UDMA.
DMA Direct Memory Access (DMA) is a data transfer method that moves
data directly from the drive to main memory. UDMA transfers data in
burst mode at a rate of 33.3 MB per second. The speed is two times
faster than DMA.
SATA This standard uses serial instead of parallel signaling technology for
ATA and ATAPI devices. SATA employs serial connectors and serial
cables, which are smaller, thinner, and more flexible than traditional
PATA cables. Data transfer rates are 150 MB per second or greater.
SATA II, SATA2, or This standard provides data transfer rates of 300 MBps.
SATA 3 Gbps
SATA 6 Gbps This standard doubled data transfer rates, and is designed to support the
latest (and future) solid state drives (SSDs).
SCSI Standards
SCSI standards have been revised repeatedly over the years. The following table describes current
SCSI standards.
SCSI-1 Features an 8-bit parallel bus (with parity), running asynchronously at 3.5 MBps
or 5 MBps in synchronous mode, and a maximum bus cable length of 6 meters,
compared to the 0.45-meter limit of the PATA interface. A variation on the
17
SCSI Standard Description
original standard included a high-voltage differential (HVD) implementation with a
maximum cable length of 25 meters.
SCSI-2 Introduced the Fast SCSI and Wide SCSI variants. Fast SCSI doubled the
maximum transfer rate to 10 MBps, and Wide SCSI doubled the bus width to 16
bits to reach 20 MBps. The maximum cable length was reduced to 3 meters.
SCSI-3 The first parallel SCSI devices that exceeded the SCSI-2 capabilities were simply
designated SCSI-3. These devices were also known as Ultra SCSI and Fast-20
SCSI. The bus speed doubled again to 20 MBps for narrow (8-bit) systems and
40 MBps for wide (16-bit). The maximum cable length stayed at 3 meters.
Ultra-2 SCSI This standard featured a low-voltage differential (LVD) bus. For this reason, Ultra-2
SCSI is sometimes referred to as LVD SCSI. LVD's greater immunity to noise
allowed a maximum bus cable length of 12 meters. At the same time, the data
transfer rate was increased to 80 MBps.
Ultra-3 SCSI Also known as Ultra-160 SCSI, this version was basically an improvement on
the Ultra-2 SCSI standard, in that the transfer rate was doubled once more to
160 MBps. Ultra-160 SCSI offered new features such as cyclic redundancy check
(CRC), an error correcting process, and domain validation.
Ultra-320 SCSI This standard doubled the data transfer rate to 320 MBps.
Ultra-640 SCSI Also known as Fast-320 SCSI, Ultra-640 doubles the interface speed yet again,
this time to 640 MBps. Ultra-640 pushes the limits of LVD signaling; the speed
limits cable lengths drastically, making it impractical for more than one or two
devices.
Serial SCSI Four versions of SCSI—Serial Storage Architecture (SSA), Fibre Channel-Alternating
Loop (FC-AL), IEEE 1394, and Serial Attached SCSI (SAS)—perform data
transfer via serial communications. Serial SCSI supports faster data rates than
traditional SCSI implementations, hot swapping, and improved fault isolation.
Serial SCSI devices are generally more expensive than the equivalent parallel
SCSI devices.
iSCSI Internet SCSI (iSCSI) provides connectivity between SCSI storage networks over
an IP-based network without the need for installing Fibre Channel.
Optical Disks
Optical Disks An optical disk is a storage device that stores data optically, rather than magnetically. The removable
plastic disks have a reflective coating and require an optical drive to be read. In optical storage, data
is written by either pressing or burning with a laser to create pits (recessed areas) and lands (raised
areas) in the reflective surface of the disc. Common optical disks include compact discs (CDs) and
digital versatile discs (DVDs).
CD-ROM Compact Disc-Read Only Memory. Data is permanently burned onto the
disk during its manufacture.
CD-R CD-Recordable. Data can be written to the disk only once.
CD-RW CD-Rewritable. Data can be written to the disk multiple times.
18
Optical Disk Type Description
DVD-ROM Digital Versatile Disc-Read Only Memory. Data is permanently burned onto
the disk during its manufacture.
DVD-R DVD-Recordable. Data can be written to the disk only once.
DVD+R Another format of DVD-Recordable. Data can be written to the disk only
once.
DVD+R DL DVD-Recordable Double Layer. A higher-capacity double-layer format.
Data can be written to the disk only once.
DVD-RW DVD-Rewritable. Data can be written to the disk multiple times.
Dual Layer DVD- A DVD-RW disc that has two layer of writable space with a maximum
RW capacity of 8.5 GB. These disks are not used widely due to the cost and the
release of Blu-ray.
DVD+RW Another format of DVD-Rewritable. Data can be written to the disk
multiple times.
DVD-RAM DVD-Random Access Memory. Data can be written to the disk multiple
times.
BD-ROM Blu-ray Disc-Read Only Memory. Blu-ray discs (BD) are intended for high-
density storage of high-definition video as well as data storage. Current Blu-
ray discs hold 50 GB total. However, companies such as Sony are testing
experimental disks that have storage capacities of up to 200 GB and more.
BD-R Blu-ray Disc-Recordable (BD-R). Data can be written to BD-R once.
BD-RE Blu-ray Disc-Recordable Erasable. BD-RE is a disc that can be written to as
well as erased. Data can be written to and erased from the disk many times
without compromising the integrity of the disk or the data stored on it.
Optical Drives
An optical drive is an internal or external disk drive that reads data to and writes data from an optical Optical Drives
disc. Optical drives can be connected to the system by using IDE, SCSI, or other interfaces. Internal
optical drives generally have a 5.25-inch form factor.
CD Compact discs store data on one side of the disc, and most hold up to 700 MB of
data, although older disks and drives may support only up to 650.4 MB of data.
CDs are widely used to store music and data. To meet the audio CD standard, the
CD drive on a computer must transfer data at a rate of at least 150 KBps. Most
19
Optical Drive Description
Type
CD drives deliver higher speeds: at least eight times (8x) or sixteen times (16x) the
audio transfer rate. There are also drives with much higher transfer rates, up to
52x. CD drives use one of two special file systems: Compact Disc File System
(CDFS) or Universal Disc Format (UDF). CDs can be either CD-R (which can be
written to once) or CD-RW (which can be written to multiple times).
DVD Digital versatile discs can typically hold 4.7 GB on one side of the disk; it is
possible to write to both surfaces of the disk, in which case the disk can hold up to
9.4 GB. There are also dual-layer disks, which store additional data on each side,
and are capable of holding up to 17 GB. DVD drives access data at speeds from
600 KBps to 1.3 MBps. Because of the huge storage capacity and fast data access,
DVDs are widely used to store full-length movies and other multimedia content.
DVD drives use UDF as the file system. DVDs can be DVD-R (which can be
written to once), or DVD-RW (which can be written to multiple times).
Blu-ray Named for the blue laser it uses to read and write data, Blu-ray drives read and
write data from Blu-ray discs. Blu-ray discs are primarily used for high-definition
video, though they are also used for data storage. Blu-ray used to compete with
high-definition (HD) DVD for market share, but has since emerged as the winner
of that battle. The wavelength of the blue laser is shorter than that of the red laser
used in previous optical drives, so data can be more tightly packed on a Blu-ray
disc. A single-layer Blu-ray disc can hold up to 25 GB of information, and a dual-
layer Blu-ray disc can hold up to 50 GB, dwarfing the capacity of a standard
double-sided DVD. Blu-ray uses UDF v2.5.
Combination A combination drive, also referred to as a combo drive, can read and write to a
drives and number of different optical disc types. Older combo drives were equipped with the
burners read/write function for CDs only, but could also read DVDs. However, most
combo drives today are primarily DVD-RW burners that also have the ability to
read/write CDs and Blu-ray discs. Depending on your needs, you may require a
combo drive that can also support the use of dual-layer DVD-RW discs.
Depending on the manufacturer, some combination Blu-ray drives and players can
also read/write to CDs and DVDs. It is a best practice to check the specific
manufacturer's drive capabilities to verify which media the device can support.
Tape Drives
A tape drive is a storage device that stores data magnetically on a tape that is enclosed in a removable
tape cartridge. Data on the tape must be read sequentially. Sizes for external tape drives vary, but
internal drives have a 5.25-inch form factor. Tape drives are most commonly used to store backup
copies of archived, offline data in large data centers and are almost never used with desktop
computers. Recent technological advances made by IBM have allowed for data on tapes to be
accessed and read in a file format method similar to other storage media, such as optical disks and
flash drives. The specification is called Linear Tape File Systems (LTFS). LTFS is a tape format that
determines how data is recorded on tape, and how specialized software will read that data.
20
Figure 1-12: A tape drive.
USB flash drives USB flash drives come in several form factors, including thumb drives and
pen drives. Thumb drives can be small, from 50 to 70 mm long, 17 to 20 mm
wide, and 10 to 12 mm thick. Data storage capacities vary, from 128 MB up to
128 GB. Data transfer rates also vary, from 700 KBps to 28 MBps for read
operations, and from 350 KBps to 15 MBps for write operations.
21
Solid State Specifications
Storage Device
CF cards CompactFlash (CF) cards are flash memory cards that are 43 mm long by 36
mm wide. Due to their compact size, they are typically used in portable
devices. Type I is 3.3 mm thick and Type II is 5 mm thick. They hold 100 GB
or more, and have a 50-pin contact. Transfer speeds of up to 66 MBps are
possible.
Newer versions of the CF card offer speeds up to 1 Gbps and can store up to
1 terabyte (TB) of data.
CF cards are commonly used for additional storage in:
• Digital cameras
• Music players
• Personal computing devices
• Photo printers
• Digital camera recorders
22
Solid State Specifications
Storage Device
SM cards SmartMedia (SM) cards are flash memory cards that are similar in size to the
CF cards, and are 45 mm long by 37 mm wide by 0.76 mm thick. They can
hold up to 128 MB and can transfer data at speeds of up to 8 MBps.
SM cards are commonly used for additional storage in:
• Digital cameras
• Digital camera recorders
• Older models of personal digital assistants (PDAs)
xD xD-Picture Cards (xD) are flash memory cards that are specifically designed
for use in digital cameras. They are 20 mm long by 25 mm wide by 1.7 mm
thick. They can hold up to 2 GB with plans for up to 8 GB. Data transfer
rates range from 4 to 15 MBps for read operations and from 1.3 to 9 MBps
for write operations.
23
Solid State Specifications
Storage Device
MSes Memory sticks (MSes) are flash memory cards that are 50 mm long by 21.5
mm wide by 2.8 mm thick. They can hold up to 16 GB and are used
extensively in Sony products such as VAIO® laptops. Data transfer rates are
2.5 MBps for read operations and 1.8 MBps for write operations.
SD cards The original Secure Digital (SD) Memory Card is 32 mm long, 24 mm wide,
and 2.1 mm thick. The miniSD Card measures 21.5 mm by 20 mm by 1.4 mm,
and the microSD/TransFlash Card measures 15 mm by 11 mm by 1 mm. SD
Memory Cards are currently available in several capacities, up to 2 TB. Data
transfer rates range from 10 MBps to 20 MBps.
SD cards are used in many different devices, including:
• Laptops
• Digital cameras
• Smartphones
• Handheld gaming devices
• Audio players
24
Solid State Specifications
Storage Device
25
ACTIVITY 1-2
Identifying Storage Devices
Scenario
In this activity, you will identify storage devices.
Consider displaying
various examples of
storage devices, 1. Your instructor might provide you with examples of storage devices and ask you or other participants to
including both drives and identify them.
disks or other media,
and ask participants to 2. Which storage device records data magnetically and is most often used for backups?
identify them. This can
be an opportunity to ○ FDD
generate discussion on ○ HDD
the differences between
the various types of
○ Optical disk drive
devices and the media ○ Tape drive
that they use, as well as
the common practice of
○ SSD
treating the drive and the
medium as identical 3. What is the primary benefit of using solid state storage?
entities. A: Answers will vary, but should include the portability of thumb drives and other small solid state
If you have virtual devices, and the speed of data access when compared to traditional magnetic storage media.
students attending your
class, be sure that they 4. Which two optical drive media types enable you to write to an optical disk only once?
can see the devices you ☐ CD-ROM
are displaying in class.
☐ CD-R
☐ CD+RW
☐ DVD+R
☐ DVD-RW
26
TOPIC C
Device Connections and Interfaces
You are already familiar with the common components that make up a personal computer. Next,
you need to be able to identify how all the components are connected together to form a complete
personal computer system. In this topic, you will identify device connection and interface methods.
A personal computer is made up of many different components. All of these components need to
be able to communicate with each other in order for the computer to function properly. As personal
computers have evolved over the years, a number of connection technologies have been
implemented to provide communication among computer components. As a computer technician,
identifying the different methods that are used to connect devices to a computer will enable you to
install, upgrade, and replace personal computer components quickly and effectively.
This topic covers all or part of the following CompTIA® A+® (2012) Exam 220-801 certification
objectives:
• Objective 1.7: Compare and contrast various connection interfaces and explain their purpose.
• Objective 1.11: Identify connector types and associated cables.
Ports
A port is a hardware interface that you can use to connect devices to a computer. The port transfers
electronic signals between the device and the system unit. The port is either an electrically wired
socket or plug, or it can be a wireless transmission device. Ports can vary by shape, by color
according to the color coding standards, by the number and layout of the pins or connectors
contained within the port, by the signals the port carries, and by the port's location. Ports exist for
both internal and external devices. External ports often have a graphical representation of the type
of device that should be connected to it, such as a small picture of a monitor adjacent to the video
port. 7
Ports
27
Figure 1-13: Ports on a personal computer.
Genders
Most ports and the cables that connect to them have genders. For example, most computer ports
are jacks, into which you plug in the matching cable. The computer's jacks are most often the female
connectors and the cable's plug is most often the male connector. You can always look directly at
the innermost electrical connections on the connectors to determine the gender. The one with the
protruding pins is the male and the one with the holes to accept the pins is the female.
Port Shapes
Ports can have different physical shapes such as round, rectangular, square, and oblong. There is
some standardization of physical properties and functions, though. Most connectors are keyed in
some way to restrict connecting devices into the wrong port.
PS/2 Ports
The round 6-pin port, also referred to as a mini-Din connector or PS/2 port, is an interface located
on the motherboard. The Din-6 port is the larger 13.2 mm port. Many keyboards and mice use PS/2
ports to connect to the motherboard. To avoid confusion between the identical-looking keyboard
and mouse ports, PS/2 ports are often color-coded to match the end of the cable on the device:
purple for the keyboard and green for the mouse. Or, there may be a sticker with a picture of a
mouse and keyboard near the connectors.
Computer Connections
Computer connections are the physical access points that enable a computer to communicate with
internal or external devices. They include the ports on both the computer and the connected
devices, plus a transmission medium, which is either a cable with connectors at each end or a
28
wireless technology. Personal computer connections can be categorized by the technology or
standard that was used to develop the device.
Serial Connections
A serial connection is a personal computer connection that transfers data one bit at a time over a single
wire. Serial connections support two-way communications and were typically used for devices such
as fax cards or external modems. These legacy serial ports have either 9-pin (DB-9) or 25-pin
(DB-25) male connectors. A legacy serial cable ends with a female connector to plug into the male
connector on the system unit. On system units that have color-coded ports, the serial port is teal-
colored. Serial connections that are seen today are used to attach printers, scientific devices such as
telescopes, networking hardware such as routers and switches, and industrial products. In most
cases, these devices will need to be connected using a USB adapter.
29
Ethernet and USB ports
are technically also Serial Transmissions
types of serial In a serial transmission, data is sent and received one bit at a time over a single wire. To accomplish
connections, and
operate similarly;
this, the serial communication process:
however, the term "serial 1. Disassembles bytes into bits on the sending end of the communication.
port" generally refers to 2. Sends the bits across the communication wires.
legacy 9-pin or 25-pin
serial connections.
3. Reassembles the bits into bytes at the receiving end.
Parallel Connections
Parallel Connections A parallel connection is a computer connection that transfers data eight or more bits at a time over
eight or more wires. Any components connected by multiple data pathways may be considered to
have a parallel connection, but the term is generally used to refer to a standard legacy parallel port
that uses eight data wires, and is typically used to connect a printer to a system unit. Parallel
connections in older personal computers support only one-way or unidirectional communications.
Newer computers have parallel ports that support bidirectional communications. Standard parallel
ports have 25-pin female connectors. A parallel cable has a 25-pin male connector to plug into the
system unit and a 36-pin male Centronics connector at the other end to attach to the external
device. On system units that have color-coded ports, the parallel port is burgundy or dark pink.
Note: The standard parallel port has been phased out in favor of USB, so you may find many
systems with no parallel ports at all.
30
FDD Connections
Internal FDDs have two primary connections: the power connection and the data connection. The
data connection is a parallel connection. The FDD cable is a 34-pin flat ribbon cable with a twist,
which is used to differentiate between multiple FDDs in a system.
USB Connections
A universal serial bus (USB) connection is a computer connection that enables you to connect multiple
peripherals to a single port with high performance and minimal device configuration. USB
connections support two-way communications. All modern PC systems today have multiple USB
ports and can, with the use of USB hubs, support up to 127 devices per port. USB cables may have
different connectors at each end. The computer end of the cable ends in a Type A connector. The
device end of the cable commonly ends in a Type B connector, or may also end in a Mini-A, Mini-B,
Micro-AB, or Micro-B connector. The mini connectors are typically used for portable devices such
as smartphones. The size of the connector varies depending on the device. USB connections
transfer data serially, but at a much faster throughput than legacy serial connections. USB devices
also incorporate Plug-and-Play technology that allows devices to self-configure as soon as a
connection is made.
USB Standards
USB 2.0, released in April 2000, is the most commonly implemented standard. It can communicate
at up to 480 Mbps. The original USB 1.1 standard is still commonly found in devices and systems. It
can communicate at up to 12 Mbps. A USB 2.0 device connected to a USB 1.1 hub or port will
communicate at only USB 1.1 speeds, even though it might be capable of faster speeds. Generally,
the operating system will inform you of this when you connect the device.
USB 3.0, also called SuperSpeed USB, is the latest USB standard released in November 2008. It
features a maximum transfer rate of 5.0 Gbps. It is 10 times faster than the USB 2.0 standard, has
enhanced power efficiency, and is backward compatible with USB-enabled devices currently in use.
USB cables have a maximum distance before performance suffers. To work around this, one or
more hubs can be used to create a "chain" to reach the necessary cable length. USB 1.1 has a
maximum cable length of 3 meters, while USB 2.0's maximum length is 5 meters. In each case, a
maximum of five hubs can be used to extend the cable length. The maximum cable length is not
specified in the USB 3.0 specification.
FireWire Terminology
Apple® was the primary vendor to promote the IEEE 1394 Standard, and used the FireWire name
as a trademark for the IEEE 1394 implementation included in its Macintosh® systems. FireWire has
since become the common name for all IEEE 1394 devices.
SCSI Connections
SCSI, pronounced “scuzzy,” is an older connection standard, typically used for storage devices such
as tape and hard drives, that remains in use due to its reliability and high speed. A SCSI adapter has
a port for external devices and a connection for internal devices. SCSI devices themselves can have
multiple ports, enabling you to connect up to seven devices in a chain to one SCSI adapter. Each
device in the chain requires a unique ID, which you configure by using switches or jumpers. SCSI
cables have 25-pin, 50-pin, 68-pin, or 80-pin connectors, depending upon the type of SCSI in use.
PATA Connections
A PATA connection is a drive connection standard that provides a parallel data channel from the
drive controller to the disk drives. Originally called ATA, IDE, EIDE, or UDMA, PATA
connections are used to connect internal hard drives, optical drives, and tape drives to the system
board. On the system board, two sockets provide connections for up to two drives per socket.
PATA cables are ribbon cables with 40 or 80 wires and 40-pin connectors.
33
Note: You might hear PATA pronounced “Parallel ay-tee-ay,” “PEE-ay-tee-ay,” “PAY-tuh,” or
“PAT-uh.”
Scheme Description
Master/slave In the master/slave configuration scheme, the drive that is the target of the
command responds to it, and the other one ignores the command, remaining
silent. Each manufacturer uses a different combination of jumpers for
specifying whether its drive is master or slave on the channel, though they are
all similar. Some manufacturers put this information right on the top label of
the drive itself, while others do not. Jumper information is available in the
hard disk’s documentation, or by checking the manufacturer's website and
searching for the model number.
CS With CS, you do not have to set jumpers to designate which device is master
and which is slave. The connectors that are connected to the devices take care
of the configuration. To set up CS, you need to use a jumper to set both
devices on the channel to the CS setting, along with a special cable. This cable
is similar in most respects to the regular PATA cable, except for the Cable
SELect (CSEL) signal, which the devices use to determine which is the master
and which is the slave.
SATA Connections
A SATA connection is a drive connection standard that enhances PATA by providing a serial data
channel between the drive controller and the disk drives. SATA transfer speeds are much higher
than PATA for the same drive technologies. SATA's physical installation is also easier because the
SATA power and data cables are much smaller, thinner, and more flexible than traditional PATA
ribbon cables. SATA connectors have seven pins.
34
Figure 1-21: A SATA connection.
Note: You might hear SATA pronounced “Serial ay-tee-ay,” “ESS-ay-tee-ay,” “SAY-tuh,” or
“SAT-uh.”
Note: Although current practice is to use the terms “IDE” and “PATA” interchangeably, you
should be aware that SATA is also a type of IDE drive, but with a different interface.
eSATA
External SATA (eSATA) is an external interface for SATA connections. Like USB and FireWire, it
provides a connection for external storage devices. eSATA connections provide fast data transfers
without having to translate data between the device and the host computer. eSATA interfaces do
require an additional power connector to function. You can provide eSATA functionality by
installing eSATA cards in systems.
If you have an eSATA
connector available, let
Display Cable and Connector Types students see what the
connector looks like.
Display devices can use several different types of cables.
Display Cable and
Connector Types
Cable Type Description
As you talk through all
Video Graphics Array The DB-15 high-density VGA connector is the most common cable used for the different connector
(VGA) types, stop and ask
LCD monitors. It contains three rows of five pins. Pins 4, 11, 12, and 15
students if they have
receive information from the device, while pins 1, 2, 3, 13, and 14 send used any of the
information to the display. connector types and
when and how they used
them.
Mention that the
connection types
presented here will be
important later in Lesson
7 when custom client
workstations is covered.
35
Cable Type Description
36
Cable Type Description
Mini-High Definition Mini-HDMI is similar to the full size HDMI connector, except that it is
Multimedia Interface specified for use with portable devices. The connector is a smaller version of
(Mini-HDMI) the full size with same number of pins. The difference between the full size
and the mini is that some of pins have different transmission functions.
Separate Video (S- S-Video is an analog video signal that carries the video data as two separate
Video) signals (brightness and color). S-Video works in 480i or 576i resolution.
Note: Video resolution is sometimes noted in the format shown here,
particularly when television signals are being discussed. A resolution
of 480i indicates a vertical frame resolution of 480 interlaced lines that
contain picture information, while a resolution of 576i indicates a
vertical frame resolution of 576 interlaced lines that contain picture
information.
37
Cable Type Description
Composite video Composite video is the format of an analog (picture only) signal before it is
combined with a sound signal and modulated onto a radio frequency (RF)
carrier.
Coaxial A coaxial cable, or coax, is a type of copper cable that features a central
conducting copper core surrounded by an insulator and braided or foil
shielding. An insulator separates the conductor and shield, and the entire
package is wrapped in an insulating layer called a jacket. The data signal is
transmitted over the central conductor. The outer shielding serves to reduce
electromagnetic interference.
DisplayPort DisplayPort is a digital display standard that aims to replace DVI and VGA
standards. DisplayPort is not backward compatible with DVI and HDMI
and is a royalty-free standard. However, by using special dual-mode ports
and suitable adapters, it may be possible to use DVI and HDMI signals with
DisplayPort. Similar to Peripheral Component Interconnect Express (PCIe),
DisplayPort also supports high-quality gaming and other applications that
use high-end graphics.
38
Cable Type Description
Radio Corporation of RCA cables and connectors are used to carry audio and video transmissions
America (RCA) to and from a variety devices such as TVs, digital cameras, and gaming
systems. In some cases, the RCA cable may also be used as a power cable, a
loud speaker cable, and to carry digital audio. The female jacks on the
devices are colored to provide a guide as to what type of connector can be
attached. Common colors found are:
• Yellow for various composite connections.
• Red for the right channel of the audio transmission.
• White or black for the left channel of audio transmission.
Bayonet Neill- The BNC connector is used with coaxial cable to carry radio frequencies to
Concelman (BNC) and from devices. The BNC cable can be used to connect radio equipment,
aviation electronics, and to carry video signals. The actual BNC connectors
come in two versions. The connector will be either 50 or 75 ohms,
depending on the specific cable that is attached.
Audio/Video Connections
There are a number of audio/video connectors that are used to connect a wide variety of devices,
including PCs, DVD and Blu-ray players, surround sound systems, stereo equipment, projectors,
and HDTVs. In addition to HDMI and DVI, common audio/video cable and connectors include
those described in the following table. 9
39
Type Description
Single-core/shielded The single core wire is the positive, and the shield is the negative. This
cable type of cable is used for unbalanced audio signals. Generally, unbalanced
audio cables are short, because noise is less of an issue.
One pair/shielded Uses a pair (white and red) of cores with one wire being the positive, and
cable the other wire being the negative. The shield acts as a ground. This type
of cable is used for balanced audio signals. Balanced audio is a method
for minimizing noise and interference in audio cables.
TS and TRS The most common connectors used in for unbalanced audio cables are
connectors the 1/4-inch tip-sleeve (TS) or tip-ring-sleeve (TRS) and RCA
connectors, which are typically used with high-end audio equipment. The
1/8-inch tip-sleeve is typically used with smaller audio devices such as
Apple® iPods®. TS and TRS connectors are also referred to as phone
jacks, phone plugs, audio jacks, and jack plugs. Traditionally, TS
connectors are used for mono, while TRS connectors are used for stereo.
Some connectors can carry more signals; these are often used with
camcorder, laptops, and other devices. Stereo connectors can also carry a
single, balanced signal. Wiring configurations for TRS connectors include:
• For unbalanced mono, the tip carries the signal, the ring is not
connected, and the sleeve acts as ground.
• For balanced mono, the tip is positive, the ring is negative, and the
sleeve acts as ground.
• For stereo, the tip carries the left channel, the ring carries the right
channel, and the sleeve acts as ground.
40
Type Description
3-pin XLR connectors The standard connector for balanced audio is the 3-pin XLR. The most
common wiring configuration is:
• Pin 1: Shield (ground)
• Pin 2: Positive (hot)
• Pin 3: Negative (cold)
Radio frequency (RF) Radio networking is a form of wireless communication in which signals are sent
via RF waves, in the 10 KHz to 1 GHz range, to wireless antennas.
An antenna transmits by converting electrical energy into an RF wave. When
an antenna receives a transmission, it converts the RF wave into electrical
energy.
41
Connection Method Description
42
Frequency Range Name
3 KHz–30 KHz Very Low Frequency (VLF)
30 KHz–300 KHz Low Frequency (LF)
300 KHz–3000 KHz Medium Frequency (MF)
3 MHz–30 MHz High Frequency (HF)
30 MHz–300 MHz Very High Frequency (VHF)
300 MHz–3000 MHz Ultra High Frequency (UHF)
3 GHz–30 GHz Super High Frequency (SHF)
30 GHZ–300 GHz Extremely High Frequency (EHF)
43
ACTIVITY 1-3
Identifying Device Connections and Interfaces
Scenario
In this activity, you will identify device connections and interfaces.
Consider displaying 1. Your instructor might provide you with examples of device connections and interfaces and ask you or
various examples of other participants to identify them.
device connectors and
interfaces, and ask 2. Examine the following graphic and identify the ports.
participants to identify
them. This can be an Identify the ports shown in the graphic. Use labels such as audio port, parallel port, PS/2 port, serial
opportunity to generate port, and USB port.
discussion on the A:
differences between the
various types of
connections and where
they might be used.
4. Which type of connection features small, thin data and power cables?
○ SCSI
○ PATA
○ SATA
○ Parallel
5. Which connection type transfers data eight or more bits at a time over eight or more wires?
○ Serial connection
○ Parallel connection
○ USB connection
○ FireWire connection
44
6. Which connection type connects a series of internal hard drives in a master/slave configuration?
○ Parallel connection
○ USB connection
○ SCSI
○ PATA
45
Summary
In this lesson, you identified the components that make up most computers. The ability to identify
the various parts of computers is essential foundational knowledge for every computer technician.
Use the review
questions provided to How many of the personal computer components described are familiar to you?
generate discussion A: Answers will vary, but may include the system unit, display devices, input devices such as the
among the participants. keyboard and mouse, and peripheral devices such as printers and cameras.
Which of the device connections discussed were familiar to you? Which were new?
A: Answers will vary, but may indicate familiarity with USB and wireless, and unfamiliarity with FireWire
and SCSI.
Note: Check your LogicalCHOICE Course screen for opportunities to interact with your
classmates, peers, and the larger LogicalCHOICE online community about the topics covered in
this course or other topics you are interested in. From the Course screen you can also access
available resources for a more continuous learning experience.
Encourage students to
use the social
networking tools
provided on the
LogicalCHOICE Home
screen to follow up with
their peers after the
course is completed for
further discussion and
resources to support
continued learning.
46
2 Operating System
Fundamentals
Lesson Time: 2 hours, 50 minutes
Lesson Objectives
In this lesson, you will identify the basic components and functions of an operating system.
You will:
• Identify the most common personal computer operating systems.
• Identify the utilities that you can access via the Windows Control Panel.
• Identify command line tools and how they function.
• Identify Windows security settings.
• Identify Windows operating system tools.
Lesson Introduction
In the previous lesson, you identified the hardware components of standard desktop
personal computers. The other major element of a personal computer is the operating
system, which is the software that provides the user interface and enables you to access and
use the hardware components. In this lesson, you will identify the basic components and
functions of an operating system.
As a professional IT support representative or PC service technician, your job will include
installing, configuring, maintaining, and troubleshooting personal computer operating
systems. Before you can perform any of these tasks, you need to understand the basics of
what an operating system is, including the various versions, features, components, and
technical capabilities. With this knowledge, you can provide effective support for all types of
system environments.
This lesson covers all or part of the following CompTIA® A+® (2012) certification
objectives:
• Topic A:
• Exam 220-802: Objective 1.1
• Topic B:
• Exam 220-802: Objectives 1.1, 1.5
47
• Topic C:
• Exam 220-802: Objectives 1.1, 1.3
• Topic D:
• Exam 220-802: Objectives 1.2, 1.8, 2.3.
• Topic E:
• Exam 220-802: Objectives 1.1, 1.4
48
TOPIC A
Personal Computer Operating Systems
In this lesson, you will identify the basic components and functions of personal computer operating
systems. The first step is to learn about the various operating systems available today, and to identify
those that are commonly used on personal computers. In this topic, you will identify the most
common personal computer operating systems.
Aside from hardware, the operating system is the next most important piece of the personal
computer system. Without a user-friendly operating system, most people would not be capable of
using their computers to successfully perform the tasks required of them. As an IT professional,
being familiar with the different types of operating systems that can be installed on personal
computers can help you to support a variety of computer environments.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220-802, Objective 1.1: Compare and contrast the features and requirements of various
Microsoft Operating Systems.
Microsoft Windows
Microsoft® Windows® is the single most popular and widely deployed operating system on both
desktop computers and server systems in the world today. The various versions of Windows all
feature a graphical user interface (GUI), support for a wide range of applications and devices, a
minimum of 32-bit processing, native networking support, and a large suite of built-in applications
and accessories such as the Internet Explorer® browser. Windows currently comes pre-installed on
many personal computers sold commercially.
There have been several versions of Windows since its inception. The three most current versions
are often deployed on personal and professional computers.
• Windows® 7, the latest in the Microsoft product line covered in the CompTIA® A+® objectives,
was released in 2009. Windows 7 returned to the overall look and feel found in Windows® XP in
response to the criticism of Windows Vista®'s interface. Rather than introduce a multitude of
new features like Vista, 7 instead offered many critical upgrades to the system, including
application and hardware compatibility, performance improvements, and a redesigned shell.
• Windows Vista was released in 2007 and included many new features, the most noticeable
change being to the user interface. While it offered many upgrades to the system, specifically to
security features, many were critical of the redesigned interface.
• Windows XP was released in 2001, and was available in both Home and Professional editions. It
was highly praised as a consumer-friendly and highly usable operating system (OS) for personal
use, not just for those in the professional environment. Windows XP is often still found on both
home computers and in enterprise implementations; however, Microsoft no longer provides
active product support for Windows XP.
Note: Microsoft announced the latest version of Windows, Windows® 8, in 2012.
49
Version Description
50
Version Description
Version Description
Windows Small Business Windows Small Business Server® 2011, Microsoft's network solution
Server 2011 designed for small businesses, is available in two editions:
• Small Business Server 2011 Standard, an all-in-one network
solution that provides enterprise-level server features such as email,
file and printer sharing, daily backups, remote access, and Internet
connections, but for a small business with up to 75 employees.
• Small Business Server 2011 Essentials, a network solution that uses
the cloud to provide access and protection to business data, email,
resources, and tools for very small businesses with up to 25
employees.
Small Business Server 2011 Premium Add-on, an add-on for Small
Business Server 2011 allows small businesses to deploy additional
servers on the network.
Windows Server 2008 Windows Server 2008, Microsoft's current server-oriented operating
system, is currently available as Release 2 (R2) and is available in
several different editions:
• Server 2008 Foundation, an affordable small-business platform for
file and print sharing, remote access, security, and clean upgrade
paths.
• Server 2008 Datacenter, a highly scalable platform for large-scale
virtualization.
• Server 2008 Enterprise, optimized for applications, clustering, and
identity management.
• Server 2008 Standard, with enhanced security options,
virtualization capabilities, and the ability to streamline management.
• Web Server 2008, integrated with ASP.NET and the .NET
Framework.
• HPC Server 2008, which stands for High-Performance Computing,
is able to scale to thousands of cores, and can be easily integrated
with non-Microsoft HPC servers.
• Server 2008 for Itanium®-based Systems, for large databases.
Itanium is the name of a processor available from Intel®.
Windows Server 2003 Windows Server® 2003 was last updated with the R2 release in 2005.
Windows Server 2003 R2 comes in several editions:
• Windows Server 2003 R2 Standard Edition, for general purpose
use as a file server or service host, or to support the needs of small
and medium businesses.
• Windows Server 2003 R2 Enterprise Edition, optimized to support
enterprise network management for large numbers of users,
computers, and services.
51
Version Description
Feature Description
Aero Windows Aero® is a color scheme available in Windows Vista and Windows 7.
Windows Aero provides a visually rich experience with its glossy and transparent
interface. It also provides dynamic visual and animation effects such as Live
Preview of taskbar buttons and a Flip 3D view of open windows. You can choose a
color scheme from one of the predefined color schemes available in Windows
Aero, or you can create a custom color scheme using the color mixer. Each color
has a default transparency level that you can change for both predefined and
custom color schemes.
Gadgets The Desktop Gadget Gallery is a Windows 7 feature that displays different gadgets,
which are mini applications that can perform many different information-display
tasks, including displaying the date and time, central processing unit (CPU) usage,
stock information, and user-selected news headlines. If a gadget for a particular
need is not available from Microsoft or from a third-party developer, users can
create their own. Available gadgets are stored in the Gadget Gallery, which provides
a link to download additional gadgets.
BitLocker Windows BitLocker® is a security feature of Windows 7 and Windows Server® 2008.
This security feature provides full disk-encryption protection for your operating
system, as well as all the data stored on the operating system volume. BitLocker
encrypts all data stored on the operating system volume and is configured by
default to use a Trusted Platform Module. This feature ensures the protection of
early startup components and locks any BitLocker-secured volumes in order to
prevent access or tampering when the operating system is not running.
Shadow The Shadow Copy technology is available on Windows XP and newer versions. It
Copy creates backup copies or "snapshots" of the system's data and stores them locally or
to an external location of the user's choosing. You can perform Shadow Copy
operations manually, or you can set up automatic backups at scheduled intervals.
System The System Restore utility is available in Windows XP, Windows Vista, and Windows
restore 7. It monitors the system for changes to core system files, drivers, and the Registry.
It automatically creates a system restore point, which is a snapshot of the system
configuration at a given moment in time that contains information about any
changes to system components. Restore points are stored on the computer's hard
disk, and you can use them to restore system settings to an earlier state without
affecting changes in user data since that time.
52
Feature Description
ReadyBoost ReadyBoost® is a performance enhancer that is available on Windows Vista and
Windows 7 and that enables the user to supplement the computer's memory with
an external storage device such as a flash drive.
Sidebar The Sidebar is a designated area of the Windows Vista desktop that is displayed
vertically along the side of the desktop. Users can add gadgets of their choice to
appear in the Sidebar, in order to provide information and access to frequently used
tools or programs.
Compatibility Compatibility mode enables older programs or applications to run on a newer
mode version of Windows. You can configure compatibility for specific applications or
programs by using the Properties options for the applications. Windows 7 can
accommodate legacy applications dating back through Windows 95.
XP mode Windows XP mode is a download that is available for Windows 7 versions and that
is designed to enable users running Windows 7 to access and use Windows XP-
compatible software and programs directly on their desktops.
Defender Windows Defender is the antispyware software that is included with Windows XP,
Vista, and 7 installations. You can configure Defender to scan for malicious
materials at scheduled intervals, automatically remove any spyware detected during
a scan, or even alert you in real time if spyware installs or runs on the computer.
Category In Windows XP and later versions, you can configure the Start menu, Control
view vs. Panel, and other interface elements by using two options:
classic view
• Category view, which is the default setting, displays the options available divided
into high-level categories. For instance, in category view, the Control Panel
displays categories of options such as Appearance and Themes or
Performance and Maintenance.
• Classic view displays a more traditional view from earlier versions of Windows,
in which all of the available options are displayed, either in a list or icon form.
53
Microsoft Windows 7 Versions
Windows 7 is available in several different editions.
Windows 7 Starter Windows 7 Starter is a simple, basic edition with very few features and
limited customization. Windows Aero and the majority of the visual
styles included on the higher versions are not included in Starter. Unlike
the other versions of Windows 7, it is only available in a 32-bit version.
Windows 7 Home Windows 7 Home Premium is a low-cost edition for beginners and
Premium home users. This edition offers basic OS functions such as Windows
Explorer and Internet Explorer 8, and support for other productivity
software.
Windows 7 Professional Windows 7 Professional enables users to run programs in Windows XP
mode, connect to domains, and back up data to a network location.
Windows 7 Enterprise Windows 7 Enterprise is available for enterprise organizations that need
large volumes of Windows licenses for employee use. Enterprise features
include support for multiple languages through the Multilingual User
Interface (MUI), BitLocker, and compatibility with UNIX applications
that may be present in the corporate environment.
Windows 7 Ultimate Windows 7 Ultimate offers the same features as Windows 7 Enterprise,
but is available for individual licensing for personal home use.
Windows Vista Home Windows Vista Home Basic is a lower-budget OS for beginners and
Basic home users who do not require advanced multimedia capabilities and
who do not require networking more advanced than a workgroup.
Windows Vista Home Windows Vista Home Premium adds a media center, High Definition
Premium TV (HDTV) support, backup scheduling, and more support for alternate
displays. It also includes the Windows Aero interface.
Windows Vista Business Windows Vista Business offers the same features as Vista Home Basic,
plus additional business-focused features such as Remote Desktop, an
encrypting files system, and the ability to join a Windows Server domain.
Windows Vista Windows Vista Enterprise adds features to the Vista Business edition,
Enterprise including UNIX application support, BitLocker, drive encryption, and
multilingual user interfaces.
Windows Vista Ultimate Windows Vista Ultimate combines all of the features of the other
editions, plus additional features, with support for up to 128 GB of
Random Access Memory (RAM) but only in 64-bit.
Microsoft Windows 7
Versions
54
Edition Features and Requirements
55
Note: With the release of the latest version of OS X (Mountain Lion) in 2012 and with the
increased use of iOS for mobile devices, Apple officially dropped “Mac” from its operating
system's name. It is now known simply as OS X, pronounced "OS 10."
UNIX Versions
Many different companies and organizations have licensed the UNIX name and technology and
marketed their own UNIX versions, leading to a proliferation of different UNIX families, system
names, and interfaces. Different hardware manufacturers tend to favor particular versions, or
"flavors," of UNIX. The following table lists some of the most important UNIX categories you will
encounter.
Berkeley Software Any of a group of UNIX versions that followed the innovations
Distribution (BSD) incorporated into UNIX at the University of California at Berkeley. Darwin
UNIX is a newer version of BSD.
System V Release 4 The standard for UNIX systems that follow the AT&T development
(SVR4) UNIX architecture. It was issued to unify standards and features in competing
versions of UNIX, including BSD UNIX, and it is the foundation for most
current UNIX-based systems.
Portable Operating A set of Institute of Electrical and Electronic Engineers (IEEE) standards
System for Computer for portability of applications from one UNIX environment to another. A
Environments POSIX-compliant application should run identically on any POSIX-
(POSIX) compliant platform.
Single UNIX A set of specifications issued by The Open Group (www.opengroup.org),
Specification (SUS) setting software standards for operating systems that qualify for the name
UNIX.
Advanced Interactive Launched by IBM® and used on their mainframe computers. AIX is closed-
eXecutive (AIX) source, proprietary UNIX that uses the Common Desktop Environment
(CDE) as its GUI. Based on UNIX System V.
Sun Solaris/Oracle A scalable OS developed by Sun Microsystems with native support for
Solaris Sun’s own Java® Desktop Environment (though other desktop
environments work as well), as well as their StarOffice™ productivity suite.
Solaris™ has been closed source for much of its history, but moved more
toward open source in recent years. When Sun Microsystems was acquired
by Oracle® Corporation, the name was changed to Oracle Solaris and the
open-source effort was discontinued.
HP-UX A flavor of UNIX developed by Hewlett-Packard. Like AIX, HP-UX is also
based on UNIX System V. HP-UX is distributed in Operating
Environments (OEs), which are pre-packaged collections of software that
ship with the OS.
56
Vendor Description
Red Hat® Linux® A popular United States distribution designed to be easy for new users to
install and use. Red Hat officially supports Red Hat Enterprise Linux, while the
more user-oriented operating system (called Fedora) is community-supported.
SUSE® A popular European distribution, now owned by Novell®, Inc. SUSE is
properly pronounced "ZOO-zuh," but is often pronounced to rhyme with
Suzie.
Mandriva Linux Formerly known as Mandrake, Mandriva is a popular desktop Linux
distribution. Its unique features include simplified administration and an easy-
to-use package manager for software installation.
Debian® An option-rich free distribution assembled by volunteers that contains many
utilities and supports many hardware platforms.
Gentoo Linux™ A source-code distribution designed for professional developers and computer
hobbyists.
Ubuntu® A popular community-developed operating system derived from the Debian
distribution. Ubuntu works on laptops, desktops, and servers, and has
supported variants appropriate for educational, multimedia, or mobile uses.
Arch Linux® A pared-down, binary-based distribution aimed at experienced Linux users and
maintained by a volunteer community of users.
Mac OS Versions
There have been several versions of the Macintosh operating system.
Version Description
OS X Mountain The latest version of OS X, released in 2012, will continue to add many of the
Lion features being developed and deployed in the updates to Apple's iOS, the
operating system for its consumer devices such as the iPod® and iPhone®.
New features will include Game Center, an online social gaming network;
support for the iMessage messaging application; and the debut of Notification
Center, a desktop version of the application alert center already used in iOS.
OS X Lion OS X Lion incorporated many of the enhancements developed for Apple iOS
and incorporated them into the operating system. New features included the
Launchpad™ for easier navigation of applications, auto-hiding scrollbars,
auto-save for documents, and same-state restarts for closed applications.
OS X Snow The update to OS X Leopard was mostly an "under the hood" update that
Leopard increased the performance and functionality of the operating system and other
related programs. Changes included increased disk space after cleanups, faster
Time Machine® backups, an updated version of the Preview application, and
an improved Safari browser.
OS X Leopard Leopard added many new features, including Time Machine, which is an
incremental backup utility. Leopard also enhances dozens of Mac features,
including the Dashboard, iChat®, Finder®, and Safari.
OS X Tiger A version of OS X that could run on both Intel and PowerPC processors. It
featured various enhancements to OS X, including Spotlight® search
technology.
OS X The first Mac operating system to be developed as a UNIX derivative. It is
based on an open-source UNIX implementation called Darwin and features a
user interface called Exposé®.
57
Version Description
Prior Mac OS® Older versions of the Macintosh operating system were based on a proprietary
versions system architecture and utilized the proprietary AppleTalk® file and print
services and LocalTalk™ network topology. Security was based on user roles,
including administrative user accounts, normal user accounts, limited user
accounts, and panel user accounts.
58
ACTIVITY 2-1
Discussing Operating Systems
Scenario
In this activity, you will discuss various personal computer operating systems.
As you discuss the
various operating
1. Start your computer and log on to Windows. systems and their
a) If necessary, power on your computer. versions, ask
participants to share
b) On the Welcome Screen, verify that the user name Admin## is displayed, and then in the Password how many different
text box, enter !Pass1234 operating systems they
c) Verify that you are logged on to the operating system and that the desktop is displayed. have used.
Verify that all
2. Examine the desktop. participants have
successfully logged on
Which screen element indicates that the Aero interface is active? to Windows before you
A: The transparent effect of the taskbar. proceed with the next
step.
3. True or False? Windows XP includes the Windows Aero interface.
☐ True
☐ False
59
b) Select Gadgets.
c) Double-click Calendar and Clock to add the gadgets to the desktop.
d) Close the Gadget Gallery and the Windows Help and Support window.
The gadgets remain displayed on the desktop after you close the open windows.
7. True or False? Gadgets must be downloaded from the Microsoft Windows website, or they will not work
properly.
☐ True
☐ False
8. Search for help on the ReadyBoost feature, and review the help articles titled Using memory in your
storage device to speed up your computer and Turn ReadyBoost on or off for a storage device. Then,
close the Help and Support window.)
60
Do you think that you or your users might take advantage of this performance-enhancing feature? Why
or why not?
A: Answers will vary depending on individual preferences and organizational standards.
The View basic information about your computer window is displayed. The first section of this
window provides information about the Windows edition running on your computer. This information
can be helpful to IT professionals in determining whether a user issue is a true problem, or a
misunderstanding of the capabilities of the operating system.
b) Close the window.
10. Which editions of Windows would be appropriate if you needed to add computers to a Windows
domain?
☐ Windows Vista Home Basic
☐ Windows 7 Home Premium
☐ Windows 7 Professional
☐ Windows 7 Ultimate
61
☐ UNIX was developed using the open-source methodology.
62
TOPIC B
Windows Control Panel Utilities
In the previous topic, you identified the major personal computer operating systems, including
several versions of Microsoft Windows. To support these operating systems, you'll need to identify
the elements of the system that make each Windows environment function, which are found in the
Control Panel. In this topic, you will identify the utilities accessed via the Control Panel.
The Windows Control Panel provides centralized access to many of the elements of the Windows
environment. As a professional support technician, knowing which utilities can be accessed through
the Control Panel and what each utility does can help you to configure systems to meet users'
needs, as well as assist users in configuring their systems.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220-802, Objective 1.1: Compare and contrast the features and requirements of various
Microsoft Operating Systems.
• Exam 220-802, Objective 1.5: Given a scenario, use Control Panel utilities (the items are
organized by “classic view/large icons” in Windows).
63
Figure 2-1: The Control Panel in Windows 7.
Note: The Control Panel is available from the Start menu, and as a link in various My
Computer views. In Windows 7, you can open the Control Panel by selecting the Open
Control Panel button located below the address bar of the Computer window.
Internet Options
Internet Options The Internet Options Control Panel utility has many settings that can be customized.
You might want to
display the Internet Setting Description
Options Control Panel
and briefly demonstrate
General • Home page: Defines which web page the browser opens to by default.
the various settings as • History: Defines how many days the browser will keep a record of visited
you discuss them. pages.
• Colors: Defines the user's preferred colors for text, page backgrounds, and
hyperlinks.
• Fonts: Defines the user's preferred fonts for viewing pages.
• Languages: Defines the user's preferred default language for viewing
pages.
• Accessibility: Defines settings that enable visual- or hearing-impaired users
to access web pages.
64
Setting Description
Security Defines levels of security for different groups of websites, known as zones. By
placing sites in zones and then configuring zone settings, users can enable or
disable features such as the blocking or acceptance of web pages, or whether
web scripts or controls can run automatically, based upon user preference.
Privacy Defines the level of access that third-party cookies have to the browser.
Content Contains various content-related configuration settings, including settings that
relate to using content ratings on websites, implementing Internet security
certificates, and the AutoComplete function in web-based forms.
Connections Determines how Internet Explorer will use the computer’s network
connections to access Internet content.
Programs Determines which programs Internet Explorer will launch by default when the
user clicks links that are associated with other types of Internet content, such as
email or newsgroups.
Advanced Defines a wide variety of settings including how the browser handles external
scripts, whether or not hyperlinks are always underlined, and whether or not
videos can be played within web pages.
Display
The Display Control Panel utility allows the user to configure the display properties for the
system, including the physical appearance of the environment, such as the wallpaper, screen saver,
color scheme, and font size used. The user can also configure the display settings for the monitor or
monitors being used, including setting the primary monitor and the arrangement of additional
monitors, extending the desktop onto another monitor, and determining the screen resolution and
color quality for the monitors.
Display
65
Figure 2-2: The Display utility in Windows 7.
User Accounts
A user account is a collection of credentials and important information about a person who has access
to the system. Most importantly, it defines the rights and privileges assigned to the user, determining
what kinds of actions they can perform on the system. There can be more than one user account
added to a specific system. There may be users with the same permissions or different permissions
assigned to the same computer.
Note: There will typically be at least two user accounts per system: the administrator and the
user who owns or has been assigned the machine.
The User Accounts Control Panel utility lets you view and manage your own account, including
changing your user name and password. If your account has been assigned administrator privileges,
you may also be able to add, remove, or modify other user accounts to allow other users access to
the system.
66
Figure 2-3: The User Accounts utility in Windows 7.
Folder Options
The Folder Options Control Panel utility lets you configure settings for how files and folders are
displayed when they are accessed. Folder Options also lets you configure more general settings
such as whether new folders will open in a new window or the existing window, what the layout of
folders opened in the navigation pane will be, what action is used to open a file in a folder, and
which program is the default for opening specific file types.
Using Folder Options, you can also configure the Advanced Settings for files and folders,
including:
• Whether simple file sharing, the feature in Windows that allows users to share files and folders
with other computers on the network without permissions, is enabled or disabled. The default
for the system is that simple file sharing is enabled.
• If you can view hidden files and folders, including protected operating system files. The default is
that hidden files and folders, including the protected operating system files, are not displayed
when accessing a folder that contains the files to protect them from being accidentally deleted or
modified.
• Whether to hide or display extensions for known file types within the folder structure. The
default is to hide file extensions for known file types.
67
Figure 2-4: The Folder Options utility in Windows 7.
System
System The System Control Panel utility lets you view and configure settings for the system.
General Provides information about the system, such as what operating system
and version is running on the system, who the computer is registered to,
and machine hardware information such as the central processing unit
(CPU) type and speed and how much RAM is available.
Computer Name Provides information about the computer's identification, including its
description, name, and the domain it belongs to. Users can also add a
description, change the name, or join a different domain.
68
System Property Description
Hardware • Device Manager displays all devices currently installed on the
computer, and you can use it to modify the properties for these
devices.
• Drivers allows the user to configure driver signing options, such as
what action to take if a driver being installed is not compatible, and
determine how to connect to the Windows Update website when
searching for matching drivers.
• Hardware Profiles allows the user to configure and save hardware
configurations, or profiles, and choose which profile to use at startup.
Advanced • Performance allows the user to view and configure the performance
options settings for visual effects, processor usage, memory usage,
and virtual memory. You can also enable or disable Data Execution
Prevention, which is a program that monitors security threats to
essential Windows programs, through this utility.
• User Profiles allows the user to configure settings for the user
accounts registered to the machine.
• Startup and Recovery allows the user to configure settings related to
the system startup, system failure, and debugging.
System Restore Allows the user to enable or disable System Restore and configure the
amount of disk space allocated for System Restore to use.
Automatic Updates Allows the user to enable or disable Automatic Updates. The default
and recommended setting is that Automatic Updates are turned on, to
protect the system from the most current threats.
Remote Allows the user to configure settings for how the computer can be used
from a remote location.
• You can enable or disable Remote Assistance to allow the computer
to be controlled remotely, typically from IT personnel
troubleshooting a problem.
• You can enable or disable Remote Desktop, and you can add
remote users to define who will be able to remotely access the
computer.
Action Center
The Action Center Control Panel utility provides information about any security software
currently deployed on or missing from the system, and provides access to helpful resources about
current security threats, including a check for the latest Windows Update. Action Center also
provides links to the Backup and Restore, Windows Update, and Windows Program
Compatibility Troubleshooter utilities, where you can manage specific settings regarding system
security and troubleshooting. 9
69
Figure 2-5: The Action Center in Windows 7.
Security Center
In Windows Vista and XP, the Security Center Control Panel included some of the same
information as the Action Center does in Windows 7, but in the Security Center, links to the
Internet Options, Automatic Updates, and Windows Firewall Control Panels are included.
Windows Firewall
A firewall is a device or program that blocks unauthorized data transmissions and protects the
computer from unauthorized access. Windows Firewall is a software-based firewall, included with
almost all Windows installations, that protects the computer against attacks through the Internet or
the network. The Windows Firewall utility enables you to:
• Enable or disable Windows Firewall.
• View active networks.
• Configure notifications concerning blocked activity.
• Open blocked ports.
• Configure other firewall settings for both private (home or work) and public networks that the
computer may access. )
70
Figure 2-6: The Windows Firewall utility in Windows 7.
Note: In the corporate environment, this utility is usually not accessible to individual users, as
the Windows Firewall settings are configured and controlled by an administrator in the IT
department, or Windows Firewall is superseded by a dedicated enterprise-level firewall system.
Power Options
Using the Power Options Control Panel utility, there are a number of power settings that can be Power Options
configured for the computer.
71
Power Option Description
in or, if it is a laptop, is running on batteries. You can modify and save
these settings for the selected power plan, or you can create and save a
new power plan.
Sleep/Suspend/ The user can determine the amount of time of inactivity after which the
Standby computer is switched into sleep mode. In sleep mode, the computer
conserves as much energy as possible by cutting off power to the parts of
the machine that are not necessary to function, excluding RAM, which is
needed to restore the system to its state once it is woken from sleep
mode. These settings can be configured for when the computer is
plugged in or, if it is a laptop, if it is running on batteries.
Depending on the operating system and version, sleep mode can be
called a variety of things:
• Sleep mode in Windows Vista, Windows 7, Windows Server 2008, and
Apple OSs.
• Standby mode in Windows 98, Windows Server 2003, and Windows
XP.
• Suspend mode in Windows 95 and Linux.
Add or Remove Used to install or remove applications and programs, view updates that
Programs have been installed, enable or disable optional features, and set default
programs.
Network Connections Used to view available connections, connect or disconnect from a
connection, and manage all network and Internet connections.
Printers and Faxes Used to add, remove, and manage any printers, scanners, or faxes
installed on the computer.
Automatic Updates Controls how Windows Updates are downloaded and installed.
Network Setup Wizard Launches the setup wizard, which walks the user step-by-step through
setting up an Internet connection and creating a network to share files,
printers, and other resources.
Tablet PC Settings Under the Mobile PC utility, the user can configure settings for a tablet
PC running Windows Vista through the Tablet PC Settings utility. Some
of the settings that you can modify include:
• Screen calibration.
• Screen orientation.
• Handedness.
72
Windows Vista Utility Description
• Handwriting recognition.
• Button functions.
Pen and Input Devices For a tablet PC running Windows Vista, you can use a pen or other
input device such as a stylus to interact with the tablet. You can use the
Pen and Input Devices utility to customize the settings for the pen
and input devices that are used to interact with the tablet. Some of the
settings that you can configure include:
• Pen Options: You can configure the equivalent "mouse action"
when an action is taken on screen with the pen (such as a double-
tap) and customize settings for the pen buttons.
• Pointer Options: You can enable or disable dynamic feedback for
actions and select what the feedback method will be, and select
whether or not the pen cursor is displayed.
• Flicks: You can enable or disable the use of flicks as the pen gesture
for navigating, and then customize settings for flicks including
sensitivity.
Offline Files You can use the Offline Files utility to enable or disable the use of offline
files, which allows you to save and modify a local copy of a file from the
network and then sync it back to the network. Some of the settings for
offline files that you can configure include:
• Disk Usage.
• Encryption.
• Network settings.
Problem Reports and The Problem Reports and Solutions utility displays any recent
Solutions problems that Windows has encountered. Depending on the issue, the
user can find out more information about the issue or search online for
a solution to resolve the issue.
Printers The Printers utility is used to add, remove, and manage any printers
installed on the computer.
Note: The Printers utility in Vista replaced the Printers and Faxes utility in Windows XP and
was replaced with the Devices and Printers utility in Windows 7. While the name changed in
the various versions, the functionality of the utility has remained largely the same.
HomeGroup With HomeGroup, the user can set up a home network of computers and
printers, and then add users or computers to the HomeGroup to share
libraries and resources.
Action Center Action Center provides a single location where security actions are
consolidated. When the system places an alert in the Action Center, you
can view the solution to the problem and fix the issue immediately, if
possible, through the Action Center. You can enable or disable
73
Windows 7 Utility Description
notifications for the Action Center. You can also configure settings such
as how much information is sent or how often to check for solutions.
RemoteApp and With RemoteApp and Desktop Connections, users can access programs, remote
Desktop computers, and virtual computers remotely that are made available by the
Connections network administrator. The RemoteApp and Desktop Connections
utility displays all of the resources and connections available, and the user
can select the resource or connection that they want to access.
Troubleshooting The Troubleshooting utility provides troubleshooting resources for common
Windows problems in five general areas: Programs, Hardware and
Sound, Network and Internet, Appearance and Personalization, and
System and Security. Users can also configure some basic settings for
the Troubleshooting utility, including enabling or disabling scheduled
computer maintenance checks, allowing search functionality through the
Windows Online troubleshooting service, and allowing troubleshooting to
begin on startup.
74
ACTIVITY 2-2
Exploring the Windows 7 Control Panel
Scenario
In this activity, you will explore the components of the Control Panel in the Windows 7 operating
system.
75
TOPIC C
Command Line Tools
In the previous topic, you identified the utilities in the Windows Control Panel. More experienced
users should understand alternative ways to manipulate elements of the operating system, such as
the command prompt. In this topic, you will identify command line tools and how they function.
The Control Panel provides a graphical interface to control many of the elements of the Windows
environment. However, more advanced users, such as support personnel, often find that using
command line tools can provide more granular control over the Windows environment.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220-802, Objective 1.1: Compare and contrast the features and requirements of various
Microsoft Operating Systems.
• Exam 220-802, Objective 1.3: Given a scenario, use appropriate command line tools.
Note: The default path in Windows 7 for the prompt is the user profile folder for the current
user (C:\Users\username). In Windows XP, the default path is C:\Documents and Settings
\username.
Note: Because you can run DOS-type commands at the command prompt, it is sometimes
casually called the "DOS prompt."
76
Command Interpreters
Windows provides several different command interpreters. The typical command prompt interface
is the standard Windows command interpreter, available in Windows XP and Windows 7. To access
the command prompt interface, you can either run cmd.exe or select the Command Prompt
shortcut from the Accessories menu.
Windows XP also includes the DOS command interpreter command.com to support running DOS-
based applications with an MS-DOS subsystem. There are also the Windows PowerShell™ and
Windows Recovery Console, which are used for more high-level administrative tasks.
