Home>Store

IT Essentials, 5th Edition

Register your productto gain access to bonus material or receive a coupon.

IT Essentials, 5th Edition

eBook (Watermarked)

  • Your Price: $40.80
  • List Price: $48.00
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from yourAccountpage after purchase:

    ePubEPUBThe open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe ReaderPDFThe popular standard, used most often with the freeAdobe® Reader®software.

    这本电子书不需要不swords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Description

  • Copyright 2014
  • Dimensions: 8" x 9-1/8"
  • Edition: 5th
  • eBook (Watermarked)
  • ISBN-10: 0-13-325668-5
  • ISBN-13: 978-0-13-325668-0

IT Essentials: PC Hardware and Software Companion Guide, Fifth Edition

IT Essentials: PC Hardware and Software Companion Guide, Fifth Edition, supports the Cisco Networking Academy IT Essentials: PC Hardware and Software version 5 course. The course is designed for Cisco Networking Academy students who want to pursue careers in IT and learn how computers work, how to assemble computers, and how to safely and securely troubleshoot hardware and software issues.

As CompTIA Approved Quality Content, the course also helps you prepare for the CompTIA A+ certification exams 220-801 and 220-802. CompTIA A+ 220-801 covers the fundamentals of computer technology, installation and configuration of PCs, laptops, related hardware, and basic networking. CompTIA A+ 220-802 covers the skills required to install and configure PC operating systems and configure common features, such as network connectivity and email for Android and Apple iOS mobile operating systems. Students must pass both exams to earn the CompTIA A+ certification.

The features of the Companion Guide are designed to help you study and succeed in this course:

--Chapter objectives—Review core concepts by answering the focus questions listed at the beginning of each chapter.

--关键terms—Refer to the updated lists of networking vocabulary introduced, and turn to the highlighted terms in context.

--Course section numbering—Follow along with the course heading numbers to easily jump online to complete labs, activities, and quizzes referred to within the text.

--Check Your Understanding Questions and Answer Key—Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see on the online course quizzes.

--Glossaryin the back of the book to define Key Terms

The lab icon in the Companion Guide indicates when there is a hands-on Lab or Worksheet to do. TheLabs and Worksheetsare compiled and published in the separate book, IT Essentials: PC Hardware and Software Lab Manual, Fifth Edition. With more than 1300 pages of activities, including Windows 7, Windows Vista, and Windows XP variations covered in the CompTIA A+ exam objectives, practicing and performing these tasks will reinforce the concepts and help you become a successful PC technician.

