Home > Store

IT Essentials, 5th Edition

Register your product to gain access to bonus material or receive a coupon.

IT Essentials, 5th Edition

eBook

  • Your Price: $49.29
  • List Price: $57.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Description

  • Copyright 2014
  • Dimensions: 8" x 9-1/8"
  • Edition: 5th
  • eBook
  • ISBN-10: 0-13-325668-5
  • ISBN-13: 978-0-13-325668-0

IT Essentials: PC Hardware and Software Companion Guide, Fifth Edition

IT Essentials: PC Hardware and Software Companion Guide, Fifth Edition, supports the Cisco Networking Academy IT Essentials: PC Hardware and Software version 5 course. The course is designed for Cisco Networking Academy students who want to pursue careers in IT and learn how computers work, how to assemble computers, and how to safely and securely troubleshoot hardware and software issues.

As CompTIA Approved Quality Content, the course also helps you prepare for the CompTIA A+ certification exams 220-801 and 220-802. CompTIA A+ 220-801 covers the fundamentals of computer technology, installation and configuration of PCs, laptops, related hardware, and basic networking. CompTIA A+ 220-802 covers the skills required to install and configure PC operating systems and configure common features, such as network connectivity and email for Android and Apple iOS mobile operating systems. Students must pass both exams to earn the CompTIA A+ certification.

The features of the Companion Guide are designed to help you study and succeed in this course:

--  Chapter objectives—Review core concepts by answering the focus questions listed at the beginning of each chapter.

--  Key terms—Refer to the updated lists of networking vocabulary introduced, and turn to the highlighted terms in context. 

--  Course section numbering—Follow along with the course heading numbers to easily jump online to complete labs, activities, and quizzes referred to within the text. 

--  Check Your Understanding Questions and Answer Key—Evaluate your readiness with the updated end-of-chapter questions that match the style of questions you see on the online course quizzes.

--  Glossary in the back of the book to define Key Terms

The lab icon in the Companion Guide indicates when there is a hands-on Lab or Worksheet to do. The Labs and Worksheets are compiled and published in the separate book, IT Essentials: PC Hardware and Software Lab Manual, Fifth Edition. With more than 1300 pages of activities, including Windows 7, Windows Vista, and Windows XP variations covered in the CompTIA A+ exam objectives, practicing and performing these tasks will reinforce the concepts and help you become a successful PC technician.