Tool Function
bootrec Used to troubleshoot or repair startup issues with your operating system
(via the command prompt in the Windows Recovery Environment in
Windows Vista and Windows 7 only).
cd Used to view the drive letter and folder for your current location, and to
change to another directory or folder.
chkdsk Used to identify hard drive errors and correct the error if possible. Often
called "check disk."
[command name] /? Used to view online help at the command prompt. Because the syntax
for a tool might vary slightly between operating systems, you should
check online help for the exact syntax.
copy Used to copy a file or files.
del Used to delete a file.
diskpart Used to create, delete, or generally manage any hard drive partitions on
the system.
fdisk Used to partition or re-partition a hard drive.
format Used to format a drive using the file system specified.
kill or taskkill Used to stop or terminate a process or task that is running.
md Used to create a directory.
rd Used to delete a directory.
robocopy Used to copy files and folders/directories from one location to another,
but with more options than the simple copy command. Often called
Robust File Copy.
sfc Shorthand for System File Checker, it is used to verify system files and
replace them, if needed. Sometimes referred to as the Windows
Resource Checker.
shutdown Used to log off, restart, or shut down the system.
tlist or tasklist Used to display all processes currently running on the system.
xcopy Used to copy files or directories from one location to another.
77
Networking Command Line Tools
Networking Command Other command line tools can help you configure and manage network communications.
Line Tools
Poll students to see if Tool Function
anyone has used any of
these commands. Ask
ipconfig Used to verify the configuration of TCP/IP and to release or renew Dynamic
them when they used it Host Configuration Protocol (DHCP) IP address leases. (Other operating
and how the commands systems use different commands rather than ipconfig . For example, Linux
were helpful. uses ifconfig.)
ping Used to test TCP/IP communications. With the -t switch, you can ping the
indicated host until the request gets interrupted; with the -l [number]
switch, you can send a ping of a specified buffer size.
nbtstat Used to display TCP/IP information and other important information
regarding a remote computer. Also used to troubleshoot issues with NetBIOS.
If there are issues with the NetBIOS resolution to TCP/IP addresses, then
you can use the nbstat command to remove any preloaded resolution entries.
net Used to manage Microsoft network resources from a command line. With the
use option, you can connect or disconnect the computer from a shared
resource. You can also retrieve information about current network
connections. To see all of the available commands in this suite, type net /?
netstat Used to show the status of each active network connection, netstat will
display statistics for both TCP and User Datagram Protocol (UDP), including
protocol, local address, foreign address, and the TCP connection state.
Because UDP is connectionless, no connection information will be shown for
UDP packets.
nslookup Used to verify that the computer can connect to a Domain Name System
(DNS) server and successfully find an IP address for a given computer name.
tracert Used to determine and test all points along the route the computer uses to
send a packet to a destination. If tracert is unsuccessful, you can use the
results generated to determine at what point communications are failing.
Tool Description
fixboot Used to create a new partition boot sector to a hard drive partition.
fixmbr Used to repair the master boot recovery (MBR) record of the boot partition.
78
Note: You can install Recovery Console as a boot option or launch it from the Windows
installation CD-ROM.
WinRE
In Windows Vista and Windows 7, the Recovery Console was replaced by the Windows Recovery WinRE
Environment (WinRE), a set of tools used to diagnose and repair Windows errors at startup. WinRE
includes several new recovery tools accessible via the System Recovery Options menu.
Startup Repair Repairs system files that are missing or corrupted. Corrupt or missing
system files can cause problems with starting Windows.
System Restore Restores computer settings and system files to a user-defined time.
However, System Restore does not affect the user's personal files and
data.
System Image Restores a system image created by the user. The system image is a
Recovery backup of the partition in which Windows is installed.
Windows Memory Checks the system's memory for errors. Usually, memory errors are
Diagnostic caused due to faulty computer chips. So, with the results of the
diagnostics, you should contact your computer manufacturer for possible
fixes.
Command Prompt Launches the command prompt where advanced users can perform
recovery- and maintenance-related tasks.
Note: In Windows Vista, System Image Recovery is called CompletePC Restore, and uses a
CompletePC backup image to restore the computer.
79
ACTIVITY 2-3
Exploring Command Line Tools
Scenario
In this activity, you will explore command line tools and how they are used on the system.
5. What is the best command line tool to use if you want to test TCP/IP communication to a specific IP
address?
○ net
○ ipconfig
○ nbstat
○ ping
7. Which system recovery tool restores a system image created by the user?
○ System Restore
○ System Image Recovery
○ Memory Diagnostic
○ Startup Repair
80
○ Restores a system image created by the user
○ Checks the system's memory for errors
○ Restores computer settings and system files to a user-defined time
○ Repairs system files that are missing or corrupted
81
TOPIC D
Windows Security Settings
In the last topic, you identified some command line tools that you can use to manipulate some
elements of the operating system. Another critical aspect of configuring and supporting the
operating system is managing the security settings that control the access to data and files within the
environment. In this topic, you will identify Windows security settings.
As an IT professional, your responsibilities are likely to include configuring and maintaining
operating systems for many employees within the organization. Knowing the Windows security
settings and how to properly configure them enables you to ensure that users have the proper access
to only the data and files that are applicable and appropriate to their employment status.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220-802, Objective 1.2: Given a scenario, install and configure the operating system using
the most appropriate method.
• Exam 220-802, Objective 1.8: Explain the differences among basic OS security settings.
• Exam 220-802, Objective 2.3: Implement security best practices to secure a workstation.
82
Figure 2-9: The UAC.
Note: Complaints from end users against Windows Vista's UAC are common because many
tasks that users were able to perform on their own in previous Windows versions require
additional privileges in Vista. However, in Windows 7, this issue has been addressed and UAC is
now less intrusive.
Group Accounts
Windows includes several built-in group accounts that you can use to control basic system security. Group Accounts
Administrators Users in the Administrators group can perform all administrative tasks on the
computer.
When an account is created during the installation of Windows, it is
automatically added to this group by default.
Power Users Available only in Windows XP. Users in the Power Users group can run pre-
Windows 2000 applications, modify some system-wide settings (such as the
time), install some programs, and manage some local accounts.
Standard Users Users in the Standard Users group can run applications and perform other day-
to-day computer tasks for which the group has been granted permissions.
Guests Users in the Guests group can perform any tasks for which the group has
permissions.
83
System Files and Folders
System files are the files that are required for the operating system to function to its fullest capabilities.
These files are typically hidden because their deletion can prevent the computer from working
properly. For system files, both the file extension and the location of the file in the system hierarchy
are important, as they help the computer recognize it as a system file.
In the file system hierarchy, the terms folder and directory are used interchangeably to describe a
container that is used to organize files and other folders. System software and applications usually
create standardized directory structures at the time of installation. Users can also create their own
directory structures.
Note: In Windows, the maximum depth of a folder structure is restricted by the 255-character
limit in the overall file path, including the character representing the drive and any file name and
extension. Otherwise, there is no set limit on the length of a particular file or folder name.
Creating a File
The most common way for a file to be created is to start a new file within a specific application and
then save it to a directory. But you can also create a file without opening an application.
• Display the pop-up menu for the Windows desktop and select New, and then select what kind
of blank file you would like to save to the desktop.
• In Windows Explorer, display the pop-up menu for the view pane of a particular folder and
select New→[filetype].
• From a Windows command prompt, you can also use the copy con [filename] command,
which creates an empty file and allows you to edit it immediately, without leaving the command
prompt. After typing the contents of the file, press Ctrl+Z and then press Enter to save and exit
the file.
• In a UNIX system, users can create files at the command line by using the touch
[filename] command, where [filename] is the name of the file.
• UNIX users can also create files by using the cat > [filename] command. Like copy
con,the cat command (which is short for "concatenate") creates the file, opens it within the )
Windows Explorer
Windows Explorer is a graphical tool that enables users to manage files and folders on a computer,
including the contents of hard disks, floppy disks, CDs, DVDs, USB devices, and any other storage
devices attached to the computer. On the left side of Windows Explorer, the Explorer bar displays
the folder hierarchy tree by default, and the right pane displays the contents of the selected item.
Note: You can run Windows Explorer in Windows 2000, Windows XP, Windows Vista, and
Windows 7 from the Accessories group on the Start menu. In Windows XP, you can also open
Windows Explorer by displaying an object's pop-up menu and selecting Explore. Windows
Explorer open with the object selected in the folder hierarchy. For example, if you display the
pop-up menu for the Start menu and select Explore, Windows Explorer opens and displays the
contents of the Start Menu folder on the disk.
Note: In Windows XP and Windows 2000, you can choose to display other contents in the
Explorer bar. In Windows Explorer, select View→Explorer Bar and then select Search,
Favorites, History, Research, or Folders.
Computer/My Computer
Like Windows Explorer, Computer, or My Computer as it is called in Windows XP, is used to
manage files and folders on a computer and on any storage devices attached to the computer. In
Windows 7, Computer is a two-pane window, with a Windows Explorer-like navigation bar on the
left side. You can open Computer from an icon on the Windows desktop or from the Start menu.
Windows Explorer
85
Figure 2-12: Computer in Windows 7.
File Extensions
File Extensions Standard file extensions that follow the names of files can indicate whether a particular file is a
program file or a data file. If it is a data file, the extension can indicate the application category that
might be used to edit the file. Many common file extensions are three characters long, although
there is no longer a strict character limit for the file name or extension in most modern operating
systems. A period separates the extension from the file name itself.
.txt A plain text file that contains no formatting other than spaces and line breaks.
You can open .txt files in any text editing program, such as Notepad, or word
processing programs, such as Microsoft® Word.
.rtf Rich Text Format (RTF), or a text file that includes a limited amount of
formatting such as bold and italic. You can open .rtf files in various applications,
such as common word processors or Microsoft's WordPad accessory.
.doc A data file created in a word processing program, such as Microsoft Word or
WordPad. You might also see .docx, which is an Office 2010 format.
.bat A batch file; a small text file containing a list of system commands that execute
in a "batch," rather than requiring the user to enter each command in succession.
.bin A binary file, containing only binary data (1s and 0s), which cannot typically be
opened and read by a user application.
.com A command file or compiled application file.
86
File Extension Typically Indicates
.exe Executable files that launch programs and applications.
.dll A Dynamic Link Library (DLL) file, containing additional application settings or
functions that are loaded by executable files, as needed.
.hlp, .chm Help files used by various applications.
.htm, .html HyperText Markup Language (HTML) files, used to indicate web pages.
.inf Setup configuration settings for operating systems and applications.
.ini Configuration settings for software and hardware components.
.msi A Windows Installer package; a file that can specify installation parameters for
an application.
.sys System files. System files are typically hidden, as their deletion can prevent the
computer from working properly. With system files, it is not only the extension
that is important because it helps the computer recognize it as a system file, but
the location as well.
.tif, .jpg, .jpeg, .g Graphic image files in various formats.
if, .bmp, .png
.xls, .ppt, .mdb Data files created in Microsoft® Excel®, Microsoft® PowerPoint®, and
Microsoft® Access®, respectively. Office 2007 and Office 2010 file formats
include .xlsx, .pptx, and .mdbx files.
Note: By default, the folder view options in Computer and Windows Explorer are set so that
common file extensions do not display. You can display the extensions by unchecking Hide
extensions for known file types on the View page in the Folder Options dialog box.
87
ACTIVITY 2-4
Viewing File Extensions
Scenario
In this activity, you will view the file extensions for the files that are stored on your Windows 7
system.
88
a) Scroll down to view the files. The first few files in the window have a number of different extensions.
b) To see all of the files in a list format, right-click in an open area and select View→List.
c) To see similar extensions grouped together, right-click in an open area and select Sort by→Type.
d) To return to the default view, right-click in an open area and select Sort by→Name.
e) Close the window.
File Attributes
File attributes are characteristics that can be associated with a file or folder that provide the operating File Attributes
system with important information about the file or folder and how it is intended to be used by
system users.
There are several standard attributes that can be enabled for files or folders on Windows systems.
Archive (A) Indicates that a file has not been backed up. Windows automatically sets the
Archive attribute on any file you create or modify. When you back up data, you
can choose to back up only the files on which the Archive attribute is set.
Hidden (H) Hides a file from view in file management tools such as Windows Explorer,
Computer in Windows Vista and Windows 7, or My Computer in Windows
XP.
Read-Only (R) Enables users to read the contents of a file or execute it if it is a program file, but
prevents users from changing the contents of a file.
System (S) Indicates that a file is used by the operating system. Some applications use this
attribute to restrict user access to these files. The System attribute in Windows
automatically hides the file or folder.
Index (I) This Windows-specific attribute enables the Windows Indexing Service to create
an index of the file to speed up the Search function.
File Allocation An older file system that is best suited for use with drives smaller than 4 GB in
Table (FAT) size. The primary advantages of the FAT file system are its extremely low disk
overhead (less than 1 MB), and its compatibility with many different operating
systems, including all versions of Windows and MS-DOS and UNIX systems.
You might use the FAT file system if you want to dual-boot a computer
89
File System Description
between a version of Windows and another operating system. It is primarily
used for formatting floppy disks.
FAT32 An enhanced version of the FAT file system that was designed to overcome
the size limit of FAT. It scales better to large hard drives (up to 2 TB in size)
and uses a smaller cluster size than FAT for more efficient space usage.
NT File System The recommended file system for today's Windows-based computers. NTFS
(NTFS) was introduced with the Windows NT operating system. NTFS provides many
enhanced features over FAT or FAT32, including file- and folder-level security,
file encryption, disk compression, and scalability to very large drives and files.
Media file Windows also supports various types of special media file system formats, such
systems as CD File System (CDFS) for CD-ROM devices.
Permissions
Permissions In a Windows environment, permissions are security settings that control access to individual objects,
such as files or folders. Permissions determine which specific actions users can perform on a given
object. You can assign permissions by modifying an object's properties.
Note: In UNIX and Linux systems, the terms "permissions" and "rights" are used
interchangeably.
90
NTFS File Permissions
There are five standard NTFS permissions that you can assign to files.
Read Read the file and view file attributes, ownership, and permissions.
Write Overwrite the file and change file attributes.
Read & Run applications and perform Read tasks.
Execute
Modify Modify and delete the file.
Full Control Change permissions, take ownership, and perform all other tasks.
Special Permissions
Each of the standard NTFS permissions is made up of several more granular permissions called
special permissions. Standard permissions are the most frequently assigned groups of permissions;
special permissions provide you with a finer degree of control.
For example, the standard Read permission is made up of the following special permissions:
• List Folder/Read Data.
• Read Attributes.
• Read Extended Attributes.
• Read Permissions.
List Folder View the names, attributes, and permissions of subfolders in the folder, but only
Contents see the names of files within the folder.
Read View names, attributes, permissions, and contents of files and subfolders in the
folder.
Write Create new files and subfolders in the folder, and change their attributes.
Read & Perform the same functions as Read and List Folder Contents tasks, as well as
Execute execute files.
Modify Delete the folder and perform Write and Read & Execute tasks.
Full Control Change permissions, take ownership, delete subfolders and files, and perform all
other tasks.
Permissions Inheritance
Permissions that you assign to a folder are inherited by files and folders within that folder. It is
generally most efficient to group similar files together in a folder and assign permissions to the
folder, rather than to the individual files. Inherited permissions are indicated by gray background
check marks in the file or folder's security properties.
Permissions Propagation
If you modify the permissions for a parent folder, you can choose whether or not to propagate the
changes downwards, which means to apply those permissions changes to all of the subfolders within
the folder. )
92
ACTIVITY 2-5
Exploring NTFS Permissions
Scenario
In this activity, you will examine NTFS file and folder permissions.
93
7. Examine NTFS file permissions.
a) Double-click the LocalData folder.
b) Select the New Text Document file, and then select Organize→Properties.
c) Select the Security tab.
d) Select the Administrators group.
e) Determine the permissions assigned to the Administrators group. Verify that the permissions of the
New Text Document file is the same as that of the C drive and the LocalData folder.
f) Select the Users group.
g) Determine the permissions assigned to the Users group, and then select Cancel.
h) Close the window.
8. True or False? The permissions in the New Text Document file were inherited from the LocalData folder
permissions.
☐ True
☐ False
94
are Permissions
AppleTalk service active, assign a network nameto your computer, and start the file sharing service.
Other OS X users on your local network can then connect to your system by choosing Connect To
Server from the Go menu and browsing for your computer’s name. They can access files in your
Public folder, and place files in your Drop Box folder.
For more information about file sharing in OS X, including information on how to make other
folders public, share files with remote users on the Internet, and share with computers running
different operating systems, see the technical document "Mac 101: File Sharing" on the Apple
website at http://support.apple.com/kb/HT1549.
Share Permissions
You can set three different levels of permissions on shared files and folders in Windows.
95
and it is important to understand the differences between the two permissions and how they interact
with one another.
In Windows, a shared folder has two sets of permissions: the NTFS permissions (which are on the
Security tab of that folder's Properties) and the share permissions (which are on the Shared tab of
that folder's Properties). The security permissions do not automatically change once a folder is
designated as a share, and there is no propagation between the two. A folder can have NTFS
permissions assigned, and then be shared and have share permissions assigned. When a user
accesses the folder over the network, both the share and NTFS permissions are applicable, and the
most restrictive of the two sets of permissions applies. So, if the network user has the Full Control
NTFS permission but only the Read share permission, the user will have only the ability to read the
contents of the folder.
Note: When a user accesses a file on the local system, however, only the NTFS permissions
apply. The fact that the folder is shared is not relevant when you are accessing the folder locally.
Permissions Considerations
Permissions There are some important considerations that you should keep in mind when applying permissions
Considerations to files and folders.
Allow vs. Deny When choosing whether to allow or deny an action using permissions,
you need to choose carefully between the two. Deny is more restrictive
than Allow. If the Deny property is applied on either a file or a folder,
it will override any Allow permissions that may have been granted to
the user. Therefore, use of the Deny permission should be done
sparingly. You should deny permissions (using explicit Deny) only to a
specific user when it is necessary to override permissions that are
otherwise allowed for the group to which this user belongs.
When establishing permissions, administrators can specify whether the
entry being added should have access (Allow) or not have access (not
Allow) to the resource. It is more practical to clear all the Allow check
boxes for a group or a user, in effect denying them access to the
resource without using the absolute Deny option. “Not-Allow” access
in this way is easier to troubleshoot, manage, and configure.
Moving vs. copying files When permissions have been applied, moving a file or folder and
and folders copying that file or folder will have different results. It is important to
consider those results when choosing whether to move or to copy
your files or folders.
When you move a file or folder from one folder to another on the
same partition, it retains the permissions that were applied to it in its
original location. When you copy a file or folder from one directory to
another, it inherits the permissions of the folder or directory to which
it has been copied.
When you move a file or folder between partitions, the result is similar
to copying the file or folder: it will inherit the target folder's
permissions.
File attributes You can set file attributes on files and folders, and these attributes can
affect the actions a user can have on that specific file or folder,
regardless of the permissions that have already been set. If a file or
folder has the Read-Only attribute, the attribute will override the
permissions applied to users who are accessing that file or folder.
96
User Authentication
User authentication is a network security measure in which a computer user or some other network
component proves its identity in order to gain access to network resources. There are many possible
authentication methods; one of the most common is a combination of a user name and a password.
Most authentication schemes are based on the use of one or more authentication factors. The
factors include:
• Something you know, such as a password.
• Something you have, such as a key or an ID card.
• Something you are, including physical characteristics, such as fingerprints.
SSO
Single sign-on (SSO) is an access control property that you can use to provide users with one-time
authentication to multiple resources, servers, or sites. Users log in once with a single user name and
password to gain access to a number of different systems, without being asked to log in at each
access point. Different systems may use different mechanisms for user authentication, so SSO has to
use different credentials to perform authentication. With the widespread use of SSO, it is important
to ensure that user authentication is strong for the login; with one potential user name and password
providing access to a host of systems, it is critical that this single access point is being properly
secured.
User Authentication
Reassure participants
that authentication
methods are covered in
depth later in this
course.
97
TOPIC E
Windows Operating System Tools
In the previous topic, you identified Windows security settings that you can use to control access to
data and files stored in the operating system. With so many files and features available in the
operating system, a working knowledge of the toolset that is used to manage the operating system is
crucial to your success as a computer technician. In this topic, you will identify some of the
fundamental Windows operating system tools.
As an IT professional, you will need to be prepared to act on varying requests for supporting
Windows systems, from installation to configuration and beyond. The Windows operating system
provides a great many tools to assist you in supporting your Windows users. By identifying
Windows operating system tools, you can be better prepared to select the appropriate tool for the
job at hand.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220-802, Objective 1.1: Compare and contrast the features and requirements of various
Microsoft Operating Systems.
• Exam 220-802, Objective 1.4: Given a scenario, use appropriate operating system features and
tools.
Administrative Tools
Administrative Tools In Windows 7, Windows Vista, and Windows XP, the Administrative Tools folder includes several
tools that advanced users and system administrators can use to help manage the system. In
Windows 7 and Windows Vista, you can access the Administrative Tools folder by selecting
Start→Control Panel→System and Maintenance. In Windows XP, select Start→Control
Panel. The following table describes the contents of the Administrative Tools folder.
Component Services Component Services is the GUI that developers and administrators can use
to configure and administer Component Object Model (COM)
components.
Computer Management Computer Management is the primary administrative tool you will use to
manage and configure a Windows XP or Windows 7 computer.
Computer Management combines several administrative utilities into
a single console to provide easy access to the most common system
tools, including Event Viewer, Performance Monitor, Disk
Defragmenter, Disk Management, and more.
Data Sources (ODBC) Data Sources uses Open Database Connectivity (ODBC) to move data
between different databases on the system.
Event Viewer You can use the Event Viewer to view the contents of event logs, which
contain information about significant incidents that occur on your
computer. Examples of events that might be contained in an event log
include a program starting or stopping and security errors.
iSCSI Initiator You can use the iSCSI Initiator to configure connections between
network storage devices.
Local Security Policy You can use the Local Security Policy to view and edit the security settings
for the local computer.
98
Administrative Tool Description
Performance Monitor Performance Monitor is a software tool that monitors the state of services
or daemons, processes, and resources on a system. Performance
Monitor tracks one or more counters, which are individual statistics
about the operation of different objects on the system, such as
software processes or hardware components.
Print Management You can use Print Management to view and manage all of the printers
and print servers installed on a network.
Services You can use Services to view all of the services that run in the
background on a system. For each service, you can view a description
of the service, and for some services, you can perform certain actions
such as starting, pausing, stopping, or restarting the service.
System Configuration You can use System Configuration to identify and manage issues that may
be causing the system to run improperly at startup.
Task Scheduler You can use the Task Scheduler to create and manage certain system
tasks that will be automatically carried out by your computer at
predetermined times.
Windows Firewall with You can use Windows Firewall with Advanced Security to manage advanced
Advanced Security firewall settings for the computer and any remote computers that are
connected to the network.
Windows Memory You can use the Windows Memory Diagnostic to check the RAM on the
Diagnostic system and verify that it is functioning appropriately and efficiently.
99
Additional Event Logs
In certain circumstances, additional logs may also be available; for example, a DNS server will also
have a DNS log. To access Event Viewer from the command line, enter eventvwr.exe )
100
ACTIVITY 2-6
Exploring Administrative Tools
Scenario
In this activity, you will explore some of the options available in the Administrative Tools Control
Panel.
2. Examine the options available in the Administrative Tools Control Panel. Explain the tools as
participants examine
3. Examine system performance by using the Performance Monitor. them.
a) Double-click Performance Monitor, and in the console tree, select Performance Monitor.
b) The default configuration does not contain a counter. To add a counter, select the Add icon.
c) In the Select counters from computer drop-down list, verify that Local computer is selected.
d)
Scroll and expand the Memory object. Participants might have
e) With the Memory performance object expanded, check Show description. to scroll up or scroll
f) View the explanations for other performance counters. down to find the Memory
g) Click Memory and verify that all objects are highlighted under the Memory performance object, and object.
then select Add.
All of the Memory performance objects are transferred to the Added counters pane and are marked
with an asterisk.
h) Select OK.
101
Local Users and Groups
You can use Local Users and Groups to create and manage user and group accounts on the local
system. To access Local Users and Groups, open Computer Management, and expand System
Tools.
Device Manager
You can use Device Manager to manage and configure hardware devices. In Windows 7, there are
several ways to access Device Manager:
• Select Start→Control Panel→System and Security→Device Manager.
• At a command prompt, enter the mmc devmgmt.msc command.
• In the navigation pane of Computer Management, select Device Manager.
You can use Device Manager to:
• View a list of all devices attached to the system.
• See the status of a device. An exclamation point means there is a problem with a device; a yellow
question mark means the device has been detected but a driver is not installed, or there is a
resource conflict.
• Enable or disable a device. A disabled device appears with a red X.
• Determine the device driver a device is using; upgrade a device driver; roll a device driver back to
a previous version.
• Determine any system resources that the device is using, such as interrupt request lines (IRQs) or
Direct Memory Access (DMA) ports.
• Uninstall or reinstall devices.
Device Manager
102
ACTIVITY 2-7
Using Computer Management and Device
Manager
Scenario
In this activity, you will use Computer Management and Device Manager to check the status of
the various functions and devices installed in your computer.
Task Manager
Windows Task Manager is a basic system diagnostic and performance monitoring tool included
with Windows XP, Windows Vista, and Windows 7. You can use Task Manager to monitor or
terminate applications and processes, view current CPU and memory usage statistics, monitor
network connection utilization, set the priority of various processes if programs share resources, and
manage logged-on local users.
103
Task Description and Purpose
Applications Displays all of the applications currently running on the system and their
status (running, not responding, etc.). Users can use the Task Manager
to end an application that is running, switch to a different open
application, or start a new application.
Processes Displays all of the processes currently running on the system, including
the CPU and memory usage for all processes. Users can choose to end a
process from the Task Manager.
Performance Displays the current CPU and physical memory usage statistics for the
system in a graphical format and numerical format for an overall view of
the current system performance.
Networking Displays the networks that the system is currently connected to, and
graphically displays current connection utilization for all network
connections.
Users The Users tab was added in Windows Vista and is still available in
Windows 7. It displays all of the users currently logged on to the system.
Users can select another user's account and connect to that user's
session, send them a message, or disconnect or log off the user via the
Task Manager.
104
ACTIVITY 2-8
Using Task Manager
Scenario
In this activity, you will use the Task Manager utility to examine your system's status.
1. Display the pop-up menu for the taskbar, and select Start Task Manager.
The Applications tab is blank because there are no application windows open.
2. Run an application.
a) To start an application, select New Task to open the Create New Task dialog box.
b) In the Open text box, type notepad and select OK.
Notepad opens in the background and the Untitled - Notepad task appears on the Applications tab.
5. Select the Services tab, and examine the services that are running independently on the system.
Disk Management
Disk Management is a snap-in utility for the MMC that you can use to manage all of the drives
installed on the system, including hard disk drives, optical disk drives, and flash drives.
105
Figure 2-14: The Disk Management utility in Windows 7.
Note: Although any user can access Disk Management and view information about their
drives, only an administrator can use the other disk management tools available through this
utility.
Action Description
Views Displays all of the drives on the system, the drive letter assigned, the total
capacity of the drive and how much free space is available, and the current
status of the drive. It also displays the partitions for each drive.
Assign a drive letter Can be used to assign or change a drive letter for any hard drives, optical
drives, or flash drives being used by the system. The drive letter for the
partition that Windows is installed on cannot be changed.
Mount a drive Can be used to create a mounted drive or partition, in which the drive is
mapped to a NTFS-formatted folder on the hard drive and is assigned a
folder path name rather than a drive letter.
Extend partitions Can be used to create a container for logical partitions in order to extend
the volume of an existing partition, if more than four partitions are desired.
Split partitions Can be used to shrink or divide a partition on the drive to make room for
another partition to be created. In Windows Vista and Windows 7, you can
reduce the partition volume to a desired size to make free space for a new
partition to be created.
Add a drive Can be used to add a drive/disk to the machine. Once the drive has been
installed and depending on the history of the drive (already partitioned,
never been used, etc.), you can use this utility to initialize the disk or set an
offline disk to online.
Add an array Can be used to create and add an array to the system, including assigning
the drive a drive letter, mounting it to a folder, and formatting the volume.
An array is more than one physical drive on the machine that is combined
and managed as a single logical drive in the disk management utility.
106
Accessing Disk Management Directly
You can access Disk Management by using an MMC snap-in, but you can also access it directly by
selecting Start→Run, and then entering the diskmgmt.msc command.
Migration Tools
There are a number of tools available through the Windows operating system to assist in migrating Migration Tools
user information between systems, including files and settings.
User State Migration The User State Migration Tool (USMT) is a command line utility that copies
Tool files and settings from one Microsoft Windows computer to another,
including user accounts, files, folders, Windows settings, email messages,
and more. USMT can support the transfer of files and settings for
Windows 2000, Windows XP, Windows Vista, and Windows 7. Not all
versions of the USMT can support all source or destination operating
systems.
Easy Transfer Easy Transfer is a built-in data-migration utility in Windows Vista and
Windows 7 that helps transfer files, data, and settings from one personal
computer to another. If the computer isn't running Windows 7, the user
will need to download and install a version of Easy Transfer for
Windows Vista or Windows XP before beginning the migration process.
Easy Transfer replaced the Files and Settings Transfer Wizard from
Windows XP. It was upgraded with Windows 7 to include a file explorer
for easy selection of files to transfer and provides a report of any files
that were not migrated to the new system.
Files and Settings The Files and Settings Transfer Wizard is a system tool that is available in
Transfer Wizard Windows XP and earlier versions of Windows. It transfers files and
settings from an old computer to a new computer. In the tool, the user
can choose what to migrate (files only, settings only, or both files and
settings) and how the selected items should be migrated (via a storage
device like a disk or other removable media device, via a direct
connection between the computers, or via a drive on a network).
The files created using the Files and Settings Transfer Wizard are not
supported in Windows Vista or Windows 7. However, to work around
this problem, a user running Windows XP who needs to transfer files to
a computer running Windows Vista or Windows 7 can download and The Registry
install a version of Easy Transfer for Windows XP, and then migrate You may want to show
data by using the Easy Transfer tool. the LearnTO Use the
Registry from the
LogicalCHOICE Course
UDMT screen or have students
The Windows NT User Data Migration Tool (UDMT) is a legacy tool that was used with the navigate out to the
Microsoft Windows NT operating system to copy files and settings from one system to another. In Course screen and
the later versions of NT derivatives, from Windows 2000 and on, it was replaced by the USMT. watch it themselves as a
supplement to your
instruction. If not, please
The Registry remind students to visit
the LearnTOs for this
course on their
Note: For additional information, check out the LearnTO Use the Registry in the LearnTOs LogicalCHOICE Course
for this course on your LogicalCHOICE Course screen. screen after class for
supplemental
information and
additional resources.
107
The Registry is the central configuration database where Windows stores and retrieves startup
settings, hardware and software configuration information, and information for local user accounts.
Logically, the Registry is divided into five sections called subtrees; each subtree is further divided
into keys that contain individual data items called value entries. The Registry is stored on the disk as
a group of files.
Registry Files
The Registry consists of five files stored in the \Windows\System32\Config folder: Default, SAM,
Security, Software, and System. Plus, there is a Registry file named Ntuser.dat, which is unique for
each user who logs on to the computer. This file is stored in each user's profile folder.
108
Registry Subtrees
The Registry consists of five subtrees, which are sometimes called "hives." Some of the subtrees are Registry Subtrees
temporary pointers to information stored permanently in another Registry location. The following
table lists and describes the subtrees.
Subtree Contains
HKEY_CLASSES_RO All the file association information. Windows uses this information to
OT determine which application it should open whenever you double-click a
file with a specific extension. For example, Windows automatically opens
Notepad whenever you double-click a file with the extension .txt.
HKEY_CURRENT_U The user-specific configuration information for the user currently logged
SER on to the computer. For example, information about the user's selected
color scheme and wallpaper is stored in this subtree.
HKEY_LOCAL_MAC All the configuration information for the computer's hardware. For
HINE example, this subtree contains information about any modems installed
in the computer, any defined hardware profiles, and the networking
configuration.
HKEY_USERS User-specific configuration information for all the users who have ever
logged onto the computer.
HKEY_CURRENT_C Information about the current configuration of the computer's hardware.
ONFIG Windows operating systems support Plug and Play (PnP), a set of
industry-standard device specifications, originally developed by Intel
Corporation, which enables computers to automatically detect and install
various types of devices without user intervention.
109
Run Command Description and function
[command].msc Opens the management console for that entry (if one is
available) when the .msc extension is added to the command.
For example,
diskmgmt.msc
opens the Disk Management console, and
services.msc
opens the Services Control Panel.
msconfig Opens the System Configuration utility.
msinfo32 Opens the System Information utility, which displays a
summary of the hardware, software, and other system
components in the environment.
mstsc Opens the Remote Desktop Connection utility.
notepad Opens an instance of Notepad.
regedit Opens the Registry Editor, where the user can view or modify
the contents of the Registry.
services.msc Opens the Services console, where the user can manage all of
the services and installed software on the system. Must be used
with the .msc extension to open the management console.
Note: You can use the Run line to open programs, folders, documents, Internet resources, or
any other system component if there is an appropriate command to use.
MSConfig
MSConfig MSConfig is a system utility that is specifically used to troubleshoot issues that can arise during
system startup. You can use it to view and manage which files or programs are processed on startup,
including temporarily disabling and re-enabling software, programs, device drivers, or services that
run automatically upon startup.
Note: MSConfig.exe is called System Configuration in Windows Vista and Windows 7, but
was called the Microsoft System Configuration Utility in earlier versions.
Within the MSConfig utility, there are five areas that can be accessed and modified.
Option Description
General Provides the options to choose from for startup configuration modes:
• Normal startup. Windows will start in the normal manner. This is the default
configuration or is selected once the other two modes have been used to
troubleshoot an issue.
110
Option Description
111
• Startup
112
ACTIVITY 2-9
Exploring System Configuration Settings and
Information
Scenario
In this activity, you will use the MSConfig and MSINFO tools to examine the system
configuration settings and information.
113
Summary
In this lesson, you identified the fundamental components and functions of personal computer
operating systems. Understanding the basics of what operating systems are, including their various
versions, features, components, and technical capabilities, is knowledge that you can use to build a
successful career as an IT support representative or PC service technician, interact confidently with
other professionals, and perform your job duties properly and efficiently.
Use the review
questions provided to What operating systems do you have personal experience with? What operating systems would you like to
generate discussion learn more about, and why?
among the participants. A: Answers will vary, but might include: Experience with operating systems formerly or currently used at
home, work, or school. If they do not differ by vendor, they will probably differ by version.
Which of the Windows system components and tools discussed in this lesson were familiar to you? Which
ones were new?
A: Answers will vary, but should contain references to Administrative Tools, the MMC, the Registry, and
so forth.
Note: Check your LogicalCHOICE Course screen for opportunities to interact with your
classmates, peers, and the larger LogicalCHOICE online community about the topics covered in
this course or other topics you are interested in. From the Course screen you can also access
available resources for a more continuous learning experience.
Encourage students to
use the social
networking tools
provided on the
LogicalCHOICE Home
screen to follow up with
their peers after the
course is completed for
further discussion and
resources to support
continued learning.
114
3 Operational Procedures
Lesson Time: 1 hour, 20 minutes
Lesson Objectives
In this lesson, you will identify the operational procedures that should be followed by
professional PC technicians. You will:
• Identify basic maintenance tools and techniques for personal computer systems.
• Identify the best practices for PC technicians to follow to promote electrical safety.
• Identify best practices for PC technicians to follow to promote environmental safety and
proper handling of materials.
• Identify best practices for PC technicians to use to communicate appropriately with
clients and colleagues to conduct business in a professional manner.
Lesson Introduction
In the previous lessons, you gained fundamental knowledge about personal computer
hardware components and operating systems. In addition to that information, every PC
technician also needs a working knowledge of tools, safety and environmental precautions,
and when professional conduct is important in the workplace. In this lesson, you will
identify the operational procedures that you should follow to ensure a safe working
environment.
As an A+ technician, you will be asked to install, configure, maintain, and correct problems
with a variety of PC components. To work with these components without damaging them
or causing physical injury to yourself or others, there are several tools to use and operational
procedures to follow in order to get the job done quickly, safely, and correctly.
This lesson covers all or part of the following CompTIA® A+® (2012) certification
objectives:
• Topic A:
• Exam 220–801: Objectives 5.1, 5.2
• Exam 220-802: Objective 1.6
• Topic B:
• Exam 220–801: Objective 5.1
• Topic C:
• Exam 220–801: Objectives 5.1, 5.2
115
• Topic D:
• Exam 220–801: Objectives 5.3, 5.4
116
TOPIC A
Basic Maintenance Tools and Techniques
In this lesson, you will identify the operational procedures that can help ensure your success as an A
+ certified professional. To begin, it's critical to select the right tool or technique for the job. In this
topic, you will identify common hardware and software tools, maintenance techniques, and
resources that are used by professional PC technicians.
When it comes to computer maintenance, having the right tool will save time, trouble, and money.
Having a good collection of software and hardware tools at your disposal, a foundational knowledge
of maintenance techniques, and access to documentation or resources when you need assistance is
essential to help you perform your job tasks efficiently.
This topic covers all or part of the following CompTIA ®A+® (2012) certification objectives:
• Exam 220–801: Objective 5.1 Given a scenario, use appropriate safety procedures.
• Exam 220–801: Objective 5.2 Explain environmental impacts and the purpose of environmental
controls.
• Exam 220-802: Objective 1.6 Setup and configure Windows networking on a client/desktop.
Basic This toolkit should contain the tools necessary to remove and install
computer components. Each tool should be demagnetized, and the tools
should be stored in a case to protect and organize them.
A basic toolkit should include:
• Pen and/or pencil
• Phillips screwdrivers (small and large, #0 and #1)
• Flat-blade screwdrivers (small and large, 1/8-inch and 3/16-inch)
• Flashlight
• Container for screws
• Nut driver
Basic toolkits can also include:
• Additional sizes of drivers and screwdrivers
• Torx driver (size T8, T10, and T15)
• Tweezers
• Three-prong retriever
• Ratchets
• Allen wrenches
• Cotton swabs
• Batteries
• Anti-static cleaning wipes
• Anti-static wrist band
• Compressed air canister
• Mini vacuum
• Pen knife
117
Toolkit Name Description and Contents
• Clamp
• Chip extractor
• Chip inserter
• Multimeter
• Soldering iron and related supplies
• Spare parts container
• Circuit tester
• Drive adapters (USB to IDE/SATA and SATA/PATA/IDE to USB)
Network Specialized tools, in addition to those listed previously, are needed to make
and install network cables. Kits containing these tools are available, but the
prices vary widely depending on the quality of the tools.
A network toolkit typically includes:
• Cable crimper with dies for a variety of cable styles
• Wire stripper for flat and coax cable
• Precision wire cutters
• Cable tester
• Punchdown tool
• Curved forceps
• Multi-network Local Area Network (LAN) cable tester
• Digital multimeter
Circuit board Usually circuit boards are replaced, not repaired. However, sometimes you
can fix an obviously loose connection or replace a jack with a broken pin.
A circuit board toolkit typically includes:
• 30-watt (W) ceramic soldering iron
• Desoldering braid
• Desoldering pump
• Soldering iron stand with sponge
• Solder
• Miniature pliers and wire cutters
• Heat sink
118
Figure 3-1: Software diagnostic tools.
119
Hardware Component Examples of Software Diagnostics Test
Fan SpeedFan, BIOS setup
Video adapter card Video Card Stability Test, DirectX Diagnostic Tool, POST, BIOS setup
Network adapter card 3Com Dynamic Access Managed PC Boot Agent (MBA), Intel®
PROset II Utility, DirectX Diagnostic Tool
Modem Modem Doctor Diagnostics, DirectX Diagnostic Tool, Windows
Device Manager, Windows Performance Monitor
Optical drive CDRoller, Windows Device Manager, Windows Performance
Monitor
120
Cleaning Supply Description
• A toner cloth is a special cloth that you stretch that picks up toner
particles that are either in the printer or around the printer. Be
careful if you are using it inside the printer so that the cloth does not
get caught on any components and leave fibers behind.
Cleaning solutions There are a variety of cleaning solutions that you can use to clean
displays, keyboards, and other equipment.
• You can use rubbing alcohol on cotton swabs or lint-free cloths to
clean many components.
• You can use mild household cleaner to keep the exterior of
computer components clean. This helps prevent dirt and debris
from getting inside the equipment. Never spray the cleaner directly
on the equipment. Avoid using ammonia-based cleaners around
laser printers; the ammonia may react chemically with the toner.
• For older monitors, especially plastic monitors, read the device's
manual to determine the cleaning method recommended by the
manufacturer. While some recommend water or isopropyl alcohol
(IPA), others claim it is acceptable to use volatile chemicals such as
hexane or petroleum benzene, a soft detergent such as Palmolive
and water, no suds, or nothing but a dry soft cloth. While some
recommend a top-down motion, others subscribe to the circular
method.
• For flat screens such as LCDs, light emitting diodes (LEDs), and
plasmas, you can use distilled water, or an equal ratio of water and
vinegar on a microfiber or lint-free cloth. There are also specialized
cleaners available for flat screens, but make sure to check the
manufacturer's instructions before use.
• In some cases, you can use standard household window cleaner on
components if you spray it on a lint-free cloth first. You can use this
to clean smudges from optical disks. Never use window cleaner on
plastic monitor screens, and even on glass screens; this cleaner
might strip off the anti-glare protection. The best option is a damp,
clean, soft cloth with water or a cleaner specifically made for
monitors (or one that states it is safe for use with monitors) and will
not damage anti-glare finishes.
Cleaning tools Several tools are optimal for cleaning computer components.
• Tightly wound cotton swabs are useful in getting cleaning solution
into tight places. They are also useful when used dry to get dust and
debris out from between keys and around buttons or other tight
areas.
• Toothpicks come in handy in getting dirt out from around keys,
buttons, and other tight spaces. They are also useful for removing
the debris that builds up on the rollers inside of a mouse.
• You can use a small paint brush to remove dust from between keys
on a keyboard. If the brush has long bristles, they can reach under
the keys where other cleaning objects would not be able to reach.
Compressed air canister A canister with a nozzle that can be aimed at components to blow dust
out. This is often used when removing dust from the interior of a
computer or laptop. Be sure to blow the dust away from the power
supply and drives. You can also use it to blow dust out of the power
supply fan area, from keyboards, and from the ventilation holes on
various components.
121
Cleaning Supply Description
Use caution when working with compressed air. Read the instructions
on the can and follow them carefully. Tipping the can too much, which
is easy to do when you are trying to maneuver the can into place, can
cause the propellant to leave the can in liquid form and at sub-freezing
temperatures. The freezing could easily damage components,
particularly those that may still be hot from use. There is also the issue
of the corrosiveness of the chemical damaging components later on.
Also, some delicate components on the motherboard can be damaged
(literally blown off the board) if compressed air is used too close to a
component.
If you use compressed air, take the equipment to a different location,
preferably outside, so that the dust does not simply disperse into the air
in the work area and settle back on the computer equipment or other
devices.
Computer or electronics A non-static vacuum that you can use on system components such as
vacuum the power supply, fans, and in printers. (Regular vacuum cleaners can
create static, which will damage computer equipment.) The vacuum
should have a filter and bag fine enough to contain toner particles so
that you can use it to clean up toner spills from laser printers or
photocopiers. These vacuums can often be used to blow air as well as
for suction, so they can replace the need for compressed air canisters
for blowing dust out of machines. Sucking the dust up is usually better,
though, since blowing the dust can cause it to get onto or into other
components. Sucking it up into a vacuum cleaner bag gets it out of the
system without the chance of it getting into something else.
Mask and gloves A mask that fits over your mouth and nose should be worn when you
are using a compressed air canister or working around toner spills. This
will keep the particles out of your body. You should also wear latex
gloves when cleaning up a toner spill.
Method Description
User/installation manuals User and installation manuals can provide you with basic guidance
for installing, configuring, and troubleshooting hardware and
software.
By providing users with various user and installation manuals, users
can fix minor issues and problems before requesting additional
assistance from a technician. Examples include installing company-
specific applications, installing network printers, and mapping
drives.
Internet/web-based Internet and web-based resources can provide a wealth of
resources information on installing, configuring, and troubleshooting
hardware and software. Many hardware and software manufacturers
maintain knowledge bases and wikis to share information about
122
Method Description
both common and unusual issues that can arise with PC hardware
and software.
Internet and web-based materials can also provide users with quick
reference materials for dealing with everyday issues on their own.
Some organizations provide a web page or wiki with user-specific
information and reference materials.
Training materials Most major hardware and software manufacturers provide training
materials on how to install and use their products. These materials
can be helpful for both new and experienced technicians.
You can provide training materials for various tasks that users may
need to complete on their own, such as virus scans, computer
maintenance tasks, and PC clean-up tasks. By providing training
materials, you empower users to be proactive in maintaining their
systems.
Scenario
In this activity, you will examine the various tools and techniques used to maintain computer
equipment and the workplace environment.
1. You are asked to repair a motherboard in a customer's PC. Which set of tools would be best suited for
the task?
○ Phillips screwdriver (#0), torx driver (size T8, T10, and T15), tweezers, and a three-prong retriever
○ 30-W ceramic solder iron, miniature pliers, wire cutters, and a soldering iron stand with sponge
○ Wire strippers, precision wire cutters, digital multimeter, and cable crimper with dies
○ Chip extractor, chip inserter, ratchet, and Allen wrench
○ Anti-static cleaning wipes, anti-static wrist band, flashlight, and cotton swabs
2. You are asked to correct a network cabling problem at a customer site. Which set of tools would be best
suited for the task?
○ Phillips screwdriver (#0), torx driver (size T8, T10, and T15), tweezers, and a three-prong retriever
○ 30-W ceramic solder iron, miniature pliers, wire cutters, and a soldering iron stand with sponge
○ Wire strippers, precision wire cutters, digital cable tester, and cable crimper with dies
○ Chip extractor, chip inserter, ratchet, and Allen wrench
○ Anti-static cleaning wipes, anti-static wrist band, flashlight, and cotton swabs
3. You suspect that contaminants from the environment have prevented the fan on a PC from working
optimally. Which set of tools would be best suited to fix the problem?
○ Phillips screwdriver (#0), torx driver (size T8, T10, and T15), tweezers, and a three-prong retriever
○ 30w ceramic solder iron, miniature pliers, wire cutters, and a soldering iron stand with sponge
○ Wire strippers, precision wire cutters, digital multimeter, and cable crimper with dies
○ Chip extractor, chip inserter, ratchet, and Allen wrench
○ Anti-static cleaning wipes, anti-static wrist band, flashlight, and cotton swabs
4. True or False? Windows includes software diagnostic tests that help you find and correct hardware
problems.
☐ True
☐ False
5. Examine the tools that are available to you in class. Discuss how and when they may be used to repair,
Facilitate a discussion of fix, or maintain computer equipment.
the tools that you have
provided, and ask
participants to suggest
other tools that might be
helpful and that they
would want to include in
a "Dream Toolkit."
124
TOPIC B
Electrical Safety
In the previous topic, you identified basic maintenance tools and techniques that you will use as a
PC technician. In addition to these basic maintenance practices, you need to be aware of specific
tools and techniques that are available to promote electrical safety. In this topic, you will identify the
best practices for PC technicians to follow to promote electrical safety.
The most prevalent physical hazards that computer technicians face are electrical hazards. Electricity
is necessary to run a computer, but it can also damage sensitive computer equipment, and in some
cases, pose a danger to humans. Following established best practices for promoting electrical safety
will protect not only the computer equipment that you work on, but also your personal safety and
the safety of others.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 5.1 Given a scenario, use appropriate safety procedures.
Static Electricity
Static electricity is a build-up of a stationary electrical charge on an object. It is called "static" because
the charge cannot escape the charged body until it comes in contact with another object. Static
electricity is often caused by friction; rubbing one object against another causes a transfer of
electrons between the two. Using friction to create a static charge is called triboelectric generation. The
amount of static that can be built up in this manner depends on various factors, including the types
of materials, their surface area and texture, and the ambient humidity. If you have ever shuffled your
feet on a carpet and then gotten a small shock when you touched a doorknob or other metal object,
you have used triboelectric generation.
Note: Static charges can be as small as the sparks that come off a dry blanket in the wintertime
or as massive as a lightning strike, with its millions of volts.
ESD
Electrostatic discharge (ESD) occurs when a path is created that allows electrons to rush from a
statically charged body to another with an unequal charge. The electricity is released with a spark.
The charge follows the path of least resistance, so it can occur between an electrical ground, such as
a doorknob or a computer chassis, and a charged body, such as a human hand. ESD can damage
sensitive computer equipment.
125
the spark to cause widespread damage. A few cells in your fingertip may be damaged, but they easily
grow back.
Eliminate activities and By eliminating unnecessary activities that create static charges and by
tasks. removing unnecessary materials that are known charge generators,
you can protect against ESD-related damage and injuries.
Use self-grounding Use grounding conductive materials and self-grounding methods
methods. before touching electronic equipment. You can prevent ESD injuries
by using ESD straps that can be attached to your ankle or wrist.
Use equipment grounding Grounding equipment made up of dissipative material can also be used
methods. to avoid a static shock. A dissipative material is a conductor, but with
high resistance. It loses its electrical charge slowly, so when you
touch it, the electron flow is spread over time and you do not feel a
shock. Prevent ESD damage to equipment by:
• Using anti-static vacuums for cleaning computer components
(such as system units, power supplies, and fans).
• Using ESD mats and materials such as electric grounded flooring,
work benches, or surfaces.
• Using anti-static bags to store computer components that are
particularly sensitive to ESD, such as RAM and power supplies.
Maintain air quality. You can maintain air quality and prevent a high-ESD work
environment by:
• Using an air ionizer, which releases negative ions into the air.
They attract positively charged particles and form neutrally
charged particles.
• Humidifying the air to speed up the static discharge from
components. When the air is extremely dry, more static is likely. A
higher humidity is best for ESD prevention. A rate of 50 to 60
percent is comfortable for both computers and technicians.
Anti-static Bags
Anti-static bags that are used for shipping components actually conduct electricity, so keep them
away from equipment that is powered on.
EMI
Electromagnetic interference (EMI) occurs when a magnetic field builds up around one electrical circuit
and interferes with the signal being carried on an adjacent circuit, causing network communication
interference issues. All current-carrying devices generate magnetic fields, and fluctuating magnetic
fields generate electrical current in nearby wires. While ESD is the primary electrical danger to
126
computer equipment, EMI also causes problems with microcomputer circuitry and data
transmissions between computing devices.
Magnets
EMI-related issues can be a result of magnets being placed too close to computer systems. Magnets
can be harmful to computer components, and components should not be placed in close proximity
to any magnets or items that contain magnets. It's important that you inform users to keep magnets
away from their computer equipment.
Method Description
Twisted-pair Twisted-pair cables are made with both sending and receiving conductors
implementations twisted together within the same cable. This method of manufacturing
cable minimizes the chances of EMI interference because the conductors
within the wire cancel each other out. For extra protection in multi-pair
cables, such as Ethernet, each pair is twisted together at a different rate,
and the multiple twisted pairs are then twisted together.
Cautious wiring The types of cables you use and how you place them can prevent certain
techniques devices and wires from interfering with each other. Fluorescent lights and
alternating current (AC) electrical cables, for example, emit signals that are
a source of EMI, so when you are running network cable in or along walls
or ceilings, avoid running them near fluorescent fixtures, and try to cross
electrical cables at right angles, rather than follow them. This minimizes
the "cross-section" of interference from these sources. Electronic
components themselves may generate or be susceptible to EMI; however,
their leads serve as the antennae that radiate or receive such interference.
SMD technology Surface Mount Devices (SMDs) are electronic components that are
implementation designed to be soldered directly onto circuit boards without legs. This
technology minimizes EMI transmissions to and from such devices.
Electromagnetic Shielding is used to prevent electromagnetic transfers from cables and
shielding devices by creating a conductive material protective barrier. For example,
a shielded cable contains electromagnetic shielding within the cable that
directly protects the inner core conductor from producing electromagnetic
discharge.
Network Interference
Network interference is the disruption of normal data transmissions over a network. EMI can cause
intermittent network issues and can be avoided by applying EMI prevention techniques such as
shielding, wiring techniques, and using twisted pair cables to connect network components.
An ESD Toolkit
Some people who work on computer equipment never use a single piece of ESD safety equipment.
They discharge themselves by touching an unpainted metal part of the computer case before
touching any components. In other instances, a company policy might require that you use a
properly equipped ESD-free work area. The minimum equipment in this case would be a grounded
wrist ESD strap. Other ESD-protection equipment includes leg ESD straps, anti-static pads to
cover the work surface, and grounded floor ESD mats to stand on. The mats contain a snap that
127
you connect to the wrist or leg strap. Anti-static bags for storing components might also be included
in an ESD toolkit. If the technician's clothing has the potential to produce static charges, an ESD
smock, which covers from the waist up, can be helpful.
To ensure that the ESD equipment remains effective, you should test it frequently. A minor shock
that you cannot feel can compromise ESD-sensitive equipment.
Electrical Hazards
Electrical Hazards Because computers are powered by electricity, there are some common potential electrical hazards
that you should be aware of when you are servicing them.
Electric shock If you touch a high-voltage source, and if you are either grounded or
in contact with another electrical circuit, your body may complete an
electrical circuit, permitting electrons to flow through you. Water is a
better conductor than air or dry skin, so touching an electrical contact
with wet hands reduces resistance and increases the current flow even
more. Depending on the conditions, this may cause pain, burns, or
even death.
Electrocution (fatal shock) Electrocution results when the body is exposed to a lethal amount of
electrical energy. For death to occur, the body must become part of
an active electrical circuit with a current capable of overstimulating
the nervous system or damaging internal organs. The extent of
injuries received depends on the current’s magnitude (measured in
amperes), the pathway through the body, and the duration of flow.
The resulting damage to the human body and the emergency medical
treatment determine the outcome.
Burns Contact with a source of electrical energy can cause external and
internal burns. Exposure to higher voltages will normally result in
burns at the sites where the electrical current entered and exited the
body. High-voltage contact burns may display only small superficial
injuries; however, the danger of these deep burns is destruction of
internal tissues.
128
Electrical Hazard Description
Electricity can hurt you even if you are careful and avoid becoming
part of an electrical ground circuit. The heat generated by an electric
arc or electrical equipment can burn your skin or set your clothes on
fire.
Collateral injuries Collateral injuries occur when involuntary muscle contractions caused
by the shock cause the body to fall or come in contact with sharp
edges or electrically live parts. You instinctively pull your hand back
from the doorknob when you get a static shock. Electricity flowing
through your body can also cause your muscles to twitch
uncontrollably. These motions can cause you to hurt yourself on
objects around you.
129
Power Inverter Electrical Safety
A power inverter converts direct current (DC) voltage to AC voltage. For example, you can use a
power inverter in a car to provide a normal wall-style outlet for a laptop. The power inverter unit
has no user-serviceable parts within it, so after you determine that the inverter is a problem, there is
no need for further diagnosis and troubleshooting; the unit must be replaced.
Category Guidelines
Personal safety • Make sure that you disconnect the power before repairing
computer equipment.
• Do not attempt repair work when you are tired; you may make
careless mistakes, and your primary diagnostic tool, deductive
reasoning, will not be operating at full capacity.
• Do not assume anything without checking it out for yourself.
• Remove jewelry or other articles that could accidentally contact
circuitry and conduct current.
• Wear rubber-soled shoes to insulate yourself from ground.
Environment conditions • Suspend work during an electrical storm.
• Do not handle electrical equipment when your hands or feet are
wet or when you are standing on a wet surface. Perform as
many tests as possible with the power off.
Anti-static equipment • Prevent static electricity from damaging components by
standing on a totally insulated rubber mat to increase the
resistance of the path to ground. In some cases, workstations
are located in areas with grounded floors and workbenches, so
static electricity has a low-resistance, non-destructive path to
ground.
• When removing circuit boards, place them on a dissipative
ground mat or put them in an anti-static bag.
• Use an anti-static wrist strap when you are handling static-
sensitive components such as system boards, sound cards, and
memory chips.
Disassembly safety • After cleaning a keyboard, be completely sure it is dry before
powering it up.
• Label wires and connectors as you detach them, and make sure
you that plug them back into the proper sockets in the proper
order.
• When you replace the computer's case, make sure that all of the
wires are inside. The case may have sharp edges that can cut
through exposed cables.
Power supply safety • Power supplies have a high voltage in them any time the
computer is plugged in, even if the computer power is turned
off. Before you start working inside the computer case,
disconnect the power cord and press the power button to
dissipate any remaining power in the system circuitry. Leave the
power off until you are done servicing the system unit.
130
Category Guidelines
131
ACTIVITY 3-2
Identifying Electrical Safety Issues
Scenario
In this activity, you will identify electrical safety issues.
1. True or False? If you are using an anti-static ESD floor mat, you do not need any other ESD safety
equipment.
☐ True
☐ False
2. Electrical injuries include electrocution, shock, and collateral injury. Would you be injured if you are not
part of the electrical ground current?
A: Yes, you could receive a thermal burn from the head of an electric arc or electric equipment. Your
clothes can catch on fire, or your skin can be burned.
3. Which computer component presents the most danger from electrical shock?
○ System boards
○ Hard drives
○ Power supplies
○ System unit
4. Have you had any personal experience with any of the electrical hazards covered in this topic? What
safety precautions could have prevented the incident?
A: Answers will vary depending on individual experiences. Common precautions include
disconnecting a computer from the electrical outlet or power strip before servicing it, using anti-
static equipment to protect computer components, and implementing smoke and flame detectors
to alert you of electrical fires.
132
TOPIC C
Environmental Safety and Materials Handling
In the previous topic, you identified best practices for safely dealing with electricity. Electrical safety
is just one factor that you need to consider to ensure a safe work area. In this topic, you will identify
best practices for promoting environmental safety and proper materials handling.
In addition to electrical issues, there are other environmental issues that computer technicians must
deal with on a regular basis. The health and safety of you and those around you should always be
your highest priority. Recognizing potential environmental hazards and properly dealing with them
in a safe manner is a critical responsibility for an A+ technician.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 5.1 Given a scenario, use appropriate safety procedures.
• Exam 220–801: Objective 5.2 Explain environmental impacts and the purpose of environmental
controls.
Ozone gas Laser printers produce ozone gas, usually when the corona wire
produces an electrical discharge during printing. Depending on the
levels, ozone can be a mild-to-severe irritant. Regulatory agencies have
established limits regarding the amount of ozone that employees can
be exposed to. Be sure that your laser printers operate in a well-
ventilated area. Some laser printers have a filter to control ozone
emissions.
Temperature and humidity Computer equipment and performance are both affected by
temperatures and humidity levels.
• Too much moisture can be problematic and cause physical damage
to equipment. On the other hand, low humidity can contribute to
more electrostatic charge into the air. High humidity levels can also
have an effect on tapes and paper media.
• Extreme temperatures can also be an issue. Low temperatures can
cause condensation on computer system components that generate
heat while turned on, while high temperatures can cause the
components to overheat. Proper ventilation systems must be used
to help prevent overheating of computer systems.
Be aware of the humidity level and temperatures of the environment
where devices will be installed and running to prevent these types of
issues.
Dust and debris Dust can be a more subtle hazard. The buildup of dust particles over
time can cause problems with different types of equipment. Dust
buildup causes resistance in moving parts, such as fans, drives, and
printer motors. Dust buildup on circuit boards, heat sinks, and vents
creates insulation that reduces heat dissipation. Dusting equipment
often with compressed air and vacuums can prevent these types of
issues. Make sure that printers and paper products are kept in a
133
Consideration Description and Controls
separate area from computer equipment to prevent paper dust from
getting into the equipment.
Airborne particles The conditions surrounding computer equipment can be an issue
when there is a large number of airborne particles flowing in and
around various devices. Contaminants can be either gaseous, such as
ozone; particles, such as dust; or organic, which comes from industrial
processing of fossil fuels, plastics, etc. All these contaminants can
cause damage to computer equipment, such as corrosion and
overheating. To protect your computing environment from airborne
particles, you can:
• Install computer equipment enclosures that will prevent
contaminants from entering the devices.