Sample Content

Table of Contents

Introduction xxiv

Chapter 1Introduction to the Personal Computer 1

Objectives 1

关键Terms 1

Introduction (1.0.1) 4

Cases and Power Supplies (1.1.1) 4

Computer Cases (1.1.1.1) 4

Power Supplies (1.1.1.2) 6

Connectors 7

Electricity and Ohm’s Law (1.1.1.3) 8

Internal PC Components (1.1.2) 11

Motherboards (1.1.2.1) 11

CPUs (1.1.2.2) 13

Cooling Systems (1.1.2.3) 16

ROM and RAM 18

ROM (1.1.2.4) 18

RAM (1.1.2.5) 19

Memory Modules (1.1.2.6) 20

Cache Memory 22

Error Checking 22

Adapter Cards and Expansion Slots (1.1.2.7) 22

Storage Devices and RAID (1.1.2.8) 25

Floppy Drive 26

Hard Drive 26

Tape Drive 27

Optical Drive 27

External Flash Drive 28

Types of Drive Interfaces 28

Internal Cables (1.1.2.9) 30

External Ports and Cables (1.1.3) 31

Video Ports and Cables (1.1.3.1) 31

Other Ports and Cables (1.1.3.2) 35

Serial Ports and Cables 35

Modem Ports and Cables 36

USB Ports and Cables 36

FireWire Ports and Cables 37

Parallel Ports and Cables 38

eSATA Data Cables 38

SCSI Ports and Cables 38

及rk Ports and Cables 39

PS/2 Ports 40

Audio Ports 40

Input and Output Devices (1.1.4) 41

Input Devices (1.1.4.1) 41

Mice and Keyboards 41

Gamepads and Joysticks 42

Digital Cameras and Digital Video Cameras 42

Biometric Identification Devices 43

Touchscreens 43

Digitizers 43

Scanners 44

Output Devices (1.1.4.2) 44

Monitors and Projectors 44

All-in-One Printers 46

Speakers and Headphones 46

Monitor Characteristics (1.1.4.3) 46

Connecting Multiple Monitors to a Single Computer 48

Selecting PC Components (1.2.1) 49

Case and Power Supply (1.2.1.1) 49

Selecting Motherboards (1.2.1.2) 50

Selecting the CPU and Heat Sink and Fan Assembly (1.2.1.3) 51

Selecting RAM (1.2.1.4) 53

Selecting Adapter Cards (1.2.1.5) 54

Graphics Cards 54

Sound Cards 55

Storage Controllers 55

I/O Cards 56

NICs 56

Capture Cards 57

Selecting Hard Drives and Floppy Drives (1.2.1.6) 57

Floppy Disk Drive 57

Hard Drives 57

Selecting Solid State Drives and Media Readers (1.2.1.7) 60

Solid State Drives 60

Media Readers 61

Selecting Optical Drives (1.2.1.8) 62

Selecting External Storage (1.2.1.9) 62

Selecting Input and Output Devices (1.2.1.10) 63

Specialized Computer Systems (1.3.1) 64

CAx Workstations (1.3.1.1) 65

Audio and Video Editing Workstations (1.3.1.2) 65

Virtualization Workstations (1.3.1.3) 67

Gaming PCs (1.3.1.4) 68

Home Theater PCs (1.3.1.5) 69

Summary (1.4.1) 71

71年演习总结

Worksheets 71

Check Your Understanding 72

Chapter 2Lab Procedures and Tool Use 75

Objectives 75

关键Terms 75

Introduction (2.0.1) 77

Safe Lab Procedures (2.1) 77

General Safety (2.1.1.1) 77

Electrical Safety (2.1.1.2) 78

Fire Safety (2.1.1.3) 78

Procedures to Protect Equipment and Data (2.1.2) 79

ESD and EMI (2.1.2.1) 79

Climate 80

Power Fluctuation Types (2.1.2.2) 80

Power Protection Devices (2.1.2.3) 81

Procedures to Protect the Environment (2.1.3) 82

Material Safety and Data Sheet (2.1.3.1) 82

Equipment Disposal (2.1.3.2) 83

Batteries 83

Monitors 84

Toner Kits, Cartridges, and Developers 84

Chemical Solvents and Aerosol Cans 84

Proper Use of Tools (2.2) 84

Hardware Tools (2.2.1) 84

ESD Tools (2.2.1.2) 85

Hand Tools (2.2.1.3) 85

Cleaning Tools (2.2.1.4) 86

Diagnostic Tools (2.2.1.5) 86

Software Tools (2.2.2) 88

Disk Management Tools (2.2.2.1) 88

Protection Software Tools (2.2.2.2) 89

Organizational Tools (2.2.3) 89

Reference Tools (2.2.3.1) 89

Miscellaneous Tools (2.2.3.2) 91

Demonstrate Proper Tool Use (2.2.4) 92

Antistatic Wrist Strap (2.2.4.1) 92

Antistatic Mat (2.2.4.2) 93

Hand Tools (2.2.4.3) 94

Cleaning Materials (2.2.4.6) 98

Summary (2.3.1) 101

Summary of Exercises 101

Labs 101

Worksheets 102

Check Your Understanding 102

Chapter 3Computer Assembly 105

Objectives 105

关键Terms 105

Introduction (3.0.1) 106

Open the Case and Install the Power Supply (3.1.1) 106

Open the Case (3.1.1.1) 106

Install the Power Supply (3.1.1.2) 107

Install the Motherboard (3.1.2) 108

Install the CPU, Heat Sink, and Fan Assembly (3.1.2.1) 108

CPU 108