Sample Content

Table of Contents

Introduction xxiv

Chapter 1 Introduction to the Personal Computer 1

Objectives 1

Key Terms 1

Introduction (1.0.1) 4

Cases and Power Supplies (1.1.1) 4

    Computer Cases (1.1.1.1) 4

    Power Supplies (1.1.1.2) 6

        Connectors 7

    Electricity and Ohm’s Law (1.1.1.3) 8

Internal PC Components (1.1.2) 11

    Motherboards (1.1.2.1) 11

    CPUs (1.1.2.2) 13

    Cooling Systems (1.1.2.3) 16

ROM and RAM 18

    ROM (1.1.2.4) 18

    RAM (1.1.2.5) 19

    Memory Modules (1.1.2.6) 20

        Cache Memory 22

        Error Checking 22

    Adapter Cards and Expansion Slots (1.1.2.7) 22

    Storage Devices and RAID (1.1.2.8) 25

        Floppy Drive 26

        Hard Drive 26

        Tape Drive 27

        Optical Drive 27

        External Flash Drive 28

        Types of Drive Interfaces 28

    Internal Cables (1.1.2.9) 30

External Ports and Cables (1.1.3) 31

    Video Ports and Cables (1.1.3.1) 31

    Other Ports and Cables (1.1.3.2) 35

        Serial Ports and Cables 35

        Modem Ports and Cables 36

        USB Ports and Cables 36

        FireWire Ports and Cables 37

        Parallel Ports and Cables 38

        eSATA Data Cables 38

        SCSI Ports and Cables 38

        Network Ports and Cables 39

        PS/2 Ports 40

        Audio Ports 40

Input and Output Devices (1.1.4) 41

    Input Devices (1.1.4.1) 41

        Mice and Keyboards 41

        Gamepads and Joysticks 42

        Digital Cameras and Digital Video Cameras 42

        Biometric Identification Devices 43

        Touchscreens 43

        Digitizers 43

        Scanners 44

    Output Devices (1.1.4.2) 44

        Monitors and Projectors 44

        All-in-One Printers 46

        Speakers and Headphones 46

    Monitor Characteristics (1.1.4.3) 46

        Connecting Multiple Monitors to a Single Computer 48

Selecting PC Components (1.2.1) 49

    Case and Power Supply (1.2.1.1) 49

    Selecting Motherboards (1.2.1.2) 50

    Selecting the CPU and Heat Sink and Fan Assembly (1.2.1.3) 51

    Selecting RAM (1.2.1.4) 53

    Selecting Adapter Cards (1.2.1.5) 54

        Graphics Cards 54

        Sound Cards 55

        Storage Controllers 55

        I/O Cards 56

        NICs 56

        Capture Cards 57

    Selecting Hard Drives and Floppy Drives (1.2.1.6) 57

        Floppy Disk Drive 57

        Hard Drives 57

    Selecting Solid State Drives and Media Readers (1.2.1.7) 60

        Solid State Drives 60

        Media Readers 61

    Selecting Optical Drives (1.2.1.8) 62

    Selecting External Storage (1.2.1.9) 62

    Selecting Input and Output Devices (1.2.1.10) 63

Specialized Computer Systems (1.3.1) 64

    CAx Workstations (1.3.1.1) 65

    Audio and Video Editing Workstations (1.3.1.2) 65

    Virtualization Workstations (1.3.1.3) 67

    Gaming PCs (1.3.1.4) 68

    Home Theater PCs (1.3.1.5) 69

Summary (1.4.1) 71

Summary of Exercises 71

    Worksheets 71

Check Your Understanding 72

Chapter 2 Lab Procedures and Tool Use 75

Objectives 75

Key Terms 75

Introduction (2.0.1) 77

Safe Lab Procedures (2.1) 77

    General Safety (2.1.1.1) 77

    Electrical Safety (2.1.1.2) 78

    Fire Safety (2.1.1.3) 78

Procedures to Protect Equipment and Data (2.1.2) 79

    ESD and EMI (2.1.2.1) 79

        Climate 80

    Power Fluctuation Types (2.1.2.2) 80

    Power Protection Devices (2.1.2.3) 81

Procedures to Protect the Environment (2.1.3) 82

    Material Safety and Data Sheet (2.1.3.1) 82

    Equipment Disposal (2.1.3.2) 83

        Batteries 83

        Monitors 84

        Toner Kits, Cartridges, and Developers 84

        Chemical Solvents and Aerosol Cans 84

Proper Use of Tools (2.2) 84

    Hardware Tools (2.2.1) 84

        ESD Tools (2.2.1.2) 85

        Hand Tools (2.2.1.3) 85

        Cleaning Tools (2.2.1.4) 86

        Diagnostic Tools (2.2.1.5) 86

    Software Tools (2.2.2) 88

        Disk Management Tools (2.2.2.1) 88

        Protection Software Tools (2.2.2.2) 89

    Organizational Tools (2.2.3) 89

        Reference Tools (2.2.3.1) 89

        Miscellaneous Tools (2.2.3.2) 91

    Demonstrate Proper Tool Use (2.2.4) 92

        Antistatic Wrist Strap (2.2.4.1) 92

        Antistatic Mat (2.2.4.2) 93

        Hand Tools (2.2.4.3) 94

        Cleaning Materials (2.2.4.6) 98

Summary (2.3.1) 101

Summary of Exercises 101

    Labs 101

    Worksheets 102

Check Your Understanding 102

Chapter 3 Computer Assembly 105

Objectives 105

Key Terms 105

Introduction (3.0.1) 106

Open the Case and Install the Power Supply (3.1.1) 106

    Open the Case (3.1.1.1) 106

    Install the Power Supply (3.1.1.2) 107

Install the Motherboard (3.1.2) 108

    Install the CPU, Heat Sink, and Fan Assembly (3.1.2.1) 108