• Install air filters throughout the facility to catch excess particles as
the air flows through the heating, ventilation, and air conditioning
(HVAC) system.
Falling and tripping Within your work area alone, a number of things can cause you to fall or
trip. While working with computer equipment, you need to keep in mind
the location of hardware, cables, and devices.
Equipment storage CPUs and other hardware should not be stacked on top of one another.
Make sure the equipment is secure, whether it is on the floor or on a desk
or shelf.
Component handling Whenever you are handling computer equipment, you must follow the
and protection proper handling guidelines. Use an anti-static bag to store any computer
component that can carry ESD. For example, when you are removing or
replacing RAM, motherboards, or CPUs from inside a computer,
immediately place the component in an anti-static bag until it is either
replaced or disposed of.
Cable management In office environments where there are many computers, there can also be
many cables and power cords. If these cords and cables are lying on the
floor, they could possibly cause a person to trip on them.
Lasers Lasers are used in printers, CD drives, DVD drives, and Blu-ray drives
and players. "Laser" is an acronym for Light Amplification by Stimulated
Emission of Radiation. A laser produces an intense, directional beam of
light by stimulating electronic or molecular transitions to lower energy
levels. This powerful beam can cause damage to the human eye or skin.
Lasers have many uses and, like other tools, are capable of causing injury
if improperly used. The most likely injury is a thermal burn that will
destroy retinal tissue in the eye. Because retinal tissue does not regenerate,
the injury is permanent.
Repetitive strain injury Repetitive strain injuries involve damage to muscles, tendons, and nerves
(RSI) caused by overuse or misuse. Computer users suffer mostly from
repetitive strain injuries to the hand, wrist, and arm. Unlike strains and
sprains, which usually result from a single incident—called acute trauma—
134
Safety Issue Description
repetitive strain injuries develop slowly over time. The type of injury
depends on whether the muscle, tendon, tendon sheath, or nerve tissue
has been irritated or damaged. Any or all of the following symptoms may
appear in any order and at any stage in the development of an injury of
RSI:
• Aching, tenderness, and swelling
• Pain, crackling, and tingling
• Numbness and loss of strength
• Loss of joint movement and decreased coordination
Eye strain Many computer tasks are done at a close working distance, requiring the
eyes to maintain active focusing. This can cause stress and strain on the
eyes and the muscles that control them. A very common health problem
reported by users of computer monitors is eye strain—including the
following symptoms:
• Blurred vision
• Difficulty focusing
• Double vision
• Tiredness
• Headaches
• Burning, sore, or itchy eyes
Dry eyes can also be a concern for computer operators. The eye surface
becomes dry because computer users tend to blink less and tears
evaporate faster during monitor use. Symptoms associated with dry eyes
are redness, burning, and excess tearing.
Radiation Radiation is a broad term used to describe energy in the form of waves or
particles. Electromagnetic radiation comes from both natural and
manufactured sources, including CRT computer monitors. Circuits within
the monitor are responsible for the horizontal and vertical movements of
the electron beam. This movement occurs tens of thousands of times each
second (Very Low Frequency, or VLF) for the horizontal scan, and 50 to
60 times each second (Extremely Low Frequency, or ELF) for the vertical
scan. The VLF and ELF field intensities have been extensively evaluated
in many different models of monitors for possible biological effects. CRT
computer monitor users have expressed concerns about the possible
health effects from the electromagnetic radiation that monitors produce.
While the research continues, current scientific information does not
identify a health risk from exposure to these electromagnetic fields. With
CRT monitor use decreasing, concerns about radiation exposure have also
declined.
Noise Noise levels produced by computers and most printers are well below
those that cause adverse health effects. The equipment has minor noise
sources such as the hum of cooling fans and the clicking of keys.
Excessive noise from a computer may indicate an internal malfunction.
Certain industrial high-speed line printers may produce noise at a level
which is uncomfortable for prolonged exposure; in these cases, sound-
deadening covers are often used.
Hot components Hot computer components within the system unit can be problematic.
For example, any component carrying a high electrical voltage can get very
hot and could cause burns. High-speed processors are also known heat
generators; heat sinks and fans keep them cool enough to prevent a
135
Safety Issue Description
burnout, but they may still be uncomfortably hot to touch. You must
exercise caution when working with any part of a computer or printer that
may be hot to the touch, or that might be holding an electrical charge.
Food and drink Eating and drinking around computer equipment can be problematic.
Food particles and liquids can get inside and harm the inner mechanics of
the hardware. Your employer may have policies in place that prohibit
eating and drinking around computer equipment for these reasons.
Moving equipment Lifting and moving computer equipment can be one of the more
strenuous parts of your job. For example, when you need to work on a
CPU, you may have to lift and relocate the machine to your work area.
Always assess the situation first to determine if you can lift or move items
safely.
Cords and cables If cords and cables must traverse a floor area where people need to walk,
it is recommended that cord protectors be used to shield the cords and
cables from being damaged by pedestrian traffic, as well as to minimize
the chance of someone tripping on the cords and cables. You can also use
cable management techniques and tools to group and organize cables
together to keep them out of the way and hidden from the general
working space.
Lasers Precautions include the following:
• Never point a laser beam in someone’s eyes.
• Never look directly at a laser beam.
• Never disable safety mechanisms when servicing a device with an
embedded laser.
RSI If an individual has even mild RSI symptoms, action should be taken. If
symptoms are allowed to progress, a person with RSI can develop
136
Best Practice Safety Precautions
chronic symptoms. The key to RSI management is to remove an
individual from the exposure that causes injury. A period of time away
from the keyboard and mouse is followed by a gradual return to keying in
an ergonomically correct work setting. Occasionally, a physician will
prescribe a medication to help reduce symptomatic inflammation and
pain. People with more severe forms of RSI may be referred by their
medical provider to an occupational therapist who can do further
evaluation and recommend a program of localized treatments, stretches,
and exercises. Referral to an orthopedic hand specialist may be needed to
determine treatment options. If the individual displays symptoms even at
rest, splints may be recommended; while these are useful in the first
stages of recovery, they are not the long-term solution. The best
treatment for RSI, of course, is prevention through proper arrangement
of computer workstations and reasonable project design.
Eye strain A vision examination is recommended. A specific eyeglass prescription
for computer use may help compensate for the strain involved in looking
at a close and fixed point for periods of time.
Artificial tears—used to supplement the eye’s natural tear film and
lubricate the dry surface—alleviate dry-eye symptoms for some computer
users.
Noise Impact printers and even the paper handling mechanisms on other
industrial high-speed printers can be noisy and should be placed in rooms
away from operators, where possible. Noise reduction hoods are
recommended.
Lifting techniques Before lifting anything:
• Know your own strengths and weaknesses. You need to be aware of
what your weight limitations are.
• When you lift, bend at your knees and not at your waist. This will
prevent strain on your back muscles and pressure on your spine.
• Assess the equipment you are moving. If you feel that physically the
equipment is too heavy or awkward for you to move alone, then get
help from a coworker, or use a cart to relocate the equipment. If you
use a cart, make sure the equipment is tightly secured during transport.
• The equipment may be unstable for lifting. You may need to take
special precautions and may require help moving it to a cart.
• Equipment should never be stacked too high while moving to avoid
hardware falling and breaking on the floor. This can cause damage to
other devices or to you.
• Plan ahead. While moving equipment from one area to another, be
aware of narrow doorways or columns that you will encounter on the
way. Also, make sure to prep the space before delivering the
equipment so that you are not trying to reconfigure the space with all
the equipment in the way.
137
Power Problem Description
UPS or battery backup An uninterruptible power supply (UPS), also referred to as a battery backup, is a
device that continues to provide power to connected circuits when the
main source of power becomes unavailable. Depending on the design,
UPSs can be battery operated, AC powered, or both. They are meant for
temporary use and are intended to support computer systems until they
can be powered off normally. Power is likely to be interrupted when the
batteries or other power sources are discharged.
Generators A generator creates its own electricity through the use of motors.
Generators provide long-term power and are often started while a UPS
system supports equipment through the initial power loss. Generators
can fail when motor fuel runs out or when a mechanical failure occurs.
Surge suppressor A surge suppressor is a device that provides power protection circuits that
can reduce or eliminate the impact of surges and spikes.
UPS Types
Depending on the needs of an organization, different types of UPSs might be used. Common types
include:
• A standby UPS, which is primarily AC-powered, until the power source fails. When the power
source fails, it switches to the backup power source or battery. This UPS is used most often with
personal computers.
• A line interactive UPS is commonly used in smaller business settings to provide power through a
constant AC connection. When the AC power fails, the inverter switches to battery power. This
UPS is unique in that while the AC power is available, it is used to also charge the battery.
Liquid Hazards
There are many different professional situations when you may come in contact with a hazardous
liquid. Some such compounds are used to clean or condition equipment, including the computer’s
case, adapter card contacts and connections, and glass surfaces. They may present safety or
environmental problems. Make sure you read the labels and follow the instructions carefully when
you are disposing of hazardous materials.
138
Chemical Hazards
Working with personal computers can cause you to come in contact with some chemical hazards.
Laser printer toner Made of fine particles of iron and plastic, toner presents its own set of
problems due to its reactions with heat. If you spill toner, do not clean
it up with a regular vacuum; the particles will get into the motor and
melt. Do not use warm water to wash toner off your hands or arms;
the toner could fuse to your skin. Instead, brush off as much as you
can with a dry paper towel, rinse with cold water, and then wash with
cold water and soap. In addition, do not use ammonia-based cleaners
on or around laser printers, as the ammonia may react chemically with
the toner.
Batteries Batteries maintain the data in complementary metal oxide
semiconductor (CMOS) chips and supply power to remote controls,
portable computers, and other devices. These batteries may contain
mercury, cadmium, and lithium, as well as other dangerous chemicals.
Capacitors Capacitors store electricity by using two or more conducting plates
separated by an insulator. There are capacitors in various personal
computer components, including microprocessors. The electrolytes in
capacitors are very caustic; treat them as you would any hazardous
chemical. Thoroughly wash your hands after handling ruptured
capacitors.
Caution: The capacitors in power supplies and monitors do not discharge when they are turned
off or unplugged, and contain enough charge to kill you. Do not open or attempt to service
internal components of power supplies or monitors.
MSDS Documentation
A Material Safety Data Sheet (MSDS) is a technical bulletin that is designed to give users and
emergency personnel information about the proper procedures for the storage and handling of a
hazardous substance. This applies to any situation in which an employee is exposed to a chemical
under normal use conditions or in the event of an emergency. The manufacturers supply MSDSs
with the first shipment to a new customer and with any shipment after the MSDS is updated with
significant and new information about safety hazards. You can get MSDSs online; the Internet has a
wide range of free resources. OSHA regulations govern the use of MSDSs and the information an
MSDS must contain.
Chemical Hazards
139
Figure 3-3: An MSDS.
Incident Reports
An incident report is a record of any instance where a person is injured or computer equipment is
damaged due to environmental issues. The report is also used for accidents involving hazardous
materials, such as chemical spills, that could have an impact on the environment. Any time an
accident occurs at a work site, you should submit an incident report. Reporting these occurrences is
often part of company policy and can help provide protection against liability. )
140
Figure 3-4: Sample incident report.
Liquid cleaning materials Follow your company's guidelines for disposing of liquid cleaning
and empty containers materials and their containers. Each municipality has its own disposal
regulations that you must learn and follow. You can find out about
these regulations by contacting your local government's environmental
office or department for trash disposal and recycling.
Toner Empty toner cartridges should not be discarded in the trash because of
the damage that the residual chemicals can do to the environment.
Used toner cartridges should be refilled or returned to the
manufacturer for recycling and/or disposal. Follow your company's
guidelines for disposal procedures.
Display devices The CRTs in older computer monitors contain lead, which is
considered a hazardous material. Follow your company's guidelines for
disposing of display devices. Many municipalities have regulations for
disposal and recycling of old monitors and television sets; contact your
local government's environmental office or department for trash
disposal and recycling to determine if there are specific rules you need
to follow.
Ozone filter Follow the manufacturer's recommendations for replacement and
disposal of a laser printer's ozone filter.
Batteries Used batteries should not be discarded in the trash; they should be
recycled or disposed of following your company's guidelines.
141
ACTIVITY 3-3
Identifying Environmental Safety Issues
Scenario
In this activity, you will identify the best practices for promoting environmental safety and proper
handling of materials.
1. You are on a service call, and you accidentally spill some liquid cleaner on the user's work surface.
What actions should you take?
☐ Refer to the MSDS for procedures to follow when the material is spilled.
☐ Wipe it up with a paper towel and dispose of the paper towel in the user's trash container.
☐ Report the incident.
3. What item reacts with heat and ammonia-based cleaners to present a workplace hazard?
○ Capacitor
○ Laser
○ Toner
○ Battery
142
TOPIC D
Professionalism and Communication
So far in this lesson, you have identified best practices for working directly with computer
equipment. On almost every service call, you will also need to interact with users who are
experiencing problems. In this topic, you will identify best practices for PC technicians to use to
communicate appropriately with clients and colleagues and to conduct business in a professional
manner.
You are a representative of your profession, as well as your company. Working with customers is a
fundamental job duty for every A+ technician. How you conduct yourself will have a direct and
significant impact on the satisfaction of your customers, and your level of professionalism and
communication skills can directly affect whether or not you will do business with them again in the
future.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 5.3 Given a scenario, demonstrate proper communication and
professionalism.
• Exam 220–801: Objective 5.4. Explain the fundamentals of dealing with prohibited content/
activity.
Communication Skills
Using the proper communication skills when dealing with clients and colleagues creates a Communication Skills
professional environment that is conducive to solving the problem at hand.
Use proper language • Use clear, concise, and direct statements. This will help you get to
the crux of the matter more quickly, and it will help the user
understand what you are saying.
• Avoid using jargon, abbreviations, acronyms, and slang. Many users
will not have the same level of technical knowledge as you and your
colleagues, and using terminology that is beyond their level of
knowledge can confuse or upset them.
• Use timing to set the pace of a conversation. A pause may be more
valuable than an immediate answer, as it allows you time to
formulate your response. If a situation escalates and your customer
becomes agitated, you may ask him or her to slow down so that you
can get all the information. When a customer is having difficulty
ending a call to the help desk, you may gently step up the pace to
indicate your need to move on.
Non-verbal • Be aware of the non-verbal clues you use, whether you are talking
communication or listening. Body language communicates more than actual words.
Studies show that up to 70 percent of a message is conveyed
through actions. Even when you are talking on the phone, non-
verbal characteristics—such as tone of voice—will add meaning to
your message and help you interpret your customer's concerns.
• Use the proper level of eye contact. You and your customer will
make, maintain, and break eye contact as you talk with each other.
When attention is directed to the problem at hand, eye contact may
be minimal. Avoid staring directly at your customer—a form of
143
Communication Skill Description
144
Active Listening
Active listening techniques can enhance your communications skills. These techniques may feel
awkward at first, so you might want to try them out in a situation outside your job. With practice,
you will use active listening skills more easily and creatively.
Action Description
Questioning Ask questions to gain information, clarify what you have heard, and
direct the conversation. Open-ended questions can elicit a lot of
information. Close-ended questions limit the amount of information by
giving a choice of answers. Yes/no questions further limit the
information exchange and can be used when you need to get closer to a
conclusion. Examples of each of these question styles are:
• Open-ended: "What happened after you pressed Ctrl+Alt+Delete?"
• Close-ended: "What kind of a printer do you have, laser or inkjet?"
• Yes/no: "Are you on a network?"
What if the answer to your open-ended question is "I do not know" or
"I am not sure"? Go down the list—using close-ended and then yes/no
—until you reach the customer's level of expertise.
Examples of less helpful question styles:
• Confusing multiple questions: "What did you do next? Did you
try...? What happened?"
• Accusations: "What did you do that for?"
Empathizing Let your customer know that you perceive and support what they are
feeling. Try to be specific in naming the emotion and link it to the
customer, using "you," not "I." Examples of helpful empathetic
responses include:
• "This delay is frustrating for you."
• "You are afraid you will lose business while your computer is
down."
• "You must be worried about the cost."
Examples of less helpful empathetic responses include:
• "I know how you are feeling."
• "I can identify..."
Paraphrasing Restate what the customer says in your own words to make sure that
you interpreted correctly, to bring order to the customer's thoughts, and
to relay that their message is important. Use statements, not questions,
and do not add or change anything. Examples of starters for
paraphrasing include:
• "You are saying that..."
• "It sounds like..."
• "I am hearing you say..."
Summarizing Outline the main points of your conversation to summarize what has
been said. You can begin by summarizing your understanding of the
problem and then checking for clarification. During the conversation,
you can re-establish the focus by listing the important facts. Bring
closure by summing up the work performed. If a follow-up plan is
needed, restate the responsibilities and timeline. Helpful starters for
summarizing include:
145
Action Description
Professional Conduct
Professional Conduct Acting in a professional manner when dealing with colleagues and clients provides a work
environment where problems can be solved efficiently.
Facet Description
146
Facet Description
your shoes or put on a hard hat. Be aware of the corporate culture and
respond accordingly.
Respect Be respectful of the customer and the environment in which you are
working.
• Maintain a positive attitude when talking with users. Avoiding arguing
or getting defensive with users will make it easier for you to solve the
problem to the user's satisfaction.
• Be culturally sensitive. Always be conscious of who you are working
with, and how your actions can be conveyed.
• Do not minimize the customer's problem. What seems simple to you
could be a mission-critical problem to the user.
• Never insult a customer or call the customer names. No matter how
frustrating a service call might become, rudeness is never the answer.
• When you are dealing with customers, avoid distractions and
interruptions. Repeatedly answering a mobile phone, talking to
coworkers, or attending to any other personal distractions while you
are supposed to be working on a problem sends the message that the
user's problem is unimportant to you.
• Ask open-ended questions and try and narrow the scope of the
problem. Restate the issue or question to verify understanding. This
will show the customer that you are listening and care about resolving
the issues at hand.
• Be sure to keep your work area at the customer site neat. Do not pile
materials on your customer's books and files. Clean up after yourself.
When you are on-site, ask where to dispose of materials; find out
where the recycling bin is for printer test-run paper.
• Be on time. Tardiness can give the customer a negative impression of
you. If you are going to be late, always call and communicate with the
customer.
• Be respectful of the property at the customer site. Always ask
permission before entering an office or workspace, using the
telephone, sitting down at a computer, or adjusting the workspace.
Accountability Be accountable. Do not misrepresent your credentials, competence, or
training. Take responsibility for your actions, and admit your mistakes. In
questions of conflict of interest between your company and the customer,
refer to your supervisor or follow your company's procedures. Be aware
of your company's policy for accepting gifts or samples, and for
socializing with customers.
Confidentiality Treat any information located on a desktop, a computer, or a printer that
pertains to your customer's business as confidential. Know your
company's policies concerning confidential information—and follow
them. Many fields—including medicine, social work, and special
education—are regulated by federal and state laws concerning the
confidentiality of their customers, consumers, or clients. All companies
have personal information about their employees. Many corporations
have sensitive information about the development of their products or
services.
Honesty Be forthright with your customers about what is occurring and the
actions you will take. Clients have a right to understand the process you
are following and how it will affect them.
147
Facet Description
Prohibited Content
As an A+ technician, you may come across situations when you may encounter prohibited activities,
such as viewing pornography on work-issued devices by users either within your organization or by
a customer. There are different levels of prohibited content, which can be described as distasteful,
inappropriate, or illegal. Every organization will have different guidelines and restrictions based on
the type of content. For example, some organizations will discourage access to social networking
sites, or websites that contain questionable words or phrases, but will not explicitly forbid it. On the
other hand, restrictions on content or data that can be categorized as inappropriate or illegal, such as
pornography, will be enforced heavily, and accessing such content will have immediate
consequences. In each of these cases, it is your responsibility to follow organizational procedure to
report the incident. When reporting potentially illegal activities, you must follow the organization's
policy on reporting, collecting, and documenting the specifics of the situation and what evidence
was found.
148
Phase Description
First response First response refers to the immediate actions that follow an incident, as
well as the individual or individuals who perform these actions. There
are a few actions that take place during the first response to an incident:
• Identifying the data and/or hardware.
• Reporting the details of the discovery and evidence through the
proper channels. This will vary depending on the specific
organization's policies and reporting instructions.
• Preserving the data and/or device as evidence. This can sometimes
be also be called computer forensics.
Chain of custody The chain of custody is the record of tracking evidence from collection
through presentation in court. The evidence can be hardware
components, electronic data, or telephone systems. The chain of
evidence reinforces the integrity and proper custody of evidence from
collection, to analysis, to storage, and presentation in a court of law.
Every person in the chain who handles evidence must log and
document the process, methods, and tools they used.
Documentation In the process of identifying and reporting incidents with prohibited
content, you should follow the organization's documented procedures
to ensure that you are carrying out the correct response tasks and
guidelines. You must also be aware of any changes made to the
documentation so that you are always following the right procedures in
handling incidents, managing evidence, and reporting findings to the
appropriate individuals.
Computer Removal
When computer crimes are reported, one of the first response activities is removing computers from
the crime location. They are tagged with a chain of custody record to begin the process of making
the evidence secure for future presentation in court.
Computer Forensics
Computer forensics is the practice of collecting and analyzing data from storage devices, computer Computer Forensics
systems, networks, and wireless communications and presenting this information as a form of
evidence in a court of law. Primarily, forensics deals with the recovery and investigation of potential
evidence. Computer forensics is a fairly new field, so there is little standardization or consistency in
practicing it across organizations and courts. Basically, computer forensics is a blend of the elements
of law with computer science in analyzing evidence in a way that is permissible in the court of law.
Capture system image One of the most important steps in computer forensic evidence
procedures is to capture exact duplicates of the evidence, also known as
forensic images. This is accomplished by making a bit-for-bit copy of a
piece of media as an image file with high accuracy.
Examine network traffic Attackers always leave behind traces; you just need to know how and
and logs where to look. Logs record everything that happens in an intrusion
149
Forensic Response Description
Procedure
prevention system (IPS) or intrusion detection system (IDS), and in
routers, firewalls, servers, desktops, mainframes, applications, databases,
antivirus software, and virtual private networks (VPNs). With these logs,
it is possible to extract the identity of hackers and provide necessary
evidence.
Capture video Video forensics is the method by which video is scrutinized for clues.
Tools for computer forensics are used in reassembling video to be used
as evidence in a court of law.
Record time offset The format in which time is recorded against a file activity, such as file
creation, deletion, last modified, and last accessed, has developed to
incorporate a local time zone offset against GMT. This makes it easier
for forensic examiners to determine the exact time the activity took
place, even if the computer is moved from one time zone to another or
if the time zone has deliberately been changed on a system.
Take hashes Federal law enforcement agencies and federal governments maintain a
list of files such as files relating to components of Microsoft®
Windows® and other application software. The hash codes generated by
a file or software can be compared to the list of known file hashes and
hacker tools if any are flagged or marked as unknown.
Take screenshots You should capture screenshots of each and every step of a forensic
procedure, especially when you are retrieving evidence by using a
forensic tool. This will ensure that data present on a compromised
system is not tampered with and also provides the court with proof of
your use of valid computer forensic methods while extracting the
evidence.
Identify witnesses Courts generally accept evidence if it is seconded by the testimony of a
witness who observed the procedure by which the evidence was
acquired. A computer forensics expert witness is someone who has
experience in handling computer forensics tools and is able to establish
the validity of evidence.
Track man hours and When the first incidents of computer crimes occurred, it would usually
expense take less than 40 man hours to complete a forensic investigation because
incidents usually involved single, standalone computers. Now, with
advances in technology and the advent of new digital media such as
voice recorders, cameras, laptop computers, and mobile devices,
computer forensics procedures can require a much greater amount of
time and expense. Also, the increase in storage device capacities and
encryption affect the amount of man hours that it can take to assess any
damage, and consequently increase the expenses incurred in any
computer forensics investigation. Capturing this expense is part of the
overall damage assessment for the incident.
150
ACTIVITY 3-4
Examining Professionalism and Communication
Techniques
Scenario
In this activity, you will examine different professionalism and communication techniques.
3. While answering a service call on a computer that is located in a common area of the office, you come
across information showing that some unauthorized websites have been viewed. The activity has been
linked to a particular user account. What is the appropriate action to take?
A: Answers will vary, but will most likely include referring to procedures and guidelines documented
by your specific organization and following the best practices used when responding to an
incident, such as first response procedures, chain of custody guidelines, and documenting the
entire process.
4. When a service technician does not share sensitive customer information with others, which skill or
behavior is being practiced?
○ Confidentiality
○ Ethical behavior
○ Respect
○ Active listening
5. You have received an off-site service call to service a network printer at a customer location. When you
arrive, the user is at the printer and starts talking about how the printer is not working properly, and he
cannot get his reports handed in on time. As a result, you start asking more clarifying questions to
gather more information, so you can identify the specific issue with the printer. What type of technique
are you using to gather information?
○ Passive listening
○ Non-verbal communication
○ Active listening
151
☐ Asking permission before changing display settings
☐ Asking "What happened just before you noticed the problem?"
☐ Sitting in a user's chair without permission
☐ Silencing your pager or mobile phone
152
Lesson Summary
In this lesson, you identified best practices that are followed by professional PC technicians. With
the proper tools, awareness of safety and environmental issues, and basic communication skills, you
are prepared to do your job in a safe, effective, and professional manner.
Use the review
Which of the best practices discussed in this lesson apply in your workplace? questions provided to
A: Answers will vary, but may include silencing phones and pagers, using active listening techniques, generate discussion
acting in a professional manner, and treating clients with respect. among the participants.
Have you ever been in a situation where you uncovered inappropriate conduct or prohibited activity?
A: Answers will vary, but may include finding inappropriate content on a user's machine while you are
performing general maintenance on the machine.
Note: Check your LogicalCHOICE Course screen for opportunities to interact with your
classmates, peers, and the larger LogicalCHOICE online community about the topics covered in
this course or other topics you are interested in. From the Course screen you can also access
available resources for a more continuous learning experience.
Encourage students to
use the social
networking tools
provided on the
LogicalCHOICE Home
screen to follow up with
their peers after the
course is completed for
further discussion and
resources to support
continued learning.
153
154
4 Peripheral Components
Lesson Time: 2 hours, 15 minutes
Lesson Objectives
In this lesson, you will install and configure peripheral components. You will:
• Install and configure display devices.
• Install and configure input devices.
• Install and configure expansion cards
• Install and configure multimedia devices.
Lesson Introduction
So far in this course, you have identified the hardware and software that makes up a
personal computer system and examined some general best practices for working with
them. Now that you have a solid base of background information, it is time to roll up your
sleeves and start working with some of those hardware components. In this lesson, you will
install and configure peripheral computer components.
Much of the work that you will perform as a PC technician will involve installing and
configuring various hardware and software components. As an IT professional, you will
often find yourself setting up end-user workstations or helping those end users with the
hardware they need to make their daily lives easier. Installing and configuring peripheral
components—like display devices, keyboards and mice, or even more specialized devices—
are some of the more common tasks that you will perform.
This lesson covers all or part of the following CompTIA® A+® (2012) certification
objectives:
• Topic A:
• Exam 220–801: Objective 1.10
• Topic B:
• Exam 220–801: Objective 1.12
• Topic C:
• Exam 220–801: Objective 1.4
• Topic D:
• Exam 220–801: Objective 1.12
155
TOPIC A
Install and Configure Display Devices
In this lesson, you will install and configure peripheral components. Generally, one of the most
common peripherals that you will be asked to install is the display device. In this topic, you will
install and configure display devices.
The display device provides visual output from the computer system. Without the display device,
you can't see any images on screen to guide your interactions with programs or see the results of
your input. Correctly installing and configuring the display device enables you to meet the basic user
need to see what they are working on.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 1.10: Given a scenario, evaluate types and features of display devices.
CRT Cathode ray tube (CRT) displays use electron beams within a vacuum tube to
create images on a fluorescent screen. The intensity of three electron beams,
one for each primary color (red, blue, and green), are manipulated to display
the image on the screen.
CRT monitors are larger, heavier, and boxier than their more modern
counterparts due to the components used to build them, especially the thick
glass used for the screen. The screen may be curved or flat, but CRTs are not
considered flat-panel monitors.
CRT monitors have for the most part been replaced by more modern and
efficient displays like LCD, LED, or plasma screens, though many may still be
in use in organizations who have yet to upgrade their devices.
LCD Liquid crystal display (LCD) flat-panel displays are a compact, lightweight
alternative to traditional CRT displays.
LCDs consume much less energy than CRTs and do not emit nearly as much
electromagnetic radiation as CRTs do. LCD monitors use a cold cathode fluorescent
lamp (CCFL) as the backlight source. CCFLs use electrodes and mercury vapor
to create ultraviolet light that is used as the light source.
Depending on the LCD screen, the user may need to sit directly in front of the
screen to see the display properly.
A unique feature of LCD displays is that the screen auto centers. There is
typically no center alignment needed.
LED Light emitting diode (LED) displays utilize the same screen as an LCD display,
but use a different backlighting technique/technology. Instead of the CCFLs
used in LCD, LED screens use one of two types of light emitting diodes as a
backlighting source: dynamic RGB LEDs, which are located behind the panel;
or white edge-LEDs, which are located around the edge of the screen and use a
diffusion panel to evenly distribute the light source.
LED displays consume even less power than LCD displays. However, LED
displays are currently more expensive to purchase.
156
Display Device Description
OLED Organic light emitting diode (OLED) displays utilize the same technology as LED
displays, but use organic compounds that emit light when subjected to an
electric current as the light source.
However, OLED screens can be used in a larger variety of dimensions than
LED screens, and are currently utilized in computer monitors, television
screens, tablets, and mobile phones.
Plasma Plasma displays use xenon and neon rays and a flat panel of glass to provide
visuals with high contrast, brightness, and vibrant colors that can be viewed
from a multitude of angles.
However, plasma displays can suffer from image burn-in from repeated, long-
term use. They are currently only available in very large dimensions, typically 40
inches or more, and are mostly marketed and utilized as television displays.
They can also be incredibly heavy and cumbersome due to the technology.
Projector Video projectors are often used to display the video output onto a whiteboard
or other surface so that a larger audience can see it.
157
Display Setting or Description
Feature
is not the same as the native resolution, but it will result in image quality
loss.
Refresh rate The number of times per second that the entire monitor is “refreshed,”
or scanned to illuminate the pixels. Each scan is referred to as a frame.
The rate is expressed in hertz (Hz). Typical refresh rates are 60 to 70 Hz
or 60 to 70 times per second. Any setting lower than 60 Hz usually
produces noticeable flickering.
Brightness The amount of light that is being emitted from a display device.
Brightness is measured in lumens, which is the unit of measurement for
visible light that is being emitted from a light source. On a display
device, brightness can be increased or decreased for the display. If the
brightness is set too high, you might get an "aura" effect displayed on
the screen. If it is set too low, you might not see anything on the screen.
Multiple displays Many users choose to use more than one display device to increase the
amount of display space. The typical setup is two displays, though more
than two displays can be configured with the appropriate expansion
card that can support that setup. Multiple displays are most commonly
used for either a professional computer workstation or for gaming
environments, where an extended desktop is useful.
Within the monitor's display properties, you can designate one of the
two monitors as the primary monitor, which controls where the
desktop administrative features (Start menu, taskbar, etc.) appear. The
other monitor would contain extra desktop space. While it is far more
common to have the desktop span both monitors and contain a
different window in each, it is also possible to have the two monitors
display the same image, which is useful for presentations.
Analog vs. digital Depending on the type and make of the display device, it may support
either analog or digital inputs. Most devices providing the input signals
(like a computer) are inherently digital. CRT display devices are analog,
and will need a video card and VGA cable to receive the digital input
and convert it to analog. Newer display devices such as LCD or LED
can innately support digital input signals, and do so via Digital Video
Interface (DVI) connections between the input device and the display
device.
Privacy/antiglare filters Privacy or antiglare filters are physical accessory screens that can be
attached onto or over a display device and provides a number of
benefits:
• Reduces glare from the screen for the user sitting in front of the
display device.
• Protects the display device screen from scratches or dust.
• Prohibits others not sitting in the front of the device from viewing
information being displayed, protecting confidentiality and
providing privacy.
Color depth (quality) The number of bits used to store the color of a pixel: the more bits per
pixel, the more colors can be displayed.
Font A size and style of typeface. Computers use fonts to display text on the
screen. Common font faces include Arial (which is a sans serif font),
158
Display Setting or Description
Feature
Times (which is a serif font), and Courier (which looks like legacy
computer output).
Contrast The difference in intensity between adjacent colors in an image. If the
contrast is not set correctly for the display device and the lighting
conditions in the room (for example, a really bright or really dark
room), you might not be able to see anything on the screen, or you
might get strange results.
Image position The location or size of the display in relation to the physical device.
Sometimes the image is not centered on the display screen. Other times
the image does not fill the screen, leaving a black band around the edge.
Or, part of the image can scroll off the screen. There are usually
separate buttons or menu options to adjust each of these issues.
Distortion control Distortions can appears as curves, waves, or moiré patterns in the video
image. These are typically caused by electromagnetic interference or a
defect with hardware, usually with the video card or video cable. If lines
do not appear straight on the screen, you might need to adjust settings.
Electromagnetic issues, however, are resolved by eliminating the source
of interference. Refer to the display device documentation for how to
resolve such issues. Distortion control is configured on the display
device itself, not through a system utility.
Aspect Ratio
The aspect ratio is the ratio of width to height of a display. Most software expects a 4:3 ratio, and
the display will appear to be distorted if other ratios are used. The aspect ratio is found by
determining the proportion of the number of pixels across the screen to the number of pixels down
the screen. For example, a resolution of 640 x 480 has a 4:3 aspect ratio.
Note: For a demonstration, check out the LearnTO Adjust Display Output Settings in the
LearnTOs for this course on your LogicalCHOICE Course screen.
Device Drivers
A device driver is a type of software that enables the operating system and a peripheral device to
communicate with each other. Also referred to as simply a driver, a device driver takes generalized
commands from the system software or an application and translates them into unique
programming commands that the device can understand. It also provides the code that allows the
device to function with the operating system, and it is generally installed as part of the installation
process for a new piece of hardware. Device drivers can be generic for a class of device or specific
to a particular device.
159
Where to Get Device Drivers
Device drivers can be:
• Included with the operating system. New operating systems include thousands of drivers that
allow them to work with all current, popular devices. Peripherals that are designed after the
operating system comes out must supply their own drivers.
• Supplied with the device on a CD-ROM when you purchase the hardware.
• Downloaded from the Internet from an operating systems vendor's site, such as Windows
Update, or from the hardware manufacturer’s website.
Criteria Description
Size Depending on the space available for the display or a user's personal
preferences, you may choose a display based on the physical size or
footprint of the device. Because they take up less space, flat-panel devices
like LCD, LED or OLED, may be preferred or needed for small work
spaces. Plasma screens are still rather large, and may not be practical for a
workstation.
Technical needs Depending on what the display device will be used for, technical
requirements for programs, or personal preferences, a specific type of
display device may be required or desired. LCD, LED/OLED, and
plasma monitors support high resolutions, which make them a better
choice for users who work in high-end graphics applications such as
Adobe® Photoshop®. However, some users still prefer CRT monitors
because their display is brighter.
Efficiency As the technology used in display devices evolves, the devices tend to be
more energy efficient than its predecessors. LEDs consume less energy
than LCDs, which may make them preferable if you are trying to be more
energy efficient and cost efficient.
Cost The newer the technology, the more expensive the device. LCDs are still
fairly low cost, as the most common and in-demand type of display.
LEDs and OLEDs are more expensive, but as they become more
common, the cost is decreasing as well. Plasma displays are currently the
most expensive option.
160
You may want to show
Note: For a demonstration, check out the LearnTO Install a Display Device in the LearnTOs
the LearnTO Install a
for this course on your LogicalCHOICE Course screen. Display Device from the
LogicalCHOICE Course
screen or have students
Access the Checklist tile on your LogicalCHOICE course screen for reference navigate out to the
information and job aids on How to Install and Configure Display Devices Course screen and
watch it themselves as a
supplement to your
instruction. If not, please
remind students to visit
the LearnTOs for this
course on their
LogicalCHOICE Course
screen after class for
supplemental
information and
additional resources.
161
ACTIVITY 4-1
Examining Display Devices
Scenario
In this activity, you will examine display devices.
1. What step should you complete first when you are installing a monitor?
○ Secure the monitor to the port by tightening the screws on each side of the connector.
○ Turn off the computer.
○ Plug in the monitor power cord.
○ Locate the monitor port on the computer.
○ Align the pins on the monitor cable with the holes in the adapter port and plug in the monitor.
162
ACTIVITY 4-2
Installing Display Devices
163
ACTIVITY 4-3
Configuring Display Devices
164
TOPIC B
Install and Configure Input Devices
In the previous topic, you examined display devices and how to install and configure them so that
users can see the computer system's output. Users also need to be able to interact with the computer
system by using input devices. In this topic, you will install and configure input devices.
Computers need user input such as directions or commands and user interaction with the programs
that are included in order to produce something of use. Keyboards and pointing devices are the
standard input devices for personal computers these days, but there is an ever-growing number of
input devices available for the user to interact with in a variety of ways. As an A+ technician, part of
your responsibilities will include installing and configuring all types of input devices.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 1.12: Install and configure various peripheral devices.
165
Input Device Description
166
Input Device Description
configured to detect finger taps on its surface and
process those signals like button clicks.
Specialty Keyboards
Specialty keyboards include:
• Keyboards for children or users with special needs. These may have enlarged or specially
constructed keys.
• Foreign language keyboards, which have a variety of different keys.
• Custom application keyboards, which can have multimedia access buttons, video/audio editing
software buttons, and gaming devices.
Function Keys
Function keys, typically positioned horizontally along the top length of the keyboard, allow a user to
do two things: they launch operating system commands, and they allow a user to customize the
input from the keyboard. For example, when booting a PC, a user can change Basic Input/Output
System (BIOS) settings by choosing certain function keys. A user can also customize how certain
programs interpret function keys. On smaller devices, such as laptops, a user might notice a key
labeled "Fn." This key is usually labeled in a different color from the rest of the keyboard, and is
used in conjunction with other keys to increase the number of distinct inputs a keyboard can offer.
Many of the Fn inputs control video or sound settings since there are not usually separate monitor
buttons on a laptop.
167
Biometric Input Device Types
Biometric Input Device Biometrics is an automated method of recognizing a person based on a physiological or behavioral
Types characteristic unique to the individual, such as a retina pattern, fingerprint, or voice pattern.
Biometric technologies are becoming the foundation of an extensive array of highly secure
identification and personal verification solutions. Biometric input devices can add an additional layer
of physical security or information security by verifying the identity of the person attempting to gain
access to a location or device.
Several types of biometric input devices might be used in an organization.
168
Biometric Device Description
169
Biometric Device Description
Biometric devices will need to be installed and configured, and then initialized for the specific end
user that will be using the device. The initial biometric authentication “object” for the user (be it a
fingerprint, retina scan, pass phrase, etc.) must first be captured and stored. Then the user will have
to test the device to make sure that it accurately verifies his or her identity against the authentication
object, permitting them access to the location or device.
Touch screen Touch screens enable users to enter inputs by touching areas on a monitor
screen. They can be activated by a finger touch or a stylus touch.
Touch screens are composed of:
• Touch sensors. The sensors can be a panel that lays over a standard
monitor or can be built into a special touch screen monitor where the user
actually touches the glass on the monitor.
• A controller. If using an overlay panel, the controller connects to the panel
and then to a PC port. Many use a COM or USB port, although there are
special instances where the controller connects to a drive or other device or
port. For touch screens with built-in touch sensors, the controller is built
into the monitor. In this case, the monitor contains two cables—one to the
monitor port and one to the COM or USB port (or other port).
• A device driver or specialized software. This enables the operating system
to receive and interpret information from the touch screen device.
170
Input Device Description
Scanner A scanner is used to take a photo-identical copy (scan) of a physical hard copy
of any kind of document, such as a piece of paper or a photo, and create a
digital-format copy of the document.
A scanner is similar to a photocopy machine or copier, but with a much
smaller footprint. Scanners can be attached directly to a personal computer to
import scanned copies of documents. With the proper software or program
installed, scanned versions can be manipulated and edited once they have been
imported.
A scanner typically uses a USB or high-speed USB connection to connect
between devices.
Barcode reader Barcodes provide a simple and inexpensive method of encoding text
information that is easily read by inexpensive electronic readers. A barcode
reader decodes a barcode by scanning a light source across the barcode and
converting the pattern of reflected light to an electronic signal that is decoded
back to the original data by electronic circuits. There are currently four
different types of barcode readers available: pen-type readers (or barcode
wands), laser scanners, Charge Coupled Device (CCD) readers, and camera-
based readers.
Barcode scanners or readers connect to a device via a USB connection or are
wireless.
Microphone Microphones record any type of sound and convert it to a electronic or digital
format. Once in this format, the recorded sounds can be manipulated or
edited, and used in a variety of ways.
Microphones typically connect to a device through a MIC jack, although some
connect with a USB connection. Some laptops may have a built-in
microphone.
Gamepad A gamepad is a game controller used to interact with a video game console or
program, typically held and manipulated with two hands. It uses a number of
buttons and toggles, each of which controls a different action within the game
program.
The latest versions of many gamepads also include sensors and pointing
devices that sense directions of movement and rotation, and use a combination
of these movements to control actions within the game program.
Gamepads typically connect to a device via a USB connection. The latest
technology in gamepads is unique in its wireless capabilities: many gamepads
do not attach to a device via a connector, but rather transmit inputs wirelessly
to the receiving device or console.
Joystick A joystick is a pivoting stick or lever attached to a base that is used to control
movement on a device. It typically also includes push buttons, toggles, or
switches that control other actions associated with the program or device that
the input is controlling. The joystick inputs the angle and direction of a desired
movement.
Joysticks are most commonly used to control video games or other computer
programs, but are also used to control machines and devices such as cranes
and unmanned vehicles.
Legacy joysticks connected to a computer via a game port, a device port
designed specifically for connecting this input device. However, most modern
joysticks connect to the device via a USB connection.
171
Input Device Description
Digitizer A digitizer is any device that performs digitization, which is the conversion of
any type of analog signal into its digital form. This includes images, objects,
text, and so forth. However, the term is most commonly used in reference to
the device used to convert audio and video data into a digital format that can
be edited, manipulated, and viewed on a computer, television or other device.
A digitizer typically uses a USB or high speed USB connection to connect
between devices. Some older versions may use an S-Video and Composite-to-
USB connection.
Interactive An interactive whiteboard looks similar to a traditional whiteboard; however, it
whiteboard connects to a computer using a wired USB cable, or connects wirelessly
through a Bluetooth® connection. A projector is typically used with it to
display the computer's desktop, and it can be used as an input device once the
correct device drivers are installed on the computer. You can manipulate the
computer directly on the whiteboard using a special stylus or by using your
finger. Interactive whiteboards are used in many schools today, and have
become a very popular teaching tool.
172
KVM Switches
A keyboard, video, mouse (KVM) switch is a device that enables a computer user to control multiple KVM Switches
computers with a single keyboard and mouse, with the display sent to a single monitor. This feature
is particularly useful in managing multiple test environments, or in accessing multiple servers that
have no need for dedicated display or input devices. KVM switches are available with PS/2 or USB
connections, and come in desktop, inline, or rack-mount varieties. Higher-end rack-mount models
can be uplinked to connect dozens of computers.
173
Input Device Description
If any specialty devices will be deployed on the system, you will need to
determine the device's connector requirements. Most specialty input devices
use a USB connection, so you will need to make sure that the user's
computer has an available USB port or ports if multiple specialty devices will
be connected.
Drivers Be sure that you have the most current drivers for the input device for the
operating system of the computer on which you plan to install it. If you install a
USB device, you might get a HID message (which stands for "Human Input
Device"). Either let the PC find the right driver, or restart the computer and see
if the issue resolves itself. If that does not work, you will need to find a driver for
the device.
Ports Make sure that the computer has an available port to which you can connect the
device. Input devices can use a variety of ports, including PS/2, serial, parallel,
USB, infrared, and FireWire/IEEE 1394. If a large number of input devices will
be connected using the same connector type, you may need to consider using a
hub, splitter, or extender that creates multiple accessible ports via one port on
the device. For example, a USB hub expands one USB port into several available
USB ports, using an upstream port that connects to the device USB port and
multiple downstream ports on the hub.
Manufacturer's Review the manual or quick start guide that came with the device. In some cases,
instructions the manufacturer might require you to install the device drivers before
connecting the device to the computer.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Install and Configure Input Devices
174
ACTIVITY 4-4
Installing Input Devices
175
ACTIVITY 4-5
Configuring Input Devices
Scenario
You just replaced a user's mouse and keyboard. The user is left-handed and prefers a slow-blinking
cursor. She also has a hard time distinguishing the mouse pointer from other screen elements, and
asks if you can adjust the pointer to something more easily discernible.
e) Select Apply.
f) Select OK.
176
a) In the Control Panel window, select the Mouse link.
b) In the Mouse Properties dialog box, on the Buttons tab, check the Switch primary and secondary
buttons check box.
c) To verify that the right mouse button is now the primary button, right-click the Pointers tab.
d) Right-click the Buttons tab.
e) Select the Pointers tab.
f) From the Scheme drop-down list, select Magnified (system scheme).
177
g) Select OK.
3. Reconfigure the mouse settings to suit your personal preferences, and close the Control Panel.
178
TOPIC C
Install and Configure Expansion Cards
In the previous topic, you installed input devices, such as mice and keyboards, that are most
commonly connected and used on a computer system. These devices typically connect using
standard ports that are available on most machines, such as a USB port. You can expand the
functionality of your computer by adding expansion cards that provide additional ports for a variety
of peripheral devices. In this topic, you will install and configure expansion cards.
Display devices, keyboards, and other pointing devices are the most common devices you are likely
to install and configure; these devices are typically included in a standard workstation environment
when a PC is requested. When a user needs to connect a peripheral component that doesn't have an
existing interface, like a multimedia device, you will need to install an expansion card. As an A+
technician, your responsibilities are likely to include upgrading users' computers by installing a
variety of components, including expansion cards.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 1.4: Install and configure expansion cards.
Sound cards A sound card or audio card provides the interface necessary for the
input and output of audio signals both to and from the computer.
Video cards A video card, sometimes called a display card or graphics card,
provides the interface necessary to generate the visual output that is
sent to the display device.
Network cards A network card, sometimes called a network interface card (NIC),
provides the interface necessary for network communications, whether
for wired or wireless connectivity.
Serial and parallel cards A serial or parallel card provides the interface necessary for the
computer to recognize and interact with any devices that connect to
the computer via a serial or parallel connection. Devices that utilize
serial or parallel connections include modems, display devices, barcode
scanners, point of sale devices, and more.
USB cards A USB card provides the interface necessary for the computer to
recognize and interact with all devices that connect to the computer
via a USB connection. Devices that utilize USB connections include
keyboards, flash drives, cameras, and more.
FireWire cards A FireWire card provides the interface necessary for the computer to
recognize and interact with all devices that connect to the computer
via a FireWire connection. FireWire is mainly used for high-speed data
transfer. Devices that use FireWire connections include external hard
drives, video and audio recording devices, and more.
Storage cards A storage card provides the interface for the computer to recognize
and interact with a storage device such as a disk. Systems with multiple
disk drives, especially of different types, may require multiple storage
179
Expansion Card Type Description
cards to manage the communication between the disks and the system
board.
Modem cards A modem card provides the interface necessary for remote
communications over phone or data lines that have been provided by
a cable or Internet service provider.
Wireless/cellular cards A wireless or cellular card provides the interface necessary for remote
communications, such as Internet over mobile phone or wireless data
lines such as Wi-Fi, 3G, or 4G Internet that have been provided by a
cellular service provider.
TV tuner cards A TV tuner card provides the interface necessary for the computer to
receive television signals and display the output on a display device.
Video capture cards A video capture card provides the interface necessary for the computer
to input video feeds, including digital video, and interact with the
software necessary to process and edit video.
Riser cards A riser card provides the interface necessary for adding expansion
cards to a system board while saving space within the system case. A
riser card allows the cards to stack horizontally rather than vertically
within the system.
180
Configuration Method Description
PnP installation If the expansion card, the device, the BIOS, and the operating system
(Windows® 95 and newer) are all PnP compatible, the expansion card
will be automatically configured and the system will automatically assign
resources to the card when the system starts.
Manufacturer driver If Windows does not automatically detect an expansion card, you can
manually install a driver from the manufacturer.
The Add Hardware You can use the Add Hardware wizard to install and configure PnP
wizard devices, although to install most unrecognized devices, you will typically
just run a setup program provided by the manufacturer.
Hardware scan When using the wizard, you should initially let Windows try to scan for
new hardware (this is the default selection).
Device list If Windows cannot find the device, you can then choose the device
from a list of devices offered by Windows and Windows will install the
appropriate driver.
Note: Read the installation instructions for the expansion card to determine if any software is
required prior to the installation. Failure to do so could cause the installation to fail or the card
and system to behave erratically.
181
ACTIVITY 4-6
Examining Expansion Cards
Scenario
In this activity, you will examine expansion cards.
1. Which expansion card provides interfaces necessary to connect Small Computer Systems Interface
(SCSI) devices?
○ Input/output card
○ Multimedia card
○ Video card
○ Modem card
2. True or False? Before attempting to install an expansion card, verify that the computer has an available
slot that matches the expansion card's bus type.
☐ True
☐ False
182
ACTIVITY 4-7
Installing Expansion Cards
Caution: Do not rock the card side to side when installing or removing it.
d) Secure the card to the chassis with the screw from the slot cover. Normally, you would now secure
the cover back on to the system, but because you will be doing more work inside the system, leave
it off.
183
TOPIC D
Install and Configure Multimedia Devices
In the previous topic, you installed and configured expansion cards to support additional computer
functionality. Once you have the right expansion cards in place, you can add peripheral components
such as multimedia devices that provide users with additional and expanded capabilities such as
recording music. In this topic, you will install multimedia devices.
As an A+ technician, you might support corporate users, such as marketing or sales representatives,
who will need to create multimedia business presentations. Or, you might work for a retail computer
outlet, supporting home users who like to play music and games on their PCs. Add to that the sheer
number of multimedia devices that are now available for personal computer systems, and you will
likely be tasked at some point with connecting and configuring a variety of multimedia devices for
various types of end users.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 1.12: Install and configure various peripheral devices.
Multimedia Devices
Multimedia Devices A multimedia device is a computer peripheral or internal component that transfers sound, images or a
combination of both to or from a personal computer. Multimedia devices can be input devices or
output devices.
Digital camera A digital camera uses electronic signals to capture and store
photographic images or video images. The resulting files are often
stored on embedded memory cards, removable memory cards, or
optical disks. Connecting the digital camera or its removable memory
card to a PC enables you to save, transfer, print, and otherwise work
with the images.
184
Multimedia Device Description
If the digital camera has a removable memory card, the card itself may
need to be connected to a computer through a media reader. Most
digital cameras also offer USB and FireWire cables and connections.
Camcorder A video recording camera captures and stores visual images and sounds
in the form of either analog or digital signals. Video files are stored
either on an internal storage device or on removable memory cards.
Most digital camcorders available for personal (commercial) use also
offer USB and FireWire cables and connections. If the camcorder has a
removable memory card, the card itself may need to be connected to a
computer through a media reader. Professional-grade cameras are more
likely to use tapes or disks that will need an alternate transfer method,
often including digitizing.
Webcam A web camera, or webcam, is used to send periodic images or
continuous frames to a website for display. Webcam software usually
captures the images as JPEG or MPEG files and uploads them to a
web server. Webcam images can also be accessed using some instant
messaging software and by some video applications. Some
corporations use webcams as a security measure.
Webcams commonly use USB or FireWire cables and connectors.
MIDI-enabled device The Musical Instrument Digital Interface (MIDI) connection enables
you to connect and control musical devices such as electric keyboards,
synthesizers, guitars, drum kits, and mixers. Sound cards usually
include built-in synthesizers as well, to produce MIDI sounds. MIDI
devices can be connected to each other and then to the computer.
MIDI devices can connect to the computer using a number of ports.
MIDI to USB interface, MIDI to serial, or MIDI to FireWire
connections are most commonly used, allowing for faster
communication between the musical instrument and the computer or
controller device.
Microphone A computer microphone is used to input audio into the device, either
for recording the audio as data or for use in real-time, such as the audio
input that accompanies a webcam or video conferencing chat.
Microphones can be connected to the microphone port or jack of any
sound card. If the card is color-coded, it will be pink. Otherwise, it will
be labeled MIC or have a picture of a microphone. Many microphones
have a 1/8-inch phono plug built into the attached cable.
Speakers Speakers can be attached to the device to play the audio out loud,
without the need for headphones.
Speakers are connected to the line out port or jack on the sound card.
Some speaker sets are permanently connected to each other. Other
speaker sets are connected by the user to each other or to a subwoofer.
A cable runs from one of the speakers to the line out port to connect
both speakers to the computer. If the card is color-coded, the speaker
port will be lime. The port might be labeled as Line Out, Out, Spkr, or
Speaker, or it may have an image with an arrow indicating the direction
of the audio (out).
Speakers typically have a 1/8-inch phono plug built into the attached
cable.
185
Line In
On many devices, there will be a third auxiliary port available: line in. Most PCs will have at least
one line in jack, which provides a connection for a music player or other audio input device. If the
sound card is color-coded, the line in port will be light blue. The port might be labeled as Line In or
In, or it may have an image with an arrow indicating the direction of the input (in).
Note: Most desktop computers will have three auxiliary jacks available: microphone, line out,
and line in. Most laptops don't have a line out or line in jack, but will typically have a
microphone jack and a headphone jack.
Media Readers
A media reader functions as an interface between a removable memory card and a PC. Commonly
connecting to the computer via a USB cable, a media reader is a small device that a user inserts a
memory card into if that card does not have an interface of its own. For example, a Secure Digital
(SD) card cannot be inserted directly into a computer, but by inserting the SD card into a media
reader and then connecting the media reader to the computer, the computer will recognize the SD
card as another external storage device.
Digital camera Determine what type of output the user needs from the camera. If the
user plans to use the images only for viewing online, you can select a
lower quality (fewer megapixels) camera. If the user also wants to print the
images, particularly if the user wants large prints (such as 11-inch x 17-
inch and higher), you should select a camera with as many megapixels as
the user can afford.
Keep in mind that you also need to have a means for the user to move
photos off the device and onto the computer. Common techniques you
can use include:
• Connecting the camera directly to the computer via a USB or FireWire
port.
• Connecting the camera's memory card directly to the computer via a
memory card slot. Not all computers have this feature, but many home
PCs do.
• Using a memory card reader that connects to a USB or FireWire port.
Determine if you have the appropriate cables or connectors available that
will be needed to connect the camera. Depending on the connector
needed, make sure that there is also a port available on the device to
connect the camera.
Camcorder Determine what type of recording format/output the user needs from the
camcorder. The format (analog or digital) can determine the cost of the
device, the type and cost of any additional storage devices used with the
device, how much video can be recorded, and the quality of the
recordings and copies. Specifically, converting analog recordings to digital
formats can be time consuming and usually results in degradation of
quality.
186
Multimedia Device Considerations
You should also consider the additional costs for the tapes or disks that
will be used to record videos. which will vary depending on the
manufacturer or type of device used.
Determine if you have the appropriate cables or connectors available that
may be needed to connect the camcorder. If the camcorder does not have
external or removable storage, you may also need to have a solution for
moving video files from the device and onto the computer, such as a
FireWire cable.
If a camcorder that records analog signals is being used, the user will likely
need a digitizer (and the accompanying cables and connectors) to convert
the files to digital format.
Webcam Ensure that the user's computer has the necessary hardware, operating
system, and memory required to support the device. Older computers may
not meet the requirements.
Different webcams offer different features: image quality can vary, lens
quality and focus (manual versus automatic) can vary, they can be color or
monochrome, some come with audio integrated and some need an
external microphone. Determine what the user needs to do with the
webcam and what features are indispensable.
You will also need to determine if you have the appropriate cables or
connectors available that may be needed to connect the webcam. You
may also need to install an expansion card if the required port is not
available on the computer.
Many laptops will have a built-in webcam that is integrated into the
system already.
MIDI-enabled device Determine what kind of device is needed based on what the user needs or
wants to do with the device. Once you know what kind of device they
need, ensure that the user's computer has the necessary hardware and
software to support the device.
Determine if you have the appropriate cables or connectors available that
may be needed to connect the device. You may also need to install an
expansion card if the required port is not available on the computer.
Microphone Users use microphones to complete tasks such as making phone calls
through their computers and dictating to the computer using voice
recognition software. For such users, the higher the quality of the
microphone, the better they will be able to accomplish these tasks.
Determine if you have the appropriate cables or connectors available that
will be needed to connect the microphone. You will also need to make
sure that there is an available port or jack available on the device to
connect the microphone.
Many laptops will have a built-in microphone that is integrated into the
system already.
Speakers If users plan to listen to music or play games on a computer, it is
important to help them select higher-quality speakers. Key speaker
standards include:
• Stereo: Specifies a left and right speaker that connects directly to a
single jack in a sound card. These types of speakers are usually the least
expensive.
187
Multimedia Device Considerations
Consideration Description
Expansion card slots If the device requires a specific expansion card, do you have an available
slot on the motherboard? Also, try to place this expansion card in such a
way as to avoid reducing the airflow in the computer.
Device drivers Do you have the appropriate device drivers for the computer's operating
system? If not, download them before starting the installation.
Cables and connectors Do you have the necessary cables and connectors to connect devices,
such as speakers, and place them where the user wants them?
Cameras and card Although you can connect a digital camera directly to a computer to
readers download its photos, you can use a memory card reader instead. The user
will also see faster download performance when downloading photos
using a memory card reader.
Note: Read the installation instructions for the device to determine if any software is required
prior to the installation. Failure to do so could cause the installation to fail or the device and
system to behave erratically.
Note: For additional information, check out the LearnTO Install Multimedia Devices in the
LearnTOs for this course on your LogicalCHOICE Course screen.
188
• Updating the device's driver.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Install and Configure Multimedia Devices
189
ACTIVITY 4-8
Examining Multimedia Devices
Scenario
In this activity, you will examine multimedia devices.
1. If you want to watch TV on your PC, but you do not need to record the transmission on your hard drive,
which multimedia adapter should you use?
○ TV tuner card
○ Capture card
○ Video card
○ NIC
2. True or False? When you are installing a sound card, you do not have to worry about the available slots
on the motherboard.
☐ True
☐ False
190
ACTIVITY 4-9
Installing Multimedia Devices
Scenario
A group in the marketing department is responsible for creating and presenting audio-visual
presentations. These users have sound cards installed on their systems. They all have speakers and
microphones connected to their sound cards. Some of them also have MIDI instruments and
instruments that connect through an 8-inch stereo jack. The users have just received these sound
devices and want to begin using them.
4. If you have a MIDI device, connect the MIDI device through the USB-to-MIDI device or a MIDI
expansion card.
a) Locate the appropriate port and connect the MIDI adapter to the appropriate port.
b) If necessary, connect MIDI cables to the MIDI adapter.
c) Connect the MIDI cable to the MIDI instrument.
d) If necessary, install drivers for the MIDI instrument.
e) Test the MIDI device by playing a few notes to ensure that it is working properly.
5. If you have another external multimedia device, connect it to the Line In jack.
a) Locate the line in jack and connect an 1/8-inch stereo jack from the device to the computer.
b) Test the device to ensure that it is working properly.
191
Summary
In this lesson, you installed and configured various types of peripheral computer components,
including input and output devices and the expansion cards that may be necessary to connect them.
As an IT professional, having the ability to successfully install and configure these components is an
integral part of a your daily work life, as you will be expected to set up workstations or assist users in
installing anything that they may need to perform their job duties effectively.