Heat Sink and Fan Assembly 110

Install RAM (3.1.2.2) 111

Install the Motherboard (3.1.2.3) 112

Install the Drives (3.1.3) 113

Install the Internal Drive (3.1.3.1) 113

Install the Optical Drive (3.1.3.2) 113

Install the Floppy Drive (3.1.3.3) 114

Install the Adapter Cards (3.1.4) 115

Types of Adapter Cards (3.1.4.1) 115

Install a NIC (3.1.4.2) 116

Install a Wireless NIC (3.1.4.3) 116

Install a Video Adapter Card (3.1.4.4) 117

Install the Cables (3.1.5) 118

Install the Internal Power Cables (3.1.5.1) 118

Motherboard Power Connections 118

SATA Power Connectors 119

Molex Power Connectors 119

Berg Power Connectors 119

Install the Internal Data Cables (3.1.5.2) 120

PATA Data Cables 120

SATA Data Cables 121

Floppy Data Cables 121

Install the Front Panel Cables (3.1.5.4) 122

Power and Reset Buttons 123

Power and Drive Activity LEDs 124

System Speaker 124

USB 124

Audio 125

Install the Case Assembly (3.1.5.6) 126

Install the External Cables (3.1.5.7) 126

POST and BIOS (3.2.1) 128

BIOS Beep Codes and Setup (3.2.1.1) 128

POST Card 129

BIOS Setup (3.2.1.2) 129

BIOS Configuration (3.2.2) 131

BIOS Component Information (3.2.2.1) 131

BIOS Configurations (3.2.2.2) 131

Time and Date 131

Disabling Devices 132

Boot Order 132

Clock Speed 132

Virtualization 133

BIOS Security Configurations (3.2.2.3) 133

BIOS Hardware Diagnostics and Monitoring (3.2.2.4) 134

Temperatures 134

Fan Speeds 135

Voltages 135

Clock and Bus Speeds 135

Intrusion Detection 136

Built-In Diagnostics 136

Motherboard and Related Components (3.3.1) 137

Motherboard Component Upgrades (3.3.1.1) 137

CPU Installation 138

Jumper Settings 138

CMOS Battery Installation 139

Upgrade the Motherboard (3.3.1.2) 139

BIOS Updates 140

Upgrade CPU and Heat Sink and Fan Assembly (3.3.1.3) 141

Upgrade the RAM (3.3.1.4) 142

Upgrade the BIOS (3.3.1.5) 143

Storage Devices (3.3.2) 144

Upgrade Hard Drives and RAID (3.3.2.1) 144

Input and Output Devices (3.3.3) 147

Upgrade Input and Output Devices (3.3.3.1) 147

总结(3.4.1.1)149

Summary of Exercises 149

Virtual Desktop Activities 150

Labs 150

Worksheets 150

Check Your Understanding 151

Chapter 4Overview of Preventive Maintenance 155

Objectives 155

关键Terms 155

Introduction (4.0.1) 156

Preventive Maintenance (4.1) 156

Benefits of Preventive Maintenance (4.1.1.1) 156

Preventive Maintenance Tasks (4.1.1.2) 157

Hardware 157

Software 157

Clean the Case and Internal Components (4.1.1.3) 158

Inspect Internal Components (4.1.1.4) 159

Environmental Concerns (4.1.1.5) 160

Troubleshooting Process Steps (4.2.1) 160

Introduction to Troubleshooting (4.2.1.1) 161

Data Backup 161

Identify the Problem (4.2.1.2) 162

Conversation Etiquette 162

Open-Ended and Closed-Ended Questions 163

Documenting Responses 163

Beep Codes 163

BIOS Information 164

Event Viewer 164

Device Manager 164

Task Manager 165

Diagnostic Tools 165

Establish a Theory of Probable Cause (4.2.1.3) 166

Test the Theory to Determine Cause (4.2.1.4) 166

Establish a Plan of Action to Resolve the Problem and

Implement the Solution (4.2.1.5) 167

Verify Full System Functionality and, If Applicable, Implement

Preventive Measures (4.2.1.6) 168

Document Findings, Actions, and Outcomes (4.2.1.7) 168

PC Common Problems and Solutions (4.2.2.1) 169

Summary (4.3.1) 175

Summary of Exercises 175

Check Your Understanding 175

Chapter 5Operating Systems 179

Objectives 179

关键Terms 179

Introduction 5.0.1.1 181

Modern Operating Systems (5.1) 181

Terms (5.1.1.1) 181

Basic Functions of an Operating System (5.1.1.2) 181

Hardware Access 182

File and Folder Management 182

User Interface 182

Application Management 183

Processor Architecture (5.1.1.3) 183

Types of Operating Systems (5.1.2) 184

Desktop Operating Systems (5.1.2.1) 185

Microsoft Windows 185

Apple OS X 186

Linux 186

及rk Operating Systems (5.1.2.2) 186

Customer Requirements for an Operating System (5.1.3) 187

OS-Compatible Applications and Environments (5.1.3.1) 187

Minimum Hardware Requirements and Compatibility with the OS Platform (5.1.3.2) 188