        CPU 108

        Heat Sink and Fan Assembly 110

    Install RAM (3.1.2.2) 111

    Install the Motherboard (3.1.2.3) 112

Install the Drives (3.1.3) 113

    Install the Internal Drive (3.1.3.1) 113

    Install the Optical Drive (3.1.3.2) 113

    Install the Floppy Drive (3.1.3.3) 114

Install the Adapter Cards (3.1.4) 115

    Types of Adapter Cards (3.1.4.1) 115

    Install a NIC (3.1.4.2) 116

    Install a Wireless NIC (3.1.4.3) 116

    Install a Video Adapter Card (3.1.4.4) 117

Install the Cables (3.1.5) 118

    Install the Internal Power Cables (3.1.5.1) 118

        Motherboard Power Connections 118

        SATA Power Connectors 119

        Molex Power Connectors 119

        Berg Power Connectors 119

    Install the Internal Data Cables (3.1.5.2) 120

        PATA Data Cables 120

        SATA Data Cables 121

        Floppy Data Cables 121

    Install the Front Panel Cables (3.1.5.4) 122

        Power and Reset Buttons 123

        Power and Drive Activity LEDs 124

        System Speaker 124

        USB 124

        Audio 125

    Install the Case Assembly (3.1.5.6) 126

    Install the External Cables (3.1.5.7) 126

POST and BIOS (3.2.1) 128

    BIOS Beep Codes and Setup (3.2.1.1) 128

        POST Card 129

    BIOS Setup (3.2.1.2) 129

BIOS Configuration (3.2.2) 131

    BIOS Component Information (3.2.2.1) 131

    BIOS Configurations (3.2.2.2) 131

        Time and Date 131

        Disabling Devices 132

        Boot Order 132

        Clock Speed 132

        Virtualization 133

    BIOS Security Configurations (3.2.2.3) 133

    BIOS Hardware Diagnostics and Monitoring (3.2.2.4) 134

        Temperatures 134

        Fan Speeds 135

        Voltages 135

        Clock and Bus Speeds 135

        Intrusion Detection 136

        Built-In Diagnostics 136

Motherboard and Related Components (3.3.1) 137

    Motherboard Component Upgrades (3.3.1.1) 137

        CPU Installation 138

        Jumper Settings 138

        CMOS Battery Installation 139

    Upgrade the Motherboard (3.3.1.2) 139

        BIOS Updates 140

    Upgrade CPU and Heat Sink and Fan Assembly (3.3.1.3) 141

    Upgrade the RAM (3.3.1.4) 142

    Upgrade the BIOS (3.3.1.5) 143

Storage Devices (3.3.2) 144

    Upgrade Hard Drives and RAID (3.3.2.1) 144

Input and Output Devices (3.3.3) 147

    Upgrade Input and Output Devices (3.3.3.1) 147

Summary (3.4.1.1) 149

Summary of Exercises 149

    Virtual Desktop Activities 150

    Labs 150

    Worksheets 150

Check Your Understanding 151

Chapter 4 Overview of Preventive Maintenance 155

Objectives 155

Key Terms 155

Introduction (4.0.1) 156

Preventive Maintenance (4.1) 156

    Benefits of Preventive Maintenance (4.1.1.1) 156

    Preventive Maintenance Tasks (4.1.1.2) 157

        Hardware 157

        Software 157

    Clean the Case and Internal Components (4.1.1.3) 158

    Inspect Internal Components (4.1.1.4) 159

    Environmental Concerns (4.1.1.5) 160

Troubleshooting Process Steps (4.2.1) 160

    Introduction to Troubleshooting (4.2.1.1) 161

        Data Backup 161

    Identify the Problem (4.2.1.2) 162

        Conversation Etiquette 162

        Open-Ended and Closed-Ended Questions 163

        Documenting Responses 163

        Beep Codes 163

        BIOS Information 164

        Event Viewer 164

        Device Manager 164

        Task Manager 165

        Diagnostic Tools 165

    Establish a Theory of Probable Cause (4.2.1.3) 166

    Test the Theory to Determine Cause (4.2.1.4) 166

    Establish a Plan of Action to Resolve the Problem and

    Implement the Solution (4.2.1.5) 167

    Verify Full System Functionality and, If Applicable, Implement

    Preventive Measures (4.2.1.6) 168

    Document Findings, Actions, and Outcomes (4.2.1.7) 168

    PC Common Problems and Solutions (4.2.2.1) 169

Summary (4.3.1) 175

Summary of Exercises 175

Check Your Understanding 175

Chapter 5 Operating Systems 179

Objectives 179

Key Terms 179

Introduction 5.0.1.1 181

Modern Operating Systems (5.1) 181

    Terms (5.1.1.1) 181

    Basic Functions of an Operating System (5.1.1.2) 181

        Hardware Access 182

        File and Folder Management 182

        User Interface 182

        Application Management 183

    Processor Architecture (5.1.1.3) 183

Types of Operating Systems (5.1.2) 184

    Desktop Operating Systems (5.1.2.1) 185

        Microsoft Windows 185

        Apple OS X 186

        Linux 186

    Network Operating Systems (5.1.2.2) 186

Customer Requirements for an Operating System (5.1.3) 187

    OS-Compatible Applications and Environments (5.1.3.1) 187

    Minimum Hardware Requirements and Compatibility with the OS Platform (5.1.3.2) 188