Use the review
questions provided to What types of peripheral components do you anticipate having to install and configure most often in your
generate discussion current job role?
among the participants. A: Answers will vary, but might include multimedia, storage, display devices, or expansion cards.
Depending on how data is input into a company's databases, input devices could include a stylus,
mobile device, or touch pad.
Will there be any specialty input devices that you will need to install or configure at your workplace? How
might this affect your day-to-day activities as an IT professional?
A: Answers will vary according to the type of business where the individual works or expects to work. If
the company has a great need for security, biometric devices may be incorporated at many key levels
of entry, including computers. Specialty input devices might include touch screens, bar code readers,
gamepads, or interactive whiteboards. Having knowledge of various types of devices, how they work,
and how they are installed and configured will be necessary. Keeping up with evolving technology will
likely be necessary as well.
Note: Check your LogicalCHOICE Course screen for opportunities to interact with your
classmates, peers, and the larger LogicalCHOICE online community about the topics covered in
this course or other topics you are interested in. From the Course screen you can also access
available resources for a more continuous learning experience.
Encourage students to
use the social
networking tools
provided on the
LogicalCHOICE Home
screen to follow up with
their peers after the
course is completed for
further discussion and
resources to support
continued learning.
192
5 Managing System
Components
Lesson Time: 4 hours, 35 minutes
Lesson Objectives
In this lesson, you will manage system components. You will:
• Identify motherboard installation and replacement methods.
• Select CPUs and cooling systems.
• Select and install power supplies.
• Identify the characteristics of RAM.
• Install and configure storage devices.
• Configure the system BIOS.
Lesson Introduction
In the previous lesson, you worked with peripheral components such as display devices,
input devices, expansion cards, and multimedia devices. As an A+ technician, you are not
only responsible for the components outside the system unit, but all the internal
components as well. On the job, you may be asked to connect peripheral components for a
user, or you may be asked to swap out a motherboard. In this lesson, you will explore the
components that reside within a computer system.
A large part of your time as an A+ technician will be helping users to install and configure
new software and hardware components. Having the knowledge and skills to properly install
and configure the internal system components is crucial because, in most cases, users will
not have the knowledge or the experience to install the components themselves. It will be
your professional responsibility to know the technical specifications for these components
and how to manage them appropriately.
This lesson covers all or part of the following CompTIA® A+® (2012) certification
objectives:
• Topic A:
• Exam 220–801: Objectives 1.2, 1.3
• Topic B:
193
• Exam 220–801: Objectives 1.2, 1.6
• Topic C:
• Exam 220–801: Objective 1.8
• Topic D:
• Exam 220–801: Objective 1.3
• Topic E:
• Exam 220–801: Objective 1.5
• Topic F:
• Exam 220–801: Objective 1.1
194
TOPIC A
Motherboards
In this lesson, you will dive inside the computer system and take a closer look at the internal
components that enable the computer to run successfully. In this topic, you will start by examining
motherboards.
The most important system component in a computer system is the motherboard. Although you
can argue a case for almost any system component as being most important, without the
motherboard, the computer simply cannot run. As an A+ technician, you must be knowledgeable
about motherboards and their purpose within the computer system.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 1.2: Differentiate between motherboard components, their purposes,
and properties.
• Exam 220-801: Objective 1.3: Compare and contrast RAM types and features.
ATX ATX boards are an older motherboard standard that was introduced by Intel® in
1995 to provide better I/O support, lower cost, easier use, and better processor
support than even earlier form factors. Some of the features of the ATX board
are as follows:
• Power supply with a single, keyed 20-pin connector. Rather than requiring
Voltage Regulator Modules (VRMs) to reduce voltage down from 5 volts (V)
to 3, 3 VDC is available directly from the power supply.
• The central processing unit (CPU) is closer to the cooling fan on the power
supply. Also, the cooling circulation blows air into the case instead of blowing
air out of the case.
• Input/output (I/O) ports are integrated into the board along with PS/2
connectors (instead of 5-pin DIN connectors).
• You can access the entire motherboard without reaching around drives. This
was accomplished by rotating the board 90 degrees.
• This board cannot be used in Baby AT or LPX cases.
• The board is 12 inches by 9.6 inches.
Mini-ATX The mini-ATX board has a maximum size of 11.2 inches by 8.2 inches. The main
difference between the mini board and the full-size ATX board is its smaller size.
For example, it uses the same power supply form factor and case mounting holes
as the full-size board.
microATX The microATX board introduced in late 1997, is often written as μATX, and has
a maximum size of 9.6 inches by 9.6 inches. MicroATX boards with integrated
graphics are often used by system board manufacturers as a basis for small form
factor and home entertainment PCs. MicroATX boards are backward compatible
with the full size ATX boards and often use the same chipsets, so they can usually
use the same components. However, because the cases are generally smaller, there
195
System Board Form Factor
are fewer I/O ports available than in ATX systems, so it might be necessary to
use external USB hard drives, CD burners, and so forth.
mini-ITX The mini-ITX motherboards are small, compact boards that fit the same form
factor as the ATX and the micro-ATX boards. They have a maximum size of 6.7
inches by 6.6 inches. ITX boards were developed by a company named VIA
technologies in 2001 to provide a compact board that does not drain system
power. The boards are unique in that they are uniquely designed to consume less
power while providing adequate processing power. Because of this, the board
itself does not demand excessive cooling components. Due to their small size,
and low power consumption, the boards can be implemented in a number of
cases and electronics, and are popular among the industries that purchase
motherboards in bulk to be incorporated into a number of different products.
Full-size AT This form factor is usually used in older tower systems. Originally, it was
designed from an even older system, the original XT motherboard, which
itself was designed for use in the second version of the IBM® PC, released in
1983. These original full-size systems took up a large amount of desktop
space. Vertically oriented tower systems using the AT board can stand on the
floor and not take up desktop space, and they can still use the full-size system
board. The board is 12 inches by 13.8 inches. A transfer bus of 16-bit or
better is required. It uses complementary metal oxide semiconductors
(CMOS) to retain configuration settings. It has a 5-pin DIN keyboard
connection.
Baby AT This form factor is usually used in older desktop systems. In an effort to free
up desk space, manufacturers wanted to build a computer that was smaller
than systems with full-size AT motherboards. The popular AT motherboard
was scaled down to create the Baby AT motherboard. It fits into a smaller
case than the full-size AT board, but it is otherwise the same. It works in any
case except for those considered low profile or slimline. This was an
extremely popular design. This board is usually 13 inches by 8.5 to 9 inches.
It was never developed as a standard, so there are variations on the size of
this particular board.
LPX Slimline and low-profile cases, which are today’s typical desktop cases, were
being developed about the same time as the Baby AT motherboard was
introduced. However, these smaller cases could not use even the Baby AT
board. The LPX and Mini-LPX motherboards were developed for these
cases. A riser card is used to plug expansion cards into the motherboard. This
riser card enables the expansion cards to lie sideways, in the same orientation
as the system board. Thus, the case does not have to be as high as the card.
Another difference in this board is that it uses a PS/2-style keyboard
connector rather than the 5-pin DIN connector used on the AT boards.
Video, parallel, and two serial ports were placed at the rear of the board in
standard locations. This board is 9 inches by 11 to 13 inches. A mini-LPX
board was also designed, which was 8 to 9 inches by 10 to 11 inches.
196
System Board Form Factor
NLX The NLX system board was developed to replace the LPX system board
initially in 1997. It is a small form factor designed around the Pentium II
processor. It supports advances in memory and graphics technology such as
dual in-line memory modules (DIMMs) and accelerated graphics port (AGP).
This board was designed to fix all the known issues with the LPX board and
still fit slimline design systems. The board is 8 to 9 inches by 10 to 13.6
inches.
The use of the NLX system board never really gained any headway with
computer system manufacturers and was later replaced by the micro-ATX,
FlexATX, and Mini-ITX boards.
BTX Intended to be the replacement for the ATX system board form factor in
2005, the BTX form factor was designed to fix some of the issues that arose
from using newer technologies (which often demand more power and create
more heat) on system boards compliant with the circa-1996 ATX
specification. BTX features include:
• A low profile: The backplane is inches lower than the ATX.
• Thermal design: The BTX layout establishes a straighter path of airflow
with fewer obstacles, resulting in better overall cooling capabilities.
• Structural design: The emerging need for heat sinks, capacitors, and other
components dealing with electrical and thermal regulation has resulted in
devices that can physically strain some motherboards. The BTX standard
addressed this issue by specifying better locations for hardware mounting
points. For example, the chips that make up the system's chipset are
located closely to each other and to the hardware they control to reduce
delays in data transfer. The BTX was discontinued by Intel in 2006.
MicroBTX (μBTX) The MicroBTX is similar to the standard BTX system board, measuring 10.4
by 10.5 inches. The main difference between the standard board and the
micro board is the smaller size and that the micro board has fewer expansion
slots.
PicoBTX The PicoBTX system board form factor is a smaller version of the standard
BTX board measuring 10.5 inches by 8 inches. The pico board is designed
with the same rear panels as the standard board and is used for half height or
riser cards applications. Pico boards usually include only one or two
expansion slots.
197
ACTIVITY 5-1
Identifying Motherboards
Scenario
In this activity, you will analyze and identify common motherboards in use today.
This activity is designed
to be an exploration of
common motherboard 1. Examine the graphic and answer the following question.
types. If you have some
sample motherboards
available to you during
the class, then have the
students identify them as
a group. If there are no
boards available, you
can walk the students
through identifying
motherboards using the
images presented in this
activity.
Make sure that remote
students can see your
work area so they can
see the sample
motherboards.
After step 3, have
students keep the case
cover off their systems,
because they will be What type of motherboard is displayed here, and what characteristics did you use to help you identify
taking a look at the the board type?
expansion slots in the
A: Based on its small size dimensions and compact component design, this motherboard is a mini-
next activity.
ITX.
198
What type of motherboard is displayed here, and what characteristics did you use to help you identify
the board type?
A: You can tell by the large size and vast number of available components and slots that this
motherboard is an ATX.
3. Take the case off of the computer you are using for this course to identify the type of motherboard Assist participants in
installed in the system. Use the descriptions presented in this topic to help you. identifying their
motherboards.
Expansion Slots
Expansion slots allow you to add expansion cards to your motherboard in order to extend the Expansion Slots
capabilities of a computer system. Motherboards generally include several of these slots so that the
adapters can transfer data to and from the different computer components that have been installed
in a system.
If applicable, show
Expansion Slot Type Description students examples of
the different expansion
PCI The Peripheral Component Interconnect (PCI) expansion slot is the most common card slots and what the
expansion slot used on system motherboards. The specifications include: cards look like.
• Physical characteristics of cards: 33 or 66 MHz. 133 MBps throughput at
33, 66, or 133 MHz. Up to eight functions can be integrated on one
board.
• Configuration: Supports up to five cards per bus and a system can have
two PCI buses for a total of 10 devices per system. Can share interrupt
requests (IRQs). Uses Plug and Play (PnP).
• Used for all current adapters in client and server systems.
• Number of data lines: 64-bit bus often implemented as a 32-bit bus.
• Communication method: Local bus standard; 32-bit bus mastering. Each
bus uses 10 loads. A load refers to the amount of power consumed by a
device. The PCI chipset uses three loads, while integrated PCI controllers
use one load. Controllers installed in a slot use 1.5 loads.
199
Expansion Slot Type Description
PCIe The PCI Express (PCIe) slot and bus is an implementation of the PCI bus
that uses a faster serial physical-layer communications protocol. It is the
most common system bus found in PCs today. There are four versions of
200
Expansion Slot Type Description
the PCIe standard—1.x, 2.x, 3.x, and 4.x. PCIe version 3.x is the current
standard, which will eventually be replaced by version 4.x.
• Used for high-speed graphics cards and high-speed network cards.
• Number of data lines: Each device has a serial connection consisting of
one or more lanes. The data rate depends on the PCIe version.
• PCIe version 1.x: Each lane offers up to 250 MBps of throughput. An
x16 slot (16 lanes) can handle 4 GBps of bandwidth in one direction.
• PCIe version 2.x: Each lane offers up to 500 MBps of throughput. An
x16 slot (16 lanes) can handle 8 GBps of bandwidth in one direction.
• PCIe version 3.x: Each lane offers up to 1 GBps of throughput. An
x16 slot (16 lanes) can handle 16 GBps of bandwidth in one direction.
• PCIe version 4x: Specifications are not expected to be released until
2014, but the transfer rates are targeted to reach 16 gigatransfers per
second (GT/s).
• Communication method: Local serial interconnection.
MiniPCI MiniPCI is a standard that was based on the PCI specification 2.2. It was
specifically for use in laptops to implement a number of devices. The cards
are attached to the motherboard and are not accessible from the outside of
the laptop. There are three card form factors available:
• Type I: Uses a 100-pin stacking connector
• Type II: Uses a 100-pin stacking connector
• Type III: Uses a 124-pin edge connector
201
Expansion Slot Type Description
AGP The Accelerated Graphics Port (AGP) bus was developed by Intel® specifically
to support high-performance video requirements, especially fast 3D
graphics.
• Physical characteristics of cards: Brown slot on the system board. AGP
1.0 is a 1x/2x slot. This is the shortest of the AGP slots with a small
separator that divides it into two sections. AGP 2.0 is a 2x/4x slot that
has extra pins at one end. There is also an AGP Pro slot. See http://
en.wikipedia.org/wiki/AGP for more information.
• Have their own processors and cooling units attached.
• Used for video cards.
• Number of data lines: 32 bits wide with a throughput of 266 MBps for
AGP 1x. Faster modes with throughput of 533 MBps are available on
AGP 2x, 1.07 GBps for AGP 4x, and 2.1 GBps for AGP 8x.
• Communication method: Directly accesses Random Access Memory
(RAM) rather than needing to transfer data to video RAM first.
202
ACTIVITY 5-2
Identifying Expansion Slots
Scenario
In this activity, you will examine and identify the expansion slots on your system's motherboard.
You may have to help
the students identify the
1. With the case removed from your computer, examine the expansion slots on your motherboard. slots on their system
boards, because it may
2. Try to identify the different types of expansion slots. be difficult to identify
them with all the
connections made.
RAM Slots
RAM Form Factor Description
203
ACTIVITY 5-3
Identifying RAM Slots
Scenario
In this activity, you will examine and identify the RAM slots on your system's motherboard.
1. With the case removed from your computer, examine the available RAM slots on your motherboard.
2. How many RAM slots are on your motherboard? Are they all being used?
A: Answers will vary depending on the individual computers.
Chipsets
The chipset is the collection of chips and integrated circuits that support basic functions of the
computer. PC chipsets are housed on one to four chips and include built-in controllers for the
system board’s buses and all the integrated peripherals.
The chipset architecture, including the number, function, name, and placement of the various chips
in a chipset, will vary depending on the type and manufacturer of the system board. For example, on
many Intel Pentium computers, the two main chips in the chipset are known as the Northbridge and
the Southbridge.
• The Northbridge controls the system memory and the AGP video ports, and it may also control
cache memory. The Northbridge is closer to the processor and communicates directly with it
using the system bus )
204
• The Southbridge controls input/output functions, the system clock, drives and buses, advanced
power management (APM), and various other devices. The Southbridge is further from the CPU
and uses the PCI bus to communicate with the Northbridge.
Newer Intel systems employ the Intel Hub Architecture (IHA) chipset. This also has two main
chips, now named the Graphics and AGP Memory Controller Hub (GMCH) and the I/O
Controller Hub (ICH), which perform functions roughly analogous to the Northbridge and
Southbridge, but the communication between the two new chips is designed to be faster.
CMOS Battery
The complementary metal-oxide-semiconductor (CMOS) battery is a small battery on the motherboard that
provides power to the real-time system clock when the computer is turned off. You may find cases
when the CMOS battery fails, which will result in a CMOS Battery Failure message (or possibly a
CMOS Read Error). Replacing a CMOS battery is not difficult, but it is not always necessary. Start
by leaving the computer on for a day, and see if this helps the battery recharge. If this does not
work, and you need to replace the battery, immediately write down all of your CMOS settings, as
you will need to re-enter them later after replacing the battery. Note that not all motherboards can
have their CMOS batteries replaced; in these cases you can add a new CMOS battery, but not
remove the old one. Consult the documentation for your motherboard. 5
205
Figure 5-3: A CMOS battery.
CMOS Settings
CMOS settings can be changed if needed in the system setup program that is loaded from the BIOS
setup utility. The CMOS battery supports the Basic Input/Output System (BIOS) utility by
providing enough power to save critical system settings.
System date and time You can set the system's real-time clock using DOS date and time
commands, or by setting the clock in Windows, which will adjust the
real-time clock.
Password You can specify whether a user or administrator password is required to
start up the system.
Boot sequence You can specify the order that Power-On Self Test (POST) checks
drives for an operating system.
Memory Some systems require you to specify in CMOS how much RAM is
installed on the system. You might also be able to specify whether the
system uses parity memory or non-parity memory. Most modern
systems automatically detect and report the installed RAM.
Hard drive You can specify the number, type, and size of the hard drives attached
to the system.
Floppy drive You can adjust the speed and density settings for the floppy drive. You
can also disable or enable a floppy drive.
Display You can specify the monitor type and port.
Parallel/LPT ports You can specify settings such as unidirectional or bidirectional printing,
Enhanced Capability Port (ECP) options, and Enhanced Parallel Port
(EPP) options. You can also disable or enable a parallel port. If you
know that a parallel or serial port will not be used, you can disable the
port, thereby freeing up the resources for use by other devices.
Conversely, if you connect a device to a port and the device will not
work at all, you might want to check the CMOS to ensure that the port
has not been disabled.
Serial/COM ports You can specify settings such as what memory addresses and interrupts
are used by a port. You can also disable or enable a serial port.
Power management In most modern computers, you can specify settings such as powering
down components (such as the monitor, video card, and hard drives)
when the components have not been used for a specified time period,
206
CMOS Setup Setting Description
as well as options and time limits for standby and suspend modes. You
can also disable or enable global power management.
207
ACTIVITY 5-4
Identifying Other Motherboard Components
Scenario
In this activity, you will locate and identify various components on the motherboard of your system.
Have students keep the
case cover off of their
systems in preparation 1. Look closely at the I/O ports on your system board and try to identify each one. You may need to look
for the next activity. on the back of the system unit to identify all the ports.
As participants attempt 2. On the motherboard, identify the chipset. How is it configured? Can you see the Northbridge and
to find the chipset, Southbridge chips? Or does this computer have the newer GMCH/ICH chipset?
discuss the differences
between the 3. Try to find the CMOS battery on the motherboard.
Northbridge/Southbridge
configuration and the
GMCH/ICH
configuration.
Jumpers and DIP Switches
Jumpers and DIP Jumpers and dual in-line package switches (more commonly called DIP switches) are used to configure
Switches older system boards by shutting off an electrical circuit located on the motherboard. Using jumpers,
this is accomplished by sliding a jumper shunt over the jumper pins on the jumper block of the
motherboard. When using DIP switches, the numbered notches located on the switch can be moved
to cut off the electrical circuit it is attached to. Newer motherboards are being designed to use
software to configure these values (through the BIOS Setup program) instead of jumpers and DIP
switches.
Motherboard Description
headers
USB header The USB header contains the pins that the USB cable connects to. This
connects the USB drive installed in the computer case directly to the
motherboard. USB headers will have one pin missing from the second row on
the end. This can be a visual guide when identifying the different headers.
208
Motherboard Description
headers
Front panel header The front panel header of the motherboard contains many system connection
pins that are used to connect components installed in the computer case to
the motherboard. Most front panel headers will include:
• Power switch
• Power light emitting diode (LED)
• Reset switch
• Hard drive LED
• Speaker
Audio header The audio header contains the pins to connect the system audio cable to the
motherboard.
209
Motherboard Description
headers
Fan Connectors
There are a number of uses for fans within a computer. The components installed and how much
heat they produce will determine what type of fans are installed. Full size desktop systems will
generally have a case fan that will pull the hot air out, letting the cooler air circulate through the
chassis. There is no current standard that dictates the size and form factor of the fan connector.
Common connectors include:
• A 3–pin Molex KK connector, commonly used to connect a fan directly to the motherboard.
• A 4–pin Molex KK connector is similar in function to the 3–pin KK connector, except that it
has an extra pin to provide the ability to control the speed of the fan.
• A 4–pin Molex connector that connects directly to the system's power supply.
Fan Connectors
210
ACTIVITY 5-5
Identifying the Front Panel and Fan Connectors
Scenario
In this activity, you will identify the front panel connectors on the system board and any fan
connections within the system unit.
2. Check for any fans installed within the system. Locate the case fan and see how it is connected to the
motherboard. Also check for any fans connected directly to the motherboard, and identify where the
connections are made.
Bus Speeds
The motherboard bus speed determines how fast circuits will carry data simultaneously from one
area of the motherboard to another. Speed can vary based on the capacity of the specific bus. The
bus speed will depend on what components are installed in the computer.
211
Figure 5-4: System board power supply connectors.
Specific Connectors
There are specific connectors, depending on the motherboard requirements, usually tied to the CPU
type. There is the 20-pin (ATX), a 24-pin ATX connector, and the 20+4 combo (which you can
separate, or not, depending on the motherboard). This includes a 20-pin for the main power, plus a
4-pin connector for additional CPU power. This 4-pin is sometimes known as the Intel® Pentium®
4 connector. There is also an 8-pin CPU connector that requires an ATX 2.02 or an EPS12V PSU.
Clock speed Does the motherboard operate at a high enough frequency to support
the processor you want to use?
CPU What type of processor can you install? Can you install more than one
CPU?
Drive interfaces Does the motherboard include drive interfaces? If not, does it have
enough available expansion slots to accommodate the user's hard disk
requirements?
Expansion slots How many expansion slots will the user need? What types of slots
does it include? What type of expansion cards will you be installing?
Form factor Will the motherboard fit inside the case of the computer?
212
System Component Questions To Ask
Ports Does the motherboard have the necessary ports to meet the user's
needs? Specifically, does it have the parallel, serial, or multiple USB
ports, and possibly FireWire ports needed?
RAM Does the motherboard support enough Random Access Memory
(RAM) to meet the user's needs?
213
TOPIC B
CPUs and Cooling Systems
In the last topic, you identified the various types of motherboards used in computer systems. Now
that you understand the purpose of the motherboard, you can take a closer look at the components
that make up the board. Two of these components are the central processing unit, or CPU, and the
cooling systems that service it. In this topic, you will examine CPUs and cooling systems.
Much like the motherboard, the CPU is another important component of the computer system that
actually carries out all the tasks requested by the applications installed in the computer. The CPU is a
heat generator, so part of understanding the CPU includes understanding how to manage heat inside
the computer case by managing the airflow and temperature. Keeping the system cool is an easy but
important way to maintain or even increase its productivity. A computer that runs too hot risks
damaging its own components. As an A+ technician, you need to be familiar with these essential
components of the computer system.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 1.2: Differentiate between motherboard components, their purposes,
and properties.
• Exam 220–801: Objective 1.6: Differentiate among various CPU types and features and select
the appropriate cooling method.
CPU Sockets
CPU Sockets CPUs use either sockets or slots to connect to the motherboard. Older slot-based processors
plugged into a system board in much the same way as an expansion board, while socketed
processors plug into a system board using a pin grid array (PGA). Modern CPUs usually fall into
either the AMD or Intel category. While there are other CPU manufacturer brands available, Intel
and AMD technologies tend to dominate in the marketplace.
LGA 775 The land grid array (LGA) 775 CPU is also referred to as Socket T.
• Uses 775 copper pins with no socket holes to attach to the
motherboard's pins. The CPU is connected via a load plate that the
CPU attaches to and is lowered onto the board by a lever.
• Proper cooling is accomplished by the design of the CPU
connection to the motherboard. By using the load plate to connect,
the CPU is properly seated into place and is perfectly level. This
ensures that the CPU is making full contact with the heat sink or
liquid cooling method.
• Commonly used in consumer desktop computers.
• Used for Pentium 4, Celeron D, Pentium Extreme Edition, Core 2
Duo, and Core 2 Extreme processors.
LGA 1155 The LGA 1155 is also referred to as Socket H2.
214
Socket Type Description
940 The 940 was designed primarily for use in 64–bit server machines.
Commonly found used with the Opteron and Athlon 64 FX processors.
AM2 The AM2 is similar to the 940 in design with the exception that it uses a
DDR2 controller, instead of DDR used by the 940. This socket replaces the
older Socket 939 and 754. This socket is commonly used with Athlon 64,
Sempron, Athlon 64 X2 and Athlon 64 FX.
AM2+ The AM2+ was designed to replace the AM2. They are similar in design and
are, in some cases, interoperable with the processors they support.
AM3 The AM3 was designed to replace AM2+. The socket is not compatible with
the previous versions AM2 and AM2+ because of the pin layout being
slightly different than the older models. The AM3 has 941 pins, while the
AM2+ has 940.
AM3+ The AM3+, also referred to as AM3b, is designed to be more efficient and
use less power.
FM1 FMI is AMD's next generation socket type that is designed to be used with
the Fusion and Athlon II processors.
F An older model socket type that was designed specifically for the Operton
and Athlon 64 FX processors that used the LGA connection method.
215
Cache
Cache Cache memory, or CPU cache, is a type of memory that services the CPU. It is faster than the main
memory, is physically located closer to the processor, and allows the CPU to execute instructions
and read and write data at a higher speed. Instructions and data are transferred from the main
memory to the cache in blocks to enhance performance. Cache memory is typically static RAM
(SRAM) and is identified by level. Level 1 (L1) cache is built directly into the CPU chip. Level 2
cache (L2) feeds the L1 cache. L2 can be built into the CPU chip, reside on a separate chip, or be a
separate bank of chips on the system board. If L2 is built into the CPU, then a level 3 cache (L3)
may also be present on the system board.
216
CPU Characteristic or Description
Technology
Virtualization support Most modern CPUs are virtualization compatible, meaning that they
have virtualization software built into the chipset of the CPU. Both Intel
and AMD have CPU virtualization built into their chips. This allows the
CPU to process instructions from multiple operating systems quickly and
efficiently.
Cores CPU cores read and execute instruction data sent from computer
applications. A single chip that contains two or more distinct CPU cores
that process simultaneously is called a multi-core. Options include dual-
core (two CPUs), triple-core (three CPUs) and quad-core (four CPUs),
though octo-core chips are becoming more common. Once you start
adding tens or hundreds of CPUs, the terminology changes from "multi-
core" and becomes "many-core."
Cache Dedicated high-speed memory for storing recently used instructions and
data.
VRM A voltage regulator module (VRM) is a replaceable module used to
regulate the voltage fed to the CPU.
MMX Multimedia Extensions (MMX) is a set of additional instructions, called
microcode, to support sound, video, and graphics multimedia functions.
217
Cooling System Types
Having the right cooling method can be crucial to reach the optimal performance of the system's
CPU. Many cooling systems will be directly attached to the CPU.
Fans Computer fans provide cooling by simply blowing regular air across
heated components. It is common to see case fans, power supply fans,
adapter card fans, and CPU fans.
Vents Computer cases are designed with vents to facilitate airflow through the
case and across all components. A common implementation is to include
air vents near the bottom of the front of the case and to place a fan near
the top of the rear of the case to pull cooler air through the system.
Heat sinks A heat sink is designed to provide direct cooling to a system's CPU.
Modern CPUs have enormous processing power that requires instant
cooling that is attached right the CPU itself. Heat sinks have metal fins to
increase their surface area to aid in heat dissipation. Cool air is blown past
it by a fan, removing the heat from the processor.
Thermal paste Thermal paste is used to connect a heat sink to a CPU. At the
microscopic level, when two solids touch, there are actually air gaps
between them that act as insulation; the liquid thermally conductive
compound gel fills these gaps to permit a more efficient transference of
heat from the processor to the heat sink.
Liquid-based CPUs can also be kept cool using a device to circulate a liquid or liquefied
gas, such as water or freon, past the CPU. Like an air conditioner, heat
from the CPU is absorbed by the cooler liquid, and then the heated liquid
is circulated away from the CPU so it can disperse the heat into the air
outside the computer. Liquid cooling systems are not as prevalent as heat
sinks in most desktop systems or low-end servers.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Install and Configure CPUs and Cooling Systems
219
ACTIVITY 5-6
Selecting Cooling Systems
Scenario
In this activity, you will select cooling systems.
Use the questions in this
activity to generate
discussion about the 1. When might you need more than one cooling system in a computer?
cooling system selection
A: Answers will vary, but should include instances such as high processing levels that generate
factors presented in this
excessive heat.
topic.
2. When would liquid cooling systems be more appropriate than adding a fan?
A: Answers will vary, but might include when there is not much room inside the computer case or
when an externally mounted fan is not appropriate.
220
TOPIC C
Select and Install Power Supplies
In the previous topic, you examined CPUs and cooling systems. The next logical step is to select and
install the power supply in the system unit. In this topic, you will take a closer look at the computer's
power supply and its connections to the other system components.
The computer's power supply is the main source of power for all components installed within the
system unit. Understanding the power requirements of all the components and the maximum power
supplied is crucial in managing the overall computer system power needs. Whether you are
upgrading or replacing faulty components, you need to effectively manage the capacity of the
current power supply.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 1.8: Install an appropriate power supply based on a given scenario.
Specification Description
Size Hardware manufacturers across the globe strive to standardize the power
supply unit specifications in terms of dimensions and layout to make
computer users' lives simpler. This has resulted in a range of power supply
unit types that are accepted worldwide. The key to replacing and installing a
power supply is to make sure that the form factor matches the case and the
motherboard it will connect to. Form factors available today are:
• AT, which is used in AT form factor cases and with AT or Baby AT
system boards. Dimensions are 213 mm x 150 mm x 150 mm. It is a
legacy form factor found in older desktops and towers.
• ATX, which can be used in ATX and NLX cases and with ATX and
NLX motherboards. Dimensions are 150 mm x 140 mm x 86 mm.
Found in desktops and towers. ATX power supplies do not have a pass-
through outlet, but instead usually have a physical on-off switch.
• Micro ATX is essential the same form factor as standard ATX, only
with smaller wattage and physical size.
• Proprietary, which include motherboards that do not conform to
standards. It is likely that these proprietary system boards will require
nonstandard power supply form factors as well, although you might be
able to use an ATX power supply.
Connector styles There are generally three types of connectors used to connect different
devices in a computer to the power supply:
• Berg, a square shaped connector used to supply power to floppy disk
drives and some tape drives.
• Molex, a round shaped connector used to supply power to Parallel ATA
drives, optical drives, and SCSI drives.
• SATA, used to supply power to Serial ATA drives.
221
Specification Description
Wattage Power supply specifications are given in watts. Watts are volts times amps
(voltage x current). Older systems typically had power supplies under 200
watts (W) and often even under 100 W. Newer power supplies typically
have wattages ranging from 200 to 500 W. Because of their increased power
demands, high-powered servers or computers designed for gaming can
have power supplies with wattages from 500 W up to 1 kilowatt (kW).
Voltage All system components require specific voltages. Some devices have
different voltage requirements depending on use. This is particularly true of
some memory chips, which vary in voltage requirements from 1.8 volts (V)
to 3.3 V, and some can actually function at different voltages (voltage
range). You must verify that the power supply used can provide the volts
demanded by the system.
Some power supplies are dual-voltage power supplies. They can contain
multiple channels that provide discrete voltages, with 5 V, 12 V, 15 V, and
24 V being the most common.
In order to calculate whether your power supply meets your power needs,
you will need to add up the maximum power you might use at one time. A
range of maximum power consumption for various components has been
established. Most components use much less than the maximum, so by
using the published requirements as a guide, you are overestimating the
power usage, and therefore making it more likely that you never test the
capacity of the power supply. You can check the documentation for the
component to determine how much power it actually will use.
Even some of the most powerful current CPUs, such as the Intel Core 2
Extreme and the AMD Opteron Dual Core, only use 1.1 to 1.3 V. The
necessary voltage for CPU and RAM is usually detected by the
motherboard (BIOS) and configured appropriately, but sometimes you
have to manually configure it by accessing the BIOS and entering the
appropriate values. The power supply will supply 3.3 V for the CPU, RAM,
and other devices, but the motherboard regulates how much they actually
get.
Note: Although most devices require specific voltages, some devices have different voltage
requirements depending on use. This is particularly true of some memory chips, which vary in
voltage requirements from 1.8 V to 3.3 V, and some can actually function at different voltages,
or in a voltage range.
222
Connector Type Description
4/8–pin 12 V The 4-pin and 8-pin connectors are similar in that they both provide 12
volts of power to the CPU on the motherboard. The 8-pin was designed
to provide power to multiple CPUs in the system. The 4-pin has a
maximum wattage of 192, and the 8-pin has a maximum wattage of 336.
PCIe 6/8–pin The Peripheral Component Interconnect Express (PCIe) 6-pin and 8-pin
connectors provide power to PCIe slots on the motherboard. Both
connectors provide power at 12 V. The 6-pin has a maximum wattage of
75, while the 8-pin has a maximum wattage of 150.
Main power The main power connector to the motherboard is either a 20-pin or 24-
connectors pin ATX connector. The 24-pin connector contains four additional pins
to support the requirements for PCI Express slots on the motherboard.
The 20-pin connector has a maximum wattage of 72, while the 24-pin has
144. Both connectors provide power at three voltages:
• +3.3
• +5
• +12
223
Connector Type Description
Floppy The floppy connector is a Berg connector and was used to connect
floppy drives to the power supply. The connector has only four pins and
provides power at +5 and +12 V with a maximum wattage of 36.
224
ACTIVITY 5-7
Identifying Power Supply Connections
Scenario
In this activity, you will identify the various power supply connections within your system.
Have students keep the
case cover off of their
1. Locate the power supply within your system. systems in preparation
for the next activity.
2. Trace the connections from the power supply to the motherboard and identify the type of connections
made.
Check for certification Be sure to purchase power supplies that are certified by the
Underwriters Laboratories, Inc. (UL). UL standard #1950, the
"Standard for Safety of Information Technology Equipment,
Including Electrical Business Equipment, Third Edition," regulates
computer power supplies (along with other components). When it
comes to electricity, you do not want to take a chance with a non-
certified power supply. The risk of electrocution or fire from a
malfunctioning power supply is simply not worth saving a few dollars
by purchasing a low-quality power supply.
Replace instead of repair You run the risk of electrocution if you open a power supply to
the power supply attempt to repair it. Even when you unplug a computer, the power
supply can retain dangerous voltage that you must discharge before
servicing it. Because power supplies are relatively inexpensive, it is
easier (and safer) to simply replace a failed power supply rather than
attempting to repair it.
Keep the computer case Make sure that you run computers with their cases on. The fans inside
on power supplies are designed to draw air through the computer. When
you remove the cover, these fans simply cool the power supplies and
not the computer's components. Leaving the case open puts the
computer at risk of overheating.
Protect the power supply Use a power protection system such as an uninterruptible power
supply (UPS) or surge suppressor to protect each computer's power
supply (and thus the computer) from power failures, brownouts,
surges, and spikes. You should also make sure that the computer's
power cord is plugged into a properly grounded electrical outlet.
(Three-pronged outlets include grounding; never use an adapter to
plug a computer's power cord into a two-pronged electrical outlet.)
You can buy a socket tester (available at hardware stores) to test your
outlets if you suspect that they are not properly grounded.
225
Note: You should also make sure to cover empty slots in the system board with filler brackets.
If you do not install a filler bracket, you reduce the efficiency of the power supply's fan and
increase the chances of the computer overheating.
226
ACTIVITY 5-8
Calculating Power Requirements
Scenario
In this activity, you will calculate the power required by the computer you are using for this course.
As a guide, you can refer to the following table that includes common component types and
example specifications and required wattages.
1. Examine your computer, and complete the Specifications row of the table in step 2. If you have different
or additional components in your PC, revise the table accordingly.
There are several free
power-supply calculators
available on the web.
The calculator at
www.journeysystems.co
m/power_supply was
used to develop this
activity. You can have
participants access this
calculator, or another
online power-supply
calculator that you might
be familiar with, to help
them complete this
activity.
227
2. Determine the power required by each component, and complete the following table. Again, example
values have been provided for your reference.
CPU
Memory
Video card
Motherboard
Hard drive
Optical drive
NIC
Sound card
USB wired keyboard
USB wired mouse
USB flash drive
Other external devices
3. Calculate the total wattage required for your system. Compare this value with the maximum wattage
output listed on the power supply. Does this power supply need to be upgraded?
4. Add a buffer of 30 percent to the total wattage required for your system. Will the existing power supply
continue to supply enough power if additional components are added to the system?
228
ACTIVITY 5-9
Replacing a Power Supply
In most cases, you will
Scenario not have extra power
After calculating the power needed for all the components added to a user's system, you have supplies for students to
determined that it exceeds the capacity of the installed power supply. You have ordered and received install in their systems,
a replacement power supply and now you need to install it. so you can just have
them uninstall and
reinstall the one they
have. If there are
1. Remove the existing power supply. restrictions on students
a) Shut down and turn off the system. working within their own
b) Unplug the power cord from the electrical outlet. systems, have at least
c) On AT systems, to discharge any remaining electricity stored in the computer's capacitors, toggle one or two extra
the power switch on the computer on and off. systems to demonstrate
with.
d) Remove any components necessary in order to access the power supply and its connection to the
system board.
e) Unplug all power connections from devices, marking where each connection went to as you go.
f) Unplug the power supply from the system board.
g) Unscrew the power supply from the case.
h) Remove the power supply from the case.
229
TOPIC D
RAM Types and Features
In the previous topic, you examined the requirements of the system's power supply. Providing
sufficient electrical power is one way to ensure that system components run at an acceptable
performance level, but it is not the only solution you should consider. In this topic, you will examine
RAM.
Just as some people say you can never be too rich or too thin, you can never have too much
memory. Adding memory is one of the simplest and most cost effective ways to increase a
computer's performance, whether it is on a brand-new system loaded with high-performance
applications or an older system that performs a few basic tasks. Upgrading the memory is a common
task for any PC technician.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220-801: Objective 1.3: Compare and contrast RAM types and features.
RAM Modules
A RAM module, or memory module, is a printed circuit board that holds a group of memory chips that
act as a single memory unit. Memory modules reside in slots on the motherboard, and they are
removable and replaceable. Memory modules are defined by their design, and by the number and
type of chips they contain.
230
Note: Whether a RAM module has chips on one side or two, if the computer can access all of
its memory at once, the RAM module is considered to be single-sided.
RAM Configurations
There are three different chipset configurations used in RAM that will determine how fast data can RAM Configurations
be transferred between the chips on the board. The slowest is the single channel because it is limited
to only one channel for communication. On the other hand, double channel can transfer data twice
as fast as single, because it has two channels in which to send and receive data. The fastest
configuration is called triple channel, and it uses three channels for data transfer and is three times
as fast as single channel.
Intel has recently introduced a fourth RAM configuration that can support a quadruple channel
architecture, but there are restrictions based on the limitations from system components within the
system.
Types of RAM
There are several types of RAM. Types of RAM
SRAM Static RAM (SRAM) is used for cache memory, which is high-speed
memory that is directly accessible by the CPU. It does not need to be
refreshed to retain information. It does not use assigned memory
addresses. It is faster than Dynamic RAM, but it is also more expensive.
DRAM Dynamic RAM (DRAM) is used on single and dual in-line memory
modules (SIMMs and DIMMs). It is the most common type of RAM. It
needs to be refreshed every few milliseconds. It uses assigned memory
addresses and can be implemented using Synchronous DRAM, Direct
Rambus DRAM, or Double Data Rate SDRAM.
DRDRAM Direct Rambus DRAM (DRDRAM) is implemented on a RIMM memory
module. It is a type of synchronous, dynamic RAM.
SDRAM Synchronous DRAM (SDRAM) runs at high clock speeds and is
synchronized with the CPU bus. SDRAM was originally packaged on a
168-pin DIMM.
DDR SDRAM Double Data Rate SDRAM (DDR SDRAM) transfers data twice per clock
cycle. It is a replacement for SDRAM. DDR uses additional power and
ground lines and is packaged on a 184-pin DIMM module.
DDR2 SDRAM DDR2 chips increase data rates over those of DDR chips. DDR2
modules require 240-pin DIMM slots. Although DDR2 chips are the
same length as DDR, they will not fit into DDR slots.
DDR3 SDRAM DDR3 chips transfer data at twice the rate of DDR2, and use 30 percent
less power in the process, Like DDR2, DDR3 chips use 240-pin
connections, but cannot be used interchangeably because of differences in
notch location and electrical requirements.
231
Types of ROM
ROM is memory that is non-volatile. The original ROM chips could not be altered after the
program code was placed on the ROM chip. As time went on, though, users needed the ability to
update the information stored on ROM chips. Over the years, various chips have been created that
perform the function of ROM, but can be updated one way or another. These are referred to as
programmable ROM (PROM). Types of ROM include:
• PROM: A blank ROM chip that is burned with a special ROM burner. This chip can be changed
only once. After the instructions are burned in, it cannot be updated or changed.
• EPROM (erasable PROM): Like PROM, except that the data can be erased through a quartz
crystal on top of the chip. After removing the chip from the system, an ultraviolet (UV) light is
used to change the binary data back to its original state, all ones.
• EEPROM (electronically erasable PROM): A chip that can be reprogrammed using software
from the BIOS or chip manufacturer using a process called flashing. Also known as Flash ROM.
The chip does not need to be removed in order to be reprogrammed.
Standard Characteristics
232
Standard Characteristics
ECC
Error Correcting Code (ECC) is an error correction method that uses several bits in a data string for ECC
error checking. A special algorithm is used to detect and then correct any errors it finds. ECC is
used only in upper-end systems such as high-end workstations and servers; other desktop systems
use non-ECC memory. Non-ECC memory usually employs parity to ensure that errors are detected
within the data, but does not have the functionality to correct them.
Parity
Parity is an error-checking method that is sometimes used in RAM modules to detect errors that Parity
may occur during data transmission. When parity is used, a data transmission contains 8 bits of data
with the ninth bit being the parity bit. The parity bit is used to determine whether a piece of data is
equal to another piece of data. The parity bit value can be either true, or a 1, or it can be false, or 0.
An error is detected if the parity bit values of two data strings do no match. When an error is
detected, the system simply tries again after discarding the data. Parity memory is rarely used;
however, there are usually other system components that are relied on to verify that the data
contained in memory is accurate when non-parity memory is used. You will typically find this type
of memory used in servers.
RAM Characteristics
There are several factors you should consider when purchasing RAM for a computer. RAM Characteristics
Compatibility Is the RAM compatible with the system's motherboard? What is the maximum
RAM size supported by the computer's motherboard? What channel
architecture does the RAM support? What architecture is desired based on the
requirements of the system's motherboard?
Speed What is the current speed of the RAM in the computer? What is the bus speed
of the computer? RAM speed is the time needed to read and recharge a
memory cell, and is measured in nanoseconds (ns). A nanosecond is one-
billionth of a second. The smaller the number, the faster the RAM. For
example, 10 ns RAM is faster than 60 ns RAM. All of the RAM in the system
runs at the lowest common speed. It is backward-compatible, so it can run at
the lower speed if it finds slower RAM. Some systems will not run with mixed
RAM speeds, but these are not common. Also, the RAM will not run any faster
than the system board's bus speed.
System board Do you need to install RAM in pairs of memory modules? What is the size of
configuration the connector for RAM chips?
233
RAM Speed
Older Ferroelectric Random-Access Memory (FPRAM) was often 60- to 70-nanosecond (ns) speed
RAM. Modern RAM that you are likely to find runs at clock speeds of 100 MHz and 133 MHz. The
100 MHz RAM has a RAM speed of 10 ns. The 133 MHz RAM has a RAM speed of 6 ns. The
SDRAM used in 168-pin DIMMs has access times in the 6 to 12 ns range.
234
ACTIVITY 5-10
Comparing RAM Types and Features
Scenario
In order to choose the right type of RAM for a computer system, you typically will compare the
various types and features.
1. When selecting a new RAM module, how do you determine the maximum running speed of the RAM
once it has been installed?
A: The RAM module can run only as fast as the motherboard's bus speed, so you must determine
the maximum speed of the system bus.
Discuss the fact that you
2. On a typical system with RAM that runs at 10 ns, what RAM can you add? (Select all that apply.) can install RAM of
☐ RAM that runs at 10 ns different speeds into the
same computer. The
☐ RAM that runs at 12 ns point to make here is
☐ RAM that runs at 6 ns that all the installed RAM
will run at the speed of
☐ RAM that runs at 8 ns the slowest module. If
you add RAM that runs
3. When selecting a RAM module, when would you choose RAM enabled with ECC as opposed to RAM at 12 ns, all the RAM in
with only parity? the system will run at 12
A: The difference between ECC and parity is that ECC can detect errors and correct them, while ns.
parity can only detect errors. If you are adding or replacing RAM in a high-end system or a server
where errors can have a critical impact on data integrity, you should consider choosing ECC RAM.
235
TOPIC E
Install and Configure Storage Devices
In the previous topics, you identified a number of system components that you may have to install
and configure on a computer system. Storage devices such as hard disks are one of the most
common system components you will install. In this topic, you will install and configure storage
devices.
Users rely on local storage devices to keep their applications and data current and available. As an A
+ technician, your responsibilities are likely to include installing and configuring different types of
storage devices to provide your users with the data-storage capabilities that they need to perform
their jobs.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 1.5: Install and configure storage devices and use appropriate media.
Media Capacity
There are several media types available to users for storing their data. The capacity for any type of
media will depend on what the capacity is. Each media type has a limit to the amount of data it can
store.
Media Capacity
CD/CD-RW The capacity for CD-ROMs ranges from 700 to 860 MB.
DVD/DVD-RW • Single-sided (single-layer): 4.7 GB
• Single-sided (double-layer): 8.7 GB
• Double-sided (single-layer): 9.4 GB
• Double-sided (double-layer): 17.08
Blu-ray Blu-ray discs have a capacity of up to 128 GB, depending on the
number of layers. Each layer on the disc has a capacity of 25 GB.
Newer discs have the capability of holding up to four layers of storage.
Tape Tapes are generally used to backup data. Higher-end tapes can store up
to 5 TB of digital data.
Floppy Floppy disks are rarely used any longer. Regular 3.5 inch floppy disks
had a capacity of 720 KB or 1.44 Mb. Super floppy disks are rarely
used today and only have a capacity ranging from 100 to 200 MB.
DL DVD Dual layer (DL) DVDs have a capacity of 8.5 GB.
RAID Standards
The Redundant Array of Independent Disks (RAID) standards are a set of vendor-independent
specifications for improvements in performance and/or fault-tolerant configurations on multiple-
disk systems. In a fault-tolerant configuration, if one or more of the disks fails, data may be
recovered from the remaining disks.
RAID can be implemented through operating system software, but hardware-based RAID
implementations are more efficient and are more widely deployed. Hardware-based RAID requires a
card, or controller, to show the different disks to the computer as a single drive. These cards are
usually a PCI or PCIe card, but can also be already built into the motherboard. There are several
236
RAID levels, each of which provides a different combination of features and efficiencies. RAID
levels are identified by number; RAID 0, RAID 1, and RAID 5 are the most common.
Note: The original RAID specifications were titled Redundant Array of Inexpensive Disks. As
the disk cost of RAID implementations has become less of a factor, the term "Independent"
disks has been widely adopted instead.
RAID 0 RAID level 0 implements striping, which is the process of spreading data across
multiple drives. Striping can dramatically improve read and write performance.
Striping provides no fault tolerance, however; because the data is spread across
multiple drives, if any one of the drives fails, you will lose all of your data. You
must have at least two physical disk drives to implement striping, and the largest
size RAID-0 partition that can be created is equal to the smallest available
individual partition times the number of drives in the set. For instance, combining
a 37 GB drive and a 100 MB drive in a RAID 0 set would result in a 200 MB
partition; the balance of the 37 GB drive could not be included in the set (although
it would remain available for use in other partitions).
RAID 1 In RAID level 1, data from an entire partition is duplicated on two identical drives
by either mirroring or duplexing. In mirroring, the two disks share a drive controller.
In duplexing, each disk has its own drive controller, so the controller card is not a
single point of failure. Data is written to both halves of the mirror simultaneously.
This redundancy provides fault tolerance and provides for quick failure recovery,
but the storage overhead consumes half the available space. The work of reading
the data can be split between both drives, improving performance. However, with
the increased read speed, a RAID 1 implementation loses some write speed.
RAID 5 RAID level 5 spreads data byte by byte across multiple drives, with parity
information also spread across multiple drives. You need at least three physical
disk drives that have the same capacity and are the same type. If one drive fails, the
parity information on the remaining drives can be used to reconstruct the lost data.
In the event of a drive failure, data recovery is not instantaneous (as it is in RAID
1); the bad drive needs to be replaced, and then the missing data needs to be
reconstructed. With RAID 5, disk performance is enhanced because more than
one read and write can occur simultaneously. However, the parity calculations
create some write-performance overhead. Storage overhead is at a ratio of one to
the number of drives in the set (for example, 1/3 overhead in a three-drive set or
1/10 overhead in a 10-drive set), so the more drives that are in the set, the less
overhead, and the better performance. In the event of multiple drive failures, all
data will be irrecoverable.
RAID 10 RAID 10, or RAID 1+0, combines two RAID levels into one. It uses RAID 1 and
RAID 0 to provide both mirroring from level 1 and striping from level 0. RAID
10 uses a minimum of four disks, in two disk mirrored blocks. This configuration
gives you better performance and system redundancy.
237
Consideration Details
Does the computer have If it does, what interfaces do these devices use (PATA, SCSI, or
existing internal storage SATA)? Is there room on the controller of these devices for an
devices? additional device? For example, if the computer uses devices with the
SATA interface, are there already two devices connected to the
controller? If there are, you will need to purchase an additional SATA
controller before you can add another SATA device. If you do not
have room on the controller for an additional storage device, you
must purchase both the storage device and a controller. In addition,
make sure that the computer has an available slot for the controller.
Does the device need Make sure that you have the appropriate operating system device
additional drivers installed? drivers to install the new storage device on the computer. If
necessary, download the device drivers from the device
manufacturer's website.
Does the computer have an If not, you can purchase splitters to enable two (or more) devices to
available power supply be connected to a single power connection, but be aware of power
cable to supply power to consumption. The number of connectors approximates the available
the device? power, so make sure that the storage device will not cause the
computer to exceed the capacity of its power supply.
Does the computer have an Most hard drives require a 3.5-inch drive bay; most tape drives and
available drive bay for the optical drives require a 5.25-inch drive bay. If you want to install a
storage device? hard drive in a 5.25-inch drive bay, you will need drive rails.
Make sure you place the storage device where it will get good air flow
to avoid overheating the device. Consider the placement of the drives
inside the bays with the cable configurations. You may need to adjust
the placement of the drives to match the order of cable connectors.
Do you have the necessary SCSI devices require unique SCSI IDs. SCSI IDs are assigned to each
data cables to connect the device connected to the bus. The ID numbers range from 1 to 15,
storage device to the and determine the device priority. Some storage devices require you
controller? to configure this ID using a jumper or the device's installation
software.
PATA (IDE): Internal PATA hard drives must be jumpered properly.
If the drive is the only drive in the computer, you must jumper it as a
single drive. If the drive is the second drive in the computer, you
must jumper the drive as the second (slave) drive in a two-drive
configuration and the first drive as the master drive.
Does the placement of the Make sure there is enough total air flow to handle whatever heat the
device interrupt the air new storage device will add to the computer.
flow of the case?
Consideration Details
What interface does • If the external storage device uses USB 2.0, does the computer
the external storage support it?
device require (USB,
FireWire, or SCSI)?
238
Consideration Details
239
ACTIVITY 5-11
Installing an Internal Storage Device
Scenario
You have been assigned the task of refurbishing a computer for a client. This computer has a single
functioning hard drive, and the user needs a significant amount of local storage space.
1. Locate the available bay and the power and data connections for the new hard disk drive.
a) Power off the system, unplug all the peripherals and power cord, and open the computer case.
b) Locate an available drive bay and determine if the bay is the same form factor as the drive. If you
are using a 5.25-inch drive bay and a 3.5-inch drive, you will need to install the drive using rails to
adapt the drive to the larger bay.
c) Locate an available data connection on the data cable. If necessary, connect a PATA data cable to
the PATA controller connection on the system board.
d) Locate an available power connector. If necessary, connect a power splitter to an existing power
connection.
Note: You can leave the case open until the end of the activity.
If for any reason some
students did not install a
second independent b) Restart the computer.
drive, they can practice c) If necessary, access CMOS, enable the disk, and then exit CMOS and save your settings.
partitioning and
formatting the existing 5. Partition and format the new drive as an NTFS drive.
unallocated space on
Drive 0. a) Log on to Windows as Admin## with !Pass1234 as the password.
240
b) Select Start, right-click Computer, and select Manage.
c) In the left pane, select Disk Management.
d) If the Initialize Disk window is displayed, select MBR if the new drive is smaller than 2 TB or GPT if
the drive is larger than 2 TB. Select OK.
e) If necessary, maximize the Disk Management window to view the new drive. It may be labeled Disk
1 Unallocated.
f) Right-click the unallocated space for the new disk.
g) Select New Simple Volume. The New Simple Volume wizard starts.
h) Select Next.
i) In the Simple volume size in MB text box, type 20000
j) Select Next.
k) From the Assign the following drive letter drop-down list, select S.
l) Select Next.
m) On the Format Partition page, verify that NTFS is selected and select Next.
Note: To save time during class, you can check the Perform a Quick Format
option.
n) Select Finish.
o) Close the new drive window.
p) Close Computer Management.
q) In the Auto Play dialog window, click Open folder to view files.
r) Close the New Volume (s:) window.
241
TOPIC F
Configure the System BIOS
In the previous topics, you focused on the basic internal storage devices that enable a computer to
run, but what about how the computer communicates with all these devices? In this topic, you will
configure settings in the system BIOS.
How does the computer know when to start devices within the computer? Without the system
BIOS managing the system components within the computer system, the devices simply would not
be accessible. As an A+ technician, you must fully understand how the system BIOS operates and
how to configure it to enable a customized computing environment for users.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 1.1 Configure and apply BIOS settings.
BIOS Memory
BIOS memory stores information about the computer setup that the system BIOS refers to each time
the computer starts. The BIOS information is stored in non-volatile Electrically Erasable Programmable
Read-Only Memory (EEPROM), or flash memory chips. Because you can write new information to
BIOS memory, you can store information about system changes, such as new components that you
add to your system. The computer will look for the component each time it is turned on.
BIOS Components
When the BIOS is activated on startup, it determines which components are present and when they
are accessed during the boot process. Any time you change a hardware component, you should
check the BIOS settings to see if they also need to be changed for the system BIOS to recognize the
new hardware. Also, you can configure BIOS memory without needing to open the chassis. Several
system components can be configured through the system BIOS:
• RAM
• Hard drives
• Optical drives
• CPU
Firmware Upgrades
Most modern motherboards contain a number of BIOS chips that contain the system firmware that
runs the system BIOS. This firmware may need an upgrade from time to time depending on the
manufacturer. When the manufacturer issues an update, then the firmware will need to be updated.
These updates contain security patches, updates to the performance, and updates to address any
known issues. The updates can be installed in a number of ways, but most commonly can be
downloaded from the manufacturer's website and then either burned to CD, or copied to a flash
drive.
242
heavily on the manufacturer of the particular BIOS; however, in most cases, you should be able to
configure at least the following—and possibly much more—from the keyboard by using the BIOS
configuration utility.
Configuration Description
Option
243
Configuration Description
Option
Video Allows you to change the video controller settings when more than one
video card is installed.
Performance Allows you to change CPU settings such as enabling or disabling multicore
support and changing processor modes.
Virtualization If the CPU supports virtualization, then you can use the BIOS setup utility
support to enable or disable the various virtualization settings available.
Virtualization support within the BIOS is dependent on the OEM model.
Most modern systems will support virtualization.
Power management Allows you to configure different power options available, such as how the
system will recover from a power loss and other advanced power options.
Maintenance Allows you to verify and set service and asset tags used when a computer
needs further maintenance from an outside vendor. The asset tag is used to
identify the computer within the BIOS. It is usually a four or five digit
number.
Note: For additional information, check out the LearnTO Work with the System BIOS in the
LearnTOs for this course on your LogicalCHOICE Course screen.
BIOS Diagnostics
Most BIOS systems come with a built-in diagnostics utility that can be used to troubleshoot issues
and verify proper functionality. Most diagnostic tools allow you to test the system memory and the
entire system. The tool will thoroughly test each system component and display test results which
are usually a pass or fail. This will help you to identify which component is having issues. Most
utilities will run tests on the following components:
• Video cards
• System memory
• Hard drives
• Optical drives
Temperature The temperature of the CPU, motherboard, and overall system can
usually be checked within the system BIOS. You can use this options
to check for overheating and to verify that the CPU is running within
its safe temperature range.
Fan speeds Within the BIOS, you can verify the fan speed for your CPU, and any
system fans installed in the computer. Keep in mind that you must
balance the rotations per minute (RPM) speed of the fans with the
temperature of the CPU and motherboard.
Intrusion detection Most modern BIOS will have some security functions built in. This
includes system intrusion detection. The intrusion detection is
implemented using a sensor that alerts the system BIOS when the case
cover of the system has been removed.
Voltage The system voltage settings are strictly based on the specific hardware
you have installed in the system, such as type of motherboard and
CPU. The BIOS allows you to change the voltage configuration for
each device installed. Once in the BIOS, you will look for:
• Vcore, or VCC, which is the CPU voltage reading.
• Memory voltage, which displays the RAM voltage settings.
• VDD voltage, which displays the motherboard's voltage. This
rating is driven by the Northbridge chip of the board.
• If there is a graphics card installed, then you will see the AGP
voltage setting displayed.
245
Monitoring Capability Description
Clock You can verify that the BIOS clock is accurate by verifying the time
within the system BIOS.
Bus speed In some cases, you may find the need to monitor the bus speed, and
to make sure that the overall CPU speed is in line with the bus speed.
Bus speeds are usually set by the manufacturer at a natural clock rate
or an enhanced clock rate.
For an example, when you have a processor with a CPU speed of 1.82
GHz clock speed, you would need to set the bus speed to 166 MHz
with the multiplier of 11. (166 MHz x 11 = 1.826 GHz).
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Configure System BIOS Settings
246
ACTIVITY 5-12
Exploring and Configuring the System BIOS
Scenario
In this activity, you will explore the configuration options available to you in the system BIOS
utility.
Depending on the type
of systems used for this
1. Explore the system BIOS utility. class, the students may
a) From the Start menu, restart your computer system. not have all the options
mentioned in this topic,
b) As the computer restarts, press the BIOS access key. You might want to record this key for later or the steps in this
use. activity might not reflect
c) Navigate to the System Setup menu option. the order in which the
Depending on the BIOS installed on your computer, this menu might have a different name. information appears on
d) Browse through the available BIOS configuration options. computer screens. You
may need to provide
e) Locate the motherboard settings and record the BIOS version.
additional assistance
This information can be helpful if you ever have to update the BIOS to solve a hardware issue. when accessing the
BIOS on startup, or
2. Change the boot order. explain that any
a) Navigate to the Boot Sequence setting. differences are based on
Depending on the BIOS installed on your computer, this setting might have a slightly different name. what BIOS is installed.
b) Examine the current boot order. If participants cannot
press the BIOS access
In older systems, the floppy drive was often configured as the primary boot device. In newer key quickly enough,
systems, a USB storage device or the internal hard disk might be configured as the primary boot have them restart the
device. computer and try again
c) Change the boot order to the following: until they access the
• Optical drive system BIOS utility.
• Internal hard disk 1 Before you proceed with
• Internal hard disk 2 each step in the rest of
• USB storage device this activity, ensure that
all participants have
d) Save the change. successfully completed
the step.
3. Update the system date and time.
If participants did not
a) Navigate to the Date and Time setting. add a second hard drive
Depending on the BIOS installed on your computer, this setting might have a slightly different name. to their computers, only
b) Examine the current setting. If the date and time appear to be correct, you can skip this and the next one hard disk will display
substep. If the date and time are not correct, adjust them to match the current date and time. in the boot sequence list.