Microsoft Compatibility Center 188

Comparing OS Requirements (5.1.3.3) 189

Operating System Upgrades (5.1.4) 192

Checking OS Compatibility (5.1.4.1) 192

Upgrade Advisor 192

Windows OS Upgrades (5.1.4.2) 193

Data Migration (5.1.4.3) 195

User State Migration Tool 195

Windows Easy Transfer 195

File and Settings Transfer Wizard for Windows XP 196

Operating System Installation (5.2) 196

Hard Drive Partitioning (5.2.1.1) 196

Partitioning 197

Hard Drive Formatting (5.2.1.2) 198

Quick Format Versus Full Format 200

OS Installation with Default Settings (5.2.1.4) 200

及rk Settings 202

Account Creation (5.2.1.8) 203

Complete the Installation (5.2.1.12) 204

Windows Update 205

Device Manager 206

Custom Installation Options (5.2.2) 207

Disk Cloning (5.2.2.1) 207

Other Installation Methods (5.2.2.2) 207

及rk Installation 208

PXE Installation 209

Unattended Installation in Windows 7 and Vista 209

Image-Based Installation 210

Remote Installation 210

System Recovery Options (5.2.2.6) 211

System Recovery Options 211

System Image Recovery 213

Automated System Recovery in Windows XP Professional 214

Factory Recovery Partition 214

Boot Sequence and Registry Files (5.2.3) 214

Windows Boot Process (5.2.3.1) 214

Windows Boot Process 215

Windows Boot Loader and Windows Boot Manager in Windows 7 and Windows Vista 216

NTLDR and the Windows Boot Menu in Windows XP 216

NT Kernel 216

Startup Modes (5.2.3.2) 217

Windows Registry (5.2.3.3) 217

Multiboot (5.2.4) 218

Multiboot Procedures (5.2.4.1) 219

BOOTMGR File 219

Disk Management Utility (5.2.4.2) 220

Drive Status 221

Extending Partitions 222

Splitting Partitions 222

Assigning Drive Letters 222

Adding Drives 222

Adding Arrays 223

Directory Structure and File Attributes (5.2) 224

Directory Structures (5.2.5.1) 224

Drive Mapping 224

Mounting a Volume 224

User and System File Locations (5.2.5.2) 225

User File Locations 225

System Folder 225

Fonts 225

Temporary Files 226

Program Files 227

文件扩展名和属性(5.2.5.3)227

Application, File, and Folder Properties (5.2.5.4) 228

Application and File Properties 229

Folder Properties 229

Shadow Copy 230

The Windows GUI and Control Panel (5.3) 230

Windows Desktop (5.3.1.1) 230

Gadgets 231

Desktop Properties (5.3.1.2) 232

Start Menu and Taskbar (5.3.1.3) 233

Start Menu 233

Taskbar 234

Task Manager (5.3.1.4) 234

Computer and Windows Explorer (5.3.1.8) 236

Computer 236

Windows Explorer 236

236年启动的应用程序和打开文件

Windows 7 Libraries (5.3.1.9) 237

Install and Uninstall Applications (5.3.1.10) 237

Adding an Application 237

Uninstalling or Changing a Program 238

Control Panel Utilities (5.3.2) 239

Introduction to Control Panel Utilities (5.3.2.1) 239

User Accounts (5.3.2.2) 241

User Account Control Settings 241

Internet Options (5.3.2.6) 242

Display Settings (5.3.2.10) 243

Folder Options (5.3.2.11) 245

General Tab 245

View Tab 245

Search Tab 245

Action Center (5.3.2.12) 245

Windows Firewall (5.3.2.13) 246

Power Options (5.3.2.14) 247

System Utility (5.3.2.15) 248

Performance Settings 248

Windows ReadyBoost 249

Device Manager (5.3.2.19) 250

Regional and Language Options (5.3.2.23) 252

Administrative Tools (5.3.3) 252

Computer Management (5.3.3.1) 252

Event Viewer, Component Services, and Data Sources (5.3.3.2) 253

Services (5.3.3.3) 254

Performance and Windows Memory Diagnostic (5.3.3.4) 255

System Tools (5.3.4) 256

Disk Defragmenter and Disk Error-Checking Tool (5.3.4.1) 256

Disk Defragmenter 256

Disk Error-Checking Tool 257

System Information (5.3.4.5) 258

Accessories (5.3.5) 259

Remote Desktop (5.3.5.1) 259

Control Panel Utilities Unique to Specific Windows Versions (5.3.6) 260

Windows 7 Unique Utilities (5.3.6.1) 261

HomeGroup 261

Action Center 261

Windows Defender 261

RemoteApp and Desktop Connections 262

Troubleshooting 262

Windows Vista Unique Utilities (5.3.6.2) 262

Windows XP Unique Utilities (5.3.6.3) 263

Command-Line Tools (5.3.7) 264

Windows CLI Commands (5.3.7.1) 264

Run Line Utility (5.3.7.3) 265

MSCONFIG 267

Client-Side Virtualization (5.4) 268

Purpose of Virtual Machines (5.4.1.1) 268

Hypervisor: Virtual Machine Manager (5.4.1.2) 269

Windows Virtual PC 269

Windows XP模式270

Virtual Machine Requirements (5.4.1.3) 270

Common Preventive Maintenance Techniques for Operating Systems (5.5) 271

Preventive Maintenance Plan Contents (5.5.1.1) 271

Preventive Maintenance Planning 271

Security 272

Startup Programs 272

Updates (5.5.1.5) 273

Device Driver Updates 273

Operating System Updates 273

Firmware Updates 274

Scheduling Tasks (5.5.1.6) 274

Windows Task Scheduler 274

at Command 275

Restore Points (5.5.1.10) 276

Hard Drive Backup (5.5.1.14) 277

Normal Backup 278

Copy Backup 278

Incremental Backup 278

Differential Backup 278

Daily Backup 278

Basic Troubleshooting Process for Operating Systems (5.6) 279

Identify the Problem (5.6.1.1) 279

Establish a Theory of Probable Cause (5.6.1.2) 279

Test the Theory to Determine Cause (5.6.1.3) 280

Establish a Plan of Action to Resolve the Problem and

Implement the Solution (5.6.1.4) 280

Verify Full System Functionality and Implement Preventive Measures (5.6.1.5) 281

Document Findings, Actions, and Outcomes (5.6.1.6) 281

Common Problems and Solutions (5.6.2.1) 282