        Microsoft Compatibility Center 188

    Comparing OS Requirements (5.1.3.3) 189

Operating System Upgrades (5.1.4) 192

    Checking OS Compatibility (5.1.4.1) 192

        Upgrade Advisor 192

    Windows OS Upgrades (5.1.4.2) 193

    Data Migration (5.1.4.3) 195

        User State Migration Tool 195

        Windows Easy Transfer 195

        File and Settings Transfer Wizard for Windows XP 196

Operating System Installation (5.2) 196

    Hard Drive Partitioning (5.2.1.1) 196

        Partitioning 197

    Hard Drive Formatting (5.2.1.2) 198

        Quick Format Versus Full Format 200

    OS Installation with Default Settings (5.2.1.4) 200

        Network Settings 202

    Account Creation (5.2.1.8) 203

    Complete the Installation (5.2.1.12) 204

        Windows Update 205

        Device Manager 206

Custom Installation Options (5.2.2) 207

    Disk Cloning (5.2.2.1) 207

    Other Installation Methods (5.2.2.2) 207

        Network Installation 208

        PXE Installation 209

        Unattended Installation in Windows 7 and Vista 209

        Image-Based Installation 210

        Remote Installation 210

    System Recovery Options (5.2.2.6) 211

        System Recovery Options 211

        System Image Recovery 213

        Automated System Recovery in Windows XP Professional 214

        Factory Recovery Partition 214

Boot Sequence and Registry Files (5.2.3) 214

    Windows Boot Process (5.2.3.1) 214

        Windows Boot Process 215

        Windows Boot Loader and Windows Boot Manager in Windows 7 and Windows Vista 216

        NTLDR and the Windows Boot Menu in Windows XP 216

        NT Kernel 216

    Startup Modes (5.2.3.2) 217

    Windows Registry (5.2.3.3) 217

Multiboot (5.2.4) 218

    Multiboot Procedures (5.2.4.1) 219

        BOOTMGR File 219

    Disk Management Utility (5.2.4.2) 220

        Drive Status 221

        Extending Partitions 222

        Splitting Partitions 222

        Assigning Drive Letters 222

        Adding Drives 222

        Adding Arrays 223

Directory Structure and File Attributes (5.2) 224

    Directory Structures (5.2.5.1) 224

        Drive Mapping 224

        Mounting a Volume 224

    User and System File Locations (5.2.5.2) 225

        User File Locations 225

        System Folder 225

        Fonts 225

    Temporary Files 226

        Program Files 227

    File Extensions and Attributes (5.2.5.3) 227

    Application, File, and Folder Properties (5.2.5.4) 228

        Application and File Properties 229

        Folder Properties 229

        Shadow Copy 230

The Windows GUI and Control Panel (5.3) 230

    Windows Desktop (5.3.1.1) 230

        Gadgets 231

    Desktop Properties (5.3.1.2) 232

    Start Menu and Taskbar (5.3.1.3) 233

        Start Menu 233

        Taskbar 234

    Task Manager (5.3.1.4) 234

    Computer and Windows Explorer (5.3.1.8) 236

        Computer 236

        Windows Explorer 236

        Launching Applications and Opening Files 236

    Windows 7 Libraries (5.3.1.9) 237

    Install and Uninstall Applications (5.3.1.10) 237

        Adding an Application 237

        Uninstalling or Changing a Program 238

Control Panel Utilities (5.3.2) 239

    Introduction to Control Panel Utilities (5.3.2.1) 239

    User Accounts (5.3.2.2) 241

        User Account Control Settings 241

    Internet Options (5.3.2.6) 242

    Display Settings (5.3.2.10) 243

    Folder Options (5.3.2.11) 245

        General Tab 245

        View Tab 245

        Search Tab 245

    Action Center (5.3.2.12) 245