Assist participants in
c) Save your changes.
changing the boot order,
if necessary.
4. Examine system monitoring options.
If temperature
a) Navigate to the Hardware Monitoring menu option. monitoring is not
Depending on the BIOS installed on your computer, this setting might have a different name, such available through the
as PC Health, CPU Temperature, or some other name. BIOS, skip this step. If it
b) Examine the CPU temperature reading. is available, assist
Normal CPU temperatures range from 30 to 60 degrees Celsius. participants in locating
the settings in their BIOS
utilities.
5. Verify the BIOS changes.
a) Exit the BIOS utility.
b) Log on to Windows.
247
c) If you changed the date and time, verify that the system date and time has been updated in the
taskbar.
Before you proceed,
ensure that all
participants have been
successful in restarting
their computers without
errors.
248
Summary
In this lesson, you installed and configured internal system components. In your role as an A+
technician, you will be responsible for helping users with installing motherboards, RAM, CPUs, and
storage devices, so having the skills to install and configure them correctly will be crucial to assisting
users.
Use the review
In your current job role, what system components have you worked with the most? questions provided to
A: Answers will vary, but may include swapping out hard drives, optical drives, and RAM. generate discussion
among the participants.
In future job roles as an A+ technician, what system components do you think you will be working with the
most?
A: Answers will vary, but anyone working with desktop systems may need to replace hard drives, optical
drives, and power supplies, and also upgrade RAM.
Note: Check your LogicalCHOICE Course screen for opportunities to interact with your
classmates, peers, and the larger LogicalCHOICE online community about the topics covered in
this course or other topics you are interested in. From the Course screen you can also access
available resources for a more continuous learning experience.
Encourage students to
use the social
networking tools
provided on the
LogicalCHOICE Home
screen to follow up with
their peers after the
course is completed for
further discussion and
resources to support
continued learning.
249
250
6 Installing and
Configuring Operating
Systems
Lesson Time: 3 hours, 10 minutes
Lesson Objectives
In this lesson, you will install and configure operating systems. You will:
• Implement virtualization.
• Install Microsoft Windows.
• Perform a Windows Upgrade.
• Perform preventive maintenance with common tools and techniques.
Lesson Introduction
So far in this course, you have learned in general about hardware and software, and have
installed and configured many of the hardware components required for a computer system.
Now it is time to install the most important software component—the operating system—
so that all the hardware you've assembled so far can function together. In this lesson, you
will install and configure operating systems.
Because so many computers today come with operating system software installed by the
vendor, an ordinary user might never need to install an operating system. As an IT
professional, however, you might be called upon to install and configure operating systems
for a variety of reasons: if the original installation does not meet a user's needs; if the system
needs to be upgraded; if you are redeploying a system from one user to another; or even if
you need to complete a brand new build and construct a computer entirely from scratch. In
all of these cases, you will need to be able to install, configure, and optimize the computer's
operating system.
This lesson covers all or part of the following CompTIA® A+® (2012) certification
objectives:
• Topic A:
• Exam 220–802: Objective 1.9
• Topic B:
251
• Exam 220–802: Objectives 1.2, 1.6
• Topic C:
• Exam 220–802: Objective 1.1
• Topic D:
• Exam 220–802: Objective 1.7
252
TOPIC A
Implement Virtualization
In this lesson, you will install and configure the Windows® operating system. One or more of those
operating systems can be leveraged using virtualization to improve performance or increase
productivity for one or more machines. In this topic, you will implement virtualization.
As organizations grow in size and scope, there is an increased need for more resources, especially
when it comes to computing. Virtualization can help ease the growing pains of an organization by
providing the opportunity to leverage one machine and one operating system for use over many
machines, and save valuable time and resources when it comes to hardware, software, and
personnel. As an A+ technician, you may need to know what is needed to set up a virtualized
environment.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 1.9: Explain the basics of client-side virtualization.
What is Virtualization?
Virtualization is the technological process of creating a virtual version of a computing environment
by separating the elements of the computing environment―the applications, operating system,
programs, documents, and more―from each other and from any physical hardware by using an
additional software application. Virtualization can provide flexibility and scalability for organizations
where the costs for hardware and software and the IT infrastructure needed to maintain them both
continue to increase. It can increase resource utilization by allowing those resources to be pooled
and leveraged as part of a virtual infrastructure, and it can provide for centralized administration and
management of all the resources being used throughout the organization.
Types of Virtualization
Note: For additional information, check out the LearnTO Identify Server-side vs. Client-side
Virtualization in the LearnTOs for this course on your LogicalCHOICE Course screen.
There are two main types of virtualization being used today: server virtualization and client-side
virtualization. The main difference between the two types is determined by where the virtualization
takes place.
• Server (or server-side) virtualization takes place centrally at the server or data center. Server
virtualization utilizes one logical device, typically the server, to act as the host machine for the
guest machines that virtually use the applications and programs provided by the host. A software
application is used to divide the single physical device into multiple isolated virtual devices.
• Client-side virtualization takes place at the endpoints, the desktop environments themselves. Client-
side virtualization separates the elements of a user's logical desktop environment―the
applications, operating system, programs, and more―and divides them from each other and from
the physical hardware or a physical machine. With desktop virtualization, a single user can run
multiple operating systems on one machine simultaneously and seamlessly; a single user can
interact with their computer and all of their applications remotely from a mobile device; or
numerous users can access and maintain their own individual desktop environments via a single
and centrally-managed physical device which can either be co-located to the virtualized
environments or operate from a remote location. This type of virtualization environment allows
multiple virtualized machines to run on a single device with no impact on the host's file system,
registry and OS.
253
Components of a Virtual Environment
A virtual environment is made up of three components:
• The host machine, which is the computer or server on which the elements of the virtual
environment are installed and which manages the machines or desktops accessing or running the
environment virtually.
• The hypervisor, which is a software application that is installed on the host machine and is used to
configure and manage all the machines or desktops running virtually from the host.
• And the virtual machines or VMs, which are the software implementations or emulations of the
host machine, and which run programs just like a physical machine. The VMs are created by the
hypervisor and run independently from the host in which they are installed.
Components of a Virtual
Environment
254
Figure 6-2: VDI.
Virtualization Requirements
In order to run a virtualization environment on a client computer securely, certain requirements Virtualization
must met. There are generally four areas that should be addressed. Requirements
Area Requirements
255
Area Requirements
Integration Components
Windows client virtualization solutions provide integration components that enable you to work more
effectively within the VM environment. Integration components enable you to share the mouse
between the host and the VM, as well as sharing other physical components and exchanging data
without the need for a virtual network connection. Integration components are installed by default if
you are using Windows XP Mode; otherwise, you need to install them manually.
256
For more information about integration components, visit About integration features at http://
technet.microsoft.com/en-us/library/ee449432(v=ws.10).aspx.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Implement Virtualization
257
ACTIVITY 6-1
Creating a VM on Windows 7
Scenario
You have recently been hired as a PC technician at a local business. One of your primary
responsibilities will be to install and upgrade operating systems. To prepare for your new job
responsibilities, you have decided that you will create a VM on your Windows 7 computer so that
you can practice installing Windows 7 without affecting the files stored on your computer.
258
TOPIC B
Install Microsoft Windows
In this lesson, you will install and configure operating systems. The fundamental installation method
is to install the operating system from scratch. In this topic, you will perform a fresh installation of
Microsoft® Windows®.
Being able to perform a fresh installation of Windows can be important if you have built a custom
computer system from scratch, if the system you purchased from a vendor did not have the correct
system installed, or if you are completely redeploying existing hardware from one system to another.
The skills and information in this topic will help you plan and perform a fresh installation properly,
for whatever your technical and business requirements might be.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 1.2: Given a scenario, install and configure the operating system using
the most appropriate method.
• Exam 220–802: Objective 1.6: Set up and configure Windows networking on a client/desktop.
259
Operating System Requirements
Hardware Compatibility
Prior to installing any versions of Windows, you should check to make sure that your system meets
the system requirements and that all your hardware is compatible with the version of Windows you
plan to install.
If you plan on installing or upgrading to Windows 7, Microsoft offers a number of ways to check to
see if your existing hardware is compatible.
• The Microsoft Windows 7 Upgrade Advisor: For single systems or for home computers, you can
download and run the Windows 7 Upgrade Advisor, available at http://
windows.microsoft.com/en-us/windows/downloads/upgrade-advisor. The Upgrade
Advisor will scan your hardware and any connected devices to determine if you can upgrade to
Windows 7 with your current hardware configuration.
• The Windows 7 Compatibility Center: The Windows 7 Compatibility Center is a one-stop-shop
where you can find out which hardware and software components are compatible with Windows
7. You can visit the Compatibility Center at www.microsoft.com/windows/compatibility/
windows-7/en-us/default.aspx.
• The Microsoft Assessment and Planning (MAP) Toolkit: The MAP Toolkit is the appropriate
tool to use to assess an organization-wide or network-wide migration to a Windows operating
system. It allows you to check the hardware configuration of all the systems on your network
The toolkit can generate details about those systems that can be readily upgraded to Windows 7
using their present configuration. It also provides details about the hardware that needs to be
upgraded for the other systems to run Windows 7. The toolkit is freeware, and can be
260
downloaded from the Microsoft Download Center at www.microsoft.com/download/en/
details.aspx?id=7826.
Boot Methods
The operating system comes loaded onto a boot device, which is connected to the computer and
can be used to either launch the OS or, in some cases, install the OS files onto the computer. There
are a number of boot methods that can be used to install the operating system.
USB The operating system files and all necessary support files are loaded onto a
USB device, such as a flash drive. The USB is connected to the computer
and the operating system is booted and launched via the files on the USB.
CD-ROM/DVD The operating system files and all necessary support files are loaded onto
an optical disk, such as a CD-ROM or DVD. The disk type used will be
dependent upon the size of the files on the disk: DVDs can hold more
files and larger files than a CD-ROM. Regardless of the type, the disk is
inserted into the optical drive of the computer and the operating system is
booted and launched via the files on the disk.
PXE The operating system files and all necessary support files can be accessed
from a Preboot Execution Environment, or PXE (pronounce as "pixie").
With PXE, the operating system and all necessary supporting files are
loaded onto a server. The operating system is then booted and launched
over a network interface, accessing the operating system files on the
server, instead of using a local drive. This method is often used for
booting multiple computers that are being managed centrally and accessed
by more than one user, such as public computers at a library or school.
Factory Configuration
Most computers are factory-configured to boot from CD-ROM or DVD-ROM first, and changing
them to boot from hard disk speeds up the startup process. It also reduces the risk of contracting
viruses by accidentally booting from an infected disk.
Device Priority
The BIOS allows a user to specify disk boot order and to provide device priority. By default, the
computer might look to boot from the hard disk or a DVD-ROM first. If you prefer to boot from
an operating system contained on a USB device, you can instruct the computer to look to that
261
device first. To change the settings, wait until the computer has performed its POST, press the key
(usually a function key, such as F12) indicated onscreen, and follow the instructions.
Imaging
Imaging Imaging is the process of creating a computer image from one main computer, called the reference
computer, and copying that image onto one or more other computers, called the target computers, as a
method of installing an operating system and other programs. A computer image is essentially a replica
of the reference computer's hard disk and contains the operating system software, such as Windows
XP Professional or Windows 7, and any other desired applications, files, desktop settings, and user
preferences.
Problems can arise from differences in the hardware between the reference computer and the target
computer. Not everyone has the same exact computer throughout a company, so it is not
uncommon for slight variances in network and video cards to exist. For these systems, the best
thing to do is to create the image without these drivers installed, then install them after the machine
is imaged. Bigger concerns that are difficult to overcome deal with differences at the motherboard
level, which can cause the installation to fail. This would necessitate different images for each system
type.
Installation Types
Installation Types There are several methods available for installing a Windows operating system.
Upgrades are briefly
mentioned here as a Installation Method Description
method of installation;
however, upgrades are Clean install A clean install is used to install the operating system on a brand new
covered in more detail computer or to replace the operating system on an older computer
later on in the Windows in which the hard drive has been completely wiped.
Upgrades topic.
If the computer is new or once the old hard drive has been wiped,
you can install the operating system using the boot method of your
choice. Typically a clean installation will be performed with a local
source, likely an installation disc.
A clean install on an old system is particularly helpful if the system
has been plagued by problems; erasing the hard drive and starting
with a clean install can eliminate viruses and corrupted files and
allow the computer to work more efficiently. However, it is
important to remember that all the settings, preferences and files will
be lost with a clean install to replace an existing system. Some of
these settings or files can be migrated after the install using a
migration tool.
Unattended installation An unattended installation is an automated installation method that
is most often used to roll out an installation or upgrade of the
operating system to multiple systems and with minimal user
interaction. An administrator is needed to start the installation, but
then tasks that would usually require user input during installation
are carried out automatically using an answer file. An answer file is a
simple text file that contains all of the instructions that the Windows
Setup file will need to install and configure the OS without any
administrator intervention, including the product key.
Using unattended installation allows for multiple installations to
occur simultaneously, can prevent errors during installation and
create more consistency between installations in a large-scale rollout,
262
Installation Method Description
263
Installation Method Description
Note: If your network environment supports Microsoft Active Directory®, you can use
Microsoft's Windows Deployment Services (WDS) to deploy Windows automatically on multiple
computers. WDS uses disk imaging (the Windows Imaging format). It will now fully automate
the installation of Windows XP, Windows Server 2003, Windows Server 2008, Windows Vista,
and Windows 7. WDS is a replacement of the old Remote Installation Services (RIS).
264
ACTIVITY 6-2
Examining Installation Methods
Scenario
Based on the scenario given, choose the most appropriate installation method.
1. A user has had Windows 7 for several months, but a virus attack has corrupted some files.
○ Unattended
○ Upgrade
○ Repair
○ Multiboot
Partitioning
Partitioning is the process of dividing a single hard disk into multiple isolated sections that function
like separate physical hard drives, known as disk partitions. Partitions enable you to create a logical
disk structure to organize hard drives. You can set up and format one or more disk partitions during
installation. If you make an entire disk one partition, you cannot re-partition the disk later without
either reinstalling the operating system or using a third-party disk utility. After you create a partition,
you must format it to be able to store data on that partition.
265
Figure 6-3: Disk partitioning in Windows 7.
Partitioning Types
There are several types of partitions and disks used to create sections on a hard disk.
Logical A part of a physical disk drive that has been partitioned and allocated as an
independent unit and functions as a separate drive.
Primary A partition that contains only one file system or logical drive.
Extended An extended partition can be subdivided into several file systems or logical
disks/drives. Extended drives can be assigned a new drive letter.
Basic A basic disk contains a primary partition, logical drives, and possibly an
extended partition. These partitions have been formatted with a file system
and are used as a volume for storage. Up to four partitions can be made on
a basic disk. Basic disks are the most commonly used storage type in a
Windows environment.
Dynamic A dynamic disk contains dynamic volumes, which are volumes that can
span multiple disks. On a dynamic disk, up to 2,000 volumes can be
created, though a maximum of 32 volumes is recommended.
Volumes
A volume is a single storage unit made up of free space that can reside on a single disk or partition or
across multiple disks or partitions. However, a volume must be located on a single file system. The
266
term “volume” may be used in place of the term “drive” to refer to a drive that is not a physical
disk.
Types of Volumes
There are two main types of volumes: basic or simple volumes and dynamic volumes. Within
dynamic volumes, there are different ways of expanding storage space over multiple disks.
• Basic (Simple) volume: A volume where the free space on a single disk or partition is used for
storage space. It can be extended on the same disk or onto an additional disk; if extended onto
an additional disk, it becomes a spanned volume.
• Spanned volume: A volume where the free space from multiple disks or partitions, which have
been linked together, is used for storage space. A maximum of 32 disks can be linked together on
a spanned volume.
• Striped volume: A volume where the free space from two or more physical disks is alternately
utilized for storage space. The data is stored equally and alternately on each of the physical disks.
It is sometimes referred to as a RAID-0 volume.
• Mirrored volume: A volume where the free space is used on two physical disks to store duplicate
copies of the same data. The data from the volume on one disk is duplicated another physical
disk to provide data redundancy. It is sometimes referred to as a RAID-1 volume.
• RAID-5 volume: A volume that is a combination of hard drives that are configured to write data
across three or more drives.
Type Description
NTFS For a typical Windows setup, it is recommended that you choose the NTFS
file system. This file system is used in newer Windows operating systems and
can handle larger size partitions greater than 32 GB.
FAT The FAT file system is a legacy formatting option that should only be used if
running an older operating system such as Windows 95 or 98. The FAT file
system is less secure and has a limit to size of partition it can support. If
FAT32 is chosen, the size of the partition being formatted will determine the
FAT file type used. If the partition is larger than 2 gigabytes, Windows
automatically uses the FAT32 file system; smaller than 2 GB, FAT16 is used.
If the partition is larger than 32 GBs, FAT is not an option
CDFS Compact Disc File System (CDFS) CDFS is a very limited file system that was
developed for optical disc media, typically for open source operating
systems. Multiple operating systems support CDFS, including Windows,
Apple® OS, and Unix-based systems. By supporting multiple platforms,
CDFS allows for data and files to be exchanged without compatibility issues
between the various operating systems.
Format Options
Whether your needs are to support older operating systems with FAT, or newer systems with
NTFS, there are two options available for formatting during setup: full format and quick format.
During a full format, any existing files on the partition being formatted are removed and the disk is
scanned for any potential bad sectors. This scan can be time consuming, which is why the quick
format option is available. During a quick format, the existing files on the partition are removed, but
the hard disk is not scanned for bad sectors. While the quick format may indeed be quicker, it is
suggested that quick format is used only if the hard disk was previously formatted and you are sure
there are no damaged sectors.
267
Format Types
There are two types of formatting for hard disks:
• Low-level formatting is the process of writing track and sector markings on a hard disk. This level of
formatting is performed when the hard disk is manufactured.
• High-level formatting is an operating system function that builds file systems on drives and
partitions. It tests disk sectors to verify that they can be reliably used to hold data. It marks any
unreliable sectors as bad sectors that cannot be used.
Workgroups
A workgroup is a Microsoft peer-to-peer network model in which computers are grouped together
with access to shared resources for organizational purposes. Members of a workgroup can access
folders, files, printers, or other connections over the network. The computers that make up a
workgroup appear together when you browse the list of networked devices in either the Network
folder or My Network Places. Each computer in the workgroup maintains its own user account
database. This means that if a user wants to log on at any computer within the workgroup, you must
create an account for the user on each computer in the workgroup.
Homegroups
In Windows 7, a homegroup is a peer-to-peer networking scheme where computers on a home
network are grouped together for the purpose of sharing files and other resources such as printers.
Computers on a home network must belong to a workgroup, but they can also belong to a
homegroup.
When you install Windows 7, a homegroup is created automatically, if one does not already exist on
your home network. The homegroup is automatically assigned a password by Windows. If you want
to add computers to the homegroup, you will need to enter the password to join.
The homegroup provides easy resource sharing with security options such as:
• Excluding files and folders from being shared.
• Specifying whether or not others can change the files that you share.
268
The HomeGroup Control Panel contains options to manage your homegroup.
Domains
A domain is a Microsoft client/server network model that groups computers together for security
and to centralize administration. Computers that are members of a domain have access to a shared
central user account database, which means that an individual can use a single user account to log on
at any computer within the domain. Administration is centralized because you need to create the
user accounts only once in the domain, not on each computer. Domains require a specially
configured server computer called a domain controller, where the centralized user account database is
stored. Like a workgroup, computers that are members of a domain appear together when you
browse the network.
269
Figure 6-6: A domain.
Option Description
Regional and language The default for a Windows system is the English language, with the
settings location set to the United States. However, these settings can be
customized to reflect region- or language-specific options. You can select
the date and time for a specific location and choose appropriate regional
settings, such as the manner in which numbers or currencies are
displayed.
Computer name During installation, you can provide the computer with a descriptive
name and the organization to which you or the computer belongs.
Date and time If you are within the United States and did not customize the regional and
language settings, you can set the correct date and time, and choose the
appropriate time zone for your region. If desired, you can choose to have
Windows automatically adjust the time for Daylight Savings Time.
Network configuration If Windows detects a network adapter during installation, you can decide
how you want to configure networking settings for the computer. You
can accept a Typical configuration or you can configure Custom settings
that are appropriate to your environment. Otherwise, you can install your
network adapter settings after the installation.
Workgroup vs. During installation, you can decide if you want the computer to be a
Domain setup member of a domain or a member of a workgroup. If the computer is not
270
Option Description
on a network or on a network without a domain, you can select or create
a workgroup for the computer to belong to. If the computer is part of a
network with a domain, you can select the domain to which the computer
will be added as a member.
Creating a Homegroup
If you are installing Windows 7 on a computer that is connected to a home network, the homegroup
will be created when you configure the network settings.
Updates
As operating systems constantly evolve with the many changes in the technological world, there is
always the possibility that you may need to update your operating system immediately after installing
it. You will also need to maintain the system over time as changes and improvements are made.
Updates fall into one of three categories: critical updates, including Service Packs and security-
related system patches; optional software updates that provide new tools and functionality; and
optional hardware updates such as new device drivers.
Windows XP uses the Microsoft Update website or the Microsoft Update utility within the Help
and Support Center to obtain any updates needed for the operating system. Windows Vista and
Windows 7 uses the Windows Update Control Panel utility, a centralized location where you can
check to see if your system is up to date and if there are any updates available, and configure the
settings for updating your system. Regardless of the version you are running, the Microsoft Update
website can provide updates for other Microsoft products that may have updates available.
Note:
The Windows Update website is located at www.update.microsoft.com/microsoftupdate.
You can run either an Express or Custom update; if you run a Custom update, you will be able
to choose from updates in each of the three main categories.
271
partition on the computer's hard disk containing all of the original files and settings for the
operating system and other pre-installed applications in their initial state, to restore the computer to
it's factory settings.
The steps you use to perform this type of recovery are manufacturer-specific. You should always
review the documentation that came with the computer to determine how to perform the recovery
for the specific computer you are restoring. Regardless of how you perform the restore, it is always
recommended that you back up any important data from the computer onto an external storage
device, as all data will be lost when the system is restored to factory settings.
Activation Methods
For individual installations of Windows, you can activate the installation over the Internet. If you do
not have an Internet connection, you can activate over the phone, although this takes a little longer.
If you wish, you can postpone product activation and activate later in the activation grace period.
In large organizations, you can use a Volume License Product Key, which eliminates the need to
individually activate each installation of Windows. You can also activate Windows as part of an
automated installation.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Install Microsoft Windows
272
ACTIVITY 6-3
Installing Microsoft Windows
Scenario
You have created a VM named Win7test## on your Windows 7 computer so that you can practice
installing Windows 7 for a new job opportunity.
4. Configure Windows.
a) In the Set Up Windows dialog box, type Admin## for the user name and VMWin## for the computer
name. Select Next.
273
You are prompted to set a password for the new account.
b) Type and confirm !Pass1234 as the password and as the password hint, and then click Next.
c) Type the product key provided by your instructor, and select Next.
d) On the Help protect your computer and improve Windows automatically screen, select Use
recommended settings.
e) On the Review your date and time settings screen, select the correct Time zone, Date, and Time for
your locale. Select Next.
f) On the Select your computer's current location screen, select Work network.
Windows connects the VM to the network and prepares the desktop.
274
TOPIC C
Windows Upgrades
In the previous topic, you installed Microsoft Windows on a personal computer system. Upgrades
are one method for installing Windows, but are more commonly utilized to migrate from one
version of Windows to a different or newer version. In this topic, you will perform a Windows
upgrade.
Software vendors such as Microsoft are constantly coming out with new operating system versions,
and it can sometimes be more economical to upgrade existing systems when possible rather than to
purchase new computer hardware with the new version pre-installed. Whether you are upgrading for
an individual user or as part of a company-wide migration plan, the skills in this topic should help
you upgrade from older versions of Windows to the current version successfully.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 1.1: Compare and contrast the features and requirements of various
Microsoft Operating Systems.
In-Place Upgrades
An in-place upgrade is the process of installing a newer version of an operating system without first In-Place Upgrades
removing the existing operating system that is currently installed on the computer. In-place upgrades
also eliminate the need to perform the most tedious tasks involved with a clean install of an
operating system: saving or backing up data that has been saved on the computer, wiping the hard
drive, migrating or transferring saved data back to the machine, and reinstalling any programs that
had been added to the system. In essence, an in-place upgrade can overwrite the existing, older
operating system with the new version without disruption to the end user's environment.
275
Current Operating System Can Be Upgraded To
Upgrade Support
There are many upgrade paths that are not supported, whether because of the vast differences in
functions between the operating systems, or if your operating system is no longer commercially
available. To see a full list of all of the supported or unsupported upgrade paths for Windows XP,
Windows Vista, and Windows 7, please visit the following links:
• Windows XP: http://support.microsoft.com/kb/292607
• Windows Vista: http://windows.microsoft.com/en-us/windows7/help/upgrading-from-
windows-vista-to-windows-7
• Windows 7: http://windows.microsoft.com/en-US/windows7/products/home
276
Compatibility Tools
When upgrading to a different version of Windows, you will need to check to ensure that the
existing hardware is compatible with the new operating system and that your existing software
applications will run properly on the new version of Windows. Applications written for earlier
versions of Windows might not always work with your new OS version, but you may be able to
select an appropriate application compatibility mode for the application after you have upgraded the
operating system.
Note: To access the Upgrade Advisor, you can visit http://windows.microsoft.com/en-US/
windows/downloads/upgrade-advisor.
Compatibility Tools
277
278
7 Networking
Technologies
Lesson Time: 3 hours, 15 minutes
Lesson Objectives
In this lesson, you will identify network technologies. You will:
• Identify the fundamental components that make up a computer network.
• Identify the properties and characteristics of TCP/IP.
• Identify network connectivity technologies.
• Examine common ports and protocols.
• Set up and configure Windows networking.
• Examine networking tools.
Lesson Introduction
In this course, you are learning to support a wide range of computing device features and
functions. A key factor in device communication is how they are connected and how they
transfer data to one another. In this lesson, you will identify a number of networking
technologies.
Just about very digital device on the planet today is connected to external resources via
some kind of network, whether it is a small office/home office network, a corporate wide
area network (WAN), or directly to the Internet itself. The ability to connect, share, and
communicate using a network is crucial for running a business and staying connected to
everything in the world, so as an A+ support technician, you will need to understand the
technologies that underlie both local and global network communications to ensure that the
organization you support stays connected.
This lesson covers all or part of the following CompTIA® A+® (2012) certification
objectives:
• Topic A:
• Exam 220–801: Objectives 1.7, 1.11, 2.1, 2.2
• Topic B:
• Exam 220–801: Objectives 2.3, 2.4
279
• Topic C:
• Exam 220–801: Objectives 2.7, 2.8, 2.9
• Topic D:
• Exam 220–801: Objective 2.4
• Topic E:
• Exam 220–802: Objective 1.6
• Topic F:
• Exam 220–801: Objective 2.10
280
TOPIC A
Physical Network Connections
In this lesson, you will identify various networking technologies. In order to do so, you will need to
understand a few basic concepts and the connections used to implement computer networks and
their components. In this topic, you will identify the physical network connections that make up
most computer networks.
No matter what types of networks you support in your professional career, they will all share some
fundamental characteristics as well as basic physical components. As a computer support technician,
dealing with these components will need to be as natural to you as handling a scalpel is to a surgeon.
The information in this topic will familiarize you with the physical network connections and
components that you will deal with on a daily basis as a support technician.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 1.7: Compare and contrast various connection interfaces and explain
their purpose.
• Exam 220–801: Objective 1.11: Identify connector types and associated cables.
• Exam 220–801: Objective 2.1: Identify types of network cables and connectors.
• Exam 220–801: Objective 2.2: Categorize characteristics of connectors and cabling.
• Exam 220–801: Objective 2.4: Explain common TCP and UPD ports, protocols, and their
purpose.
Networks
A network is a group of connected computers that communicate and share resources such as files,
printers, Internet connections, and databases. Whether wired or wireless, most networks will include
network media, such as a cable to carry network data; network adapter hardware to translate the data
between the computer and the network media; an operating system to enable the computer to
recognize the network; and a network protocol to control the network communication. All these
components work together to enable a fully functioning computer network. Any computing device
that will communicate with a network will also include a network interface card (NIC) that is usually
built into most devices. Older devices may require an adapter card that can be inserted into an
expansion port or slot.
281
Figure 8-1: A network.
Network Models
Network Models There are two primary network models, which are design specifications for how the computers and
other nodes on a network can interact.
282
Network Model Description
to the lack of central data storage and administration. In a peer-to-peer network,
user accounts must be duplicated on every workstation from which a user
accesses resources. Such distribution of user information makes maintaining
peer-to-peer networks difficult, especially as the network grows. Consequently,
peer-to-peer networks should not exceed 10 computers. A Windows®
workgroup is an example of a peer-to-peer network.
Characteristic Description
Network connection Network adapter cards will have one or more ports that are configured to
port connect specifically to a given type of network cable. Some older cards
had several types of ports so that they could connect to several different
types of network cable. Network connections today are standardized and
almost all use one port type.
Physical network Each network adapter has a globally unique physical address burned onto
address the card by the card manufacturer. The physical address uniquely
identifies every individual card that connects to the network cable or
media. For this reason, the physical address is also called the Media Access
Control (MAC) address. MAC addresses are six bytes long. A typical MAC
address might appear as 00-00-86-47-F6-65, where the first three bytes
are the vendor's unique ID and the next three uniquely identify that card
for its vendor.
283
Characteristic Description
Status indicator lights Network adapters, including those built into most network devices,
typically have one or more light emitting diode (LED) status lights that
can provide information on the state of the network connection.
• Most adapters have a link light that indicates if there is a signal from
the network. If the link light is not lit, there is generally a problem
with the cable or the physical connection.
• Most adapters also have an activity light that flickers when packets are
received or sent. If the light flickers constantly, the network might be
overused or there might be a device generating network noise.
• Some multi-speed adapters have a speed light to show whether the
adapter is operating at 10 Mbps (Ethernet), 100 Mbps (Fast Ethernet),
or 1000 Mbps (Gigabit Ethernet).
• Some types of equipment combine the functions of more than one
light into dual-color LEDs. For example, a green flickering light
might indicate normal activity, while an orange flickering light
indicates network traffic collisions.
284
Category Network Type and Maximum Speed
285
Figure 8-4: Twisted pair connectors.
Coaxial Cables
Coaxial cable, or coax, is a type of copper cable that features a central conductor surrounded by
braided or foil shielding. An insulator separates the conductor and shield, and the entire package is
wrapped in an insulating layer called a jacket. The data signal is transmitted over the central
conductor. The outer shielding serves to reduce electromagnetic interference.
286
Note: Coaxial cable is so named because the conductor and shield share the central COmmon
AXis or are co-axial. This arrangement helps prevent electromagnetic interference from reaching
the conductor.
The different types of coaxial cable are described in the following table.
287
Coaxial Cable Description
Type
5 mm/0.25 inch RG-58/U and RG-58A/U, also known as thinnet, are older types of media used
("Thinnet") for networking. RG-59 is used for cable television transmission. The
specifications include a maximum transmission speed is 10 Mbps using
baseband transmission up to 185 meters in length.
Thinnet connections are made with a twist-lock connector called a Bayonet
Neill-Concelman (BNC) connector. Devices connect to the network with T-
connectors. Each end of the cable must be terminated with a 50-ohm resistor.
Another coax connector type is the F-connector, which is used to connect cable
TV and FM antenna cables. Today, F-connectors are also used to connect cable
modems to the CATV network.
6.91 mm/ 0.35 RG-6/U has been replacing RG-59 in recent years as the preferred cable for
inch CATV networks. Like RG-59, F-connectors are used to connect cable modems
to the CATV network.
10 mm/0.5 inch RG8 is a thicker type of coaxial cable often referred to as thicknet. It is seldom
("Thicknet") seen today due to its expense and stiffness, but was popular at one time as a
backbone cable in coaxial network installations. The specifications include a
maximum transmission speed is 10 Mbps using baseband transmission up to
500 meters in length.
Connections between Thicknet segments are made with a screw-type connector
called an N-connector. Thicknet segments must be terminated with a 50-ohm
resistor.
A legacy method used to quickly connect a computer to a thicknet wire is called
a vampire tap.
Termination
Coax network segments typically must be terminated to prevent signal reflections off the end of the
cable. Cables are terminated by installing a resistor of an appropriate rating, typically 50 ohms, on
the end of the cable.
288
Figure 8-7: A fiber optic cable.
Single-mode fiber Carries a single optical signal, and has a small core that allows only a
single beam of light to pass. A laser, usually operating in the infrared
portion of the spectrum, is modulated in amplitude (intensity) to
transmit the signal through the fiber.
Step index multimode Contains a core surrounded by cladding, each with its own uniform
fiber index of refraction. When light from the core enters the cladding, a
step down occurs due to the difference in the refractive indices. Step-
index fiber uses total internal reflection to trap light.
Graded index multimode Possesses variations in the core glass to compensate for mode path
fiber length differences. It provides up to 2 GHz of bandwidth, which is
significantly more than step-index fiber.
Straight Tip (ST) Used to connect multimode fiber, ST connectors look like BNC
connectors. They have a straight, ceramic center pin and bayonet lug
lockdown. They are often used in network patch panels. ST connectors
are perhaps the most popular type of fiber connector.
289
Connector Description
Subscriber Connector or Box-shaped connectors that snap into a receptacle. SC connectors are
Standard Connector (SC) often used in a duplex configuration where two fibers are terminated
into two SC connectors that are molded together. SC is used with
single-mode fiber.
Face Contact (FC) Similar to SMA connectors, FC connectors use a heavy duty ferrule in
the center for more mechanical stability than SMA or ST connectors.
These connectors are more popular in industrial settings where greater
strength is required.
Fiber Distributed Data The FDDI connector is a push/pull type, two-channel snap-fit
Interface (FDDI) connector used for multimode fiber optic cable. Also called a MIC
(Media Interface Connector).
290
Connector Description
Biconic The biconic connector is a screw-on type connector with a tapered
sleeve that is fixed against guided rings and screws onto the threaded
sleeve to secure the connection. When the connector is inserted into
the receptacle, the tapered end of the connector locates the fiber optic
cable into the proper position. The biconic connector is one of the
earliest connector types and is, for the most part, no longer in use.
Local Connector (LC) The LC is a small form factor ceramic ferrule connector for both
single-mode and multimode fiber. It is about half the size of the SC or
ST. The LC uses an RJ45-type latching and can be used to transition
installations from twisted pair copper cabling to fiber.
Sub Multi Assembly or Sub Similar to ST connectors, SMA connectors use a threaded ferrule on
Miniature type A (SMA) the outside to lock the connector in place. These are typically used
where water or other environmental factors necessitate a waterproof
connection, which is not possible with a bayonet-style connector.
Mechanical Transfer The MT-RJ connector, sometimes called a Fiber Jack connector, is a
Registered Jack (MT-RJ) compact snap-to-lock connector used with multimode fiber. The MT-
RJ is easy to use and similar in size to the RJ45 connector. Two strands
of fiber are attached with one connector.
291
Wireless Connections
Wireless connections are network connections that transmit signals without using physical network
media. Instead, signals are transmitted as electromagnetic energy, such as radio waves, satellite
microwave, or infrared light. Most general office wireless implementations use radio. Wireless
communication enables users to move around while remaining connected to the network.
Note: Wireless communication permits connections between areas where it would be difficult or
impossible to install wires, such as in hazardous areas, across long distances, or inside historic
buildings. It is also extremely popular in standard business and home installations because of the
mobility and flexibility it provides, as well as the simplicity of media-free installation.
Wi-Fi
Wireless radio communications following the IEEE 802.11g Wi-Fi standard are the most common
choice for ordinary wireless LAN connectivity for portable computers inside homes, offices, and,
increasingly, public buildings. Choose Wi-Fi when you need to connect portable computer systems
to a wired or wireless Ethernet LAN and enable users to move from place to place freely without a
line of sight to the WAP. Wi-Fi provides good performance within the WAP coverage area, barring
any signal interference.
Wireless
292 Connections
ACTIVITY 8-1
Identifying Network Cables and Connectors
For the ideal learning
Scenario experience, you should
In this activity, you will identify the various types of cables and connectors used to make network provide students with a
connections. variety of cables and
connectors in addition to
the cables used to
connect their computers
1. Look at the cables and connectors on the back of your computer, and identify what cables are used and
and devices.
what their purpose is.
Walk the students
through each step of the
2. What type of cable is used to connect your computer to the network?
activity and provide them
A: Answers will vary depending on the location of the participant and the type of network interface is with additional cables to
in the computer, and could range from twisted pair to wireless to virtual. identify.
3. Are there any LED lights on the cable ports indicating activity?
A: Answers will vary depending on the location of the participant and the level of network activity.
Some participants might see the LED lights lit or blinking, while others might not.
293
TOPIC B
TCP/IP
Now that you are familiar with the basic components that make up a network, you can start to take
a closer look into how Transmission Control Protocol/Internet Protocol (TCP/IP) addressing and
data delivery methods are used to implement TCP/IP on a network. In this lesson, you will identify
the properties and characteristics of TCP/IP.
As an A+ technician, you must be able to identify the components of a system in order to provide
the right level of support to your organization. Because all networks are different, you still need to
be able to identify the components and how they are connected. Understanding how everything is
connected and functioning within the network will allow you to properly support TCP/IP within
the network.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 2.3: Explain properties and characteristics of TCP/IP.
What is TCP/IP?
Transmission Control Protocol/Internet Protocol (TCP/IP) is a nonproprietary, routable network protocol
that enables computers to communicate over all types of networks. TCP/IP is the native protocol
of the Internet and is required for Internet connectivity. TCP/IP is a suite of related protocols that
work together to provide network addressing and naming, and data delivery. In this suite, IP
provides addressing, TCP provides connection-oriented message transmission, and User Datagram
Protocol (UDP) provides connectionless, best-effort message transmission.
Note: For additional information, check out the LearnTO Interpret IP Address in the
LearnTOs for this course on your LogicalCHOICE Course screen.
294
Broadcast, Unicast, and Multicast
Broadcasts are network communications that are sent to all the computers on the network at once.
Compare this to unicast transmissions, which are sent to a specific address or addresses, or multicast
transmissions, which use a single address to transmit to a group of systems.
IPv4 Addresses
An IPv4 address is a 32-bit number assigned to a computer on a TCP/IP network. Some of the bits in
the address represent the network segment; the other bits represent the computer, or node, itself.
For readability, the 32-bit IPv4 address is usually separated by dots into four 8-bit octets, and each
octet is converted to a single decimal value. Each decimal number can range from 0 to 255, but the
first number cannot be 0. In addition, all four numbers in a host address cannot be 0 (0.0.0.0) or 255
(255.255.255.255).
Network Names
Systems on a network are typically assigned a host name, in addition to the numeric address. The
host name is the descriptive name you see assigned to computers on the Internet, but systems on
local networks have them as well. On the Internet, these host names appear to the left of the
domain name. Host names can be up to 63 characters long.
Subnet Masks
A subnet mask is a 32-bit number that is assigned to each system to divide the 32-bit binary IP
address into network and node portions. This makes TCP/IP routable. A subnet mask uses a binary
operation to remove the node ID from the IP address, leaving just the network portion. Subnet
masks use the value of eight 1s in binary, or 255 in decimal, to mask an entire octet of the IP
address. 5
295
Figure 8-11: The subnet mask.
Binary ANDing
The binary logical operation applied to the subnet mask and the IP address is called binary ANDing.
There are two rules in the binary AND operation:
• Zero AND any value equals zero.
• One AND one equals one.
To apply a subnet mask, you convert both the IP address and the subnet mask to binary. You AND
each digit of the two binary numbers together. The zeros in the subnet mask convert all the bits in
the node portion of the IP address to zeros, leaving the network portion of the address intact.
Gateways
Gateways A gateway is a device, software, or a system that has the ability to convert data between incompatible
systems or devices. Gateways can translate data between different operating systems, or email
formats, or between totally different networks. A gateway can be implemented as hardware,
software, or both. You can also install gateways as software within a router, allowing the router to
act as a gateway when required, and eliminating the need for separate hardware.
IP Address Classes
IP Address Classes The designers of the TCP/IP suite defined five ranges of addresses, called address classes, for
specific network uses and sizes. Changes in the Internet since the early 90s have rendered classful
addresses all but obsolete. One of the final remnants of classful addressing is the use of the terms
"Class A," "Class B," and "Class C" to describe common subnet masks.
Class A Class A subnet masks provide a small number of network addresses for
255.0.0.0 networks with a large number of nodes per network:
• Number of nodes per network: 16,777,214
• Network ID portion: First octet
• Node ID portion: Last three octets
296
Class and Subnet Mask Description
Used only by extremely large networks, Class A addresses are far too big
for most companies. Large telephone companies and ISPs leased most
Class A network addresses early in the development of the Internet.
Class B Class B subnet masks offer a larger number of network addresses, each
255.255.0.0 with fewer nodes per network:
• Number of nodes per network: 65,534
• Network ID portion: First two octets
• Node ID portion: Last two octets
Most companies leased Class B addresses for use on Internet-connected
networks. In the beginning, there were plenty of Class B addresses to go
around, but soon they were depleted.
Class C Class C subnet masks offer a large number of network addresses for
255.255.255.0 networks with a small number of nodes per network:
• Number of nodes per network: 254
• Network ID portion: First three octets
• Node ID portion: Last octet
Because there can be more Class C networks than any other type, they
are the only addresses still generally available.
Classless Addressing
Because the traditional IP address classes have limitations on the number of available addresses in
each class, there are now various implementations that utilize classless addressing. In these schemes,
there is no strict dividing line between groups of addresses, and the network address/node address
division is determined entirely by the number of 1 bits in the subnet mask.
IPv6 Addresses
IP version 6, or IPv6, is an Internet standard that increases the available pool of IP addresses by IPv6 Addresses
implementing a 128-bit binary address space. IPv6 also includes new efficiency features, such as
simplified address headers, hierarchical addressing, support for time-sensitive network traffic, and a
new structure for unicast addressing. One of the goals of IPv6 is to keep the IP headers as small as
possible to make access to the address more efficient and quicker. Non-essential information in
IPv6 headers is moved to optional extension headers. In IPv6, address blocks are automatically
assigned hierarchically by routers. Top-level routers have top-level address blocks, which are
automatically divided and assigned as routers and segments are added. This divides the address space
logically instead of randomly, making it easier to manage.
IPv6 is not compatible with IPv4, so now, it is narrowly deployed on a limited number of test and
production networks. Full adoption of the IPv6 standard will require a general conversion of IP
routers to support interoperability. IPv6 makes use of an Institute of Electrical and Electronics
Engineers (IEEE) standard called Extended Unique Identifier (EUI). A host computer implemented
with EUI-64 can assign itself a 64-bit IPv6 interface identifier automatically.
Note: For more information on IPv6, see the IETF's IP Version 6 Working Group charter at
www.ietf.org/html.charters/ipv6-charter.html.
297
The IPv6 Address Format
An IPv6 address has 128 bits or 16 bytes and is denoted as eight hexadecimal blocks separated by
colons. The byte on the left has the highest order, and the byte on the right has the lowest order. To
make the representation easier, some abbreviation techniques are used. For example, one
abbreviation technique used replaces all zero hexadecimal values with a single zero and removes the
leading and trailing zeros of all nonzero values.
For example, in the IPv6 address 2001:DB8:0000:0056:0000:ABCD:EF12:1234, the third, fourth,
and fifth bytes contain consecutive zeros and, therefore, they can also be represented as
2001:DB8:0:56:0:ABCD:EF12:1234 without the unnecessary zeros.
Another technique used replaces all consecutive zero values or consecutive leading or trailing zeros
with a double colon. However, the double colon can be used only once in an address. This is
because when a computer comes across a simplified address, it replaces the double colon symbol
with as many zeros as required to make it 128 bits long. If an address contains more than one
double colon, the computer cannot determine the number of zeros for each place.
For example, the IPv6 address 2001:DB8:0000:0056:0000:ABCD:EF12:1234 can also be
represented as 2001:DB8::56:0:ABCD:EF12:1234 or 2001:DB8:0:56::ABCD:EF12:1234 after
replacing any one of the consecutive zeros with a double colon.
Addressing Schemes
When assigning addresses to hosts on your network, you must assign an address in the right scheme
based on the type of network and access is given to that host.
298
Scheme Description
Private Private IP addresses are addresses that organizations use for nodes requiring
IP connectivity within enterprise networks, but not requiring external
connections to the global Internet. IP addresses in each of the Classes A, B,
and C are reserved as private IP addresses. When an Internet router
receives a data packet bound for one of these reserved IP addresses, it
recognizes the address as nonroutable and does not forward it outside the
network. Private IP addresses can be used freely on internal networks.
Because they are not routable, private IP addresses do not cause duplicate
IP address conflicts on the Internet.
Any organization that opts to use private IP addresses can do so without
contacting the ICANN or an Internet registry. Because these addresses are
never injected into the global Internet routing system, the address space can
simultaneously be used by many different organizations. Problems arising
due to the shortage of IP addresses are resolved by private IP addresses.
Public Public IP addresses are addresses that get shared on the Internet. In order to
keep internal addresses private, Network Address Translation (NAT) is used to
conceal internal private IP addresses from external networks. A router is
configured with a single public IP address on its external interface and a
private address on its internal interface. A NAT service running on the
router or on another system translates between the two addressing schemes.
Packets sent to the Internet from internal hosts all appear as if they came
from a single IP address, thus preventing external hosts from identifying
and connecting directly to internal systems.
APIPA Automatic Private IP Addressing (APIPA) is a feature of Windows that enables
a Dynamic Host Configuration Protocol (DHCP) client computer to
configure itself automatically with a random IP address in the range of
169.254.0.1 to 169.254.255.254 if there is no DHCP server available.
APIPA enables DHCP clients to initialize TCP/IP and communicate with
other local APIPA-configured machines, even in the absence of an active
DHCP scope. APIPA addresses are not routable, so computers with
APIPA addresses cannot communicate outside their local subnet. APIPA
can be a useful configuration method on small home networks because
computers can initialize TCP/IP and connect without any administrative
configuration. On larger networks, however, a computer with an APIPA-
range address is usually nothing more than a symptom, to the technician, of
a DHCP problem that requires resolution.
299
DHCP
Dynamic Host Configuration Protocol (DHCP) is a network service that provides automatic assignment
of IP addresses and other TCP/IP configuration information on network systems that are
configured as DHCP clients. DHCP requires a DHCP server computer configured with at least one
active DHCP scope. The scope contains a range of IP addresses and a subnet mask, and can contain
other options, such as a default gateway address or Domain Name Server (DNS) addresses. When the
service is enabled, it automatically leases TCP/IP configuration information to DHCP clients for a
defined lease period.
DNS
Computers on TCP/IP networks are assigned both a host name and an IP address. Users generally
access systems by their descriptive names, and the network needs to translate, or resolve, those
names into the relevant systems' IP addresses. The Domain Name System (DNS) is the primary name
resolution service on the Internet as well as private IP networks.
DNS is a hierarchal system of databases that map computer names to their associated IP addresses.
DNS servers store, maintain, and update the databases and respond to DNS client name resolution
requests to translate host names to IP addresses. The DNS servers on the Internet work together to
provide global name resolution for all Internet hosts. For example, the IP address 209.85.165.99
might map to www.google.com.
Hosts Files
Another way to resolve machine names to IP addresses is to provide each computer on the TCP/IP
network with a hosts file. The hosts file is a text file that contains a list of computer names and their
associated IP addresses. The use of hosts files predated the development of DNS and they are no
longer commonly used, because this manual name-resolution method is practical only on very small
and very stable networks. Adding a new computer, for example, requires that the hosts file of every
computer that might need to reach it be manually updated with the new information.
However, a TCP/IP system will still use entries in the hosts file if the file is present, and the hosts
file actually takes precedence over DNS name resolution. This can make the hosts file useful for
testing purposes. However, if the hosts file is configured incorrectly, it can cause connectivity
problems even when the DNS configuration is correct. Because altering the hosts file is a simple
way to disrupt communications, the hosts file can be a target of attacks or malware. Be sure to check
it when you troubleshoot name resolution and connectivity.
Client-Side DNS
Client-side DNS can be implemented by running a DNS service on a client computer. The client
can quickly use the client resolver cache to lookup host names for resolution. This enables the client
to perform basic DNS lookups without having to connect to a DNS server. In cases where the
lookup is out of scope for the client resolver, the DNS servers that store, maintain, and update
databases will respond to any resolution requests that may be out of scope for client-side DNS
services to handle. In this case, the client-side DNS service will communicate directly with multiple
DNS servers to resolve name requests made from the client machine.
DHCP
300
DNS
ACTIVITY 8-2
Identifying Your Computer's TCP/IP Information
Scenario
In this activity, you will examine the configuration settings on your computer that enables it to
connect to the network.
7. Return to the network connection properties, and examine the Internet Protocol Version 4 (TCP/IPv4)
properties.
a) Select Close.
b) Select Properties to return to the network connection properties.
c) In the This connection uses the following items list, select Internet Protocol Version 4 (TCP/IPv4), Briefly explain the
and then select Properties. significance of the
d) Select Advanced. information on the
General tab of the
e) Select the DNS tab. Internet Protocol Version
f) Select Cancel three times, and then select Close. 4 (TCP/IPv4) Properties
g) Close the Network Connections window. dialog box.
Briefly explain the
information displayed on
the IP Settings tab.
Briefly explain the
information displayed on
the DNS tab.
301
TOPIC C
Network Connectivity
In the previous topics, you identified network communication technologies and the components of
TCP/IP. To complete your understanding of network concepts, you will need to examine the
technologies that connect multiple nodes and networks together. In this topic, you will identify
network connectivity technologies.
Putting together a network is like putting together a huge puzzle. There are physical pieces, such as
network adapters and network clients, and conceptual pieces, such as protocols and addresses. To
understand how the pieces all fit together, however, you need to be able to see the overall picture.
Examining the large structures and techniques that provide network connectivity between and
within network locations will help you see the big picture of network implementation and support.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 2.7: Compare and contrast Internet connection types and features.
• Exam 220-801: Objective 2.8: Identify various types of networks.
• Exam 220-801: Objective 2.9: Compare and contrast network devices, their functions, and
features.
LANs
A Local Area Network (LAN) is a self-contained network that spans a small area, such as a single
building, floor, or room. In a LAN, all parts of the network are directly connected with cables or
short-range wireless media.
302
WANs
A Wide Area Network (WAN) is a network that spans multiple geographic locations. WANs typically
connect multiple LANs using long-range transmission media. Such a network scheme facilitates
communication among users and computers in different locations. WANs can be private, such as
those built and maintained by large, multinational corporations, or they can be public, such as the
Internet.
PANs
A Personal Area Network (PAN) connects two to three devices together for use by one person using a
router with cabling; most often seen in small or home offices.
A Wireless Personal Area Network (WPAN) is a network that connects wireless devices in very close
proximity but not through a Wireless Access Point (WAP). Infrared and Bluetooth are some
technologies used for connecting devices in a WPAN.
WANs
303
Figure 8-15: A PAN.
MANs
A metropolitan area network (MAN) covers an area equivalent to a city or other municipality. In many
cases the MAN connects multiple LANS.
304
Figure 8-16: A MAN.
VPNs
A virtual private network (VPN) is a private network that protects communications sent through a
public network, such as the Internet. VPNs provide secure connections between endpoints, such as
routers, clients, or servers, by using tunneling to encrypt data. These connections are established
either between two LANs or between a user and a LAN over the Internet. Special VPN protocols are
required to provide the VPN tunneling, security, and data encryption services.
305
Figure 8-17: A VPN.
Ethernet
An Ethernet network is a popular LAN implementation that uses Ethernet network adapters,
contention-based media access, and twisted pair, coax, or fiber media. Xerox® corporation first
developed Ethernet in the 1970s. Later, the IEEE used Ethernet as the basis of the 802.3
specification, which standardized Ethernet and expanded it to include a wide range of cable media.
The 802.3 family of specifications also determines transmission speed (10 Mbps, 100 Mbps, or 1000
Mbps) and signal method (baseband or broadband).
306
Figure 8-18: Ethernet.
Ethernet WAN
To implement an Ethernet WAN, in most cases, you establish a connection to the Internet by using
Ethernet technology on the LAN and a broadband Internet connection such as a cable modem or
digital subscriber line (DSL) modem. After you connect to the Internet, you can then connect to
your organization's LAN using a VPN. Use Ethernet WANs when you want to enable users to
connect remotely to the Internet, your company's VPN, or both.
Network Topologies
A network topology is a specification that determines the network's overall physical layout and Network Topologies
transmission and flow patterns. There are a number of different topologies used to configure
networks.
Topology Description
Mesh A mesh topology is a network topology in which each node is directly connected
to every other node, similar to the physical point-to-point topology. This
configuration allows each node to communicate with multiple nodes at the
same time. Since all nodes have dedicated links with other nodes, there is no
congestion on the network and data travels very fast. Since no node can be
isolated from the network, this topology is extremely reliable. It is also
difficult to implement and maintain because the number of connections
increases exponentially with the number of nodes. Mesh topologies typically
provide reliable connections between separate independent networks.
307
Topology Description
Ring A ring topology is a network topology in which each node is connected to the
two nearest nodes: the upstream and downstream neighbors. The flow of
data in a ring network is unidirectional to avoid collisions. All nodes in the
network are connected to form a circle. There is no centralized node to
control network traffic and each node handles every data packet that passes
through it. Data transmission moves in one direction to each node that scans
data packets, accepts packets destined for it, and forwards packets destined
for another node.
Bus A bus topology is a network topology in which nodes receive the data
transmitted all at the same time, regardless of the physical wiring layout of
the network. Data flow propagates in a single, continuous stream.
Star A star topology is a network topology that uses a central connectivity device,
such as a hub or a switch, with individual physical connections to each node.
The individual nodes send data to the connectivity device, and the device
then either forwards data to the appropriate destination node, as in the case
308
Topology Description
of a switch, or simply passes it through to all attached nodes, as in the case of
a hub. Star topologies are reliable and easy to maintain as a single failed node
does not bring down the whole network. However, if the central connectivity
device fails, all nodes on that device fail to communicate.
Hybrid A hybrid topology is any topology that exhibits the characteristics of more than
one standard topology. Each section of the network follows the rules of its
own topology. They can be complex to maintain because they typically
incorporate a wide range of technologies. Most of the large networks consist
of several smaller subnetworks, and each subnetwork may have a different
topology.
309
Network Device Description
they can perform the same receive-then-broadcast action but regenerate or
boost the signal. Hubs are generally inexpensive and easy to manage;
however, they do not provide the best performance in high-traffic or latency-
sensitive situations. Hubs have largely been replaced by switches, but many
dedicated hubs still remain in use. Troubleshooting a hub is made easier by
the use of status lights for the various ports.
Switch A switch is a network hardware device that joins multiple computers together
within the same LAN. Unlike a hub, switches forward packets to only the
destination port based on MAC addresses. Because of this, they are slightly
"smarter" than hubs, and are more common. Switches can also be connected
to other switches, thus increasing the number of devices on a LAN without
sacrificing performance. Troubleshooting a switch is made easier by the use
of status indicator lights on the various ports.
Router A router is a networking device that connects multiple networks that use the
same protocols. Traffic from one network to another does not always have to
travel between the same routers. On the Internet, for example, traffic is
routed according to the best available path at the time. Troubleshooting a
router is made easier by the use of status indicator lights on the various ports.
Bridge A bridge is a network device that divides a logical bus network into segments.
Bridges examine the MAC address of each packet. If the packet is destined
for a node connected to a different port, the bridge forwards the packet. If
the packet is addressed to a node on its own segment, the bridge does not
forward the packet. This arrangement reduces traffic between segments and
improves overall network performance.
Access Point An access point (AP) is a device or software that facilitates communication and
provides enhanced security to wireless devices. It also extends the physical
range of a WLAN. The AP functions as a bridge between wireless STAs
(stations) and the existing network backbone for network access.
Modem A modem is a device that modulates and demodulates digital data to an analog
signal that can be sent over a telephone line. Its name is a combination of
modulate and demodulate.
Use a modem to connect to the Internet and to translate digital information
to and from your computer. Depending on the type of connection used, you
will use either a cable modem, a DSL modem, a wireless modem, a voice
modem, or a radio modem. A laptop modem can be an internal device, or can
be added to a system using a PC Card or an ExpressCard.
NAS A network-attached storage (NAS) appliance is a data storage device that can be
connected to a network to provide direct data access and file sharing to
multiple computing devices attached to the network.
Firewall A firewall is a software program or hardware device that protects networks
from unauthorized data by blocking unsolicited traffic. Firewalls allow
incoming or outgoing traffic that has specifically been permitted by a system
administrator and incoming traffic that is sent in response to requests from
internal systems. Firewalls use complex filtering algorithms that analyze
incoming network data based on destination and source addresses, port
numbers, and data type.
VoIP phones Voice over IP (VoIP) phones can transmit voice signals over IP data networks.
With VoIP, the phone system and IP network translate between voice and
network signals and between phone numbers and IP addresses. You can
310
Network Device Description
make a telephone call and the signal will be transmitted over your network
connection and transferred to the standard phone system if the called party
does not have VoIP service. Conversely, when a caller dials a phone number
that maps to a VoIP device, VoIP routes the call to the IP host.
Internet appliance An Internet appliance is a device that allows quick easy access to the Internet. It
can be connected to a number of computing devices for allowing access to
Internet services.
ISPs
An Internet Service Provider (ISP) is a company that provides Internet access to individuals and to
businesses. Most ISPs charge a fee for this connection. Customers receive logon information, access
to servers that provide name resolution and email services, dynamic or static IP configurations, and
a method for connecting to the ISP. Once connected to the ISP, the customer can access the
Internet.
Broadband Communications
Broadband is a general term for a category of network transmission technologies that provide high
throughput by splitting communications into multiple channels transmitted simultaneously over the
network media. Today's common broadband network communications technologies are typically
employed to provide affordable high-speed Internet access to homes and businesses.
311
Baseband vs. Broadband
The opposite of broadband is baseband. In baseband transmissions, a single signal sends data using
the entire bandwidth of the transmission media. Devices cannot simultaneously send and receive
data.
Neither baseband nor broadband is inherently faster or slower, but broadband is effectively faster
on large public networks, notably the Internet, where multiple clients are trying to send and receive
data simultaneously. For this reason, in common usage, broadband networks have become
synonymous with fast networks, although not all fast networks use broadband signaling. There is no
single common definition of the minimum data rate for a technology to be fast enough to qualify as
broadband in this sense, although a one-way transmission rate in the range of at least 1.5 Mbps is
typical.
Method Description
Cable Cable or cable modem transmissions use a cable television connection and a
specialized interface device known as a cable modem to provide high-speed
Internet access to homes and small businesses. Cable access arranges users in
groups around nodes that split the television and data signals at the cable
provider's end.
The speed of the network varies depending on how populated the group on
each node is. Download speeds can vary by more than 1 Mbps in different
areas. Most cable companies try to guarantee at least a 768-Kbps download
speed; however, speeds of 3.0 to 7.0 Mbps are common, and speeds of 20
Mbps or more are possible.
DSL Digital Subscriber Line (DSL) is a broadband technology that transmits digital
signals over existing phone lines. It has become a popular way to connect
small businesses and households to the Internet because it is affordable and
provides a relatively high download speed—a typical maximum is 1.5 Mbps
for basic DSL and 7 Mbps for high-end DSL. However, distance from the
phone company's switching station and the quality of the lines affect the total
bandwidth available to a customer.
Dial-up Dial-up lines are local loop Public Switched Telephone Network (PSTN)
connections that use modems, existing phone lines, and existing long-distance
carrier services to provide low cost, low bandwidth WAN connectivity, and
remote network access. Dial-up lines are generally limited to 56 Kbps, and are
sometimes used as backups for higher bandwidth WAN services.
Fiber Fiber is a method used to connect devices to the Internet using fiber optic
cable. Fiber is mostly used in smaller areas to connect computing devices to a
router. It provides a fast data exchange rate over distances of several
kilometers.