Summary (5.7.1.1) 288

Summary of Exercises 288

Labs 288

Worksheets 291

Check Your Understanding 291

Chapter 6及rks 295

Objectives 295

关键Terms 295

Introduction (6.0.1) 299

Principles of Networking (6.1) 299

Define Computer Networks (6.1.1.1) 299

Features and Benefits (6.1.1.2) 301

Require Fewer Peripherals 301

Increase Communication Capabilities 301

Avoid File Duplication and Corruption 301

Lower the Cost of Licensing 302

Centralize Administration 302

Conserve Resources 302

Identifying Networks (6.2) 302

LANs (6.2.1.1) 302

WLANs (6.2.1.2) 303

PANs (6.2.1.3) 304

MANs (6.2.1.4) 304

WANs (6.2.1.5) 304

Peer-to-Peer Networks (6.2.1.6) 305

Client/Server Networks (6.2.1.7) 306

Basic Networking Concepts and Technologies (6.3) 307

Bandwidth (6.3.1.1) 307

Data Transmission (6.3.1.2) 308

Simplex 308

Half-Duplex 309

Full-Duplex 309

IP Addressing (6.3.2.1) 309

IPv4 and IPv6 310

IPv4 (6.3.2.2) 311

IPv4 Subnet Mask 312

IPv6 (6.3.2.3) 313

Static Addressing (6.3.2.4) 314

DHCP Addressing (6.3.2.5) 315

Configuring Alternate IP Settings 317

DNS 317

ICMP (6.3.2.6) 317

Common Ports and Protocols (6.3.3) 319

TCP and UDP (6.3.3.1) 319

TCP and UDP Protocols and Ports (6.3.3.3) 320

Physical Components of a Network (6.4) 322

Modems (6.4.1.1) 322

Hubs, Bridges, and Switches (6.4.1.2) 323

Hubs 323

Bridges and Switches 324

Power over Ethernet 325

Routers and Wireless Access Points (6.4.1.3) 325

Wireless Access Points 325

Routers 326

Multipurpose Devices 326

NAS (6.4.1.4) 327

VoIP Phones (6.4.1.5) 327

Hardware Firewalls (6.4.1.6) 328

Internet Appliances (6.4.1.7) 329

Purchasing Authentic Networking Devices (6.4.1.8) 329

Cables and Connectors (6.4.2) 330

Considerations for Cabling a Network (6.4.2.1) 330

Cost 331

Security 331

Design for the Future 331

Wireless 331

Coaxial Cables (6.4.2.2) 332

Twisted-Pair Cables (6.4.2.3) 332

Category Rating 333

Wire Schemes 334

Straight-Through Cables 335

Crossover Cable 335

Fiber-Optic Cables (6.4.2.6) 336

及rk Topologies (6.5) 337

Logical and Physical Topologies (6.5.1.1) 337

Bus 338

Ring 339

Star 339

Hierarchical 339

Mesh 339

Hybrid 339

Determining the Network Topology (6.5.1.3) 340

Ethernet Standards (6.6) 341

Standards Organizations (6.6.1.1) 341

IEEE 802.3 (6.6.1.2) 342

Ethernet Technologies (6.6.1.3) 342

IEEE 802.11 (6.6.1.4) 343

OSI and TCP/IP Data Models (6.7) 343

TCP/IP (6.7.1.1) 343

Application Layer Protocols 344

Transport Layer Protocols 344

Internet Layer Protocols 344

及rk Access Layer Protocols 345

OSI (6.7.1.2) 345

Comparing the OSI and TCP/IP Models (6.7.1.3) 346

Computer-to-Network Connection (6.8) 347

及rk Installation Completion List (6.8.1.1) 347

Selecting a NIC (6.8.2.1) 348

Installing and Updating a NIC (6.8.2.3) 350

Configuring a NIC (6.8.2.7) 351

Configure Alternate IP Settings 352

Advanced NIC Settings (6.8.2.8) 352

Duplex and Speed 352

Wake on LAN 353

Quality of Service 353

Wireless and Wired Router Configurations (6.8.3) 353

Connecting to the Router (6.8.3.1) 353

Setting the Network Location (6.8.3.2) 354

Logging In to the Router (6.8.3.3) 356

Basic Network Setup (6.8.3.4) 356

Basic Wireless Settings (6.8.3.7) 358

及rk Mode 358

SSID 358

Channel 359

Wireless Security 359

Testing Connectivity with the Windows GUI (6.8.3.12) 360

Testing Connectivity with the Windows CLI (6.8.3.13) 361

ipconfig Command Options 362

ping Command Options 362

net Commands 363

tracert Command 364

nslookup Command 364

OS Configurations (6.8.4) 365

Domain and Workgroup (6.8.4.1) 365

Domain 365

Workgroup 366

Connecting to a Workgroup or a Domain (6.8.4.2) 366

Windows 7 Homegroup (6.8.4.3) 366

Sharing Resources in Windows Vista (6.8.4.4) 368

Sharing Resources in Windows XP (6.8.4.5) 369

及rk Shares and Mapping Drives (6.8.4.6) 369

及rk File Sharing 369

及rk Drive Mapping 370

VPN (6.8.4.10) 371

Select an ISP Connection Type (6.9) 372

Brief History of Connection Technologies (6.9.1.1) 372

Analog Telephone 373

Integrated Services Digital Network 373

Broadband 373

DSL and ADSL (6.9.1.2) 373

Line-of-Sight Wireless Internet Service (6.9.1.3) 374

WiMAX (6.9.1.4) 374

Other Broadband Technologies (6.9.1.5) 375

Cellular 375

Cable 376

Satellite 376

Fiber Broadband 376

Selecting an ISP for the Customer (6.9.1.7) 376

POTS 377

ISDN 378

DSL 378

Cable 378

Satellite 378

Cellular 378

Common Preventive Maintenance Techniques Used for Networks (6.10) 379

Preventive Maintenance Procedures (6.10.1.1) 379

Basic Troubleshooting Process for Networks (6.11) 380

Identify the Problem (6.11.1.1) 380

Establish a Theory of Probable Cause (6.11.1.2) 381

Test the Theory to Determine Cause (6.11.1.3) 381

Establish a Plan of Action to Resolve the Problem and

Implement the Solution (6.11.1.4) 381

Verify Full System Functionality and Implement Preventive Measures (6.11.1.5) 382

Document Findings, Actions, and Outcomes (6.11.1.6) 382

Common Problems and Solutions for Networks (6.11.2) 383

Identify Common Problems and Solutions (6.11.2.1) 383

Summary (6.12.1) 385

Summary of Exercises 387

Labs 387

Worksheets 387

Packet Tracer Activities 388

Check Your Understanding 388

Chapter 7Laptops 393

Objectives 393

关键Terms 393

Introduction (7.0.1.1) 395

395年笔记本电脑部件(7.1)