Satellite Orbiting satellites provide extremely long-range wireless network
transmissions. For broadband network access, satellites can be employed to
relay network signals from the network service provider to individual
customers. This can be a way to provide broadband network communications
in rural or remote areas where cable service or viable DSL lines are not
available. However, satellite Internet communications are comparatively
expensive and some only operate one-way; satellite transmissions provide the
downstream communication, but another media (typically telephone) is
312
Method Description
needed for upstream communication. For remote or mobile locations, true
two-way satellite-only communication is also available, but aligning a dish for
upstream communication to a satellite requires a certain degree of precision
and skill.
ISDN Integrated Services Digital Network (ISDN) is a digital transmission technology
that carries both voice and data over digital phone lines or PSTN wires.
Connections are made on demand by dialing another ISDN circuit's
telephone number.
ISDN and DSL are very similar technologies because they both use existing
phone lines to transmit digital signals. However, ISDN technology predates
DSL and has largely been superseded by DSL for the home and small
business market. ISDN requires a specialized client adapter called a Terminal
Adapter, which DSL does not. ISDN is also slower than DSL, being limited
to a data rate of approximately 128 Kbps for basic rate ISDN, and thus barely
qualifies as broadband. (Primary rate ISDN, which was commonly used for
network backbone communications before fiber optic cable, provides more
bandwidth and has higher speeds.)
Cellular Cellular technology uses radio signals to transmit network data over the
cellular telephone system. Cellular-enabled computers have a cellular radio
built in. Coverage can be regional, national, or global, depending on the
service chosen and the capabilities of the cellular service provider. Signal
fidelity will vary depending on interference and the distance from a cell tower.
Some of the cellular transmission technologies and standards in use include
Code-Division Multiple Access (CDMA) and the Global System for Mobile
Communications (GSM). CDMA is a spread-spectrum implementation that
uses the full frequency spectrum for each channel rather than assigning
specific frequencies to particular users. It separates the calls using digital
encoding. GSM uses time-division multiplexing (TDM), which transmits
multiple calls on the same frequency by dividing each call into separate time
slices.
Use a cellular Wireless WAN (WWAN) when you have users that have no
other way to connect to the Internet, your company's VPN, or both. Cellular
WWANs are typically more expensive than Ethernet WANs.
WiMAX Wireless Interoperability for Microwave Access (WiMAX) is a packet-based wireless
telecommunication technology that provides wireless broadband access over
long distances. Based on the IEEE 802.16 standard, it is intended for wireless
MANs. WiMAX provides fixed as well as mobile broadband access. It covers
a range of about 30 miles for fixed stations and 3 to 10 miles for mobile
stations. WiMAX also provides line of sight and non-line-of-sight
communication, and can provide connection speeds of about 70 Mbps.
WiMAX operates in the wireless frequency ranges of between 2 and 11 GHz
of the wireless spectrum.
Line of sight communication is a method used when distances between
devices can be seen by the human eye. In wireless networking this term can
be used to determine whether an access point is within a certain distance and
is within an acceptable range of connecting devices. There are a few terms
used when referring to line of sight factors:
• Line-Of-Sight (LOS): Wireless signals that travel over a direct visual path
from a transmitter to a receiver.
313
Method Description
Bluetooth Pairs
Most Bluetooth devices require you to establish a trusted relationship between two devices (referred
to as pairing). This trusted relationship is established through the use of an encrypted shared secret
or passkey. After the relationship is established, the pair of devices can encrypt the data
transmissions they exchange. However, most Bluetooth printers permit all devices to use their
services without requiring pairing.
314
ACTIVITY 8-3
Discussing Network Connectivity
Scenario
In this activity, you will discuss network connectivity.
Use these questions as
a basis for guiding the
1. The transmission method that allows multiple signals to be carried separately on the same media at the discussion. Encourage
same time is called __________ participants to share
○ Baseband.
their experiences with
various connectivity
○ Broadband. methods.
○ Modulated.
○ Multicast.
2. Which broadband communication method uses existing telephone lines to transmit digital signals?
○ Cable modem
○ DSL
○ ISDN
○ Fiber
○ Satellite
3. Which broadband communication method uses the same physical media to provide high-speed
transmission of data and television signals?
○ Cable modem
○ DSL
○ ISDN
○ Fiber
○ Satellite
315
☐ Fiber optic
☐ Cellular WAN
☐ Twisted-pair
7. Which wireless technology provides broadband Internet coverage in rural or remote areas?
○ Cellular WAN
○ Satellite
○ Wi-Fi
○ Infrared
○ Bluetooth
8. Which wireless technology is a short-range connection method requiring direct line of sight?
○ Cellular WAN
○ Satellite
○ Wi-Fi
○ Infrared
○ Bluetooth
9.
When would some of the different Internet connection types be used and when do you think you might
encounter them within the workplace?
A: Answers will vary depending on the physical location and the needs of the organization, but might
include wireless connectivity for a workplace that has a lot of laptops deployed.
10. If you have remote employees that need to connect to the corporate network but they are located in a
remote area with no access to broadband Internet service, what do you think is the best Internet
connection method to use in this situation?
A: Answers will vary, but will most likely include using either dial-up or satellite. However, because
this employee needs to access the corporate network through a VPN connection, satellite will
probably provide the faster connection. In some cases, tethering to a cell phone or connecting to a
wireless network device is an option, but this will all depend on how remote the employee's
location is and whether they can get a strong cellular signal.
316
TOPIC D
Ports and Protocols
In the previous topic, you explored the different network types and how they are connected. Now
that you have a good understanding of how a network can be structured physically, you are ready to
examine the various ports and protocols that are used to ensure data transmission is successful and
secure. In this topic, you will examine common TCP and UDP ports and protocols.
Properly configuring the ports of a network device and selecting the right protocol will ensure that
data gets transmitted over the network. As an A+ technician, you must understand how ports and
protocols are implemented within a network and how they function to provide the right level of
data transmission while keeping data secure.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 2.4: Explain common TCP and UPD ports, protocols, and their
purpose.
Ports
In TCP/IP networks, a port is the endpoint of a logical connection. Client computers connect to Ports
specific server programs through a designated port. All ports are assigned a number in a range from
0 to 65,535. An international agency, the Internet Assigned Numbers Authority (IANA), separates
port numbers into three blocks: well-known ports, which are preassigned to system processes by the
IANA; registered ports, which are available to user processes and are listed as a convenience by the
IANA; and dynamic ports, which are assigned by a client operating system as needed when there is a
request for service.
Port Ranges
There are three recognized blocks of port numbers. Port Ranges
Well-known Port range: 0 to 1,023. Well-known ports are pre-assigned for use by
ports common, or well-known, services. Often the services
that run on these ports must be started by a
privileged user. Services in this range include HTTP
317
Block Range Description
on TCP port 80, IMAP on TCP port 143, and DNS
on UDP port 53.
Registered ports Port range: 1,024 to These ports are registered by software makers for use
49,151. by specific applications and services that are not as
well known as the services in the well-known range.
Services in the registered port range include SOCKS
proxy on TCP port 1080, QuickTime® Streaming
Server administration on TCP port 1220, and Xbox®
Live on TCP and UDP port 3074.
Dynamic or Port range: 49,152 to These ports are set aside for use by unregistered
private ports 65,535. services and by services needing a temporary
connection.
Common Ports
This table lists some of the most common well-known TCP and UDP port numbers. Additional
well-known ports and other port number assignments are available online at www.iana.org/
assignments/port-numbers.
LDAP
Lightweight Directory Access Protocol (LDAP) is a protocol that defines how a client can access
information, perform operations, and share directory data on a directory server. It was designed for
use specifically over TCP/IP networks and on the Internet in particular. In most implementations,
LDAP relies on the DNS service. First, DNS enables clients to find the servers that host the LDAP
directory, and then the LDAP servers enable clients to find directory objects. Most common
network directories are LDAP-compliant.
318
Figure 8-21: LDAP.
SNMP
Simple Network Management Protocol (SNMP) is an Application-layer protocol used to collect
information from network devices for diagnostic and maintenance purposes. SNMP includes two
components: management systems and agent software, which are installed on network devices such
as servers, routers, and printers. The agents send information to an SNMP manager. The SNMP
manager can then notify an administrator of problems, run a corrective program or script, store the
information for later review, or query the agent about a specific network device.
319
Figure 8-22: SNMP collects information from network devices for diagnostic purposes.
SSH
Secure Shell (SSH) is a protocol that enables a user or application to log on to another computer over
a network, execute commands, and manage files. It provides strong authentication methods and
secure communications over insecure channels. It is a more secure version of remote connection
programs that transmit passwords unencrypted, such as Telnet. With the SSH slogin command,
the entire login session, including the password, is encrypted and protected against attack.
320
Figure 8-23: SSH.
SFTP
Secure FTP (SFTP) is a more secure replacement for FTP that uses the SSH protocol to manage,
transfer, and access files over a secure connection.
Note: Note that the acronym SFTP is used both for Secure File Transfer Protocol as well as for
the now obsolete Simple File Transfer Protocol.
SMB
The Server Message Block (SMB) is a protocol that works on the Application layer and helps share
resources such as files, printers, and serial ports among computers. In a TCP/IP network, NetBIOS
clients, such as Windows systems, use NetBIOS over TCP/IP to connect to servers, and then issue
SMB commands to complete tasks such as accessing shared files and printers.
321
Figure 8-24: Resource sharing using SMB.
322
TOPIC E
Set Up and Configure Windows Networking
In the previous topics, you focused on the network infrastructure and how it all works together.
Now you can take a look at how the operating system is configured to run on the hardware systems.
In this topic, you will setup and configure Windows networking.
Once all the hardware and connections are made in a networking environment, you will need to
make sure that the operating system is configured to use the hardware successfully. It is important to
fully understand not only the hardware and the connections within a network, but how Windows
will need to be setup and configured to accomplish connectivity with the resources of a network.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 1.6: Set up and configure Windows networking on a client/desktop.
Directory Services
A network directory, or directory service, is a centralized database that includes objects such as servers,
clients, computers, user names, and passwords. The directory is stored on one or more servers and
is available throughout the enterprise. The directory provides centralized administration and
centralized authentication.
Note: There are many directory services available from different network vendors. Some
directory services include Microsoft's Active Directory Domain Services, Open LDAP, and
Novell's eDirectory, although eDirectory is now less common.
323
Novell eDirectory and Novell Directory Services
Novell® eDirectory™ is Novell’s standards-based, enterprise-level directory service. It is an object-
oriented database organized as a hierarchical tree. The eDirectory is LDAP-compliant and supports
HTTP and SSL. It is portable to Windows, Linux, and UNIX platforms and supports the grafting
and moving of directory trees. The eDirectory is an evolution of earlier versions of Novell’s
directory service, which was called Novell Directory Services (NDS). NDS was one of the first
standards-based directory services, and it predated Microsoft’s Active Directory. NDS directories
comply with X.500, an International Telecommunication Union (ITU) standard for hierarchical
object-based enterprisewide directories and are LDAP compliant.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Join a Computer to a Domain
324
ACTIVITY 8-4
Joining a Computer to a Domain
Scenario
In this activity, you will examine the current networking configuration for your computer and for
the VM you created. Then, you will join your computer to the APLUS-CLASS domain, and re-
examine the networking configuration settings to see how they changed.
Network Shares
A network share is any network resource that is available to other computer users on the network.
Typical shares include folders, printers, and drives. Because shares enable users to access a computer
system from a remote location, you should secure all shared resources against unauthorized access.
Users can map drives to any shared resource on the network to access files quickly and efficiently.
325
Figure 8-26: Shared resources.
On Windows systems, you can share folders by modifying the folders' properties. When you share a
folder, you assign it a share name that can be different from the underlying folder name. You can
share the folder more than once using different names.
Users can connect to the shared folder by browsing to the computer in Network, or by choosing
Start→Run and entering the Universal Naming Convention (UNC) path to the folder, in the form
\\computername\sharename. Be aware that a shared folder has two sets of permissions: the NTFS
permissions (which are on the Security tab of that folder's Properties) and the share permissions
(which are on the Shared tab of that folder's Properties). The security permissions do not
automatically change once a folder is designated as a share, and there is no propagation between the
two.
326
File Sharing with UNIX or Linux
UNIX and Linux are typically used as centralized network file servers, rather than for ad hoc peer-
to-peer resource sharing. These systems generally use the Network File Sharing (NFS) protocol to
share files with other UNIX and Linux systems. NFS enables clients to see the files on the shared
system as if they were part of the client's own local file system.
The specific steps for implementing file sharing with NFS will vary depending on your operating
system version, and also depending on whether you use shell commands or your system's Graphical
User Interface (GUI) to configure the service. This is also true for the commands or steps the
clients will need to use to mount the file systems that NFS exports.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Create a Network Share
327
ACTIVITY 8-5
Creating a Network Share
Scenario
In this activity, you will create a network share.
1. Navigate to the C: drive and create a folder named Share# with the # being your student number.
2. Share the Share# folder with Everyone, and grant Read/Write share permissions.
a) Select the folder, display its pop-up menu, and select Share with.
b) Select Specific people to open the File Sharing wizard.
c) On the Choose people to share with page, select the down arrow next to the text box and select
Find people. In the Select Users or Groups dialog box, type everyone. Select Check Names and
then select OK.
d) In the list, select Everyone, and then select the down arrow under Permission Level. Select Read/
Write.
e) Select Share.
f) In the User Account Control dialog box, in the user name text box, type APLUS-CLASS/
Administrator##.
g) In the Password text box, type !Pass1234 and select Yes.
h) Select Done.
Proxy Settings
In computer networking, a proxy is a system that acts as an intermediary for requests for resources.
Client proxy software, such as Microsoft's MSP Client, can be installed on any client machine to add
an additional level of security between the client machine and the proxy server. Data requests sent
from the client get routed from the client side proxy through a back channel directly to the proxy
server. The key part of this relationship is the additional metadata attached to the request by the
client proxy that aids with identification once it hits the proxy server. So in essence the client proxy
and the server proxy work together to provide quick identification and access to resources.
When configuring a client computer, use the following settings:
• Set the proxy server settings to the correct IP address.
• Exceptions can be set to include ranges (for example, you can bypass a proxy server if you access
anything in the 192.168.x.y scope).
328
• Proxy settings can be set so that all HTTP or FTP connections use a proxy server, but no other
connections.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Configure Proxy Settings
Remote Desktop
Remote Desktop is used to operate a Windows computer from a remote location as if you were in
front of it. Depending on the permissions you define, you will have full access to all resources,
including printers, storage devices, and the network to which the machine is attached. You are even
capable of accessing multiple machines at once or hopping to multiple machines in a chain, by
running Remote Desktop on each machine on the daisy chain. In other words, Computer01 has a
Remote Desktop connection to Computer02, and Computer02 has a Remote Desktop connection
to Computer03. Computer01 has access to Computer03 through the open window that displays
Computer02's desktop.
The biggest limitation of Remote Desktop on Windows is that only one person can be logged in to
the machine at once, so once you log in using Remote Desktop, the monitor at the local computer
will go to the login screen. If a local user logs in, the remote user will be disconnected. Remote
Desktop is not really a remote diagnostic and troubleshooting tool as much as a management tool.
Remote Desktop
Network Location
Settings
329
Figure 8-27: Network settings in Windows 7.
The following table describes each of the network location settings available in Windows 7.
Location Description
Home The Home network setting is used for small home networks where devices are
trusted. All devices connected in a home network must be part of a workgroup or
part of a homegroup. This allows all devices to recognize and see one another
within the network using the network discovery function.
Work The Work network setting is used for small private business networks. In this
configuration all devices are part of a workgroup and can see one another as
peers, but cannot join as a homegroup.
Public The Public setting is used when devices connect to a network in a public space.
This setting automatically applies security settings for that location and protects
your device from unauthorized access via the public network.
Firewall Settings
Windows client firewalls can be configured for networking to ensure that they are secure against
unauthorized access attempts and attacks. Consider the following settings when setting up the
firewall:
• Enabling or disabling port security on certain ports.
330
• Inbound and outbound filtering. The user can set up rules or exceptions in the firewall settings
to limit access to the web.
• Reporting and logging activity.
• Malware and spyware protection.
• Pop-up blocking.
• Port assigning, forwarding, and triggering.
• Enabling or disabling the Windows Firewall when necessary.
Windows Firewall is a software-based firewall that is included with Windows 7, Windows Vista,
Windows XP with Service Pack 2, Windows Server® 2003 with Service Pack 1 or later, and
Windows Server 2008. Once an operating system is installed, Windows Firewall is automatically
installed and enabled. By default, the firewall blocks unsolicited incoming traffic on all ports. You
can open blocked ports and configure other firewall settings by using the Windows Firewall
program in the Control Panel or through Windows Security Policy Settings. In Windows 7,
Windows Vista, and Windows Server 2008, Windows Firewall offers more security options and can
be configured to drop outgoing traffic as well as incoming traffic.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Configure Windows Firewall Settings
Alternative IP Address
Configuration Methods
331
Figure 8-28: Alternate IP address settings.
Property Description
Speed and duplex The speed and duplex of the NIC can determine how efficient data
settings transmissions are sent. The speed can range from 10 MB to 100 MB and
can run in three different modes:
• Half duplex permits two-way communication, but only in one direction
at a time.
• Full duplex permits simultaneous two-way communication.
• Auto negotiation is used to negotiate a speed that is compatible with the
network router or switch. In this process the NIC can respond quickly
with a speed that meets the requirements of the network device.
Wake-on-LAN Wake-on-LAN (WOL) is a networking capability that is built into a
device's NIC circuitry that allows a device to turn on, or power up when a
network message is received by another computing device. You can check
if your NIC has this functionality by booting up the system BIOS and
checking the NIC card properties.
332
Property Description
PoE Power over Ethernet (PoE) is a technology standard that enables both power
and data to be transmitted over an Ethernet cable. NICs that are PoE
compliant will allow both power and data to be sent as long as the device
itself is also PoE compliant. PoE is commonly used to power and
transmit data for APs that are installed in locations where AC outlets are
not available.
QoS Quality of service is a set of parameters that controls the level of quality
provided to different types of network traffic. QoS allows NICs to
prioritize data traffic in order to fully support the networking needs for all
devices connected.
333
TOPIC F
Networking Tools
Now that you have covered all the different network types, configurations, and connection methods,
you are ready to take a closer look at tools used to properly install, configure, and maintain all parts
of a network.
Working with networks can be challenging depending on the size, location, and environment. In
order to properly and safely work with networking components, you must understand how
networking tools are used and how they can be used to fix common issues found in networks.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 2.10: Given a scenario, use appropriate networking tools.
Cable Testers
A cable tester, also called a media tester, is an electrical instrument that verifies if a signal is present on a
network cable. A simple cable tester will determine whether a cable has an end-to-end connection
and can detect shorts or opens, but it cannot certify the cable for transmission quality.
Crimpers
A wire crimper is a tool that attaches media connectors to the ends of cables. You can use it if you
need to make your own network cables or trim the end of a cable. There are different crimpers for
different types of connectors, so select the one that is appropriate for the type of network media you
are working with. A wire stripper is often part of a wire crimper, allowing the user to strip wires of
their protective coating, and then use the crimping tool to attach a media connector.
334
Figure 8-30: A wire crimper.
Multimeter
A multimeter is an electronic instrument used to measure voltage, current, and resistance. It usually
has two probes with leads, one red and one black, that are plugged into two sockets on the meter.
To switch between measuring volts, ohms, and amps, the leads can be moved to different sockets,
or there may be a selector switch. Digital meters have a screen that displays the numeric value of
what you are measuring. Analog meters have a thin needle that swings in an arc and indicates the
value of what you are measuring. Many meters also have specific settings for testing circuit
continuity, diodes, or battery charges. Multimeters are sometimes called volt-ohm meters.
Note: Use a digital multimeter whenever possible. It is much more difficult to read and interpret
an analog multimeter accurately.
335
Toner Probe
A digital toner and toner probe traces and locates voice, audio, and video cabling on a network. In
addition to confirming the cable location, a toner and probe can verify continuity and detect faults.
Loopback Plug
A loopback plug is any tool that causes the device to transmit a signal back to itself. It is typically used
for diagnosing transmission problems that redirects electrical signals back to the transmitting system.
It typically plugs into a port and crosses over the transmit line to the receive line. Many times
technicians will construct their own device based on their specific needs, but it can be used to test
Ethernet network interface cards (NICs).
Toner Probe
336
Punch Down Tool
A punch down tool is used in a wiring closet to connect cable wires directly to a patch panel. The tool Punch Down Tool
strips the insulation from the end of the wire and embeds the wire into the connection at the back
of the panel. The punch down tool makes connecting wires to a patch panel easier than it would be
to connect them by hand. Without the punch down tool, you would have to strip the wire manually
and connect it by twisting it or tightening it around a connection pole or screw.
Note: The technical name for a punch down tool is an Insulation Displacement Connector
(IDC).
Networking Utilities
Microsoft includes a variety of tools in its Windows operating systems that you can use to Networking Utilities
troubleshoot TCP/IP.
Tool Use To
ipconfig Verify the configuration of TCP/IP and to release or renew DHCP IP address
leases. (Other operating systems use different commands rather than
ipconfig. For example, Linux uses ifconfig.)
ping Test TCP/IP communications. With the -t switch, you can ping the indicated
host until the request gets interrupted; with the -l [number] switch, you can
send a ping of a specified buffer size.
nslookup Verify that the computer can connect to a DNS server and successfully find
an IP address for a given computer name.
tracert Determine and test all points along the route the computer uses to send a
packet to a destination. If tracert is unsuccessful, you can use the results
generated to determine at what point communications are failing.
netstat Show the status of each active network connection; netstat will display
statistics for both TCP and UDP, including protocol, local address, foreign
address, and the TCP connection state. Because UDP is connectionless, no
connection information will be shown for UDP packets.
net Manage Microsoft network resources from a command line. With the use
option, you can connect or disconnect the computer from a shared resource.
You can also retrieve information about current network connections. To see
all of the available commands in this suite, type net /? at a command line.
337
Tool Use To
Device connection Depending on whether you are using a wired or wireless network connection,
status the connection status might be called something like Local Area Connection or
Wireless Network Connection. Verify that the device is connected to the network
and able to send and receive data.
Network Walk you through the resolutions to various common network problems.
troubleshooters There are several network-related troubleshooters in the Help and Support
Center that can help.
Ipconfig Options
The ipconfig command provides several options that are helpful for network maintenance and
troubleshooting.
ipconfig /all View the computer's host name, DNS domain name, network card driver,
IP address, subnet mask, default gateway, DNS server(s), and WINS
server(s). In addition, you can use this display to determine whether the
computer was configured through DHCP or APIPA. If the computer
obtained its addressing through DHCP, you also see the IP address of the
DHCP server.
ipconfig /release Release the IP addressing information assigned to the computer by the
DHCP server or APIPA.
ipconfig /renew Lease IP addressing information from a DHCP server or APIPA. If the
computer already has a good IP addressed leased, it will not renew unless
you release the address first.
ipconfig /flushdns Clear DNS information on the client so that client updates with new
configuration information more quickly.
ipconfig / Register the client with its DNS server.
registerdns
338
ACTIVITY 8-6
Identifying Networking Tools
Scenario
In this activity, you will identify networking tools.
1. You need to determine if a cable is carrying a signal. Which networking tools might help you?
☐ Crimpers
☐ Cable testers
☐ Multimeters
☐ Toner probe
☐ Punch down tool
2. You need to connect cable wires to a patch panel. Which networking tool might help you?
○ Crimpers
Briefly explain the
○ Loopback plug various types of
○ Punch down tool information displayed by
the ipconfig /all
○ Toner probe
command. If you have
remote participants,
3. Open a command prompt. point out where their
a) Select Start. information might differ
b) In the Search programs and files text box, enter cmd from the information
shown on the computers
c) Select cmd.
in the physical
classroom.
4. Display and examine the TCP/IP configuration information for your computer.
If your course setup
a) Enter ipconfig /all uses a different IP
b) Scroll through the results of the command as your instructor describes the information that is address for the domain
displayed. controller, provide that
address or the DNS
5. Verify network connectivity with the APLUS-DC server. name to participants for
this step.
a) Enter ping 192.168.1.10
Discuss why or why not
b) Examine the results. Were you able to reach the target computer?
participants would
receive a response from
6. Examine the status of network connections on your computer. the target computer.
a) Enter netstat Briefly describe the
output of the netstat
b) Examine the results as your instructor describes them.
command.
Briefly describe the
7. View help for the net command. output of the net /?
a) Enter net /? and net
b) Enter net help helpcommands.
c) Examine the results as your instructor describes them. Encourage participants
d) Select at least one of the net help commands (such as net help view) and display detailed to select different
help information. Share your findings with the rest of the class. commands so that they
can share the
information they
8. Close the command prompt. discover with the rest of
the class.
339
Summary
In this lesson, you identified many different network technologies. Networking is at the heart of any
type of business. Without it, a business simply cannot function in today's world. It is your job to
ensure that the networks behind the business are running properly and managed correctly.
Use the review
questions provided to What do you think are the most important network concepts covered in this lesson?
generate discussion A: Answers will vary, depending on the setup of the work or home computing environments the students
among the participants. use. For example, if an individual is a gamer, he or she might be drawn more toward issues of LANs
and bandwidth. If a person has interest in one day being a system administrator, he or she might be
drawn to technologies such as wireless connectivity.
Note: Check your LogicalCHOICE Course screen for opportunities to interact with your
classmates, peers, and the larger LogicalCHOICE online community about the topics covered in
this course or other topics you are interested in. From the Course screen you can also access
available resources for a more continuous learning experience.
Encourage students to
use the social
networking tools
provided on the
LogicalCHOICE Home
screen to follow up with
their peers after the
course is completed for
further discussion and
resources to support
continued learning.
340
8 Installing, Configuring,
and Maintaining SOHO
Networks
Lesson Time: 1 hour, 30 minutes
Lesson Objectives
In this lesson, you will install, configure, and maintain SOHO networks. You will:
• Install and configure a SOHO network.
• Implement SOHO network security.
Lesson Introduction
In the last lesson, you identified basic networking technologies. As an A+ technician, you
might be asked to implement these technologies in a small office or home office (SOHO)
situation, rather than in a corporate enterprise setting. In this lesson, you will install,
configure, and maintain SOHO networks.
Small businesses, whether located in a commercial building or in an individual's home, can
benefit greatly from being able to share files and other resources. SOHO networks generally
contain anywhere from two to ten computers, though there can be exceptions to this
guideline. As an A+ technician, you might be called upon to implement SOHO networks as
part of your job duties.
This lesson covers all or part of the following CompTIA® A+® (2012) certification
objectives:
• Topic A:
• Exam 220–801: Objectives 2.5, 2.6
• Exam 220-802: Objective 2.3
• Topic B:
• Exam 220–802: Objectives 2.3, 2.5, 2.6
341
TOPIC A
Install and Configure SOHO Networks
In the last lesson, you covered basic networking concepts, the Transmission Control Protocol/
Internet Protocol (TCP/IP) addressing scheme, and how networks are connected. In this topic, you
will use that knowledge to install and configure a SOHO network.
SOHO networks are much like the larger corporate networks, just on a much smaller scale. No
matter what the size or location of the network, you are still responsible for understanding how it is
structured and configured. A+ technicians must understand the needs and complexities of SOHO
wired and wireless networks.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 2.5: Compare and contrast wireless networking standards and
encryption types.
• Exam 220-801: Objective 2.6: Install, configure, and deploy a SOHO wireless/wired router using
appropriate settings.
• Exam 220–802: Objective 2.3: Implement security best practices to secure a workstation.
342
How Small is Small?
SOHO networks can range in size, and there is no real consensus as to the maximum number of
nodes that can be in a SOHO network. Some sources cite the maximum as 10 nodes, while others
say that four or five nodes is the maximum.
Software Firewalls
In some cases a software firewall can be useful for SOHOs. The firewall provides many features that
can be configured to suit various computing needs. Some features include:
• Enabling or disabling port security on certain ports.
• Inbound and outbound filtering. The user can set up rules or exceptions in the firewall settings
to limit access to the web.
• Reporting and logging activity.
• Malware and spyware protection.
• Pop-up blocking.
• Port assigning, forwarding, and triggering.
Hardware Firewalls
A hardware firewall is a hardware device, either stand-alone or built into most routers, that protects
computers on a private network from unauthorized traffic. They are placed between the private
network and the public network to manage inbound and outbound traffic and network access.
DMZs
A demilitarized zone (DMZ) is a small section of a private network that is located between two
firewalls and made available for public access. A DMZ enables external clients to access data on
343
private systems, such as web servers, without compromising the security of the internal network as a
whole. The external firewall enables public clients to access the service whereas the internal firewall
prevents them from connecting to protected internal hosts.
In small offices, DMZs are commonly used to protect any client-facing webservers. This security
method prevents any hackers from seeing the private internal IP scheme.
NAT Implementations
Network address translation (NAT) can be implemented as software on a variety of systems or as
hardware in a dedicated device such as a router. Internet Connection Sharing (ICS) in Windows
systems includes a simple software-based NAT implementation, but requires a separate device, such
as a modem, to provide actual Internet connectivity. Hardware-based NAT devices, such as cable
modems and DSL routers, often have extended functionality and can double as Internet access
devices.
Note: A vast internal network can be configured with a single public address, which makes NAT
both secure and cost-efficient.
344
Static vs. Dynamic NAT
In static NAT, each internal address is mapped to a single specific public address. In dynamic NAT,
there is not a one-to-one ratio of internal to external addresses; any number of internal addresses
can share a pool of external addresses.
WPS
Wifi-Protected Setup (WPS) is a newer standard that was released in 2007 by the Wi-Fi Alliance to
enable an easy yet secure setup of small home networks. The goal of the standard was to ease the
setup and complicated configuration settings of wireless routers designed for use in SOHO
networks. WPS is a service that comes installed on some routers to support quick secure setups for
routers; however, recently the standard has been tainted. The standard has been cracked by brute
force attacks and has been reported to be less secure. It is important to fully understand the
technology installed on network devices before you connect and install them within your network.
In most cases routers come with WPS enabled by default, so you may need to turn it off once the
router is connected.
Basic QoS
The amount of data being transmitted over networks is rising every day. Also, the type of data being
transferred is changing. Traditional applications such as file transfer protocol (FTP) and Telnet are
now outnumbered by real-time multimedia applications such as IP telephony, multimedia
applications, and videoconferencing. FTP and Telnet are very sensitive to packet loss but are
tolerant to delays in data delivery. The reverse is applicable to multimedia applications; they can
compensate for some amount of packet loss, but are very sensitive toward delays in data delivery.
Therefore, an optimum usage of bandwidth becomes very critical while dealing with multimedia
applications. Low bandwidth may result in a bad quality transmission of real-time applications,
leading to dropouts or hangs. In small offices, this issue can be a major problem due to the small
network and need to access the Internet. To avoid this, certain parameters were developed to
prioritize bandwidth allocation for real-time applications on networks such as the Internet and
guarantee a specific QoS.
Quality of Service (QoS) is a set of parameters that controls the quality provided to different types
of network traffic. QoS parameters include the maximum amount of delay, signal loss and noise that
can be accommodated for a particular type of network traffic; bandwidth priority; and CPU usage
for a specific stream of data. These parameters are agreed upon by the transmitter and the receiver,
the transmitter being the ISP and the receiver being the subscriber. Both the transmitter and
receiver enter into an agreement known as the Service Level Agreement (SLA). In addition to defining
QoS parameters, the SLA describes remedial measures or penalties to be incurred by an ISP in the
event that the ISP fails to provide the QoS promised in the SLA.
345
802.11 Standard Description
Note: Home-based Wi-Fi networks are often susceptible to interference from microwave ovens,
which also operate in the 2.4 GHz frequency range.
WAPs
A Wireless Access Point (WAP) is a device that provides connection between wireless devices and
enables wireless networks to connect to wired networks. A WAP is sometimes called just an AP or a
WLAN-AP. WAPs have a network interface to connect to the wired network and a radio antenna or
infrared receiver to receive the wireless signals. Many include security features that enable you to
specify which wireless devices can make connections to the wired network.
346
Figure 9-5: A Wireless Access Point.
SSID
The Service Set Identifier (SSID) is a 32-bit alphanumeric string that identifies a WAP and all devices
that connect to it. Since a wireless client device must provide the SSID in order to connect to the
WAP, the SSID functions as a sort of password for the wireless network. However, because the
WAP typically broadcasts the SSID in plain text, it does not provide any security. It is more realistic
to think of the SSID as a network name that is applied to the grouping of the WAP and the devices
currently connected to it. The administrator can accept a device's default SSID or specify an SSID
manually to more clearly identify the device.
What is Encryption?
Encryption is the process of converting data into a form that is not easily recognized or understood
by anyone who is not authorized to access the data. Only authorized parties with the necessary
347
decryption information can decode and read the data. Encryption can be one-way, which means the
encryption is designed to hide only the cleartext and is never decrypted, or it can be two-way, in
which the encryption can be decrypted back to cleartext and read.
WEP Wired Equivalent Privacy (WEP) provides 64-bit, 128-bit, and 256-bit
encryption for wireless communication that uses the 802.11a and 802.11b
protocols. While WEP might sound like a good solution at first, it
ironically is not as secure as it should be. The problem stems from the way
WEP produces the keys that are used to encrypt data. Because of a flaw in
the method, attackers could easily generate their own keys by using a
wireless network capture tool to capture and analyze network data and
crack WEP in a short period of time.
WPA Wi-Fi Protected Access (WPA) is a security protocol that was introduced to
address some of the shortcomings in the WEP protocol during the
pending development of the 802.11i IEEE standard. It uses strong
authentication and data encryption mechanisms.
WPA2 or 802.11i 802.11i is a complete wireless standard that adds strong encryption and
authentication security to 802.11 and relies on 802.1x as the authentication
mechanism. 802.11i is sometimes referred to as WPA2.
• WPA provides improved data encryption through the Temporal Key
Integrity Protocol (TKIP), which is a security protocol created by the
IEEE 802.11i task group to replace WEP. It is combined with the
348
Wireless Encryption Description
Type
Setting Description
Basics Basic settings apply to both wired and wireless routers and can include the
ability to:
• Secure your router or access point administration interface.
• Change default administrator passwords (and user names).
• Disable remote administration.
• Secure/disable the reset switch/function.
• Change the default SNMP parameter.
• Regularly upgrade the Wi-Fi router firmware to ensure you have the
latest security patches and critical fixes.
SSID When installing a wireless router, change the default Service Set Identifier
(SSID) and verify that you are not broadcasting out to the network.
MAC filtering Apply MAC address filtering to both wired and wireless routers. By
configuring a wireless access point (WAP) to filter MAC addresses, you can
control which wireless clients may join your network.
Channels Change the default channel on wireless routers. By changing the router
channel, you can optimize data transmission and reduce interference with
other routers in close proximity. If your router is dual channel, then you
can easily change from the default channel to the other channel available.
To help determine what channel is not being used there are utilities
available that can scan the local area and display used channels. This can be
very helpful in choosing a different less used channel for your router.
DHCP Depending on the needs of your network, turn on DHCP on both wired
and wireless routers to automatically connect and assign an IP address, or
turn it off and enter a static IP address.
349
Port Forwarding and Triggering
If your router has NAT, then you can also configure port forwarding, which forwards a network
port from one network node to another, and port triggering, which automates port forwarding by
specifying ports (triggering ports) to automatically and dynamically forward inbound traffic to.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Install and Configure SOHO Networks
350
TOPIC B
SOHO Network Security
In the last topic, you installed and configured a SOHO network. As with any other computer
network, SOHO networks need to be secured to prevent unauthorized access and other threats. In
this topic, you will examine how security controls are implemented to secure both wired and
wireless SOHO networks.
Securing your network is critical to keeping data, systems and resources safe from unauthorized
access. You must understand what the security implications are when a network is improperly
secured. Security controls and implementations restrict access to sensitive data and system resources.
As the A+ technician, it's your job to make sure that the right security controls are implemented and
functioning as expected.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 2.3: Implement security best practices to secure a workstation.
• Exam 220–802: Objective 2.5: Given a scenario, secure a SOHO wireless network.
• Exam 220–802: Objective 2.6: Given a scenario, secure a SOHO wired network.
351
Wireless Security
Wireless Security Wireless security is any method of securing a wireless local area network (LAN) to prevent
unauthorized network access and network data theft. You need to ensure that authorized users can
connect to the network without any hindrances. Wireless networks are more vulnerable to attacks
than any other network system. For one thing, most wireless devices such as laptops, mobile
phones, and other mobile devices search and connect automatically to the access point offering the
best signal, which can be coming from an attacker. Wireless transmissions can also be scanned or
sniffed out of the air, with no need to access physical network media. Such attacks can be avoided
by using relevant security protocols.
Method Description
Configure the • Secure your wireless router or access point administration interface.
network settings • Disable remote administration.
• Secure/disable the reset switch/function.
• Change the default SNMP parameter.
• Change the default channel.
• Regularly upgrade the Wi-Fi router firmware to ensure you have the latest
security patches and critical fixes.
• Use the Remote Authentication Dial-In User Service Plus (RADIUS+)
network directory authentication where feasible.
• Use a VPN.
• Perform periodic rogue wireless access point scans.
Configure the • Disable the Service Set Identifier (SSID).
SSID • Change the default SSID broadcast.
Setting encryption • Enable WPA2 encryption.
• Change the default encryption keys.
• Avoid using pre-shared keys (PSK).
Properly place the • Position the router or access point and antennae safely. The radio
antenna and access frequency range of each access point should not extend beyond the
point physical boundaries and layout of the organization's facilities.
• Adjust the radio power level controls on routers and access points as
needed to help minimize power consumption within the wireless network.
It can be difficult to manage the radio power of wireless to reduce the
power used, while providing the right level of radio power to operate the
network.
Secure the wireless Specific procedures for implementing security options on wireless devices, as
access point well as the options your devices support, will vary. Always check the
documentation from your wireless device manufacturer before implementing
any security configurations. Common methods include:
• Implementing some form of user authentication.
• Implementing a security protocol that requires over-the-air data
encryption.
352
Method Description
Wireless Client
Configuration Options
353
ACTIVITY 9-1
Discussing Wireless SOHO Security Methods
Scenario
In this activity, you will identify some commonly used wireless security methods.
This activity is structured
to be a discussion type
activity. Depending on What security methods do you think a SOHO organization is most likely invest in and implement? What
the size of your class, methods do you think they are less likely to implement?
you can break the class
A: Answers will vary, but the more likely methods may include implementing encryption,
into small groups or
implementing a firewall, and changing the default user name and passwords. Methods less likely
discuss as a class.
to be implemented may include changing the SSID of the router and properly placing the WAP,
because these methods are not as common and can take more expertise to implement correctly.
354
Summary
In this lesson, you installed, configured, and maintained SOHO networks. These skills can help you
support users in smaller networking environments so that they can communicate and share
resources in a secure manner.
Use the review
Do you have any experience working with SOHO networks? What do you expect to support in future job questions provided to
functions? generate discussion
A: Answers will vary, but will likely include connecting and setting up a small home wireless network. among the participants.
Most technicians will be installing and supporting SOHO wireless networks within their job role.
What do you think is the most important SOHO network security measure?
A: Answers will vary, but may include changing the default user name and password to network routers.
Without a strong password, attackers can access and gain sensitive data sent over the network.
Note: Check your LogicalCHOICE Course screen for opportunities to interact with your
classmates, peers, and the larger LogicalCHOICE online community about the topics covered in
this course or other topics you are interested in. From the Course screen you can also access
available resources for a more continuous learning experience.
Encourage students to
use the social
networking tools
provided on the
LogicalCHOICE Home
screen to follow up with
their peers after the
course is completed for
further discussion and
resources to support
continued learning.
355
356
9 Mobile Computing
Lesson Time: 1 hours, 25 minutes
Lesson Objectives
In this lesson, you will configure mobile computing devices. You will:
• Identify mobile device technologies.
• Configure mobile devices.
Lesson Introduction
Just like laptops, mobile computing devices have specialized hardware and system
configurations that can be used to optimize functionality. In this lesson, you will configure
mobile computing technology, and discover the potential of mobile device use within the
professional community.
Today, mobile devices are used in just about every workplace. Because of the portability and
functionality they provide, use within the workplace is on the rise. As an A+ technician, you
may be expected to not only support desktop and laptop computers, but mobile devices
too. It is crucial that you understand the basic features, networking and email settings, and
security methods used when setting up and configuring mobile devices.
This lesson covers all or part of the following CompTIA® A+® (2012) certification
objectives:
• Topic A:
• Exam 220–802: Objectives 3.1, 3.4
• Topic B:
• Exam 220–802: Objectives 3.2, 3.3, 3.5
357
TOPIC A
Mobile Device Technologies
Up until this point in the course, your primary focus has been on the more traditional system
hardware components and laptop technologies. In this next topic, you will dive into the mobile
computing realm and will take a closer look at the capabilities and technologies that they employ to
provide optimal performance.
Not only has mobile technology reached a new level of performance and portability, but the use of
these devices is on the rise every day. As a certified A+ technician, you will be expected to
understand how these devices work and how they should be deployed within the workplace.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 3.1: Explain the basic features of mobile operating systems.
• Exam 220–802: Objective 3.4: Compare and contrast hardware differences in regards to tablets
and laptops.
Mobile Carriers
Mobile carriers, also referred to as mobile providers, mobile network carriers, or wireless carriers,
provide wireless phone and data access to mobile devices. Each carrier provides different phone and
data plans that provide devices with an allotted amount of phone-call minutes, texts, and Internet
access. Common carriers include:
• Verizon Wireless
• T-Mobile
• AT&T Mobility
358
and reverse pinching, all of which have specific definitions within the context of the iOS operating
system and its multitouch interface.
Android, on the other hand, is a layered environment built on the Linux® kernel foundation that
includes not only the operating system, but middleware, which provides additional software for the
operating system (OS), and additional built-in applications. The Android OS was developed by the
Open Handset Alliance and is owned by Google. It supports open source-developed applications and
functions and comes with basic operating system services, message passing, and so on. The major
difference between Android and iOS is that iOS runs on Apple products only, where the Android
OS is used by many different mobile device manufacturers and is more widespread across a number
of different mobile devices. Android also enables manufacturers to overlay a suite of applications
that they support.
Additional mobile operating systems are available but are not used nearly as much as Android and
iOS, such as the BlackBerry® OS, Microsoft® Windows® Phone 8, and HP® webOS. Carputers
tend to be a separate category and mainly use either one of Microsoft's operating systems or an
open-source OS, such as Linux.
Smartphones
New smartphones are emerging almost every day. The market is expanding and demand for Smartphones
powerful mobile devices has never been higher. While Android and iOS dominate the smartphone
device marketplace, there are many other technologies and devices available.
As an A+ technician, it can be challenging to keep up with the mobile device market as it is
constantly changing and there are so many different smartphones all with unique features and
functions. The most popular devices used in the marketplace include:
Mobile Description
Smartphone
359
Mobile Description
Smartphone
applications, Outlook® Mobile, web browsing, Windows Media® Player, and
other advanced features.
Tablet PCs
Tablet PCs Mobile devices that fall into the tablet PC category range from larger tablets that look like a
traditional laptop but have a touch screen to small notebook-sized mobile devices that operate
similarly to a smartphone, but are a bit larger and have more computing power. Just like
smartphones, tablet PCs can run a number of different operating systems depending on the
manufacturer:
• Apple's iPad and iPod touch both run on iOS.
• The Android OS is used in a number of different tablet PCs including Amazon™ Kindle Fire™,
Samsung™ Galaxy tablets, Toshiba Excite™.
• The Windows® 7 Home OS runs on Acer® ICONIA TAB, ASUS Eee Slate, and Samsung™
Series 7 tablet.
• Microsoft® Surface™ running the Windows® RT OS, which is a tablet version of Windows® 8.
• BlackBerry® PlayBook™, which runs the BlackBerry OS.
For a complete list of Tablet PCs and operating systems visit www.tabletpccomparison.net.
360
Characteristic Laptops Tablets
Storage Most laptops will have a mobile Most tablets will come equipped with
version of a traditional mechanical SSDs. Because of the space limitations
hard drive that has a higher storage and the portability of the tablet
capacity than solid state drives computers, SSDs make sense. They have
(SSDs). no moving parts to maintain and provides
a more stable mechanical design. The
SSDs are made up of a number of flash
chips that can retrieve data much faster
than a standard hard drive that needs to
start a motor and move the arm to read
data.
OS Laptops can run a number of Tablets can only run the mobile OS that
different operating systems including the device was manufactured to run. The
versions from Microsoft, Linux, and actual mobile OS will depend on the
UNIX. specific tablet due to the CPU architecture
versus the ARM architecture.
Feature Description
Open/closed The programming code used to develop mobile apps can be either open
source source code or closed source code, depending on the platform. Open source
refers to application code, operating systems, and programming languages
that are developed, published, and shared among the developer and
professional community. This process also promotes collaboration among
developers to build various apps and software programs. The Android mobile
operating system was developed using open source methods and is free to
customize.
Closed source refers to any application code, programming code, or operating
system code that is not published or shared with the community. Apple's iOS
operating system is an example of a closed source OS.
App source There are mobile apps for just about everything these days. Ranging from
games, calorie counters, virtual sticky notes, to recipes, and many more. These
apps are developed for personal and professional use and are intended to
make life easier, to entertain, or to connect businesses with consumers. Some
apps come preloaded on smartphones; others can be downloaded for free or
361
Feature Description
a small fee. Apple apps can be accessed and downloaded from the App Store,
or for Android devices from Google Play.
Screen orientation The screen orientation on most mobile devices will change automatically with
the position of the device. This is function is possible using advanced mobile
OS technology which includes an accelerometer and gyroscope. The accelerometer
reads and measures the orientation of the device using a sensor that can
measure the acceleration of the direction the device is moving in order to
reposition the screen. This technology works when the device is in motion
and upright. When the device is flat on a surface, the gyroscope changes the
orientation of the device by reading the x and y coordinates as the device is
moved to quickly update the orientation of the screen. These technologies
work together to provide an instant update to the screen in all environments.
GPS and Most mobile operating systems today use Global Positioning System (GPS)
geotracking technology to determine the location, weather, and time zone information of
a device using the satellite navigation system. Users can enter their starting
location and final destination to start the phone's built-in GPS. Depending
upon the phone and application, the navigator will provide directions or step-
by-step instructions or assistance. GPS technology is also used by certain
smartphone applications to let users check and share their location with
others. This practice is often referred to as geotracking. Geotracking uses the
GPS mobile technology component to constantly track and update a device's
location with applications that share and use positioning information. If
mobile devices do not use GPS technology, they will probably use Wi-Fi
triangulation to provide location services.
Screen calibration Screen calibration is a mobile operating system function typically used on older
PDAs and pen-based interfaces to update the sensors on the device to
respond quicker and more effectively to tapping, swiping, and pinching
actions on the touch screen. On most devices, the calibration settings will be
located in the device settings menu. If it is not, then it may not be available,
so refer to the manufacturer's documentation.
Voice recognition Voice recognition capabilities built in to the mobile operating system is
quickly on the rise. Apple's Siri was the first in a growing trend to use voice
recognition software in a mobile device that can not only recognize and
interpret a user's voice, but can respond and react to the instructions given.
Android has recently added a voice component called Voice Actions that
functions similarly to Siri.
Note: The CompTIA® exam objectives specifically refer to Android 4.0.x versus iOS 5.x.
362
ACTIVITY 11-1
Exploring iOS and Android Devices
Scenario
In this activity, you will examine mobile devices and their operating systems.
This activity assumes
that you have provided a
1. Examine an iOS device, and examine an Android device. mobile device to each
station. If mobile devices
2. Compare the interfaces and settings, and share your findings with the rest of the class. are not provided, you
can ask participants to
use their own
smartphones, or you can
perform this activity as a
demonstration.
Because of the
differences in the
various mobile products
available, you might
need to guide
participants in finding the
settings that you want to
discuss.
363
TOPIC B
Configure Mobile Devices
Now that you are more familiar with the different mobile device technologies available, you are
ready to learn how they can be configured for optimal performance while maintaining an acceptable
level of security. In this topic, you will configure mobile devices.
Mobile devices can be used for a number of functions within the professional workplace. Knowing
that, you must be able to provide basic level support to your users, such as configuring security
settings, configuring email, and setting up basic network connections.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 3.2: Establish basic network connectivity and configure email.
• Exam 220–802: Objective 3.3: Compare and contrast methods for securing mobile devices.
• Exam 220–802: Objective 3.5: Execute and configure mobile device synchronization.
Mobile Security
Mobile Security Mobile devices today can do just about anything a laptop or desktop computer can do when it
comes to end-user productivity such as making and receiving phone calls, emailing, capturing and
editing photos and videos, accessing the Internet, and in some cases, remotely accessing data and
resources on a private or public network. With all these functions, you can assume all the same
threats related to desktop computers and laptops will apply. For example, viruses and spam can
infect mobile devices as they would desktop and wireless devices by email or downloaded
applications and due to the portability, small size, and always-connected state, threats such as loss,
theft, and damage due to dropping are prominent.
364
Security Control Description
Configure device When available, all mobile devices should be configured to use data
encryption encryption to protect company-specific and personal data that may be
stored and accessed on the device. This method is effective as long as the
hardware cannot be accessed to steal the data. Along with device
encryption, data encryption should also be used so when data is accessed
by physically taking the device apart, the data remains secured.
Device encryption can also be a requirement in an organizational security
policy.
Require remote wipes Data wiping is a method used to remove any sensitive data from a mobile
device and permanently delete it.
Remote wiping is also available for some devices, so you can perform
these functions remotely in case the phone is lost or stolen. Wipe and
sanitization guidelines and requirements might be included in an
organization's security policy if mobile devices are issued to employees
for professional use. In some cases, Admins will have rights to remote in
to any device that is supported by the organization.
Enable location services GPS tracking service functionality is available on a number of mobile
and applications devices and can be added in most cases when required for business
reasons. This feature is used as a security measure to protect and track
mobile devices that may be lost or stolen.
If a mobile device does not have the locating functionality built in, then
you can download a locator application that can track and locate a lost or
stolen device.
Enable remote backup Depending on the type of mobile device, there are remote backup
services available through the OS. For example, Apple offers remote
backup services to its iCloud® through the General Settings of the
device. From there, you can specify what application data to back up.
Android offers remote backup using Google Drive. Both these services
offer the first 5 GB of data for free, then you can purchase more backup
space as needed. These features allow you to recover your data when a
device is either lost or stolen.
Install antivirus There are many different options when it comes to mobile antivirus
software solutions. Organizations that allow mobile devices to connect to the
network and transfer data should require that antivirus get installed to
prevent unauthorized access to data, systems, and resources. There are a
number of solutions available:
• BullGuard Mobile Security
• Kaspersky Mobile Security
• ESET Mobile Security
• Lookout Premium
• Trend Micro Mobile Security
• Webroot Secure Anywhere Mobile
Install updates and Mobile device updates are similar to other computing devices updates
patches and patches. Verify that devices are set up to automatically install updates
from the manufacturer. Updates and patches can resolve security issues
and systems flaws that present a security risk.
365
ACTIVITY 11-2
Examining Mobile Security
Scenario
In this activity, you will examine mobile security components and measures.
Note: For additional information, check out the LearnTO Secure a Mobile Device in the
LearnTOs for this course on your LogicalCHOICE Course screen.
1. How can the use of mobile devices by employees affect the security of an organization as a whole?
A: Mobile devices can function much like a regular computer; therefore, when they are used to send
and receive corporate emails, and to access systems and data within the corporate network, they
are a vulnerability. If lost or stolen, the devices can be used to access sensitive data or launch
attacks. Mobile devices should be secured just as any other system on the corporate network.
2. Examine some of the features on a mobile device. Using the main menu, open the security settings for
your device. What specific security settings are available?
A: Answers will vary, but may include a screen lock setting, device encryption options, and GPS
tracking features.
3. Now, pair up with a partner who has a different mobile device and examine the security features on that
device. Use the main menu to open the security settings. Are the security settings similar? Are there
different options available?
4. Tap to open the various options and check out the security settings that can be customized, such as the
screen lock feature, device encryption options, and GPS tracking features. Compare the available
settings on a couple different devices.
366
Figure 11-1: Smartphone network settings.
367
The Bluetooth Pairing Process
The pairing process involves devices sharing a secret key in order to create a working relationship.
The basic steps in this process include:
1. Enable Bluetooth on the mobile device through system settings.
2. Enable pairing on the device.
3. On your mobile device, find a device for pairing.
4. Once the device is found, it will ask for a PIN code.
5. Depending on the type of device, the PIN code will be sent via a text, or will be a standard code,
such as “0000” used for wireless headsets.
6. Verify that a connection message has been displayed.
7. Test the connection by using the two devices together to either make a phone call, transfer data,
or play music.
Data Synchronization
Data synchronization is the process of automatically merging and updating common data that is stored
on multiple devices. For example, a user can access his email contacts list from both his mobile
device and his laptop computer. Synchronization is established when the devices are either
connected via a cable or wirelessly, or over a network connection. In some cases, you may need to
install synchronization software on the devices you choose to synchronize. The sychronization rate
can be controlled and limited to allowing and restricting push and pull notifications from the cloud
over the Internet. There are many types of data that can be synchronized:
• Contacts
• Programs
• Email
• Pictures
• Music
• Videos
Microsoft has its own synchronization protocol called Exchange ActiveSync (EAS) that enables mobile
devices to connect to an Exchange Server to access mail, calendars, and contacts. Exchange
Synchronization Requirements
Synchronization requirements will vary and will be specific to each mobile device. There are a Synchronization
number of factors to consider when enabling data synchronization on a mobile device: Requirements
• You might need to use a specific system account to enable synchronization.
• You might require an email account.
• If you are using Microsoft Exchange, then control may be given to the Admin.
• Organizations may have specific requirements to synchronize data.
• Certain devices might require additional software to enable synchronization.
Protocol Your email server will be configured to support either POP3 or IMAP.
Post Office Protocol version 3 (POP3) is a protocol that enables an email client
application to retrieve email messages from a mailbox on a mail server. With
POP3, the email messages wait in the mailbox on the server until the client
retrieves them, either on a schedule or manually. Once the messages are
retrieved and downloaded to the client, they are generally deleted from the
server. The client then stores and works with the email messages locally.
Internet Mail Access Protocol version 4 (IMAP4) is a protocol that enables a client
to retrieve messages from a mail server. With IMAP4, messages generally
remain on the server while the client works with them as if they were local.
IMAP4 enables users to search through messages by keywords and to choose
which messages to download locally. Messages in the user's mailbox can be
marked with different status flags that denote states such as "deleted" or
"replied to." The messages and their status flags stay in the mailbox until
explicitly removed by the user. Unlike POP3, IMAP4 enables users to access
folders other than their mailbox.
Security In order to establish secure authentication to and from an email server, a
security protocol should be used. There are two main security protocols used:
369
Server Information Description
370
Summary
In this lesson, you worked with mobile computing devices. You examined mobile device
technologies including the operating systems for smartphones and tablets. You also examined how
to configure mobile devices to be secure when connecting to a network, connecting via Bluetooth,
synchronizing data, and using email.
Use the review
In your professional experience, have you supported mobile devices? If not then, what kind of experience questions provided to
do you have with them? generate discussion
A: Answers will vary, and experience levels can range from no experience at all to power users that are among the participants.
very comfortable with mobile devices.
What type of technical support do you think will be expected of an A+ technician as mobile devices become
even more prominent within the workplace?
A: Answers will vary, but will most likely include implementing security methods and synchronizing
organizational data with mobile devices.
Note: Check your LogicalCHOICE Course screen for opportunities to interact with your
classmates, peers, and the larger LogicalCHOICE online community about the topics covered in
this course or other topics you are interested in. From the Course screen you can also access
available resources for a more continuous learning experience.
Encourage students to
use the social
networking tools
provided on the
LogicalCHOICE Home
screen to follow up with
their peers after the
course is completed for
further discussion and
resources to support
continued learning.
371
372
10 Supporting Printers
Lesson Time: 1 hour
Lesson Objectives
In this lesson, you will support printers. You will:
• Identify printer components.
• Install, configure and maintain printers.
Lesson Introduction
In previous lessons, you have installed, configured, and managed system hardware for
desktops, laptops, and mobile devices, as well as the basic operating software and
networking components on all three systems. The next logical step is to examine some of
the most common external devices in use on personal computer systems: printers. In this
lesson, you will support printers.
Despite predictions that computers would bring about a paperless office environment, the
need to transfer digital information to paper or back again remains as strong as ever.
Therefore, printing and scanning are among the most common tasks for users in almost
every home or business environment. As an A+ certified professional, you will often be
called upon to set up, configure, and troubleshoot printing environments, so you will need
to understand printer technologies as well as to perform common printer support tasks.
This lesson covers all or part of the following CompTIA® A+® (2012) certification
objectives:
• Topic A:
• Exam 220–801: Objective 4.1
• Topic B:
• Exam 220–801: Objectives 4.2, 4.3
373
TOPIC A
Printer Technologies
In this lesson, you will support printers. Before you can provide the right level of support, you must
fully understand how these systems are used in a production environment. You need to understand
how the various printer components work within a printer to provide the desired outputs. In this
topic, you will identify printer technologies.
As a professional support technician, you might be supporting the latest cutting-edge technology, or
you might be responsible for ensuring that legacy systems continue to function adequately. So, you
must be prepared for either situation and be able to provide the right level of support to users and
clients. Having a working knowledge of the many printer technologies and components will help
you to support users' needs in any technical environment.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 4.1: Explain the differences between the various printer types and
summarize the associated imaging process.
Printers
A printer is a device that produces text and images from electronic content onto physical media such
as paper, photo paper, and labels. A printer is one of the most popular peripheral devices in use in
most computing environments. Printers employ a range of technologies; the quality of the print
output varies with the printer type and generally in proportion to the printer cost. A printer output
of electronic documents is often referred to as "hard copy." Printers can connect to computers using
a variety of connection types, with the most popular methods being USB, networked, and wireless.
374
Microsoft Printing Terminology
Some Microsoft technical content makes a firm distinction between the software components that
represent the printer, and the physical printer itself. You may find that Microsoft refers to the
software representation of the printer as the "printer object," "logical printer," or simply "printer,"
and refers to the printer itself as the "print device" or "physical printer." However, Microsoft
sometimes also uses the word "printer" as in common usage, to mean the physical print device. Be
aware of the context usage of the terms.
MFDs
A multi-function device (MFD) is a piece of office equipment that performs the functions of a number An MFD
of other specialized devices. MFDs typically include the functions of a printer, scanner, fax machine,
Ask participants what
and copier. However, there are MFDs that do not include fax functions. Although the multi-
types of MFDs they have
function device might not equal the performance or feature sets of the dedicated devices it replaces, experience with, and
multi-function devices are very powerful and can perform most tasks adequately and are an what capabilities were
economical and popular choice for most home or small-office needs. available on the devices.
Types of MFDs
MFDs can be broadly classified into three types, based on their size, cost, and functions.
All-in-one (AIO These MFDs are small in size and include basic features of printing,
MFD) scanning, and copying that are required for home users. Interestingly, some
of them include features such as PictBridge and smart card readers that are not
available on high-end MFDs. They have limited or no fax features and do
not support networking.
375
Type of MFD Description
SOHO MFD These MFDs are medium sized and are designed specifically for small and
home offices. They can be connected to a network and can perform tasks at
a faster pace than AIOs. They usually have enhanced faxing capabilities and
some high-end models are loaded with additional time-saving features, such
as an automatic document feeder, duplex printing, duplex scanning, extra paper
trays, and stapling.
Heavy-duty MFD As the name suggests, these MFDs are large, network-enabled machines that
can cater to the documentation needs of an entire office. They may not
include a fax. They are built to handle large volumes of printing, scanning,
and copying. Additional features such as automatic document feeder, duplex
printing and scanning, and enhanced storage space are available by default.
Laser Printers
A laser printer is a printer that uses a laser beam to form images and toner to print the images on a
printing medium, such as paper or photo paper.
376
• Paper transport mechanism. This includes the transfer belt and separator pads that move the
paper through the laser printer. If the printer is equipped with a duplexing assembly, then the
rollers and motors will flip the paper and feed it through to the imaging drum twice.
• Electrostatic Photographic drum (EP drum), or imaging drum. This component carries an electrical
charge that attracts the toner. It then transfers the toner to the paper.
• Transfer corona assembly. This is a component that contains the corona wires; it is responsible
both for charging the paper so that it pulls the toner off the drum and also for charging the drum
itself.
• Fuser assembly. This unit, also known as the fuser, applies pressure and heat to the paper to adhere
the toner particles to the paper.
• Formatter board. This unit exposes and processes all of the data received from the computer and
coordinates the steps needed to produce the finished page.
LED Printers
LED printers are similar to laser printers but use the latest printing technology, namely Light
Emitting Diodes (LEDs), to replace the laser beam. Some LED printers can print 420 pages per
minute.
377
Process Step Description
negative charges. The roller then applies these negative charges, up to
-600 volts (V), on the surface of the drum. This process is known as
conditioning. A finely tuned laser beam, which consists of positive
charges, is cast on the negatively charged drum. A multi-faced mirror that
rotates reflects the laser beam onto the drum.
4. Writing A laser beam writes to the EP drum, giving portions of the drum a
weaker negative charge.
5. Developing Toner is attracted to the areas of the drum that were hit by the laser light.
In this step, the invisible image is now ready to be developed. Inside the
toner cartridge, a thin layer of toner is applied to the surface of the drum.
A thin blade, called a wipe blade, then spreads the toner evenly on the
surface of the drum, leaving behind the toner only on the regions written
by the laser beam.
6. Transferring In the next phase, positively charged papers are fed into the printer by
the pickup rollers. The positively charged paper attracts the negatively
charged toner sticking on the drum. The transferred toner sticks loosely
on the paper's surface, bound by the charges.
7. Fusing In the final stage, the toner is melted and fused with the paper
permanently. There are two transfer rollers, closely placed to each other,
with almost no clearance between them. The heating roller at the top has
heating elements inside it and is also coated with a non-stick material to
prevent the toner from sticking to it. The pressure roller at the bottom
presses the paper against the heating roller and together they melt and
fuse the toner with the paper. When the fusing process is complete, the
printed paper rolls out of the printer.
Inkjet Printers
Inkjet Printers An inkjet printer is a printer that forms images by spraying liquid ink from an ink cartridge out of
nozzles aimed carefully on the printer. Inkjet printers have a self-cleaning cycle and will park the
printhead when not in use. The printer can use heat or vibrations to release the ink.
Note: Canon refers to their inkjet printers as "BubbleJet," and HP refers to theirs as "DeskJet."
378
Figure 12-5: An inkjet printer.
379
drum, which then transfers the image to the paper as it rolls over the drum. Solid ink printers can
produce an image with a clear, fine edge on a wide variety of media, such as standard paper or
transparency film.
1. Preparation When the print process is initiated, a motor and belt mechanism moves a
printhead across the printer. Another stepper motor along with gears
advance the paper into the printer.
2. Ink dispersion As the printhead moves across the paper, images are formed by heat or
vibration forcing liquid ink out of carefully aimed nozzles onto the paper.
The printhead does not touch the paper. If the printer has double-sided
printing capabilities, then the duplexing assembly will move the paper or
other printing media through the printer twice.
3. Ink deposit The printhead moves back and forth across the paper, printing one row of
the image at a time. Each row is several dots wide. The amount of ink shot
onto the page is determined by the driver software that controls where and
when each nozzle deposits ink. The printhead typically produces at least 300
distinct DPI. Some printers can print at up to 1,200 DPI or more.
4. Paper advance The paper advances using rollers and feeders after every row until the page is
covered.
380
2. Once the ink is heated, bubbles are formed in the cartridge that burst and shoot ink onto the
media.
3. The heat is turned off and the element cools.
4. More ink is sucked into the nozzle when the bubble collapses. Each thermal printhead has about
300 to 600 nozzles that shoot spheres of ink that can create dots about 60 microns in diameter.
Duplexing
Duplexing is the process that enables automatic printing and scanning on both sides of printing
media, such as paper and envelopes. This function can be found in both inkjet and laser printers,
and also in MFDs, and in some cases can be installed as an add-on to provide the duplexing
functionality to printers that do not have the function installed. The printer component that is
responsible for duplexing is referred to as the duplexing assembly. Its primary function is to reverse the
media inside the printer so that both sides can be moved through the imaging function of the
printer. In some higher-end commercial printers, the duplexing function can print both sides
simultaneously, without having to flip the media over.
Thermal Printers
A thermal printer is a general term for any printer that uses a heating element to create the image on
the paper with dye, ink from ribbons, or directly with pins while the feed assembly moves the media
through the printer. There are several types of thermal printers that use significantly different
technologies and are intended for different uses. The most sophisticated types of thermal printers
can produce professional photo-quality images. There are also thermal printers for everyday office
381
hermal Print Processes
use and for special-purpose applications. Most thermal printers will require special thermal paper that
contain chemicals designed to react and change color as it is heated by the heating element within
the printer to create images. These printers are commonly used with cash registers to print receipts.
Thermal dye transfer A thermal dye transfer printer, also called a dye sublimation printer, is a
printer sophisticated type of color printer that uses heat to diffuse dye from color
ribbons onto special paper or transparency stock. The resulting
continuous-tone image is similar in quality to photographic printing, and
professional photographers employ them to produce prints quickly
without having to send them to a photographic lab. However, the printers
themselves are expensive and slow, and the special media is also
expensive. Newer and less-expensive snapshot printers produce snapshot-
sized images of acceptable photographic quality.
Thermal wax transfer Thermal wax transfer printers have a thermal printhead that melts wax-based
printer ink from a transfer ribbon onto the paper. These printers can be used in
typical office settings as an economical way to produce color copies or
color prints at an acceptable quality but at lower cost than dye
sublimation printers. They are also used for standard text-based printing.
Direct thermal printer Direct thermal printers use heated pins to form an image directly onto
specially coated thermal paper. Early personal computer printers, such as
Apple’s first printer, the SilenType, were thermal printers. However,
direct thermal printers are found today only in special-purpose printing
devices such as cash registers and some fax machines.
382
• A thermal dye transfer printer, or dye sublimation printer, uses a heating element to diffuse dye
from color ribbons onto special thermal paper or transparency stock.
• A thermal wax transfer printer uses the heating element to melt wax-based ink from a transfer
ribbon onto special thermal paper as it moves through the printer by the feed assembly.
• A direct thermal printer has a heating element with heated pins to create the image directly on
the paper as it gets passed through the printer by the feed assembly.
Impact Printers
An impact printer is any type of printer that strikes a component directly against the ink ribbon to Impact Printers
create characters on impact paper. The strike can be made with a group of pins or with a preformed
type character. Impact printers tend to be noisy and slow compared to other printers and have
largely been superseded by other printer technologies. The most common use is for printing carbon
or carbonless multi-part forms such as receipts or invoices.
Dot-matrix printer A dot-matrix printer is a type of impact printer that uses a set of pins to
strike the ribbon. Dot-matrix printers create printed characters by using
various combinations of dots. The printhead contains a vertical column
of small pins that are controlled by an electromagnet. Because it uses an
383
Impact Printer Type Description
array of pins to form images, this type of printer can produce graphics as
well as text.
Formed-character A formed-character printer is any type of impact printer that functions like a
printer typewriter, by pressing preformed characters against the ink ribbon to
deposit the ink on the page.
The printhead might be shaped like a golf ball, with the type distributed
around the ball, or it might be in the form of a wheel with the characters
around the perimeter of the wheel. Because of this type of printhead's
resemblance to flower petals, they are referred to as daisy-wheel printers.
Line printer A line printer is any type of impact printer that can print a full line of text
at a time, rather than printing character by character. These are the
fastest type of impact printers.
384
Figure 12-11: The impact print process.
Pin strike The printhead has a vertical column of small pins that are controlled by an
electromagnet. The pins shoot out of the printhead and strike an ink-coated
ribbon. The dots created on the page become the printed text or graphics.
More, smaller pins create better quality images. Printers come in 9-pin or 24-
pin varieties.
Ink transfer The impact of the pin transfers ink from the ribbon to the printed page. This
physical impact is responsible for the printer's ability to print multiple-layer
forms.
Printhead move After a set of pins has fired, an electromagnet pulls them back in, the printhead
moves a fraction of an inch across the page, and another set of pins is fired.
Letter quality pass Near Letter Quality (NLQ) printers usually use two or more passes over a line
of text to increase the number of dots used per letter. This connects the dots to
form sharper and clearer letters.
385
ACTIVITY 12-1
Identifying Printer Technologies
Scenario
In this activity, you will identify various types of printers.
○ Laser
○ Impact
○ Inkjet
○ Thermal
386
○ Inkjet
○ Thermal
○ Laser
○ MFD
4. Identify any available printers that may be within your workspace for taking this class. See how many of
the components you can identify inside the printers.
Assist participants in
identifying various
printer components.
387
TOPIC B
Install, Configure, and Maintain Printers
In the previous topic, you examined printer technologies, components, and processes. You can use
this basic understanding when you install and configure printers on laptop and desktop systems. In
this topic, you will install, configure, and maintain printers.
Because printers are such a fundamental component of almost every computing environment, it is
almost a guarantee that you will be called upon to set up and configure printing on devices no
matter what professional environment you are working in. The skills you will learn in this topic
should prepare you to install, configure, and maintain a wide range of printer types efficiently and
correctly.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–801: Objective 4.2: Given a scenario, install and configure printers.
• Exam 220–801: Objective 4.3: Given a scenario, perform printer maintenance.
Component Description
Printer memory Printers typically come with their own installed memory to store information
about the current device settings as well as the print jobs in the queue.
Different devices will have a different amount of memory installed by default;
you may be able to upgrade the memory. Upgrading the memory can enable a
printer to handle higher-resolution jobs and to buffer more of each print job
to increase throughput.
Printers store current print jobs in volatile Random Access Memory (RAM);
they typically store device settings in flash-based non-volatile RAM. Consult
your device documentation for the memory amounts and types your device
supports, as well as procedures for installing or upgrading device memory.
Printer drivers Like all hardware devices, printers require appropriate software drivers in
order to enable the device to communicate with the computer system and
function correctly. The driver controls all device-specific functions, including
print resolution and quality choices, color rendition, contrast and brightness,
and finishing options such as two-sided printing, collation, stapling, and so
on. If you open a device's property sheet, you can see the driver functions on
the Advanced page and on any custom pages the driver adds. Printers might
also include management software that is separate from the low-level driver
interface and provides sophisticated control over device settings and
functions.
Printer firmware Many printers include built-in firmware that provides the on-board device
management interface. This enables you to configure printer functions,
monitor and manage print jobs, select output options, and run diagnostic
tests from a console on the device itself, rather than indirectly through a
computer operating system. The firmware type and the functions provided by
the firmware will vary depending upon your device. Check with your device
vendor for any available firmware updates.
388
Component Description
Printer interfaces Printers have been traditionally connected to computers using parallel or
sometimes serial cables and ports. However, those connection methods are
considered obsolete. Most printers and multifunction devices used today use
USB and wireless technologies, or are directly connected to the network via a
network cable.
Printer toner Laser printer toner is a fine powder made of particles of iron, carbon, and
resin. Laser printers require a toner cartridge, which is a single, replaceable
unit that contains toner as well as additional components used in image
production. You will need to maintain a supply of the proper toner cartridges
for your printer model. Refill or recycle empty toner cartridges; do not
dispose of them in regular trash.
Users can change toner cartridges, but everyone should follow proper
handling procedures, which are usually printed right on the cartridge. Toner
particles can stain clothing or skin, especially when exposed to heat. Toner
rarely spills, but when it does, clean it up with an electronics vacuum that has
a fine filter and bag to contain the material. Using a regular vacuum can melt
the toner if it gets on the vacuum motor. Use a dry paper towel, toner spill
cloths, or cool water to clean toner from skin or clothing. Do not rub the
area, because the heat from friction will make it harder to remove.
Ink and ink Inkjet printers require ink cartridges to supply black or colored ink. You will
cartridges need to maintain a supply of the ink cartridges for your printer model. Ink
cartridges vary by:
• The size of cartridges and how much ink each cartridge contains.
• Whether black is produced using a separate cartridge or by combining the
cyan, yellow, and magenta inks into a composite black output.
• Whether there are separate cartridges for each color or if they are all in
one unit. The black cartridge is separate on almost all printers, except for
some very low-end printers. If the colors are in one unit and one color
runs out, the entire cartridge needs to be replaced.
Solid ink printers require you to supply solid ink sticks designed for your
particular printer model.
Paper and other Depending upon your printer, you may be able to print to a variety of media
media types types, including:
• Standard-quality copier paper in a variety of form sizes, such as letter,
legal, tabloid, and so on.
• Bright paper made specifically for inkjet printers.
389
Supply or Media Description
• Photo paper.
• Transparencies.
• Labels.
• Card stock.
• Envelopes.
You will need to install paper trays that accommodate the media stock you
select for your printer. You can also select paper trays in different
orientations, whether letter or landscape. Some media sizes and types might
need to be fed into the printer manually.
Most printer outputs goes to an output bin on top of the printer, but there
might be an additional or alternate straight paper path through a drop-down
door, called a bypass tray, on the rear of the printer that you can use for
specialized media, such as transparencies.
Maintain an appropriate media stock on hand. Users can typically refill paper
trays themselves if the correct stock is available.
PostScript A printer driver used to render print jobs into the PostScript printer language
printer and provide device capability information to the user. It displays specific
description information about the printer itself, such as whether the printer is a color
(PPD) printer. It also contains options that can be modified by the user, such as paper
size, resolution, and print job information. PPD files can be used on Windows®,
Mac®, or LPD (Line Printer Daemon) clients.
Printer control A print driver protocol used to render print jobs into the PCL printer language
language (PCL) and transfer data from the central processing unit (CPU) to the printer. It has
become a standard used mostly by Hewlett-Packard printers. This protocol can
be found for laser, thermal, and dot matrix printers. Sometimes seen as Printer
Command Language.
Universal print UPDs are designed to support multiple printers and MFDs with one driver. The
driver (UPD) universal drivers may only be available for some printer brands. For example,
Hewlett-Packard developed a UPD that can support almost all Hewlett-Packard
printers and MFDs.
Raster/bitmap A universal driver type that supports raster/bitmap printing to most printers.
Plotter/vector Renders print jobs into specialized plotter language, for making large-scale
drawings based on X and Y coordinates.
390
are generally available on installation discs provided with the printer. Updated print drivers are
usually available for download from the printer manufacturer's website. However, in most cases, the
majority of print drivers will be available as part of the operating system.
Method Description
Wired With the increased use of USB and Ethernet cables over the years, parallel and
serial cables and ports are just about obsolete. Most wired printers and MFDs
found today will connect to devices using a USB port or are directly
connected to a network via an Ethernet cable.
Wireless Wireless printers offer many capabilities such as flexible printer locations.
Printers can be connected to a wireless network using:
• Bluetooth®
• 802.11x
• Infrared (IR) technology
Print server Print servers hold the print queue for a number of printers connected to the
same network. The server manages print jobs that come from client
computers or devices, and sends the jobs on to the desired printer. You may
also come across occasions when the print server is built into a printer, or is a
component of an appliance that also provides additional functions, such as a
firewall.
Operating system Printers can be shared with other devices on the network by assigning print
permissions that apply to local users and to users of a shared network printer.
Permissions can be allowed or denied within the operating system settings, but
if you deny a user the print permission, the user will have no access to the
printer. Available permissions include:
• The print permission, which enables you to print to the shared printer.
Assigned by default to Everyone.
• Manage this printer, which enables you to print to the printer and fully
administer the printer. Assigned by default to administrators and Power
Users.
391
Method Description
Once you do this, the Security tab will be available in the printer's property sheet.
Printer Description
Configuration
Option
Device calibration The printer manufacturer should provide documentation and tools for
calibrating device-specific settings on the physical print device. For example,
the cartridges on inkjet printers often require alignment after changing the
cartridge (this often happens automatically, or may be done manually through
the print driver interface). Or, you may need to calibrate the color overlays so
that the colors align properly and do not create shadows.
Tray assignments Each physical printer has different numbers and sizes of media and paper trays
that can accommodate different paper and media forms and weights. Once you
have installed the appropriate paper trays, you should verify that the
appropriate media form type is assigned to each tray. Configure form-to-tray
assignments on the Device Settings page of the printer's property sheet.
Tray switching If you have installed multiple trays that use the same media size and type, most
printers can use automatic tray switching to switch a job to a different tray
when the default tray is empty. See your printer's documentation for
information on configuring tray switching.
Print spool You can configure how an individual printer will spool print jobs. The printer
settings can print as soon as a page is spooled, or it can hold the job until the entire
document is spooled. You can also configure the printer to bypass spooling
and print directly to the device. Set spooler options on the Advanced tab of
the printer's property sheet.
Printer availability You can use the printer's availability schedule to postpone printing of long
documents or low-priority documents to off-hours or other convenient times.
Users can send jobs to the print queue at all times; the print server holds the
jobs until the available hours, and then produces the output. To configure
availability, open the properties of the printer and select the Advanced tab.
Select Available From and set the time range in the boxes.
392
Printer Description
Configuration
Option
Color The settings on the Color Management page control how Windows will
management select color settings for the printer based on the media type and printer
configuration.
Printer ports You can use the Ports tab to configure the printer to print to local parallel or
serial ports, or to a network port address.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Install, Configure, and Maintain Printers
393
ACTIVITY 12-2
Installing and Sharing a Local Printer
Scenario
You do not need a One of your clients has just asked you to install a refurbished printer that he purchased online. He
physical printer would like to use this printer on his Windows 7 computer as his default printer. He has also asked
connection to complete that you make the printer available to other users in the company. Even though your client has not
this activity. Students yet received the printer, he would like you to configure his computer so that all he will need to do is
can choose any printer plug in the printer when it arrives.
model from the list to
practice general
installation procedures
1. Start the Win7test## VM.
and work with a local
printer. Point out to a) Select Start→Windows Virtual PC→Win7test##.
students that newer b) Enter !Pass1234 to log onto Windows.
printers will often have
specific installation 2. Install the printer on the Win7test## VM.
instructions from the a) In the Win7test## window, select Start→Control Panel.
manufacturer.
b) Under Hardware and Sound, select View devices and printers.
c) Select Add a printer and then select Add a local printer.
d) From the Use an existing port drop-down list, select USB001 (Virtual printer port for USB), LPT1 or
LPT2, and then select Next.
e) On the Install the printer driver page, from the Manufacturer list, select a printer manufacturer.
f) From the Printers list, select a printer and select Next.
g) In the Printer name text box, type My Local Printer
h) Select Next.
i) Select Finish, and close the Devices and Printers window.
394
Summary
In this lesson, you supported printers. Because printers enable users to transfer digital information
to paper, they are among the most commonly used devices in almost every type of computing
environment. As an A+ certified professional, you can use the skills and knowledge from this lesson
when you are called upon to install, configure, or troubleshoot printers
Use the review
What types of printer have you had experience with in your current job role? questions provided to
A: Answers will vary, but may include laser printers, MFDs, and inkjet printers. generate discussion
among the participants.
In your experience, what printer maintenance tasks are you most familiar with?
A: Answers will vary, but may include replacing toner cartridges, cleaning inside and outside of printers,
printing a test page, and replacing paper.
Note: Check your LogicalCHOICE Course screen for opportunities to interact with your
classmates, peers, and the larger LogicalCHOICE online community about the topics covered in
this course or other topics you are interested in. From the Course screen you can also access
available resources for a more continuous learning experience.
Encourage students to
use the social
networking tools
provided on the
LogicalCHOICE Home
screen to follow up with
their peers after the
course is completed for
further discussion and
resources to support
continued learning.
395
396
11 Troubleshooting
Hardware Components
Lesson Time: 2 hours
Lesson Objectives
In this lesson, you will troubleshoot hardware components.
• Describe troubleshooting theory.
• Troubleshoot video and display devices.
• Troubleshoot hard drives and RAID arrays.
• Troubleshoot system hardware components.
• Troubleshoot laptops.
• Troubleshoot printers.
Lesson Introduction
In the previous lessons, you installed, configured, and maintained the hardware, software,
and other components that make up the computer system to ensure that they work
properly. But what happens when one of those components stops working or breaks? In
this lesson, you will troubleshoot hardware components.
Installing and configuring computer systems for an organization is an important task, as
more and more companies and even the general public become more tech savvy. But, the
increased use of technology inevitably invites problems: broken hardware, user accidents,
and natural wear and tear on resources. As an A+ technician, it is part of your
responsibilities to troubleshoot these issues as they arise within your organization.
This lesson covers all or part of the following CompTIA® A+® (2012) certification
objectives:
• Topic A:
• Exam 220–802: Objective 4.1
• Topic B:
• Exam 220–802: Objective 4.4
• Topic C:
397
• Exam 220–802: Objective 4.3
• Topic D:
• Exam 220–802: Objective 4.2
• Topic E:
• Exam 220–802: Objective 4.8
• Topic F:
• Exam 220–802: Objective 4.9
398
TOPIC A
Troubleshooting Theory
In this lesson, you will troubleshoot various hardware components used in computers and printers.
Before you can even begin to troubleshoot a physical problem with a piece of hardware, you need to
understand the basics of troubleshooting and some best practices used. In this topic, you will apply
troubleshooting theory.
The most elaborate toolkit and expensive diagnostic software can be useless if you do not have a
consistent plan of attack for solving problems. Even experienced technicians can sometimes
overlook obvious problems or solutions. Troubleshooting can be extremely challenging and not
always easy, but if you follow common best practices and basic troubleshooting procedures, you will
often be able to determine the specific cause of a problem, as well as possible solutions to the
problem.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 4.1: Given a scenario, explain the troubleshooting theory.
Troubleshooting Theory
A logical, methodical approach to troubleshooting usually leads to quicker solutions, so there are Troubleshooting Theory
certain general factors that will apply in any troubleshooting situation.
Let students know that
Factor Description recreating an issue can
be one of the most
Identify the Identify the issue or problem. Ask questions and try and extrapolate key useful tools used by
problem information that will help you identify any anomalies. experienced
troubleshooters.
Make sure to perform backups before making any changes. This will allow
you to restore any information that may be lost during the troubleshooting As you discuss the
factors in this table, ask
process. participants to share any
Use open-ended questions when working with users to help identify the issue experiences they have
behind the symptoms. For example, instead of asking if the user can start the with help desk
computer, try asking what happens when the user tries to start the computer. personnel, both as a
Use following questions to help identify the problem: user and as a
technician. Use the
• Were you able to complete this task before? If not, maybe the system is simply responses to generate
unable to perform the task without additional hardware or software. discussion about basic
• If you could do the task before, when did you notice there was an issue? If you can troubleshooting theory.
identify what happened immediately before the problem, then it could lead
you right to the issue.
• What types of changes have you noticed since the last time you completed this task? If
you cannot get a specific answer from the user, then you may need to
follow up with a few more targeted questions such as "Did something get
added to the computer?" or "Did you follow the exact same procedure or
did you do this task differently?"
• Were error messages displayed? If you can get the exact text of any error
messages displayed, you can try searching the manufacturer’s website (or
just a general Internet search) to get an explanation of the message and to
see if any problem reports have been logged related to this message.
Establish a theory Establish a theory. Verify anything that may seem too obvious. Make no
assumptions and check everything that may seem too simple and easy. Always
399
Factor Description
verify that components are plugged in, connected, and powered on.
Oftentimes, problems are the result of simple things.
• If applicable, try to re-create the issue so that you can experience it for
yourself and can see exactly what the results are. If you can, observe the
user as they complete the steps to verify that they are following the proper
procedures.
• Depending on the issue, develop a theory and determine how the problem
may be corrected. Use your personal experiences, refer to support
websites and online forums, and discuss theories with your colleagues to
build possible resolutions and how they may be implemented.
Test the theory Test the theory to determine the cause by testing related components;
inspecting connections, hardware and software configurations; and consulting
vendor documentation, to solve the problem or identify a likely solution.
Once the theory is confirmed, if the problem is not resolved, then determine
what the next steps will be. If the theory is not confirmed, then determine
what the next steps are to resolve the problem. In some cases, you may need
to escalate the issue to a designated party or individual.
Establish a plan Establish a plan of action to resolve the problem and implement the solution.
You may need to conduct further research and establish new ideas and
determine priorities. Research and planning may result in using a different
approach that may need detailed planning. You may also end up with more
than one plan depending on what the possible causes are, so prioritize and
execute each plan carefully. During this process, you need to make sure that
productivity does not suffer and that any downtime is limited.
Verify When the issue is resolved, verify full system functionality and, if applicable,
implement preventative measures. This part of the process may also involve
consulting with colleagues or vendors to communicate known issues,
solutions, and preventative measures. Preventative measures might include
applying system updates and installing antivirus software.
Once the issue has been resolved, make sure that the solution implemented is
actually working the way you intended and did not cause any additional or
new issues. Always make sure that the user or customer is completely satisfied
with the results.
Document Document your findings, actions, and outcomes. Documentation of
computer problems and their solutions can be a helpful part of the overall
documentation plan for your company’s computers. Not only will this
provide you with an ever-growing database of information specific to the
computers you are responsible for, it also will be valuable reference material
for use in future troubleshooting instances.
Troubleshooting Models
Troubleshooting models are used to support computing devices and networks. There are a number
of different models in use by technicians, so you may come across a variety of approaches over the
course of your professional career. Using a model, or standardized approach, can provide you with a
systematic way to tackle an issue or problem. While there is no surefire method that will work every
single time, since troubleshooting requires you to make intuitive guesses based on your own
experience and those of other professionals, using a model will help you break down each phase of
the process in order to identify causes and solutions in areas where you do not have the required
400
type of experience. Ultimately, the troubleshooting process that you use will probably be a mix of
more standardized models, plus your own processes and methods that you've used in the past.
Troubleshooting
Template Forms
401
TOPIC B
Troubleshoot Video and Display Devices
In the previous topic, you examined troubleshooting theory and general troubleshooting tips. Now,
you can start working with those theories and put those tips and tricks to work. In this topic, you
will troubleshoot common video and display devices issues.
It's simple: the display device is a user’s window into the computer system. Without a fully
functioning display, you will not be able to interact with the device. Its crucial to understand
common display issues and how they can be resolved so that users can get back to work quickly. It
is your job to respond quickly and be as timely as you can to resolve the issues and so users can
complete their tasks.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 4.4: Given a scenario, troubleshoot common video and display issues.
Dark screen A dark screen, or an indicator light that is not lit, can indicate general
power problems, such as the power is not turned on, the power cable is
disconnected, or the power is on but the display is plugged into a power
strip, surge protector, or uninterruptible power supply (UPS) that is not
turned on.
To correct the problem, turn on the power or power strip and reconnect
the cables and cords at both ends. If a circuit breaker has tripped, reset it.
Press or jiggle the power button on the monitor itself.
Dim image or no If there is no power light, check for and correct power problems.
image in screen
The data cable to the Video Graphics Array (VGA), Digital Video
Interface (DVI), High-Definition Multimedia Interface (HDMI), or display
port on the PC may be disconnected. Except on very old displays, you will
see an On Screen Display (OSD) message in this case, indicating a signal
problem. Connect or re-seat the cables and connectors. If the cable is
disconnected, and you do not see an OSD message, the display may be
bad.
Brightness or contrast may be adjusted improperly. Adjust the settings
using the display controls. (The OSD message is not affected by brightness
or contrast.)
The display may be in power saving mode. The power light will typically
change from green to solid or blinking orange. Press a key or move the
mouse to wake up the monitor.
Flickering or The display cable may need to be adjusted so that is it more securely
distortion connected to the video port. This might also imply that there are bent or
broken pins. Try to straighten any bent pins and re-connect the cable. Use
caution; a severely bent pin may break, in which case you will need to
replace the monitor. Sometimes the cable is removable, in which case you
can replace it.
402
Issue Possible Problems and Solutions
This could also be an incorrect display adapter used with incorrect device
drivers. If you can see the Power-On Self Test (POST), but the image goes
black when the system starts up, try booting the device into VGA Mode
and verify that the correct adapter and device drivers are being used.
The refresh rate may be too low or too high. The refresh rate should be set
to as high as the display and the adapter card can support. If the rate is set
too high, then you risk damaging the display.
If the display is placed in close proximity to other electronic or magnetic
equipment, then interference may cause damage. In this case, move the
equipment so that there is adequate space between devices.
Check the color depth setting on the display device. The settings may be
incorrect. If needed, make the necessary adjustments to the color depth
settings for the display.
Display turns itself In this case, power management may be enabled. You can adjust this in
off complementary metal oxide semiconductor (CMOS) settings or in the
operating system's display properties.
Another reason might be that the display's video card is overheating. You
can replace the card with one that has a better cooling system, or you can
install additional fans to cool the entire system.
Application problems If the screen goes blank, flickers, or acts erratically when a specific
application is active, the application may require different color depth or
screen resolution. Right-click in a free area on the desktop and choose
Screen Resolution. Adjust the settings on this page to suit the user's
requirements.
Defective pixels The pixels that make up a liquid crystal display (LCD) output sometimes to
do not display as they should. There are generally two types of pixels
issues:
• Dead pixels are pixels that do not display the light as expected. This is
shown visually when the LCD is displaying a picture, and there are
black spots shown with no light.
• Stuck pixels are pixels that only show light, so they appear out of place
when the display is on. Light colors can vary from red, to blue or green.
Fixing defective pixels can be difficult to repair. It is recommended that
you contact the display manufacturer to check for warranty information. If
the LCD unit is an older one, you can attempt to fix the pixels in a number
of different ways:
• Using pressure against the screen using the blunt end of an object.
• Using heat to apply pressure to the defective pixels. You must protect
yourself with gloves and protect the screen by placing a hot, wet cloth
within a plastic bag before placing it on the screen.
• Using defective pixel software utility, such as JScreenFix, Dead Pixel
Tester 2.20, and PixelRepairer.
Color issues If the color patterns are incorrect on the display, then you may need to
adjust the tint in the display settings. If you notice discoloration of the
display, then that could be a sign that you need to degauss the monitor.
Physical damage If there is noticeable physical damage to the display device or you know of
internal physical damage, you may not be able to repair it. In general, most
damaged display devices will need to be replaced rather than repaired.
403
Issue Possible Problems and Solutions
Video card issues There are a number of specific problems that can cause a number of
specific symptoms:
• Visual artifacts are errors or anomalies in the visual display of a picture.
• A Windows® system stop error (known as the Blue Screen of Death, or
BSOD) can be a indicator that there is an issue with your graphics card.
• Distortions, such as curves, waves, or other patterns show in the video
image.
Additional troubleshooting steps to take in the case of a video card issue
include:
• Check to make sure that the actual video card is seated correctly on the
motherboard.
• Always verify that you are running the latest drivers for the video card
and the chipsets on the motherboard.
• Check for interference with other devices within a close proximity. Try
removing devices that you suspect may be causing issues.
• Check to make sure you are not overclocking the system beyond the
capabilities of the card.
• Check the power supply and make sure that all connections are secure.
• Check to make sure that the fans are operating.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Troubleshoot Video and Display Devices
404
ACTIVITY 14-1
Troubleshooting Video and Display Devices Consider introducing
each issue on two or
three different systems,
and when students
Before You Begin begin the activity, ask
Your instructor might ask you to take a short break so that issues can be introduced into your them to observe different
computer systems. systems as they are
being repaired, if the
Scenario issue is not actually
introduced on their
Several users are having issues with their displays. You have been assigned to get to each systems. To engage
workstation and resolve the problems appropriately. remote participants,
demonstrate at least one
or two of the steps on a
1. The first user's LCD display is not coming on. The power light is not lit. The user has checked that the system.
display is plugged in and the display is connected to the system. Follow the appropriate actions to To create issue #1, you
resolve this issue. could loosen the power
a) Unplug the display from the electrical outlet and plug in a lamp or other device to verify that the cable on the back of the
display is plugged into a working outlet. If the device works, plug the display back into the outlet. If monitor, substitute a
the device does not work, contact an electrician to fix the outlet and plug the display into another dead monitor, or plug
outlet. the monitor into a power
b) If the outlet is on a UPS, surge protector, or power strip, verify that the unit is turned on. strip and then turn off
power to the strip. To
c) Verify that the connections of the power cord and display cable are secure on the display as well as
create issue #2, you
on the PC and electrical outlet.
could substitute a
d) Try to turn on the display again. monitor that makes
e) If the display still does not come on, replace the display with a known good monitor. crackling noises (caused
by dirty internal
2. When you arrive at the next user's workstation, you can hear that the display is making noises. components) or whines
a) Determine whether the noise is a crackling or whining noise. (which often happens
with inexpensive
b) If it is a crackling noise, clean the display and try to vacuum or blow dust out of the display vents. Do
monitors). To create
not open the display. If necessary, send it out for more in-depth cleaning.
issue #3, you could
c) If it is a whining noise, try the following to fix it: move the display or change the refresh rate. If it will substitute a monitor with
not stop whining, send it out for adjustment and replace the display with a quieter one. bent pins in the monitor
cable, loosen the
3. The next user's older CRT monitor is flickering and the display is distorted. monitor cable at one end
a) Verify that the monitor cable is firmly plugged into the monitor and to the computer. or the other, or turn on a
b) If available, press the Degauss button. fan, heater, or other
c) Check the monitor cable for any bent pins and straighten them, if necessary. monitor near the original
monitor. To create issue
d) Move the monitor away from florescent light, speakers, other monitors, or other electronic devices #4, you could turn the
with powerful motors. contrast and/or
brightness down, loosen
4. The next user's display power light is on, but there is no picture. or disconnect the
a) Verify that the display cable is connected to the display and to the PC. monitor cable at either
b) Adjust the contrast using the buttons on the display. end, or substitute a non-
c) Adjust the brightness using the buttons on the display. functioning monitor. To
create issue #5, you
d) If it still is not working, swap the display with one that you know works to determine if the problem is
could connect a monitor
with the display or the video card.
and configure the
display settings for high
5. At the last user's workstation, the LCD screen is blank with an error message that reads "Out of resolution, and then,
Frequency." without restarting
a) Restart Windows and select F8 before Windows is loaded. Windows, replace the
b) Start Windows in Safe Mode. monitor with one that
c) Display the pop-up menu for the desktop and select Personalize. has a narrower screen
width.
405
d) Select Display Settings.
e) In the Display Settings dialog box, change the resolution to the next lower resolution by dragging the
Resolution slider to the left.
f) Select Apply, select OK, and then close the Personalization window.
g) Restart Windows in normal mode.
h) If the error message "Out of Frequency" appears again, repeat the steps to change the resolution to
a lower resolution until the monitor is recognized by the operating system.
i) Once the monitor is recognized, the error message disappears. Configure the monitor resolution to
the original setting.
406
TOPIC C
Troubleshoot Hard Drives and RAID Arrays
In the previous topic, you examined troubleshooting for video and display devices. While input
devices like video and display devices are essential for the end user to be able to interact with the
system, hard drives and arrays are important components in the system as well. In this topic, you
will troubleshoot hard drives and Redundant Array of Independent Disks (RAID) arrays.
End users rely on the hard drive in their systems to store important system information and
personal or professional data and files. Without a hard drive that works properly, the computer
system is essentially worthless. As an A+ technician, you will likely be called upon to fix or
troubleshoot common problems with hard drives. In this topic, you will troubleshoot hard drives
and RAID arrays.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 4.3: Given a scenario, troubleshoot hard drives and RAID arrays with
appropriate tools.
Screwdriver In order to repair a faulty hard drive, you will need a screwdriver to remove
the drive from the drive bay within the computer case.
External enclosures External enclosures protect the hard drive by providing a strong barrier
typically made of plastic all the way around the disk. Most enclosures also
provide power to the drive through an external connection, typically
through a universal serial bus (USB) port.
CHKDSK This utility is also referred to as Check Disk. It is used to verify the logical
integrity of a file system. With the /f switch, chkdsk.exe can repair the file
system data. Enter chkdsk "drive letter" /f in the Run dialog box or
at the command line. With the /r switch, chkdsk can locate bad sectors on
the disk and recover any readable information. Entering chkdsk /?
displays a list of all available switches.
FORMAT The format utility can be used to format partitions to a selected file system.
You can run the format command right from the command line, or right-
click any drive letter in Windows® Explorer and choose the Format
option.
FDISK Use to create and manage partitions on a hard disk. You can run the fdisk
command at the command line to open the utility. The tool can be used to
not only create partitions, but to change, delete, and view current
partitions.
File recovery software File recovery software is used to recover deleted files from your computer
system. In many cases, files that have were moved to the recycle bin, then
emptied, can still be recovered. Some files may still live on the hard disk.
There are a number of free software programs that will provide recovery
functions:
407
Tool Description
• Recuva
• Glary Undelete
• Pandora Recovery
Failure to boot If you receive an error that says "Not Ready—System Halted" then the drive is
damaged, is not configured to be a master or Cable Select to suit the system, or a
data cable is not connected properly. You should check the drive for physical
damage and verify that the connections are properly attached to the drive.
POST error POST errors in the 17xx range could indicate a number of different issues
including:
• 1701: Drive not found
• 1702: Hard drive adapter not found
• 1703: Hard drive failure
• 1704: Hard drive or adapter failure
• 1780, 1790: Hard drive 0 failed
• 1781, 1791: Hard drive 1 failed
• 1782: Hard drive controller failed
You should check for damage to the connections and reconnect drive. You may
need to replace any component that has failed.
Drive not If your hard drive is not recognized by the system when it boots up, then verify
recognized that the system has been set to boot from the hard drive in the system Basic
Input/Output System (BIOS) settings in the boot priority list. You may also
need to verify that the correct drivers for the hard drive are installed.
Drive read/write The drive might have been infected with a virus. Run an antivirus utility to find
failure and remove any infections.
If you suspect that the drive is not writing and reading data properly, then it
could mean that there are bad sectors on the drive, the drive has failed, or the
drive has been infected by a virus. Sometimes, issues that seem to be device-
specific are actually virus infections that can cause physical damage as well, but
in most cases, the damage is limited to the data stored on the device.
Start by running CHKDSK to attempt to recover data from any damaged
sectors of the drive. Use Device Manager to resolve any resource conflicts and
indications of drive failure.
Computer will If the computer will not boot up, then it could be a sign that the drive is
not boot disconnected, is damaged, is not recognized by the system BIOS, or is not
configured properly by the system BIOS. Start by enabling the drive in the
CMOS setup utility and check the startup settings, then visually inspect the drive
for damage and reconnect it to the system.
Grinding noises If you hear grinding noises coming from the system, then it could be a sign that
the drive is physically damaged. If there is data that needs to be recovered, then
408
Hard Drive Possible Problems and Solutions
Symptom
power down the system immediately because powering the drive at all will make
the damage worse. Next, remove the damaged drive and send it to a suitable
recovery facility, where it will be rebuilt in a cleanroom, and the data can be
extracted.
Loud clicking Loud clicking noises can be a sign that the drive is trying to park the drive head
noises but cannot park the head. You can try turning off power management to the
drive. This will allow the drive to only park its head when the device is shut
down.
Possible data If you suspect that the data is corrupted, then the system may not have been
corruption shut down properly or the drive is either in the process of failing or has been
infected with a virus. In this case, all you can really do is educate users to be
aware of this and make sure that they are shutting the system down properly
every time. In the event that it may be a virus, run antivirus software to clean the
computer of all infected files.
Slow Slow hard drive performance can mean that the drive is too full or fragmented,
performance the controller is too slow, or the wrong cable type was used to connect the drive.
To resolve these issues:
• Delete all unneeded files.
• Defragment the drive.
• Verify and replace the hard drive cable, if necessary.
External drive External drives come with their own types of issues, including:
issues • The cable connecting the hard drive to the PC may be bad, so check it for
physical damage.
• The USB port may not be functioning, so try connecting to another USB
port and make sure the connection is successful.
• If the drive requires an external power supply, then supply an external power
source to the drive.
Removable drive Removable drives can be problematic if the jumper settings on the drive are not
issues configured properly, or the hard drive bay cable is not connected securely to the
system board. In some cases, issues can arise due to a power issue.
Start by verifying that the jumper settings are set to Cable Select. Then check
the connections of the hard drive and that the drive is seated properly within the
drive bay. Finally, make sure that the drive has power by verifying that the
power cable is connected securely to the bay and confirm that the keylock on
the drive is in the locked position.
OS not found An “Operating system not found” or “Missing Operating System” error can be
common after an operating system is either reinstalled or has been reconfigured.
In this case, the system BIOS does not detect the hard drive or the hard drive
may be damaged or has been corrupted.
Verify that the system BIOS settings are correct and that the hard disk is
recognized within the system, or replace the defective hard drive.
This may also be a symptom of a Master Boot Record (MBR) problem. The
MBR is specific to each operating system, so you will need to check the
manufacturer's documentation and website for possible solutions.
BSOD BSOD, or often referred to as the “Blue Screen of Death,” is a system stop error
that is severe enough to stop all processes and shut the system down without
409
Hard Drive Possible Problems and Solutions
Symptom
warning. BSOD errors can be a sign that the hard drive is damaged or is not
working properly.
RAID not found If RAID is not found when the computer boots up, it could be a sign
that either RAID is not configured within the system BIOS or that the
motherboard does not recognize RAID. You must verify that the
motherboard installed in the system does in fact support RAID. You
may want to refer to the manufacturer's documentation.
RAID stops working If RAID stops working suddenly, then that could mean that the
settings have changed within the system BIOS. If you have made
other configurations or replaced a component in the computer, then
those configurations may have conflicted with the RAID settings.
In the system BIOS, verify that the drive configuration is set to
RAID. Also check the motherboard documentation to see if RAID is
fully supported by the board installed in the computer.
If there is a non-system board RAID controller used, then check the
BIOS specific to the controller and verify that the settings are
properly configured.
Controller card Not all SATA controller cards are supported on all operating systems.
Check the vendor specifications for the operating system or software you
are using.
Controller driver SATA drives themselves do not require drivers, but the SATA controller
does. Ensure that you are using the latest version.
410
SATA Issue Description
Drive not detected If you install a fresh copy of your operating system and the SATA drive is
not detected, then restart the setup process and press F6 when prompted to
install the driver.
Drive size limitation If the SATA controller drivers are not loaded during the operating system
installation, then the drive will only report the 137 GB capacity supported
natively by the operating system.
Speed limitation 1.5 gigabytes per second (GBps) SATA cards do not always auto negotiate
with newer 3.0 GBps drives. Use jumper settings on the drive to limit the
transfer rate to 1.5 GBps.
Configuring single If you have one drive on a channel, depending on the manufacturer, it
drives might need to be configured as single—not master or slave. Alternatively,
set it to Cable Select and plug it into the PATA cable connector furthest
from the motherboard. Check your manufacturer's documentation for the
proper procedures and settings for your drive.
Configuring two drives With two drives on a channel, set both to Cable Select or configure them
both manually, setting one to master and the other to slave. Do not mix
these settings by setting one to be Cable Select and the other as either
master or slave. Make sure both are not set to master or slave.
Removing a drive If you remove the second PATA hard disk from a computer with two
drives installed, verify that the disk that remains in the computer is set as
single. The master/slave setting should be used only when there is more
than one hard disk in a system; otherwise, a disk-controller error will
occur when you restart the computer.
Moving to another If you need to move a PATA drive from one computer to another, you
system likely will not run into problems. However, especially if there is a great
difference in age between the computers, you might run into problems.
The BIOS of another computer might not support logical block
addressing (LBA) or Large (Extended CHS [ECHS]), or the computer
might not be set up for it. In that case, data on the hard drive would be
lost if you install it in that system. You can change the mode for a hard
drive (from LBA to Large, or vice versa), but this poses a risk of data loss.
Typically, you should set the mode only when you first install the disk. If
you do need to change it, make sure you have a working backup of all of
the data on the disk before doing so.
411
SCSI Issue Description
IDs and termination The vast majority (up to 95 percent) of problems with SCSI disks are
due to incorrect ID settings and improper termination. Verify that all
SCSI devices have unique SCSI ID numbers and are properly
terminated.
Resetting system When a SCSI system is booted or reset, SCSI controllers generally
need to renew all SCSI device connections before activating the
devices, causing a delay during POST.
Cables SCSI cables should be handled carefully to minimize problems. For
instance, rolling SCSI cable onto itself can cause crosstalk and impede
the signal. Running long lengths of it past power supplies can also
cause errors due to signal impedance.
SCSI BIOS If you intend for a SCSI disc to be bootable after you install it, you
must enable the SCSI BIOS by using jumper settings or software
configuration.
Connectors If you are installing an additional SCSI hard drive into a computer
where only one connector is available on the SCSI cable and the cable
itself is terminated, remove and replace the cable with one that has
multiple connectors.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Troubleshoot Hard Drives and RAID Arrays
412
ACTIVITY 14-2
Troubleshooting Hard Drive Problems
Scenario
In this activity, you will troubleshoot a number of different issues relating to hard drives.
For this activity, you will
need to dismiss students
1. Problem #1: Grinding Noises from the room so that
you can introduce the
A user has reported that there are grinding noises coming from her computer case. Once you take a issue in step 2 to all of
closer look, you suspect that it is the hard drive. What is the possible cause and solution to this type of their systems. To
issue? engage remote
○ The hard drive is physically damaged, probably due to a head crash, so the drive must be participants, consider
replaced. demonstrating on a
system.
○ A virus has attacked the hard drive, so use antivirus software to mitigate the issues.
○ Data is corrupt on the drive, and has not been shut down correctly.
To create this issue in
2. Problem #2: A Computer Won't Start A user has reported that her computer cannot boot and is getting Step 2, you could
an error message at POST. Diagnose and correct the issue. replace the drive with a
a) Perform a cold boot. non-functioning one,
b) Verify that BIOS lists the correct drive settings. loosen the cables on the
drive, or change the
c) Listen to the drive or touch the drive to determine if it is spinning during POST.
master or Cable Select
d) Using your multimeter, verify that power connection readings are +12 V for Pin 1 and +5 V for Pin 4. setting on multiple drives
Pins 2 and 3 should be grounded. so that they are all set
e) Verify that the data cable is correctly oriented. as slaves. If you
f) Check the drive settings: PATA should be: Master, slave, or Cable Select, or SCSI should be: introduce different
Termination and device ID causes to different
g) If nothing else corrects the problem, replace the drive. systems, you can have
participants observe as
each symptom is
3. Problem #3: A Second Hard Drive is Not Recognized
resolved.
You recently installed a second hard drive into a user's system. He is now reporting that the drive is not
showing up or is not recognized. You know that one of the things you forgot to check when you first
performed the installation is CMOS settings for the drive. What in particular do you need to check in
CMOS for this problem?
A: You need to verify that drive is enabled in CMOS and that the correct device settings for the hard
drive are listed.
Another thing you should check when a second hard drive is not recognized is that the drive was
installed correctly. What exactly should you be checking?
A: Verify that the power cable is connected to the drive, that the power cable voltages are correct,
and that the data cable is connected correctly to the drive and to the controller or host bus adapter
(HBA). For a PATA drive, verify that it is set to master, Cable Select, or slave, as appropriate to its
place in the drive chain. For a SCSI drive, verify that the termination and SCSI ID are set properly
for its place in the SCSI chain. For a SATA drive, restart the setup process and press F6 when
prompted to install the driver.
5. Problem #4: The Drive Letter for a Second Hard Drive is Not Accessible
A second hard drive was properly installed, but you cannot access it by its drive letter. What should be
your next step?
413
A: Use DOS or Windows disk utilities to verify that the drive has been properly partitioned and
formatted.
A user is encountering the following problem: Her computer boots fine and everything works until the
user tries to access data on the second hard drive, the D drive. The message "Can't Access This Drive"
is displayed when she tries to access the D drive. The user would also like an explanation about what
the error message means. List some of the steps you might take to resolve this problem.
A: You see the "Can't Access This Drive" message when you attempt to access a drive that is not
readable, or if the drive does not exist. Troubleshooting steps you should take include: determine
if the user actually has a D drive; attempt to copy a file from the D drive to C or from C to D; run
the Windows 7 error-checking option. Open Computer, display the pop-up menu for the drive you
want to check, and select Properties. On the Tools tab, in the Error-checking section, select
Check Now and then select Start to determine if there are errors; if none of the earlier steps fixed
the problem, verify that there is a recent backup and try reformatting the drive; and if the previous
step does not fix the problem, replace the drive.
When a user tries to access the hard drive containing his data, the system locks up and makes a
clicking sound. From the command prompt, he can change to drive D, but when he tries to access a file
or list the files on the drive, it locks up and begins clicking again. What steps might you take to attempt
to resolve this problem? What is the most likely cause of the problem?
A: You could try running the Windows 7 error-checking option in the Tools pane of the Local Disk
Properties dialog box. You could also try an older version of Scandisk from a removable disk to try
to identify and repair the errors it encounters. Definitely back up the data if you can get to any of it.
You can try using other software utilities to recover the data or take the drive to a data recovery
facility. You will probably need to replace the hard drive. The most likely cause of this problem is a
bad hard drive—some of the sectors on the hard drive are probably damaged.
A user reports that some of his folders have begun disappearing and some folder and file names are
scrambled with strange characters in their names. What steps might you take to attempt to resolve this
problem? What is the most likely cause of the problem?
A: You could try running the Windows 7 error-checking option in the Tools pane of the Local Disk
Properties dialog box. Definitely back up the data if you can get to any of it. You can try using
other software utilities to recover the data or take the drive to a data recovery facility. You will
probably need to replace the hard drive. You should also check the system for viruses because
the result of some infections looks like this problem. If it is not caused by a virus, the most likely
cause of this problem is a bad hard drive.
A user is questioning the difference between the sizes in GB and bytes. Why is there such a big
difference? The disk reports in some places as 9.33 GB and in others as 10,025,000,960 bytes. Why is
it not 10 GB?
A: Hard drive manufacturers usually round 1,024 bytes to 1,000 because it is easier to work with
round numbers. By the time you get up to billions of bytes, those extra 24 bytes really add up.
414
TOPIC D
Troubleshoot System Components
In the previous topics, you examined troubleshooting for some very important hardware
components in the computer system: the display device and the hard drive. Without these
components, the user would have no way of seeing what they are working on or saving the work
they are doing. Equally essential to the system are the hardware components that are vital to all user
interactions. In this topic, you will troubleshoot system hardware components.
It is only a matter of time before a personal computer's internal system hardware components
experience problems, and generally these are problems users themselves cannot fix. As an A+
technician, many of the service calls that you respond to will involve troubleshooting system
hardware components, and your ability to quickly and effectively diagnose and solve the problems
will be essential in maintaining the satisfaction level of the users you support.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 4.2: Given a scenario, troubleshoot common problems related to
motherboards, RAM, CPU, and power with appropriate tools.
Problem Description
Overheating and Most problems with CPUs can be attributed to overheating or outright
failure failure. The main solution to CPU problems is to replace the CPU. In
some cases, you may be able to add additional cooling units to prevent the
CPU from overheating and prevent further damage from occurring. Other
times, it may be possible to simply pro-actively optimize the existing
cooling system, such as by clearing dust from chips, heat sinks, and fans.
415
Problem Description
Slot and socket Before you replace a processor, you need to make sure you select a
compatibility processor that matches the type of socket on the system board. Most
sockets today use a pin grid array (PGA) that enables the chip to drop in
and ensures that Pin 1 on the processor is properly aligned with Pin 1 on
the socket. This method prevents you from bending the pins when
removing or inserting the processor. The chip fits easily into the socket
and does not need to be forced. Once the chip is in place, the retaining
clip is secured.
The land grid array is another type of socket that contains pins that
connect to pads located on the bottom of the processor package. When
examining CPU issues, confirming the socket type may help you to
identify any possible CPU connection issues.
Cooling system issues Because CPUs are prone to damage from overheating, you should always
consider the cooling system components when you are troubleshooting
CPU issues. For instance, if a user is experiencing intermittent problems
during operation, there could be inadequate airflow within the computer
chassis that can be corrected by providing space in front of the vents and
fans. Also, dust can often accumulate on the CPU's heatsink, and can
reduce the efficiency of the heatsink, possibly causing the CPU to
overheat.
When thermal problems cause a system to shut down or fail to boot, it
could be that the overall system cooling is inadequate, a cooling device has
failed, or the processor is overclocked, whether intentionally or not.
• If you suspect the cooling system is a problem, you can add more
cooling devices, upgrade to more efficient devices, or clean or replace
failed devices.
• If you suspect the CPU is overclocked, use BIOS or jumper settings to
reduce the CPU speed. If you have an advanced system BIOS, then
you may be able to see the actual CPU temperature readings.
Excess power Power consumption is a major factor for manufacturers when designing
consumption CPUs. When troubleshooting possible CPU issues, keep in mind that
because some CPUs operate at higher clock frequencies, they require more
power. If not properly cooled, this can result in the CPU overheating. In
this case, you may need to either reduce the clock frequency of the
processor using Power Management, or install additional cooling devices.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Troubleshoot CPU Problems
416
ACTIVITY 14-3
Troubleshooting CPU Issues
Scenario
You are attempting to resolve problems for a user who has been reporting intermittent but severe
system errors, such as frequent unexpected shutdowns. The problems have been getting more
frequent, and you have been unable to pinpoint a cause within the system software, power supply,
memory, or any adapter cards. You are starting to suspect that there is a bad CPU, and you need to
proceed accordingly to get the user back to work with as little downtime and cost as possible.
1. A user has reported intermittent but severe system errors, such as frequent unexpected shutdowns. The
problems have been getting more frequent, and you have been unable to pinpoint a cause within the
system software, power supply, memory, or any adapter cards. You are starting to suspect that there is
a bad CPU, and you need to proceed accordingly to get the user back to work with as little downtime
and cost as possible.
What initial steps should you take to identify and resolve a potential CPU problem?
☐ Replace the CPU with a known-good processor.
☐ Verify that the CPU fan and other cooling systems are installed and functional.
☐ Replace the motherboard.
☐ If the CPU is overclocked, throttle it down to the manufacturer-rated clock speed.
2. All other diagnostic and corrective steps have failed. You need to verify that it is the CPU itself that is
defective. What should you do?
○ Replace the CPU with a known-good chip.
○ Remove all the adapter cards.
○ Reinstall the operating system.
○ Replace the motherboard.
Dust buildup Over time, dust will build up on components inside the computer. Dust can
act as a thermal insulator once it has gathered on a system's heat sinks and
fans. In this case, the dust can act as an insulator and keep heat from escaping
from the components, and can inhibit proper airflow within the system. As a
result, system components will not perform to capacity and can burn out
quicker than expected. Make sure to keep system components clean and free
of dust.
Poor airflow When system components are not properly placed inside the computer's case,
the result can be reduced airflow within the system. This can happen when
system board components are placed too close together and create too much
heat. Another cause for concern is when there is more than one fan used in
the cooling system. Both of these examples can create irregular airflow and can
417
Issue Solution
also create small pockets of hot air inside the case. Always check the
manufacturer information for your system before adding additional
components including core cooling devices such as CPUs and case fans.
Poor heat transfer Thermal compounds are used to aid in the cooling of computer devices.
Thermal compounds are often used in conjunction with a heat sink to
maximize the cooling effect. In cases when the thermal compound is not
applied properly, heat transfer may not be effective and can result in heat
damage to the components instead of the heat being properly dissipated.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Troubleshoot Cooling System Issues
418
Preventing System Board Problems
When you have to touch the system board, you can prevent damage by handling it with care. When
you install components into the system board, be sure not to bend or break any of the pins. This
includes the pins on the cards as well as the system board. Also, the system board can crack if you
push down too hard on the board itself or the expansion cards. When you secure the system board
to the case, be sure not to overtighten the screws as this could also crack or damage the system
board. ESD damage from handling or from electrical surges such as lightening strikes can ruin the
system board electronics. Be sure to use proper surge protection as well as ESD-prevention
techniques to help prevent such problems.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Troubleshoot Motherboard Problems
419
ACTIVITY 14-4
Troubleshooting Motherboards
Scenario
Several trouble tickets related to motherboards have been assigned to you.
1. Problem #1 When the user turns on the computer, he sees a message stating that the computer's date
and time are incorrect. He must reset this information in the computer's BIOS each time he starts the
computer.
2. Problem #2 When the user turns on the PC, it does not always come on and sometimes it just shuts
itself down abruptly, with no warning. When she turns on the system again, there is no fan noise. Her
data is becoming corrupted from the frequent reboots.
3. Problem #3 One of the other hardware technicians has been trying to troubleshoot a power problem.
The computer periodically and randomly reboots. The other technician has determined that the user has
an ATX motherboard and power supply. You have been assigned to take over this trouble ticket.
Computer crashes, • ESD, overheating, or other power-related problems that can affect
system lockups, and memory.
unexpected shutdowns. • Registry writing to bad memory, General Protection Faults (GPFs),
and exception errors caused by software and operating system.
Memory errors appear on • Memory address errors at boot time.
screen. • Applications that require large amounts of memory or that do not
properly release memory.
420
Symptom Possible Causes
Blank screen on bootup • Memory is not correct for the system. For instance, the computer is
expecting memory that uses error checking and you installed non-
parity memory.
• Memory module is not fully inserted into the slot.
Computer does not boot. • CPU cannot communicate with memory due to the memory being
POST beep codes sound. improperly installed or the BIOS not recognizing the memory. Beep
codes are specific to the BIOS manufacturer and the ones for
memory can be found in the manufacturer's beep codes list.
• For additional information on specific beep codes visit
www.computerhope.com/beep.htm.
Some or all newly • You exceeded the maximum amount of RAM that can be addressed
installed RAM is not by the system. Even though the slots can accept Dual In-line
recognized. Memory Modules (DIMMs) containing more memory, the system
can only recognize a certain amount of memory on most systems.
• The wrong memory type was installed.
• The memory was not installed in the proper sequence.
• You might need to leave empty slots between multiple modules, or
you might need to install modules containing more memory in
lower-numbered slots than smaller modules.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Troubleshoot RAM Problems
421
ACTIVITY 14-5
Troubleshooting RAM Issues
Scenario
You have been assigned some trouble tickets that deal with memory issues.
1. Problem #1 The user is experiencing corrupted data in his database application. The hard drive has
been checked and no problems were found with it. The application was reinstalled and the database
was re-indexed and all data problems have been corrected. No other users are experiencing this
problem when they enter data. He has been successfully entering data until just recently.
After troubleshooting this trouble ticket, you have discovered symptoms of a memory problem. What
factors could cause sudden memory problems in this situation?
☐ New virus
☐ Power loss
☐ New memory not compatible
☐ Power surge
2. Problem #2 Additional memory was installed in a user's system, and now it will not boot.
3. Problem #3 The user is complaining of application crashes. He is fine if he is running only his email and
word processing programs. If he also opens his graphics program at the same time, then the
applications are crashing.
Why is the user experiencing the problem only when additional applications are opened?
○ There is not enough memory in the system.
○ Memory errors are occurring in one of the higher memory modules.
○ The memory modules are incompatible with one another.
Line noise Line noise occurs when there is a fluctuation in the electrical current. Causes
include:
• Electromagnetic interference (EMI)
• Radio frequency interference (RFI)
• Lightning
• Defective power supply.
422
Power Problem Possible Causes
Power sag A power sag is when the power level drops suddenly below expected power
levels. Causes include;
• Many electrical systems starting up at once.
• Switching loads at the electric company utility.
• Electric company equipment failure.
• Inadequate power source.
Power undervoltage This symptom can last from several minutes to several days and can be
or brownout caused by any of the following:
• Decreased line voltage.
• Demand exceeds power company supply.
• Utility company reduced voltage to conserve energy.
A variation on this is switching transient or instantaneous undervoltage that
lasts only a matter of nanoseconds.