External Features Unique to Laptops (7.1.1.1) 395

Common Input Devices and LEDs in Laptops (7.1.1.2) 399

Internal Components (7.1.1.3) 401

Motherboards 401

RAM 401

CPUs 402

特殊功能键(7.1.1.4)402

Docking Station Versus Port Replicator (7.1.1.5) 403

Laptop Display Components (7.2) 405

LCD, LED, OLED, and Plasma Monitors (7.2.1.1) 406

Internal Components (7.2.2) 406

Backlights and Inverters (7.2.2.1) 406

Wi-Fi Antenna Connectors (7.2.2.2) 407

Laptop Power (7.3) 408

Power Management (7.3.1.1) 408

Managing ACPI Settings in the BIOS (7.3.1.2) 409

Managing Laptop Power Options (7.3.1.4) 410

Laptop Power Options 410

Hard Drive and Display Power Management 411

Sleep Timers 412

Battery Warnings 412

Laptop Wireless Communication Technologies (7.4) 413

Bluetooth (7.4.1.1) 413

Bluetooth Installation and Configuration 414

Infrared (7.4.1.2) 415

Cellular WAN (7.4.1.3) 417

Wi-Fi (7.4.1.4) 417

Laptop Hardware and Component Installation and Configuration (7.5) 419

Expansion Cards (7.5.1.1) 419

Flash Memory (7.5.1.2) 421

External Flash Drive 421

Flash Cards and Flash Card Readers 421

SODIMM Memory (7.5.1.3) 422

Replacing Hardware Devices (7.5.2) 424

Overview of Hardware Replacement (7.5.2.1) 424

Power (7.5.2.2) 426

Replacing a Battery 427

Replacing a DC Jack 427

关键board, Touchpad, and Screen (7.5.2.4) 428

Replacing a Keyboard 429

Replacing a Touchpad 429

Replacing a Screen 430

Hard Drive and Optical Drive (7.5.2.6) 431

Replacing a Hard Drive 431

Replacing an Optical Drive 432

Wireless Card (7.5.2.8) 433

Speakers (7.5.2.9) 433

CPU (7.5.2.10) 434

System Board (7.5.2.11) 436

Plastics (7.5.2.12) 436

Preventive Maintenance Techniques for Laptops (7.6) 437

Scheduling Maintenance (7.6.1.1) 437

Preventive Maintenance Program 437

Cleaning Procedures (7.6.1.2) 439

关键board 439

Vents 439

LCD Display 440

Touchpad 440

Optical Drive 440

CD and DVD Discs 440

Basic Troubleshooting Process for Laptops (7.7) 441

Identify the Problem (7.7.1.1) 441

Establish a Theory of Probable Cause (7.7.1.2) 441

Test the Theory to Determine Cause (7.7.1.3) 442

Establish a Plan of Action to Resolve the Problem and

Implement the Solution (7.7.1.4) 442

Verify Full System Functionality and Implement Preventive Measures (7.7.1.5) 443

Document Findings, Actions, and Outcomes (7.7.1.6) 443

Identify Common Problems and Solutions (7.7.2.1) 443

Summary (7.8.1) 447

Summary of Exercises 448

Worksheets 448

Virtual Laptop Activities 448

Check Your Understanding 449

Chapter 8Mobile Devices 451

Objectives 451

关键Terms 451

Introduction (8.0.1) 454

Mobile Device Hardware Overview (8.1) 454

Non-Field-Serviceable Parts (8.1.1.1) 454

Non-Upgradeable Hardware (8.1.1.2) 455

Touchscreens (8.1.1.3) 456

Solid State Drives (8.1.1.4) 457

Mobile Operating Systems (8.2) 458

Open Source Versus Closed Source (8.2.1.1) 458

Application and Content Sources (8.2.1.2) 459

Push Versus Pull 460

Sideloading 460

Android Touch Interface (8.2.2) 461

Home Screen Items (8.2.2.1) 461

Navigation Icons 461

Google Search 462

Special Enhancements 462

Notification and System Icons 462

TouchFLO 463

Managing Apps, Widgets, and Folders (8.2.2.2) 463

Apps 464

Widgets 464

Folders 465

All Apps Icon 466

iOS Touch Interface (8.2.3) 466

Home Screen Items (8.2.3.1) 466

Home Button 467

Notification Center 467

Search 468

Managing Apps and Folders (8.2.3.2) 468

Apps 468

Multitasking Bar 469

Folders 469

Common Mobile Device Features (8.2.4) 470

Screen Orientation and Calibration (8.2.4.1) 470

Screen Orientation 470

Screen Calibration 471

GPS (8.2.4.2) 472

及rk Connectivity and Email (8.3) 473

Wireless Data Network (8.3.1.1) 473

Cellular Communications (8.3.1.3) 475

WiMAX and LTE 476

Airplane Mode 476

Bluetooth for Mobile Devices (8.3.2.1) 477

Bluetooth Pairing (8.3.2.2) 477

Introduction to Email (8.3.3.1) 479

POP3 479

IMAP 480

SMTP 480

MIME 480

SSL 480

Exchange 480

Android Email Configuration (8.3.3.3) 481

iOS Email Configuration (8.3.3.4) 481

Mobile Device Synchronization (8.3.4) 482

Types of Data to Synchronize (8.3.4.1) 482

Application Installation Software Requirements (8.3.4.2) 483

Synchronization Connection Types (8.3.4.3) 484

Cross-Platform Data Synchronization 484

Methods for Securing Mobile Devices (8.4) 485

Overview of Passcode Locks (8.4.1.1) 485

Restrictions on Failed Login Attempts (8.4.1.3) 486

Cloud-Enabled Services for Smart Devices (8.4.2) 487

Remote Backup (8.4.2.1) 487

Locator Applications (8.4.2.2) 488

Remote Lock and Remote Wipe (8.4.2.3) 489

Software Security (8.4.3) 490

Antivirus (8.4.3.1) 490

Rooting and Jailbreaking 490

Patching and Updating Operating Systems (8.4.3.2) 491

Applying the Troubleshooting Process to Mobile Devices (8.5.1) 492

Identify the Problem (8.5.1.1) 492

Establish a Theory of Probable Cause (8.5.1.2) 493

Test the Theory to Determine Cause (8.5.1.3) 493

Establish a Plan of Action to Resolve the Problem and

Implement the Solution (8.5.1.4) 494

Verify Full System Functionality and Implement Preventive Measures (8.5.1.5) 494

文档、操作和结果(8.5.1.6)494

Identify Common Problems and Solutions (8.5.2.1) 495

Summary (8.6.1) 498

Summary of Exercises 499

Labs 499

Worksheets 499

Check Your Understanding 499

Chapter 9Printers 503