Frequency variation Usually occurs when using a small power generator. As loads increase or
decrease, the power frequency varies. Generators are not recommended for
supplying direct power to computers and other sensitive equipment. The
variance in frequency (square wave instead of sinusoidal wave) and the
instability of the voltage will cause severe instability in computers, leading
to crashes, data loss, and possible equipment damage. Using a power
conditioner or an inverter with a generator will prevent these issues by
stabilizing the voltage and frequency.
Overvoltage Overvoltage occurs when power levels exceed acceptable levels.
• Suddenly reduced loads.
• Equipment with heavy power consumption is turned off.
• Power company switches loads between equipment.
• Lightning strikes.
Power failure • Lightning strikes.
• Electrical power lines down.
• Overload of electrical power needs.
Note:
POST error codes from 020 and 029 are related to the power supply.
Fan will not work The fan and openings around the power supply bring in air to cool system
components, but they also allow dirt and dust to gather around the power
supply. This can cause the fan bearings to wear and the fan to turn more
slowly. You can use compressed air to remove this debris from the
system. If the fan becomes damaged due to dust, replace the power supply
or have qualified personnel replace the fan.
No power If the computer will not boot, then the first thing to check is that the
power supply cable is securely connected at the supply and at the power
423
Symptom Possible Causes and Solutions
source. Check to make sure there is power coming from the outlet or
power strip. If the connection is secure, then you will need to open the
computer case and verify that the motherboard status indicator light is on.
The status indicator light is shown when the power is sufficiently supplied
to the board. If the light is not on, then you should check the physical
power connection from the board to the power supply.
Fans spin but no This symptom is a sure sign of a power connection issue. Check all
power to other devices connections from the power supply to the internal components. Verify
that the motherboard is properly connected to the power supply. Look for
the indicator light on the motherboard to confirm the connection is
successful and there is power supplied to the board.
Computer will not • If the computer does not start at all, make sure that there is power to
start or reboots after the outlet. You can check by plugging in a lamp or other device that
startup you know works. If that does not turn on, you know that you have a
bad outlet and not necessarily a bad power supply.
• Check that the connections from the power supply to the system
board are secure, especially on ATX systems. Make sure the master
switch to the power supply, at the rear of the system, is on before
pressing the computer's power button. Also on ATX systems, check
the voltage of the power being supplied using a multimeter.
• A loose power supply drive connector landing on exposed metal can
short-circuit the power supply. The power supply can detect this
problem and disable itself. If you fix the short (by putting the power
cable onto the drive correctly), the power supply should start working
again. Unused drive connectors should be either covered (some
technicians bring rubber end caps) or tie-wrapped to a safe location
(not too tight to avoid damaging the wire). Also check for loose screws
or foreign metallic objects that can cause shorts.
• Check power supply output voltages with a digital multimeter to verify
that the necessary voltages are being provided to the board. This will
not measure voltage under load, but will allow you to determine
whether the output is within the correct range. Most motherboards
also provide a voltage reading within the BIOS. If the system boots,
access this BIOS option to obtain readings as detected by the
motherboard.
An odor or burning An odor coming from the power supply can be the first sign that there is
smell is coming from something wrong. Start by visually inspecting the system and looking for
the power supply. any damaged parts or cables.
To verify the smell is in fact coming from the power supply, you may
need to remove some of the system components. This may include hard
drives, the CD-ROM drive, or a DVD burner. Reboot the system from an
external drive, and check for the smell once again.
Once you confirm that the odor is indeed coming from the power supply,
contact the manufacturer first. Some newer systems may have a smell
initially, but will eventually fade away. However, in other cases, an odor
can be a sign that the power supply is failing, the fan is damaged, or there
is a problem with the electricity source going to the system.
Smoke coming from Smoke coming from the computer can be a sign that there is something
computer. seriously wrong with the power supply. Typically, the only component
that can generate smoke is a failing power supply. When the wrong power
supply is installed in a computer, it can cause issues with not only the
424
Symptom Possible Causes and Solutions
supply itself, but it can literally fry the motherboard and connected
components. If you see smoke, in most cases you will need to replace the
power supply, and possibly the motherboard if there are any other
damaged components.
Loud noise is coming Other components, especially drives, also can sometimes make a lot of
from the power noise. Make sure this is not where the noise is coming from.
supply.
A loud whine or squeal from the power supply area is usually from the
fan. A damaged fan with worn bearings will cause a grinding whine that
worsens with time. Sometimes, when the bearings begin to fail, the fan
blade assembly will shift, rubbing against the fan grill or the case, and
produce a high-pitched noise. Also possible, after cleaning with
compressed air, a wire inside the power supply unit could be shifted by
the forced air and end up touching the fan, causing the very loud grinding
noise, possibly stopping the fan altogether. With the power supply off,
you can attempt to carefully shift the wire away from the fan by using a
plastic tool (metal is not recommended so as to avoid damaging any
components).
If the noise is not from the fan, but from another power supply
component, replace the power supply or take it out and send it for service.
Wattages and capacity You should always verify how much power each system component
requires, before installing or replacing a power supply. If you are having
issues with a power supply, then verify that the system component usage
does not exceed the power supply's capacity. Ideally, you want a power
supply that provides more, but not much more, power than the
components require. Use proper power calculations to determine the
power requirements of the system.
Connector types Consider the power supply's connection type when replacing the unit. You
must verify that the connection type on the system board matches the
connection interface on the power supply unit. Also, verify that there are
enough of each type of drive connector for the type and number of drives
the system will be using.
Output voltage The output voltage in a power supply is controlled by a feedback circuit
inside the unit. Verify that the output voltages are within the range of
what is expected.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Troubleshoot Power Supplies
425
ACTIVITY 14-6
Troubleshooting Power Supplies
Scenario
You have been assigned a number of power problems to solve.
1. Problem #1 When the user turns on the PC, it does not always come on and sometimes it just shuts
itself down abruptly, with no warning. When she turns on the system again, there is no fan noise. She is
using a legacy database application and the data is being corrupted during the improper shutdowns.
2. Problem #2 A user is reporting an odor coming out of his computer. You have serviced this machine
recently and replaced the computer's power supply unit.
If you have power supply 3. Problem #3 One of the other hardware technicians has been trying to troubleshoot a power problem.
testers available, you The system will not come on when the user turns on the power switch. He determined that the user has
can have students use an ATX motherboard and power supply. You have been assigned to take over this trouble ticket.
them instead of a) Set the multimeter for DC volts over 12 V.
multimeters. You will b) Locate an available internal power supply connector. If none are free, power off the system and
need to lead them unplug it, then remove one from a CD drive, and then power on the system again.
through the testing
c) Insert the black probe from the multimeter into one of the two center holes on the internal power
process.
supply connector.
d) Insert the red probe from the multimeter into the hole for the red wire.
e) Verify that the multimeter reading is +5 V DC.
f) Move the red probe into the hole for the yellow wire.
g) Verify that the multimeter reading is +12 V DC.
h) Check the documentation for the ATX motherboard to see if there is a logic circuit switch that signals
power to be turned on or off, that it is properly connected, and how it should be set.
i) Verify that the motherboard, processor, memory, and video card are all correctly installed and
working.
4. Problem #4 The user turns on the power switch, but the system does not come on. He does not hear
the fan, there is no power light on, and he hears no beeps or other sounds coming from the system. His
system is plugged into a surge protector.
426
protector, or check the electric outlet's circuit breaker. Restart the computer. If these actions did
not solve the problem, you would need to replace the power supply.
427
TOPIC E
Troubleshoot Laptops
In the previous topics, you focused on troubleshooting issues that may arise with a typical personal
computer environment. While the PC is still often deployed in many organizations, more often than
not, users are now working on laptops or other mobile devices. In this topic, you will troubleshoot
laptops.
Installing and configuring portable devices is only the first step in your responsibilities as a
computer support technician. You will also need to provide the ongoing maintenance for these
devices, as well as to diagnose and resolve any problems that might occur with them during use. The
information and skills in this topic should prepare you to assist users in proper maintenance of
portable systems, as well as to efficiently and correctly resolve problems with these systems.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 4.8: Given a scenario, troubleshoot and repair common laptop issues
while adhering to the appropriate procedures.
Issue Techniques
Cooling systems Because laptops do not have the air circulation that desktop PCs do, it is
important to keep the device air ducts clean. Dust trapped in cooling
passages acts as an insulator and can prevent proper cooling, possibly
resulting in overheating. Excessive heat should be avoided in such devices as
it can shorten the life of components. In servicing laptops, it is a good
practice to regularly blow dust from the cooling passages using compressed
air or vacuum it with an electronics vacuum. When using the compressed air
to clean the inside of the laptop, you must be extremely cautious of the
internal components. It is easy to damage other components inside the
laptop while cleaning.
The bottom surface of the laptop gets quite hot when improperly ventilated.
This can easily happen when laptops are put on soft surfaces (i.e., tables with
coverings such as table cloths), on people's laps, or in places where there is
not enough room between the vents and a wall. Sometimes people will get
careless and unwittingly cover the vents with books, mouse pads, etc.
Batteries Properly caring for the battery in a laptop not only prolongs battery life, but
also diminishes health and safety concerns. Using an incorrect battery
charging cable or exposing a battery to harsh environmental conditions, such
as extreme heat, can result in an explosion. Some simple guidelines for
acceptable battery maintenance include:
• Follow manufacturer instructions on the proper charging and discharging
of the battery.
• Use the battery charger provided by the manufacturer or an approved
replacement charger.
• Never expose the battery to fire or water.
• Do not drop, throw, or jolt the battery.
• Only use the recommended battery for your device.
428
Issue Techniques
High temperature Exposure to high temperatures can cause expansion within portable
computing devices and compromise circuitry. High temperature can also
lead to the failure of cooling systems to maintain adequate operating
temperatures, leading to the overheating and failure of internal
components such as the processor, video processor, and hard drive.
Rapid change in Rapid changes in temperature, such as those seen when transporting a
temperature device from one climate to another, could result in condensation within
the device. Devices should be allowed to come to room temperature
before being powered on after a temperature change.
High humidity Avoid operating in high humidity as condensation within the device may
occur and promote corrosion. All manufacturers specify operating
humidity levels. It is important to follow manufacturer operating
procedures/guidelines at all times. Most systems can operate at high
humidity without a problem, as long as there is no condensation (5 to 95
percent relative humidity, non-condensing).
Low humidity Be extra cautious as ESD is more likely to occur in low-humidity
environments ranging anywhere from 10% - 35%.
RFI Erratic errors may occur with laptops when exposed to radio-frequency
interference (RFI). Radio towers, two-way radios, and even cordless
telephones and microwaves have been linked to RFI.
Moving the device further from such sources will help in resolving
interference issues. Properly shielded cables for peripherals will also
minimize the effects of RFI.
429
Symptom Description
430
Symptom Description
• Try to keep the bottom of the laptop ventilated. (For example, do not rest a
laptop on a pillow in your lap.)
• Be aware of the fan in the laptop. If you hear it running very fast on a
regular basis, take steps to minimize heat in the laptop.
Laptop is not This can be an indication that the battery contacts are dirty. You can clean them
working properly by using alcohol preps or even just a dry cloth.
when on battery
power
No power when The power cord or AC adapter might have failed, the outlet to which you are
connected to AC attempting to connect the laptop is bad, or the power supply in the laptop has
power failed. Start by checking the power outlet and plugging in a known good
electrical device and verifying whether you can turn it on. If the problem
persists, then try using a known good power cord and then an AC adapter to
determine if either is the source of the problem. You might also test both AC
and DC power by using a multimeter.
Ghost cursor Laptops commonly have touch pads or pointing sticks. Touch pads can suffer
from dirt and hand grease contamination that can make the touch pad behave
erratically; make sure to clean with alcohol preps. Pointing stick heads can wear
out and become slippery, making them very difficult to use; order replacements
from the manufacturer or vendor. In some laptop models, you can actually
recalibrate the touch pad to try and fix the issue.
A ghost cursor is a cursor that jumps around on the screen randomly, or moves
too slow, or opens windows and menus on its own. Causes of this problem
include a corrupt driver, driver incompatibilities after an upgrade to a newer
operating system, and a hardware failure. Steps to take to resolve this problem
include reinstalling or upgrading the driver. If this does not resolve the
problem, many portable devices allow users to connect an external mouse as a
substitute for the touch pad or other integrated pointing devices.
Nonstandard key Due to size constraints, laptop manufacturers often rearrange function keys
placement to make them all fit.
Function keys Some keys on a standard desktop keyboard would not fit on a laptop and
have instead been added as function keys. Several keys on a laptop keypad
are shared. For an explanation of key functions, consult the device manual.
Numeric keypad Laptop computers do not have the numeric keypad like desktop keyboards.
Instead, many manufacturers place numbers on letter keys to be used when
NumLock is on. NumLock indicator lights are displayed on the laptop to
indicate that the NumLock function has been turned on.
Sticking keys On occasion, a key will remain in the depressed position due to debris
buildup or a malfunction in the mechanism. These issues can often be
resolved by removing the key, cleaning it, and replacing the key. Methods for
removing keys vary from model to model. Removing a key on a laptop
keyboard can be a risky proposition. They are typically not the type of key
where the key cap is in a peg, which you find on full-sized keyboards. Laptop
431
Issue Description
keys are usually floating on a dual-hinge mechanism, usually plastic, that will
easily break if you attempt to remove it forcefully. Refer to the
manufacturer's instructions when attempting to fix a key on the keyboard.
Keyboard too small The strain of typing on a small or non-ergonomic keyboard may bother
some users.
Issue Description
Intermittent Several factors could play a part in poor or intermittent wireless reception,
wireless including low battery, radio interference, and signal barriers such as masonry
connectivity walls or floors. Anything metal can also block signal, such as large metal file
cabinets and metal-clad fire doors, things many people forget to consider
when determining the best location of wireless access points in an office. If
there is an external antenna, check to be sure the antenna is fully extended,
properly connected, and is not damaged. In some cases, if the wireless card is
installed independently from the system board, then you can upgrade the
wireless card to improve connectivity.
No Bluetooth There are a number of issues that can cause Bluetooth connectivity problems:
connectivity • The drivers might need to be updated.
• The devices have not been set to "discoverable" mode. For security
purposes, only enable discovery mode on your laptop when want a
Bluetooth device to find your laptop; otherwise, keep that setting
disabled.
• The Bluetooth settings must be configured to allow devices to connect to
the laptop. This is also referred to as pairing.
No wireless Some portable computing devices allow the user to turn off the wireless
connectivity receiver switch, which would result in no reception. Or, the user might
simply be out of range of the wireless access point. You may also need to
enter the appropriate security key for the wireless access point.
This issue might also be the result of damage or a failure in the wireless
device or the embedded antenna on the wireless network card. Some cards
might have a flip-up antenna that might be damaged through improper
handling. If the card or antenna is damaged, you would typically replace the
wireless card.
432
It's also important to check a manufacturer's warranty restrictions before you service a laptop and its
components. In some cases, you can actually break the warranty if you crack open the case.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Troubleshoot Laptops
433
ACTIVITY 14-7
Troubleshooting Laptop Issues
Scenario
In this activity, you will troubleshoot common laptop issues and provide a solution to fix the issues.
1. You received a user complaint about a laptop being extremely hot to the touch. What actions should
you take in response to this issue?
A: Overheating can be a sign that dust and dirt is restricting the necessary airflow within the device,
so start by cleaning the ventilation duct with compressed air and then make sure that the device is
getting proper air circulation around the outside of the case.
2. Which components are typically soldered to a laptop motherboard and cannot be replaced without
replacing the entire board?
A: Typically, the processor, the AC port, and USB ports are attached directly on the board and cannot
be replaced without replacing the whole laptop motherboard.
434
TOPIC F
Troubleshoot Printers
In the previous topics, you employed troubleshooting tools and techniques for hardware
components within the computer system itself. There are other peripheral devices that users may
frequently use with their computer systems, like printers, that will experience problems or
malfunctions that require your assistance. In this topic, you will troubleshoot printers.
As a support professional, you are well aware that one of the most unpleasant problems for users is
being unable to print. If users need hard copies of documents and the systems do not work, it can
be very frustrating. Users will look to you to identify and resolve their problems quickly, so you will
need to perform proper maintenance to prevent problems, to recognize common issues, and to
correct them efficiently when they occur.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 4.9: Given a scenario, troubleshoot printers with appropriate tools.
Tool Description
Maintenance kit Printer maintenance kits for laser printers are made up of printer components
that get worn out with regular everyday use. Most printers are designed to
notify users when they have reached their predetermined page count and
maintenance schedule. Usually, the printer will display a message such as
"Perform Printer Maintenance." This means that the printer manufacturer
recommends installing a printer maintenance kit at this time. Once the kit is
installed, you must reset the page count on the printer to keep an accurate
schedule for maintenance.
Common components included in the kit are:
• Transfer rollers and pickup rollers
• Corona assembly
• Fan assembly
• Fuser assembly
• Cloths and gloves for handling printer components
Toner vacuum When you suspect that the printer needs to be cleaned due to toner build up
within the printer, then make sure to use a toner vacuum. Toner vacuums are
specifically designed to clean up toner within a printer. The vacuum is able to
reserve the particles within the tool so that it is not dispersed back into the air.
Never use a conventional vacuum to clean up toner because the particles are
so small that there is risk of them getting blown back into the air surrounding
the printer. This can be harmful to your health.
Compressed air Compressed air is sometimes used to clean out the dust and debris from
inside the printer. Refer to your manufacturer's documentation for any
guidelines on using compressed air to clean the printer. Some manufacturers
advise against using the air, because it can actually cause moisture build up
within the printer.
435
Tool Description
Extension magnet A telescoping wand with a magnet attached to the end is used to pick up
screws or other metal pieces that may fall into the printer or scanner. For
inkjet printers and dot matrix printers, it can come in handy to retrieve paper
clips people have dropped into the paper-feed mechanism. But for laser
printers, reaching inside the printer can be hazardous. If you need to reach
inside a laser printer, take extreme caution as there are fragile components
and high-voltage electronics inside laser printers.
Troubleshooting Description
Resource
Test patterns Depending upon your printer, you might be able to run test patterns to
check the clarity and print quality of your printer. It allows you to
determine what settings need to be adjusted or what ink colors need to be
refilled. Test patterns are either built in or external to the printer and are
used to test for calibration and alignment of the printhead and to check
the color/grayscale tone.
Printer spooler The printer spooler can be a useful tool when determining where a print
job is faulting. If the job is getting through the spooler then it may indicate
a hardware issue, but if its not, then it could be a issue with the application
that the job was sent from or a connection issue.
Power cycling Power cycling a device refers to turning the device off and letting it rest
for 10 to 30 seconds before powering it back up. This can give the printer
some time to clear the memory and start up again.
General diagnostic Many printers come with other self-diagnostic programs that can resolve
utilities basic hardware issues. Refer to the printer's manual on the specific steps
required to perform the diagnostics.
Windows and other operating systems often provide help for
troubleshooting general problems as well as for problems specific to that
system. In particular, Windows 7, Windows® Vista, and Windows XP® all
provide troubleshooters that can walk you through the diagnosis and
resolution of common printer problems or problems with other devices.
In Windows 7, common printer problems can be resolved by displaying
the pop-up menu from the Printer icon and selecting Troubleshoot.
There are other generic utilities you can use, such as capturing a printer
with the net use command, or redirecting output to a printer with the
prn command.
Device documentation For device-specific problems, consult the documentation that came with
your printer or scanner.
Manufacturers' Most device manufacturers will maintain technical information on their
websites websites that can help with printer troubleshooting and ongoing
maintenance. You can also download updated printer or scanner drivers or
diagnostic software tools from the manufacturer, or use web-based utilities
to help you diagnose the problem.
436
Troubleshooting Description
Resource
Software vendors' Microsoft and other operating system vendors maintain libraries of
websites technical information on their websites that can help with troubleshooting
known problems with specific devices, or general issues related to the
printing function in the specific operating system.
Error codes and Review any error messages at the printer and at the computer. This might
reports involve checking computer event logs. Some printers may have an out of
memory error displayed when the printer memory is beyond capacity.
Service logs and Check prior service records for the system to try to identify recurring
reports problems. Check for previous user reports of similar issues to see how the
issues were resolved.
Troubleshooting As with all troubleshooting, follow a structured process:
principles • Gather information and identify the symptoms.
• Review the data and establish a possible cause.
• Identify and test a solution.
Backed up print There are a number of issues that can a print queue to printer transfer
queue or printer problem:
will not print • If you suspect that the printer is out of toner, ink, or paper, then add what
is necessary. Verify the printer's status and press the Test button on the
printer.
• If you suspect that there is a paper jam, or the printer is displaying an error
code indicating a paper jam, then clear the jam. If the paper jams are
frequent, then the printer may need to be serviced to clean or replace old or
worn components such as rollers.
• In Windows, there are a number of settings that will cause issues. The
printer may be paused. In this case right-click on the printer and disable the
pause printing option. The print spooler service may be stalled, so stop and
start the service. Or, the Use Printer Offline option has been enabled.
• If the printer has been configured to be available on a specified schedule,
then you may need to verify and adjust the availability schedule.
• An incompatible print driver will prevent sending print jobs to the printer.
You may need to delete the driver and reinstall the updated one using the
manufacturer's installation instructions, if available.
Printer does not If the print out is not showing the output you expect, then this could be a page
print the way the setup, printer property, or settings issue. You should verify that the page setup
user expects it to options and the printer properties are configured correctly. If you have
confirmed the settings for the printer and the application you are printing
from, then you may need to use a maintenance kit or a driver software update
to fix the issues.
437
Symptom Possible Problems and Solutions
If the printout is streaking, this could be a sign that the printhead needs to be
cleaned.
Print quality There are a number of different print quality issues that indicate the printer
issues problems:
• Streaks may indicate that the printer head needs to be cleaned due to
clogged head openings.
• Faded prints can be an indication of a bad toner cartridge. If you are using
the re-manufactured cartridges, then you may need to try a new one. If that
does not fix the issue, then there may be an issue with the fuser.
• Vertical lines are a symptom of inkjet printheads being out of alignment.
This can also be a sign that the printing ribbon needs to be replaced.
• Color prints in the wrong color. Use the advanced printer settings to verify
that the color settings are correct. You may need to select a different output
option, such as the print quality.
Access denied When users cannot access a network printer, then there is a possibility that
there is no connectivity. Either the printer or the user has lost a connection to
the network. In this case, you can verify which device needs to be reconnected
and make necessary changes. If the connections are functional, then check the
printer or print server status and restart, if necessary. Also verify that the IP
address assigned to the printer is correct. Finally, you can check the printer's
power cycle to make sure it is coming online once it has been powered up.
Garbled When a printer outputs garbled or ghosted images, there is something wrong
characters on with the printer. These symptoms can mean a number of different things:
paper, or is • The printer is low on memory. Check to see if you can install additional
showing ghosted memory.
images
• The resolution needs to be adjusted in the printer settings.
• The driver is incompatible, so update or replace the driver.
• The cabling may be damaged or not fully connected so check all cables to
make sure they are secure and in tact.
• In laser printers, this can be a sign that the drum is not being completely
erased. You should contact the manufacturer or check the website for
additional information and troubleshooting steps.
Print jobs never General network problems. Check the network status of the client, printer, and
appear in print print server.
queue
Insufficient user print permissions. The user probably got an error message.
Update the permissions.
Insufficient space on the drive containing the spool folder. Move the spool
folder or add disk space.
Other sporadic Unfavorable environmental conditions can lead to unexplained problems with
print problems printers. Check for and correct these situations, if possible.
• If the printer is installed in an environment with a large quantity of dust and
dirt, such as a factory floor or a pet shop, debris can accumulate in the
printer case. Keep the printer clean in an enclosure in these environments if
possible, but be mindful of heat accumulation in the enclosure.
• High humidity can lead to moisture problems; low humidity can lead to
static problems. Try to maintain a relative humidity of 50 to 60 percent.
• Low memory errors can indicate that the print driver memory settings need
to be changed. Most print drivers will install a low memory default setting
438
Symptom Possible Problems and Solutions
that can be changed, if needed. You can update the driver setting to match
the printer memory capabilities to resolve this issue.
Note: In Windows 7, you can troubleshoot a printer by right-clicking the printer and choosing
Troubleshoot. In Windows XP, the Printing Troubleshooter in Help and Support Center
can be useful in stepping through and resolving common printing problems.
Smeared output, Fuser temperature is too low: if the Follow the manufacturer's instructions
or output rubs off fuser is not hot enough, the toner not to set fuser mode for the paper; adjust
the paper fused to the paper ; fuser roller is the fuser roller; clear the paper path;
uneven; problem in paper path; paper use good-quality paper.
not smooth enough.
Low-quality image Poor-quality paper does not accept Use good-quality paper; follow the
charge and transfer toner; transfer manufacturer's instructions to clean
corona is dirty or faulty; there's a the transfer corona; follow the
transfer corona power supply manufacturer's instructions to
problem; a faulty primary corona or troubleshoot other faulty components.
power supply does not charge print
drum.
Repeating Dirty fuser roller; warped or worn Clean all fuser rollers; compare the
horizontal lines or fuser roller; scratched print drum due distance between the repetitions of the
white spaces to debris between wipe blade and lines to the circumferences of the
drum. rollers, and consult manufacturer's
documentation to find which may
have the problem. Follow the
manufacturer's instructions to adjust
or replace rollers and fuser.
Follow the manufacturer's instructions
to replace the scratched print drum.
Repeating vertical Scratched print drum; dirty primary Follow the manufacturer's instructions
lines or white corona or transfer corona produces to replace scratched print drum or
spaces uneven charge; refilled toner cartridge clean corona wires; or, replace with a
produced substandard output. new cartridge.
Pickup and path The paper slips or begins to pick up After a long period of use, these
wheels 2–3 pages or more at once, and then wheels lose their grip. Wheels either
jams; paper is not feeding; paper is need to be cleaned with alcohol or
creased. replaced.
439
replace the printer instead of trying to repair it. The following are common symptoms and potential
solutions you can use when supporting users.
Poor print quality Clogged nozzles, incorrect paper; Clean the interior of the printer;
empty or defective cartridge. perform one or more print cartridge
cleaning cycles; switch to a paper
specifically designed for inkjet
printers.
Replace the cartridge. If you are using
a refilled cartridge, replace with a new
cartridge.
No output; paper Empty ink cartridges; clogged nozzles; Replace empty or incorrect ink
passes through tape sealing ink cartridge; incorrect cartridges; clean the printer and print
printer but is cartridge or cartridge improperly cartridge; remove the tape seal from
blank seated. ink cartridge; align the cartridge; check
the manufacturer's website for other
troubleshooting procedures.
Feathering/ink Clogged nozzles; low ink in cartridge; Perform several cleaning cycles;
bleed faulty printhead; low-quality refilled replace ink cartridge with a new one
cartridge. (not refilled); replace the printhead;
switch to a paper specifically designed
for inkjet printers.
Pickup and path The paper slips or begins to pick up After a long period of use, these
wheels 2–3 pages or more at once, and then wheels lose their grip. Wheels either
jams. need to be cleaned with alcohol or
replaced.
440
Symptom Possible Problems Solutions
Continuous-feed Tractor feed problems. Clean paper from gears. Align tractor
paper jams feed. Replace worn gears.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Troubleshoot Printers
441
ACTIVITY 14-8
Troubleshooting Common Printer Issues
Scenario
In this activity, you will respond to common printing issues and provide a suggested solution to fix
the issues.
® ®
1. A user reports that they cannot print from Microsoft Excel to a network printer. After determining that
other users are printing from that printer with no issues, what steps should you take next to troubleshoot
the problem?
A: Check the network availability of the network printer, then make sure that the printer is not paused.
If the user can print from other applications, then the problem might be with Excel, but not with the
printer or print driver.
2. A user reports that he is attempting to print to his local printer, but none of the print jobs are printing.
When you arrive at his desk, you check out the printer hardware and consumables and everything
seems to be fine. When you double-click the printer in the Printers folder, you see the job is listed in the
queue. What should you try next?
A: You should check to make sure that the printer is not paused, then try stopping and starting the
print spooler service. If resetting the print spooler service does not resolve the problem, try
adjusting the spool settings on the printer until you can print from all Windows programs.
3. Another user says all his printouts look garbled. You check the properties of the print object in the
Printers And Faxes window and find that the printer model listed in the Properties dialog box is not the
same as the printer model on the printer itself. What should you do?
A: Remove the printer and reinstall it using the correct printer driver.
4. A user reports that inkjet printers in the corporate training area have various problems, including no
output, fuzzy output, and generally poor print quality. List some of the steps you should take to resolve
these problems.
A: If the print quality is poor, perform one or more cleaning cycles. Clean the printer to make sure that
there is no lint or other debris dragging across the wet ink. Change to a paper specifically
designed for inkjet printers. Next, If the cartridge was recently reinstalled, make sure that the user
pulled the tape off before installing the ink cartridge. Verify that the cartridge is seated correctly in
the printer. Verify that the correct cartridge is installed. You might need to try a brand-new (not
refilled) ink cartridge. Perform an alignment after installing new cartridges as per the
documentation for the printer. If the printhead is separate from the ink cartridge, you might also
need to replace the printhead. In addition, if there is nothing printing, check the documentation or
website for the printer to see if there are any troubleshooting tips or diagnostic tools.
442
Summary
In this lesson, you applied troubleshooting techniques to resolve issues related to many different
computing hardware components. It is likely that most of your time as an A+ certified technician
will be supporting users with hardware issues, so it is important to understand the theory and best
practices used by professionals on a daily basis.
Use the review
In your current job role, have you had to troubleshoot computer hardware problems? If so, what did you do questions provided to
and how did you resolve the issues? generate discussion
A: Answers will vary but may include fixing a printing output issue, adjusting display settings to resolve among the participants.
picture issues, or fixing some basic problems with connections, cables, or ports.
What hardware components do you expect to have to troubleshoot most often at your workplace?
A: Answers will vary depending on the type of work environment, but the most common components
could be display devices, system components, and fixing all the various issues that come up with
printing devices.
Note: Check your LogicalCHOICE Course screen for opportunities to interact with your
classmates, peers, and the larger LogicalCHOICE online community about the topics covered in
this course or other topics you are interested in. From the Course screen you can also access
available resources for a more continuous learning experience.
Encourage students to
use the social
networking tools
provided on the
LogicalCHOICE Home
screen to follow up with
their peers after the
course is completed for
further discussion and
resources to support
continued learning.
443
444
12 Troubleshooting
System-Wide Issues
Lesson Time: 2 hours
Lesson Objectives
In this lesson, you will troubleshoot system-wide issues.
• Troubleshoot operating systems.
• Troubleshoot wired and wireless networks.
• Troubleshoot common security issues.
Lesson Introduction
In the previous lesson, you focused on troubleshooting the hardware components that
physically make up the computer system. You are well aware that there are other essential
components needed for the entire computer system to work properly; the operating system,
the network, and security are all integral parts of the computer environment. In this lesson,
you will troubleshoot system-wide issues.
You can have all of the components of a PC properly installed and configured, and still not
be able to perform the tasks that you need to perform. Software, network, and security
issues can present their own sets of problems for you to troubleshoot and resolve.
This lesson covers all or part of the following CompTIA® A+® (2012) certification
objectives:
• Topic A:
• Exam 220–802: Objective 4.6
• Topic B:
• Exam 220–802: Objective 4.5
• Topic C:
• Exam 220–802: Objective 4.7
445
TOPIC A
Troubleshoot Operating Systems
In this lesson, you will troubleshoot system issues. The operating system is an essential component
in the computer environment, managing all the resources that make up the system and providing the
interface for users to interact with these resources. If the operating system is not functioning
properly, the computer system will not be able to perform as needed. In this topic, you will
troubleshoot operating systems.
As a computer support professional, you will be the first line of response to help users when
problems arise with their systems. You will need the knowledge to recognize and diagnose problem
conditions, and you will need to respond to those problems with the appropriate corrective action.
The information, utilities, and skills in this topic should provide you with the diagnostic and
troubleshooting toolkit you will need to identify and correct a range of possible system problems.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 4.6: Given a scenario, troubleshoot operating system problems with
appropriate tools.
Recovery Console Use Recovery Console in Windows® XP and 2000 troubleshoot and manage
the system. The console can be installed as a boot option or you can launch
it from the Windows XP CD-ROM.
The console allows you to enable and disable services, manage files and
disks, and to fix any system boot problems.
WinRE Use Windows Recovery Environment (WinRE) in Windows Vista® and
Windows® 7 to troubleshoot and manage system errors that occur within the
operating system.
Bootrec.exe The bootrec tool is available within WinRE for Windows Vista or 7. It can be
used to troubleshoot and resolve master boot record (MBR) issues, boot sector
problems, and Boot Configuration Data (BCD) issues. Two bootrec options
commonly used to troubleshoot and fix issues are:
• The fixmbr option is used to fix MBR corruption issues by writing new
files to the system partition.
• The fixboot option is used to write a new boot sector to the system. It can
be useful when you suspect that the boot sector is damaged or
incompatible with the operating system.
For more information on the bootrec tool capabilities, visit http://
support.microsoft.com/kb/927392.
Sfc System File Checker (sfc) is a Windows utility that scans systems for file
corruptions on startup. The tool is available in Windows XP and Windows
Server® 2003. In Windows 7, this tool can be found within the Windows
Resource Protection center. There are a number of sfc commands that you
can use to manage file corruptions:
• scannow will scan all protected files
446
Tool Description
447
Tool Description
these controls, then re-register them. Common controls managed with this
tool are Dynamic Link Library (DLL) and ActiveX files.
REGEDIT Use the REGEDIT utility to make changes to infected or corrupted files
within the Registry. Use caution when viewing or modifying these files in the
Registry.
Event Viewer Use the Event Viewer to look at a system's event logs, which may contain
specific information about system errors or significant events on the
computer. This can be helpful in troubleshooting various system issues.
Safe Mode Safe Mode is a Windows system startup method that loads only a minimal set
of drivers and services. If a non-critical driver or service on your system is
causing a severe error, you can use Safe Mode to omit all non-critical drivers
and services from the boot sequence; start the system; load additional
drivers, services, and applications as needed; and correct the problem.
Command prompt Command prompt can be used when troubleshooting a number of different
issues. Windows provides several different command interpreters. The
typical command prompt interface is the standard Windows command
interpreter, available in Windows XP and Windows 7. To access the
command prompt interface, you can either run cmd.exe or select Command
Prompt from the Accessories menu.
Remote Desktop Remote Desktop can be used to access a user's computer to provide
assistance with various types of issues. The problem with Remote Desktop
for troubleshooting an end user's computer is that it must be enabled and a
user must be granted privileges to log in with network access. If a user does
not have a password set up to log in to his or her computer, Remote
Desktop will not allow that user name to be used to log in. If no other user
name exists, there is no opportunity for Remote Desktop to work.
Emergency repair When you install Windows XP, the system stores information about the
disk configuration of the operating system in a hidden folder called \Windows
\Repair. If your installation is damaged, you may be able to repair it by using
this information and the Windows Setup program. In Windows XP, you can
create a copy of the repair information on a CD called emergency repair disk
(ERD). When you create an ERD, the system also updates the contents of
the \Repair folder.
Automated System Automated System Recovery (ASR) is a Windows XP process that uses backup
Recovery data and the Windows installation source files to rebuild a failed computer
system. To perform ASR, you will need:
• The Windows XP installation disk.
• An ASR disk, which provides the information Windows Setup needs to
run ASR recovery.
• An ASR backup set that contains a complete copy of the Windows system
files and all configuration information.
448
• Safe Mode with Networking: Starts the computer with Safe Mode drivers and services, plus
networking drivers and services. It is used when you need to use files on a network location to
repair the system.
• Safe Mode with Command Prompt: Starts the computer with Safe Mode drivers and services,
but with a command prompt interface. It is used when a system problem prevents the system
from creating the Windows graphical user interface (GUI) desktop.
BSOD
Blue screen of death (BSOD) errors, or system stop errors, can be a symptom of file system errors,
viruses, hard disk corruption, or controller driver problems. Stop errors are rare in Windows XP and
Windows 7, but when they occur, they are normally preceded by a blue error screen containing a
summary statement about the error condition and also hexadecimal memory data.
449
the Advanced tab, and in the Startup and Recovery area, select Settings. Uncheck
Automatically restart and select OK.
• In Windows XP, display the pop-up menu for My Computer, and select Properties. Select the
Advanced tab, and in Startup and Recovery, select Settings. Uncheck Automatically restart
and select OK.
450
I/O Device Issues
Some of the input/output (I/O) device issues that can affect Windows operation include:
• A missing or loose mouse or keyboard connection.
• Blocked signals for wireless devices.
• A missing or incorrect driver for a specialty input or output device.
• Misconfigured monitor settings resulting in display anomalies.
Application Errors
There are some common error messages that indicate problems with applications.
Application will not install You are trying to install an application that needs to
overwrite a file that is currently in use on the computer.
Application will not start or load The application was installed incorrectly, a version conflict
between the application and other applications on the
computer exists, or your computer is experiencing memory
access errors.
Application not found One or more of the application files has been deleted,
moved, or become corrupt.
General Protection Fault (GPF) An application is accessing Random Access Memory
(RAM) that another application is using, or the application
is attempting to access a memory address that does not
exist.
Illegal operation An application is attempting to perform an action that
Windows does not permit. Windows forces the application
to close.
Invalid working directory The application cannot find the directory for storing its
temporary files (typically \Temp). This can happen if you
delete the folder that an application needs for storing its
temporary files.
Boot Issues
There are several errors that can occur during the boot process or Windows startup.
Input/Output Device
Issues 451
Issue Description
POST errors If there are errors during the Power On Self-Test (POST), the system
might display a numeric error message. Typically, you can press F1 to
acknowledge the error and continue booting.
For other POST errors, a series of audible beeps will tell you if a problem
has been detected. The sequence of beeps is a code that indicates the type
of problem.
Invalid boot disk The most common cause of this is a non-bootable disk in a drive. If your
system has floppy-disk drives, or bootable CD-ROM or thumb drives,
check to see if you need to remove a disk from the drive. However, there
could be a hardware problem with the hard disk. Also verify that the
complementary metal oxide semiconductor (CMOS) is set to boot from
the hard drive. Most BIOSes allow for the configuration of four or more
boot devices as first, second, third, etc. If one fails, it will automatically try
the next in line. The only way this process will fail is if the boot devices
are set to "None" or all the same (which many do not allow). Also, it
cannot be assumed that the user will want the CMOS to be set to "boot
from the hard drive," since many times there is a need to boot from CD,
or even boot through the network.
Failure to boot There might be a hardware problem with the hard disk or hard disk
controller. Check hard drive and hard drive controller connections. You
may also have a missing Boot.ini file. In this case, you need to use the
Bootcfg.exe to rebuild the file.
Missing operating If you receive an error message on boot up that states the operating
system system is missing, then this could be a sign that the hard disk is damaged.
You should try connecting the disk to another machine to see if it boots
up; if not, then you will need to replace the hard drive.
Missing NTLDR In Windows XP, the NT loader (NTLDR) file might be missing or
corrupt, in which case you might need to copy it from the Windows CD-
ROM. However, the most common problem is that there is a non-
bootable disk in the drive.
Missing dll message On startup, if the device displays a "missing dll" message, then this can
indicate an issue with one of the system files. A file may be disabled,
damaged, or deleted completely. You should first boot to Safe Mode and
run a virus scan on the computer to find any viruses that may have
infected the system and remove them. The next step is to determine what
files are missing. This can be a tedious task and in most cases a third party
dll finder utility can be used. Once you determine the specific files needed,
you can download them from the appropriate website or manufacturer
and install them on the system.
System files fail to If NTOSKRNL.EXE is missing, you can copy it from the Windows
open or are missing installation CD-ROM. This error can also indicate a problem in the
Advanced RISC Computing (ARC) path specifications in the Boot.ini file.
If Bootsect.dos is missing on a dual-boot system, you will have to restore
it from a backup file, as its contents are specific to a particular system.
System files should not be deleted or become corrupt during normal
system operation, so these errors are rare. They might indicate an
underlying hardware problem, a disk error, or the presence of a computer
virus.
452
Issue Description
Device or service fails There might be a problem with a missing or corrupted device driver, or
to start there could be hardware resource conflicts (although this is rare on a Plug
and Play [PnP] system).
Boots to safe mode There may be a drive problem, if the computer continues to only boot
into Safe Mode. Use the system BIOS utility to check drives and verify the
boot order.
Device or program in A device driver or related file might be missing or damaged. You might
Registry not found need to reinstall the device.
453
Beep Error Code Video Output Problem Solution
Two short beeps Numeric error Varies depending upon the source of
code the problem as indicated by the numeric
error code.
02# Power
01## System board
0104 Interrupt controller
0106 System board
0151 Real-time clock or CMOS RAM
0162 CMOS checksum error
0163 Time and date (clock not updating)
164 or 0164 System memory configuration incorrect
199 or 0199 User-indicated device list incorrect
02## Memory
201 or 0201 Memory error (may give memory address)
0202 Memory address error
03## Keyboard
0301 Stuck key (scan code of the key may be indicated)
0302 Keyboard locked
06## Floppy disk driver or controller
0601 Floppy disk adapter failure
0602 Disk failure
17## Hard disk or adapter
1701 Drive not ready or fails tests
1704 Hard drive controller failure
1707 Track 0 failure
1714 Drive not ready
1730–1732 Drive adapter failure
454
to reboot to fix it. Other devices such as hard drives can also generate mismatch errors. This
generally happens when the physical device is different than what is specified in CMOS.
General issues • For boot process issues, use standard Safe Mode and boot-process
troubleshooting techniques.
• Viruses can cause a variety of general system problems. Install or update
the user's virus software and perform a complete virus scan to try to
identify what is causing issues.
• If you suspect that the issue is stemming from a specific application, then
use Task Manager to terminate the application and then troubleshoot its
installation and configuration.
• Graphical interface fails to load. This can be an indication of a video card
problem, or that a virus has infected the operating system files.
• Compatibility errors will display if an application or device software is not
fully supported by the operating system.
Memory issues An application or service might be leaking memory, which means that it is
not releasing previously allocated memory back to the system after use.
• Use Task Manager to see which applications are using memory. Have
the user reboot and run for a period of time, then check again to confirm.
• Use System Configuration to see which applications are using memory.
Have the user reboot and run for a period of time, then check again to
confirm.
• Use system monitoring techniques to check the overall memory
performance.
Low system Low disk space can slow system performance. If there is less than 500 MB of
performance and free disk space:
disk issues • Delete temporary Internet files in the Internet Explorer cache and other
browsers.
• Empty the C:\Temp and C:\Tmp directories.
• Search for and delete .chk files.
• Run the Disk Defragmenter, Disk Cleanup, and Check Disk utilities.
• Reduce the size of the Recycle Bin.
• Reduce the amount of space allocated for virtual memory.
• Upgrade the hard disk, if possible.
It is actually preferable to keep at least 20 percent of the hard drive available,
when possible.
CPU issues Use Task Manager to identify processes that dominate the available CPU
usage. Use Services to disable any unnecessary processes at startup.
Shutdown issues Common issues include:
• Improper shutdown of system, which can lead to system file corruption
and possible data loss.
455
Category of Possible Causes and Actions to Take
Problem
Note: For more troubleshooting and support information for Windows 7 visit http://
support.microsoft.com/ph/14019
Note: The ultimate solution to some performance problems might be upgrading the system
hardware by adding more memory or a larger hard disk. As a support technician, you might or
might not be able to request this type of upgrade.
456
The Structure of Event Log Entries
The structure of event log entries differs by operating system, but they generally share some
common information, such as the type of log, the time the event occurred, the user name of who
was logged on at the time of the event (or who caused the event), keywords, any identification
numbers, and what category (or categories) that the event belongs to.
WER
The Windows Error Reporting (WER) node in the software environment category in System
Information contains data about the faults generated by Event Viewer. When there is a severe
error, Windows will also display an Error Reporting dialog box and generate report data. The
Error Reporting dialog box gives you the option to send the report data to Microsoft for analysis.
457
ACTIVITY 15-1
Identifying System Errors
Scenario
In this activity, you will interpret system errors and discuss possible appropriate responses to error
conditions.
1. A user calls saying that her screen occasionally goes blue and the system shuts down. What should you
advise her to do?
○ Call the help desk the next time the shutdown is in progress.
○ Reboot manually after the automatic restart.
○ Record as much information from the top of the blue screen as she can so that you can research
the particular error.
○ Run the system in Safe Mode.
®
2. A user reports that his Microsoft Word window has gone blank and he cannot type text. What are
possible approaches to resolving his problem?
☐ Reboot the computer.
☐ Run another copy of Microsoft Word.
☐ Wait a few minutes to see if the application returns to normal.
☐ Use Task Manager to shut down the application if it has a status of "Not Responding."
3. A user reports that her monitor display is "fuzzy" and hard to look at. What is a possible cause of this
problem?
○ Display settings for the monitor are incorrectly configured.
○ The power cord is unplugged.
○ The monitor cable is not properly seated.
○ The monitor device is disabled in Windows.
4. A user reports that while she is editing a document, she receives an "invalid working directory" message
from her application. What is the best diagnostic question to ask in response to this error?
○ Did the application work yesterday?
○ Is anyone else having this problem?
○ Who installed the application?
○ Have you deleted any files or folders lately?
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Troubleshoot Microsoft Windows
458
ACTIVITY 15-2
Troubleshooting a Remote Computer with
Remote Desktop
Scenario
You have been assigned to support a user whose office is several floors away from yours. You
would like to be able to troubleshoot this computer without having to go to the user's office.
Note: You are going to work with a partner to complete this activity. You will take turns playing
the role of the helper and the user needing assistance. First, the user needing assistance will
enable Remote Desktop. Then, the helper will connect to that computer using Remote Desktop
Connection and the administrator user account.
3. From the second computer, change the desktop theme of your partner's computer, and then log off of
the remote session.
a) Display the pop-up menu for the Desktop and select Personalize.
b) Select a theme from the available options.
c) In the Client## bar at the top of the screen, select the Close button, and select OK to exit the
Remote Desktop session.
459
TOPIC B
Troubleshoot Wired and Wireless Networks
In the previous topic, you examined troubleshooting for operating systems. In most organizations,
that operating system will be running on a machine that is also running on a network to access the
Internet and other important databases or servers. Just as the operating system is essential for the
system to function, the network is essential for most organizations to function on a daily basis. In
this topic, you will troubleshoot networks.
Every network will run into problems at some point. However, there is a lot you can do to minimize
the problems you encounter. Regular, preventative maintenance will not only keep your network
working at its peak, it will also reduce the risk of network corruption. Difficulties will arise, though,
and good troubleshooting skills will enable you to identify, assess, and repair any network issues
quickly and efficiently.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 4.5: Given a scenario, troubleshoot wired and wireless networks with
appropriate tools.
460
Network Issue Possible Problems and Solutions
IP conflict Connections by IP address but not by name can be an indication that the
Domain Name System (DNS) configuration is incorrect or the DNS
server is down. Or, the hosts file might be configured incorrectly. Check
the IP configuration settings and verify that the DNS server is running.
Check the hosts file to make sure it does not contain incorrect entries.
Intermittent Electrical noise, or electrical interference, is a general term for unwanted
connectivity signals on the network media that can interfere with network
transmissions. Interference or noise can come from natural sources, such
as solar radiation or electrical storms, or from man-made sources, such as
electronic interference from nearby motors or transformers. Electrical
noise can also cause transient power problems. Some of the common
sources of noise include:
• Ambient noise can come from many sources, including solar
disturbances that affect the earth's magnetosphere, or nearby radio
broadcasting towers.
• Nearby high-tension power lines or a building's own electrical wiring
can create electrical noise.
• Electric motors, such as those used in elevators, refrigerators, water
fountains, and heating, ventilating, and air conditioning (HVAC)
equipment, create noise while running, but it is worse when they start
up. Motors require a huge amount of electricity to start up, causing a
burst of noise. These bursts can create short temporary outages that
resolve themselves when the motor reaches full speed or stops.
• Like electric motors, electric heating elements use a lot of electricity
and cause a significant amount of noise while running.
• Fluorescent, neon, and high-intensity discharge (HID) lights produce a
large amount of electrical noise, generally due to the transformers and
ballasts required to make these lights work.
Low RF signals If radio frequency (RF) signals are low, then it could mean that there is an
issue with the access point. The access point may have failed, lost power,
or been misconfigured. For example, if Media Access Control (MAC)
filtering is enabled at the access point, then the PC may not be able to
connect. If the issue is isolated to one PC, there it could be a
configuration issue at the access point or the PC, so you will need to
verify the configuration settings on both devices.
APIPA address issues Automatic Private IP Addressing (APIPA) is automatically enabled on
Windows computers unless it has been disabled in the Registry. It is
commonly used as a backup IP addressing service to DHCP, so when
DHCP is unavailable, local computers can still get an IP address. The
issue with this configuration is that APIPA can only connect to local
computers that also have APIPA addresses assigned, so connecting to the
Internet is not allowed.
461
• NSLOOKUP
• TRACERT
• NETSTAT
• NBSTAT
• NET
Software-based utilities include:
• Network troubleshooters can be used to walk you through the resolutions to various common
network problems. There are several network-related troubleshooters in the Help and Support
Center that can help.
• Wi-Fi locators are utilities that can be installed on computing devices to locate wireless networks
within range of the device. Most locating utilities will not only locate networks, but will monitor
them for anomalies. They will usually display the Service Set Identifier (SSID), signal quality,
MAC address, and other network identifiers.
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Troubleshoot Wired and Wireless Networks
462
ACTIVITY 15-3
Troubleshooting Network Issues
Scenario
You have been assigned to assist users who are having network connectivity issues.
1. You receive a call from a client who reports that she is unable to access any websites in Internet
Explorer. While talking with this user, you verify that she can ping the server's IP address on her
network segment, the IP address of the default gateway, and the IP address of a computer on another
network segment. You also determine that none of the other users on her network can connect to
websites in Internet Explorer. What might be the problem?
A: The problem is most likely that her network's DNS server is down.
2. One of your clients reports that he is unable to see computers when he opens the Network window.
Which step should you take first?
○ Determine if any of the other users on the network are experiencing problems.
○ Ask the client to ping another computer on his network.
○ Ask the client to verify that the DHCP server is running.
○ Ask the client to run ipconfig /release and ipconfig /renew.
3. A user is trying to reach a website and is experiencing problems. How can you examine the path of the
transmissions?
A: Use the tracert command to trace the routes of packets between various source and destination
hosts. This can help you locate a packet looping between routers, or the point at which a route
fails.
4. A client reports that he is unable to connect to any computers on the network or the Internet. You have
him run the ipconfig command, and all his TCP/IP addressing parameters are correct. When you have
him ping other computers on the network, his computer is unable to reach them. This computer is the
only one that is experiencing a problem. What should you check next?
○ That the DHCP server is on and functioning properly
○ That the default gateway is on and functioning properly
○ That the DNS server is on and functioning properly
○ That his computer's network cable is plugged into both the network card and the wall jack
463
TOPIC C
Troubleshoot Common Security Issues
In the previous topics, you have examined troubleshooting for the hardware, software, and network
components of a computer system. As important as it is to maintain these more concrete
components of a system, it is equally important to make sure that the computer system is secure and
that all security measures are functioning properly; if problems arise with security, you must be ready
to address them. In this topic, you will troubleshoot common security issues.
As with many areas of computer support, your responsibility for computer security does not end as
soon as the security measures are implemented. As with printing, networking, hardware, and
software, it is your responsibility to your users and clients to ensure proper security functions on an
ongoing basis as well as to correct security problems that might compromise your systems or
prevent users from accessing the resources that they need. The information and skills in this topic
should help you troubleshoot any security issues that arise and restore your organization's security
functions.
This topic covers all or part of the following CompTIA® A+® (2012) certification objectives:
• Exam 220–802: Objective 4.7: Given a scenario, troubleshoot common security issues with
appropriate tools and best practices.
464
Symptom Description
Windows update If Windows updates fail, it could be a sign that the state of the machine has
failures changed. This can be due to a virus. Scan the computer for infections and
remove them.
Rogue antivirus Rogue antivirus is a very sneaky attack that can cause major damage to a
system if the user carries out the actions expected by the attacker. The method
involves designing a rogue antivirus application window that looks like a
legitimate antivirus solution. If users follow the instructions, then they are at
risk for downloading a slew of malware.
Email issues If there are noticeable changes to an email account, such as an excess amount
of spam or you find that there have been emails sent from the account that
the email account owner was unaware of, then the computer's security has
been jeopardized.
Email-specific issues to be aware of include:
• Spam is an email-based threat where the user's inbox is flooded with emails
which act as vehicles that carry advertising material for products or
promotions for get-rich-quick schemes and can sometimes deliver viruses
or malware. Spam can harbor malicious code in addition to filling up your
inbox. Spam can also be utilized within social networking sites such as
Facebook and Twitter.
• Hijacked email is an account that has been accessed by an attacker and is
being used by the attacker to send and receive emails. This means that an
attacker can read, edit, an send emails from an account. In a corporate
environment, a hijacked email account can result in unauthorized data
access.
Access denied Access may be denied if systems are unavailable or corrupted. The most
common cause is when a user forgets a password or credentials. Have systems
in place to reset passwords for users, when appropriate.
Repeated patterns of access denial can be a sign of attempted security
breaches.
Malicious software Once malicious software has penetrated your system, numerous security issues
can arise. The best solution to these problems is to prevent infections in the
first place, but if your systems are infected, they must be isolated from the
network and cleaned using various antivirus and security scanning tools.
If your antivirus, anti-spyware, and pop-up blocker's protections are
configured to be too restrictive, it is possible that users might not be able to
load and run legitimate software. However, it is best to keep security tight in
this area and deal with exceptions on a case-by-case basis.
File system issues Changes in system files can indicate that there has been breach in security.
Common file system security symptoms include:
• Renamed system files
• Files disappearing
• File permission changes
If permissions are set too tightly, users will not be able to access data. If they
are too loose, there will be inappropriate access. Also, because permissions are
cumulative, users may obtain permissions from a number of different groups
of which they are members. If a user cannot access a resource, you might need
to check the permissions assigned to all the relevant groups.
465
Symptom Description
Data access issues Data access across the network depends upon share permissions which, like
file system permissions, might be set too high or too low. Also, like file system
permissions, the user's effective permissions might be derived from several
group memberships that you might need to examine.
A special issue for Windows is the interaction of share and file system
permissions—since both sets are evaluated for network file access, the user
will have only the most restrictive of the two permission sets.
If you have used policies to restrict accounts from accessing systems locally or
across the network, make sure the policies are not so strict that legitimate
users cannot gain access.
Backup security Set system policies so that only legitimate users can restore data. However, if
policies are too restrictive, you might not have enough users available to do
backup restorations in an emergency. Verify that all legitimate backup
administrators have the necessary rights. Do not forget to verify that the
appropriate users have physical access to the backup storage location,
especially if the backup tapes are maintained by a third party who has
responsibility for controlling access.
Identify malware Use adware and spyware detectors. If your antivirus software does not
symptoms guard against adware and spyware, you can install separate tools to
specifically protect against these types of threats.
Disable system restore When malware is detected, it is wise to disable system restore to prevent
infected restore points in the system.
Schedule scans and Schedule scans and antivirus update schedules. By scheduling regular
updates system scans and updating your antivirus software, you are taking a more
proactive approach to vulnerability detection before a full system infection
occurs. Scanning systems regularly allows you to discover potential
malware threats and to develop useful removal techniques accordingly.
Remediate infected In some cases, you may need to employ additional scanning and removal
systems techniques to ensure that systems are clear of infections. When viruses
infect critical operating system files that are "in use" when the operating
system is running, you may need to perform an alternate startup process
in order to prevent the files from being locked against a clean and repair
cycle. You may also need to boot into Safe Mode to clean the infected
files, or it may be necessary to boot into a completely different pre-
installation environment in order to clean viruses that are deep-rooted
into the core operating system files. If you suspect that the boot blocks
have been affected by a virus, you may need to repair infected boot blocks
using the Windows Recovery Console in Windows XP, or System
Recovery in Windows 7
Quarantine infected Once an infected system is discovered, you can then quarantine it and fix
systems it to prevent the further spread of the virus to other systems.
466
Process Step Description
Enable system restore Once the system is clean of all malware infections, then you should enable
and create restore system restore and make sure to create a fresh restore point of the clean
point system.
Educate end users Provide user awareness and education, which is the best protection against
malicious software or any security threat. Providing end user education
will enable users to recognize and delete hoax email messages, avoid
unauthorized software, and keep antivirus definitions updated.
Many types of malicious software are introduced through email
attachments. Users should not save or open attachments they do not
recognize, are not expecting, or are from senders they do not recognize.
Trusted installation Always use trusted installation sources and websites. This may include
sources various "mirror" websites that offer authorized software downloads. Even
software you install deliberately can be infected with viruses. Do not
install software just because a particular website or Internet page prompts
you to do so.
Email protection Always use email attachment protection.
Research Research malware types. In order to protect systems from infections, you
must research all the possible malware types and symptoms. For example,
using various virus encyclopedias, you can recognize possible malware
types and develop solutions to fix them.
Tool Description
Anti-malware software Some anti-malware programs will scan for unknown, harmful software
already installed on the computer and attempt to remove them. In most
corporate environments, you will work closely with the security
administrator to make sure all computers are configured to meet the
guidelines set forth in the security policy. It is strongly recommended to
install anti-malware software on all computers, and keep it updated
according to your organization's patch management policies.
Antivirus software Antivirus updates must be managed as they are made available.
Antivirus engine updates can include enhancements, bug-fixes, or new
features being added to the software engine, improving the manner in
which it operates. Updates can be implemented automatically or
467
Tool Description
Access the Checklist tile on your LogicalCHOICE course screen for reference
information and job aids on How to Troubleshoot Common Security Issues
468
ACTIVITY 15-4
Troubleshooting Common Security Issues
Scenario
You have been assigned to resolve several security issues raised by users.
1. John has reported that a pop-up security alert keeps coming up when he switches application windows
on his laptop. What do you suspect is going on with his computer?
A: Often, malware is delivered through legitimate-looking methods, such as a Windows security alert.
In this case, his laptop was likely infected with a virus.
2. You have been asked to provide a list of common malware symptoms for users to be aware of in order
to prevent security breaches within your organization. What common symptoms would you provide?
A: Answers will vary, but should include: keeping an eye out for unusual email messages that may be
a hoax or social engineering attempt. Do not open or forward unrecognized email attachments.
Avoid downloading any software from the Internet that has not been approved by the IT
department.
3. True or False? The safest way to deal with unsolicited email is to delete it without opening it.
☐ True
☐ False
4. Alex reports that in the midst of composing an email at work, an unfamiliar pop-up appeared on his
screen, indicating that his email connection has been dropped and that he should log on again by using
the pop-up screen. What do you suggest he do in this situation?
A: First, you let him know that he was right to report the incident without entering the information in
the pop-up window. Next, you should run an antivirus scan to identify if the computer is infected
and remove any viruses until the system is "clean."
469
Summary
In this lesson, you used many different troubleshooting methods to resolve common issues related
to operating systems, network connectivity, and security. In your role as an A+ technician, you will
be advising and supporting users in a number of areas surrounding computing devices, so using the
guidelines and procedures provided in this lesson will enable you to provide the required level of
support to users.
Use the review
questions provided to What system wide area do you think you will provide the most support to users?
generate discussion A: Answers will vary, but will most likely include troubleshooting various operating system or network
among the participants. issues, which can often end up being a symptom of a more severe security problem.
Have you ever had to recover a severely compromised computer system? If so, then describe your
experience.
A: Answers will vary, but may include having to use Last Known Good Configuration or Safe Mode to
identify issues and recover systems.
Note: Check your LogicalCHOICE Course screen for opportunities to interact with your
classmates, peers, and the larger LogicalCHOICE online community about the topics covered in
this course or other topics you are interested in. From the Course screen you can also access
available resources for a more continuous learning experience.
Encourage students to
use the social
networking tools
provided on the
LogicalCHOICE Home
screen to follow up with
their peers after the
course is completed for
further discussion and
resources to support
continued learning.
470