Objectives 503

关键Terms 503

Introduction (9.0.1) 504

Common Printer Features (9.1) 504

Characteristics and Capabilities of Printers (9.1.1.1) 504

Capabilities and Speed 505

Color or Black and White 505

Quality 505

Reliability 505

Total Cost of Ownership 506

Wired Printer Connection Types (9.1.1.2) 506

Serial 506

Parallel 507

SCSI 507

USB 507

FireWire 507

Ethernet 507

Types of Printers (9.2) 507

Inkjet Printers (9.2.1.1) 508

Laser Printers (9.2.1.2) 509

Printing Process 509

Thermal Printers (9.2.1.3) 511

Impact Printers (9.2.1.4) 511

Types of Impact Printers 512

Installing and Configuring Printers (9.3) 513

Installing a Printer (9.3.1.1) 513

Types of Print Drivers (9.3.1.5) 514

Updating and Installing Print Drivers (9.3.1.6) 515

Printer Test Page (9.3.1.7) 516

Print Test Page 516

Print from an Application 517

Test the Printer 517

Test the Printer from the Printer Panel 518

Configuring Options and Default Settings (9.3.2) 518

Common Configuration Settings (9.3.2.1) 518

Global and Individual Document Options (9.3.2.2) 520

Global Method 520

Per Document Method 520

Optimizing Printer Performance (9.3.3) 520

Software Optimization (9.3.3.1) 521

Hardware Optimization (9.3.3.2) 521

Firmware 521

Printer Memory 521

Additional Printer Upgrades 522

Sharing Printers (9.4) 523

Configuring Printer Sharing (9.4.1.1) 523

Wireless Printer Connections (9.4.1.2) 525

Print Servers (9.4.2) 526

Purposes of Print Servers (9.4.2.1) 526

及rk, Dedicated, and Computer Shared Print Servers (9.4.2.2) 526

Hardware Print Servers 526

Dedicated PC Print Servers 527

Computer-Shared Printers 527

Preventive Maintenance Techniques for Printers (9.5) 528

Vendor Guidelines (9.5.1.1) 528

Replacing Consumables (9.5.1.2) 529

Cleaning Methods (9.5.1.3) 530

Printer Maintenance 531

Operational Environment (9.5.1.4) 532

Basic Troubleshooting Process for Printers (9.6) 532

Identify the Problem (9.6.1.1) 533

Establish a Theory of Probable Cause (9.6.1.2) 533

Test the Theory to Determine Cause (9.6.1.3) 534

Establish a Plan of Action to Resolve the Problem and Implement the Solution (9.6.1.4) 534

Verify Full System Functionality and Implement Preventive Measures (9.6.1.5) 535

Document Findings, Actions, and Outcomes (9.6.1.6) 535

Common Problems and Solutions for Printers (9.6.2) 536

Identify Common Problems and Solutions (9.6.2.1) 536

Summary (9.7.1.1) 537

Summary of Exercises 537

Labs 538

Worksheets 538

Check Your Understanding 538

Chapter 10Security 541

Objectives 541

关键Terms 541

Introduction (10.0.1) 544

Security Threats (10.1) 545

Adware, Spyware, and Phishing (10.1.1.1) 545

Adware 545

Spyware 545

Grayware 545

Phishing 545

Viruses, Worms, Trojans, and Rootkits (10.1.1.2) 546

Viruses 546

Worms 546

Trojans 546

Virus Protection Software 547

Rootkits 547

Web Security (10.1.1.3) 547

ActiveX Filtering 548

Pop-Up Blocker 548

SmartScreen Filter 549

InPrivate Browsing (10.1.1.4) 550

Spam (10.1.1.5) 551

TCP/IP Attacks (10.1.1.6) 552

Denial of Service 552

Distributed DoS 552

SYN Flood 552

Spoofing 553

Man-in-the-Middle 553

Replay 553

DNS Poisoning 553

Social Engineering (10.1.2.1) 554

Data Wiping, Hard Drive Destruction, and Recycling (10.1.2.2) 554

Data Wiping 555

Degaussing 555

Hard Drive Destruction 556

Solid State Drives 556

Hard Drive Recycling 556

Security Procedures (10.2) 556

What Is a Security Policy? (10.2.1.1) 557

Security Policy Requirements (10.2.1.3) 557

Usernames and Passwords (10.2.1.4) 559

Requiring Passwords 559

Password Requirements (10.2.1.5) 560

Screensaver Required Password 561

File and Folder Permissions (10.2.1.6) 561

Principle of Least Privilege 564

Restricting User Permissions 565

Software Firewalls (10.2.2.1) 565

Biometrics and Smart Cards (10.2.2.2) 567

Smart Card Security 568

Security Key Fob 568

Data Backups (10.2.2.3) 568

数据加密(10.2.2.4)569

Malicious Software Protection Programs (10.2.3.1) 571

Rogue Antivirus 571

Remediating Infected Systems 572

Signature File Updates (10.2.3.3) 573

Common Communication Encryption Types (10.2.4.1) 575

Hash Encoding 575

Symmetric Encryption 575

Asymmetric Encryption 576

Service Set Identifiers (10.2.4.2) 577

MAC Address Filtering (10.2.4.3) 578

Wireless Security Modes (10.2.4.4) 578

Additions to WPA and WPA2 579

Wireless Access (10.2.4.6) 579

Wireless Antennae 580

及rk Device Access 580

Wi-Fi Protected Setup 581

Firewalls (10.2.4.7) 581

Demilitarized Zone 582

Port Forwarding and Port Triggering (10.2.4.9) 583

Physical Equipment Protection Methods (10.2.5.1) 585

Disabling AutoRun 585

Two-Factor Authentication 586

Security Hardware (10.2.5.2) 586

Protecting Data While in Use 587

The Right Security Mix 588

Security Maintenance (10.3.1) 589

Operating System Service Packs and Security Patches (10.3.1.1) 589

Data Backups (10.3.1.3) 591

Configuring Firewall Types (10.3.1.7) 593

Maintaining Accounts (10.3.1.11) 595

Terminating Employee Access 595

Guest Accounts 595

Applying the Troubleshooting Process to Security (10.4.1) 596

识别问题(10.4.1.1)596

Establish a Theory of Probable Cause (10.4.1.2) 597

Test the Theory to Determine Cause (10.4.1.3) 597

Establish a Plan of Action to Resolve the Problem and Implement the Solution (10.4.1.4) 598

Verify Full System Functionality and, If Applicable, Implement Preventive Measures (10.4.1.5) 598

Document Findings, Actions, and Outcomes (10.4.1.6) 599

Identify Common Problems and Solutions (10.4.2.1) 599

Summary (10.5.1.1) 602

Summary of Exercises 602

Labs 602

Worksheets 603

Check Your Understanding 603

Chapter 11The IT Professional 607

Objectives 607

关键Terms 607

Introduction (11.0.1) 608

Communication Skills and the IT Professional (11.1) 608

Relationship Between Communication Skills and Troubleshooting (11.1.1.1) 608

Relationship Between Communication Skills and Professional Behavior (11.1.1.2) 609

Working with a Customer (11.1.2) 610

Using Communication Skills to Determine Customer Problems (11.1.2.1) 610

Displaying Professional Behavior with Customers (11.1.2.2) 611

Keeping the Customer Focused on the Problem (11.1.2.5) 613

Talkative Customers 613

Rude Customers 613

Angry Customers 614

Knowledgeable Customers 614

Inexperienced Customers 615

Using Proper Netiquette (11.1.2.6) 615

Employee Best Practices (11.1.3) 616

Time and Stress Management Techniques (11.1.3.1) 616

Workstation Ergonomics 616

Time Management 616

Stress Management 617

Observing Service Level Agreements (11.1.3.2) 618

Following Business Policies (11.1.3.3) 619

Customer Call Rules 619

Call Center Employee Rules 619

Customer Satisfaction 620

Ethical and Legal Issues in the IT Industry (11.2) 620

Ethical Considerations in IT (11.2.1.1) 620

Legal Considerations in IT (11.2.1.2) 621

Legal Procedures Overview (11.2.2) 621

Computer Forensics (11.2.2.1) 622

Cyber Law and First Response (11.2.2.2) 622

Cyber Law 622

First Response 623

Documentation and Chain of Custody (11.2.2.3) 623

Documentation 624

Chain of Custody 624

Call Center Technicians (11.3) 625

Call Centers (11.3.1.1) 625

Level One Technician Responsibilities (11.3.1.2) 626

Level Two Technician Responsibilities (11.3.1.3) 627

Summary (11.4.1) 628

Summary of Exercises 629

Worksheets 629

Check Your Understanding 629

Chapter 12Advanced Troubleshooting 633

Objectives 633

关键Terms 633

Introduction (12.0.1) 634

Apply Troubleshooting Process to Computer Components and Peripherals (12.1.1) 634

Six Steps for Advanced Troubleshooting Computer Components and Peripherals (12.1.1.1) 634

Common Problems and Solutions for Components and Peripherals (12.1.1.2) 637

Apply Troubleshooting Skills to Computer Components and Peripherals (12.1.1.3) 639

Operating Systems (12.2) 641

Six Steps for Advanced Troubleshooting Operating Systems (12.2.1.1) 641

Common Problems and Solutions for Operating Systems (12.2.1.2) 643

Apply Troubleshooting Skills to Operating Systems (12.2.1.3) 648

Apply Troubleshooting Process to Networks (12.3.1) 650

Six Steps for Advanced Troubleshooting Networks (12.3.1.1) 650

Common Problems and Solutions for Networks (12.3.1.2) 652

及rk Connection Problems 652

Email Failure 654

FTP and Secure Internet Connection Problems 654

Problems Revealed by CLI Commands 655

Apply Troubleshooting Skills to Networks (12.3.1.3) 656

Apply Troubleshooting Process to Laptops (12.4.1) 658

Six Steps for Advanced Troubleshooting Laptops (12.4.1.1) 658

Common Problems and Solutions for Laptops (12.4.1.2) 661

Apply Troubleshooting Skills to Laptops (12.4.1.3) 664

Apply Troubleshooting Process to Printers (12.5.1) 665

Six Steps for Advanced Troubleshooting Printers (12.5.1.1) 665

Common Problems and Solutions for Printers (12.5.1.2) 668

Apply Troubleshooting Skills to Printers (12.5.1.3) 669

Apply Troubleshooting Process to Security (12.6.1) 670

Six Steps for Advanced Troubleshooting Security (12.6.1.1) 670

Common Problems and Solutions for Security (12.6.1.2) 673

Malware Settings 673

User Accounts and Permissions 674

Computer Security 674

Firewall and Proxy Settings 675

Apply Troubleshooting Skills to Security (12.6.1.3) 676

Summary (12.7.1) 678

Summary of Exercises 678

Labs 678

Check Your Understanding 679

Appendix AAnswers to “Check Your Understanding” Questions 683

Glossary699

9781587133084 TOC 6/6/2013

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simplyemailinformation@informit.com

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through ourContact Us form

Other Collection and Use of Information


Application and System Logs

皮尔森自动收集日志数据来帮助sure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on theAccount page.如果一个用户不再期望我们的服务和德西res to delete his or her account, please contact us atcustomer-service@informit.comand we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:www.e-skidka.com/u.aspx

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information toNevadaDesignatedRequest@pearson.com

Supplemental Privacy Statement for California Residents


California residents should read ourSupplemental privacy statement for California residentsin conjunction with this Privacy Notice. TheSupplemental privacy statement for California residentsexplains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Pleasecontact usabout this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020