    Windows Firewall (5.3.2.13) 246

    Power Options (5.3.2.14) 247

    System Utility (5.3.2.15) 248

        Performance Settings 248

        Windows ReadyBoost 249

    Device Manager (5.3.2.19) 250

    Regional and Language Options (5.3.2.23) 252

Administrative Tools (5.3.3) 252

    Computer Management (5.3.3.1) 252

    Event Viewer, Component Services, and Data Sources (5.3.3.2) 253

    Services (5.3.3.3) 254

    Performance and Windows Memory Diagnostic (5.3.3.4) 255

System Tools (5.3.4) 256

    Disk Defragmenter and Disk Error-Checking Tool (5.3.4.1) 256

        Disk Defragmenter 256

        Disk Error-Checking Tool 257

    System Information (5.3.4.5) 258

Accessories (5.3.5) 259

    Remote Desktop (5.3.5.1) 259

Control Panel Utilities Unique to Specific Windows Versions (5.3.6) 260

    Windows 7 Unique Utilities (5.3.6.1) 261

        HomeGroup 261

        Action Center 261

        Windows Defender 261

        RemoteApp and Desktop Connections 262

        Troubleshooting 262

    Windows Vista Unique Utilities (5.3.6.2) 262

    Windows XP Unique Utilities (5.3.6.3) 263

Command-Line Tools (5.3.7) 264

    Windows CLI Commands (5.3.7.1) 264

    Run Line Utility (5.3.7.3) 265

        MSCONFIG 267

Client-Side Virtualization (5.4) 268

    Purpose of Virtual Machines (5.4.1.1) 268

    Hypervisor: Virtual Machine Manager (5.4.1.2) 269

        Windows Virtual PC 269

        Windows XP Mode 270

    Virtual Machine Requirements (5.4.1.3) 270

Common Preventive Maintenance Techniques for Operating Systems (5.5) 271

    Preventive Maintenance Plan Contents (5.5.1.1) 271

        Preventive Maintenance Planning 271

        Security 272

        Startup Programs 272

    Updates (5.5.1.5) 273

        Device Driver Updates 273

        Operating System Updates 273

        Firmware Updates 274

    Scheduling Tasks (5.5.1.6) 274

        Windows Task Scheduler 274

        at Command 275

    Restore Points (5.5.1.10) 276

    Hard Drive Backup (5.5.1.14) 277

        Normal Backup 278

        Copy Backup 278

        Incremental Backup 278

        Differential Backup 278

        Daily Backup 278

Basic Troubleshooting Process for Operating Systems (5.6) 279

    Identify the Problem (5.6.1.1) 279

    Establish a Theory of Probable Cause (5.6.1.2) 279

    Test the Theory to Determine Cause (5.6.1.3) 280

    Establish a Plan of Action to Resolve the Problem and

    Implement the Solution (5.6.1.4) 280

    Verify Full System Functionality and Implement Preventive Measures (5.6.1.5) 281

    Document Findings, Actions, and Outcomes (5.6.1.6) 281

    Common Problems and Solutions (5.6.2.1) 282

Summary (5.7.1.1) 288

Summary of Exercises 288

    Labs 288

    Worksheets 291

Check Your Understanding 291

Chapter 6 Networks 295

Objectives 295

Key Terms 295

Introduction (6.0.1) 299

Principles of Networking (6.1) 299

    Define Computer Networks (6.1.1.1) 299

    Features and Benefits (6.1.1.2) 301

        Require Fewer Peripherals 301

        Increase Communication Capabilities 301

        Avoid File Duplication and Corruption 301

        Lower the Cost of Licensing 302

        Centralize Administration 302

        Conserve Resources 302

Identifying Networks (6.2) 302

    LANs (6.2.1.1) 302

    WLANs (6.2.1.2) 303

    PANs (6.2.1.3) 304

    MANs (6.2.1.4) 304

    WANs (6.2.1.5) 304

    Peer-to-Peer Networks (6.2.1.6) 305

    Client/Server Networks (6.2.1.7) 306

Basic Networking Concepts and Technologies (6.3) 307

    Bandwidth (6.3.1.1) 307

    Data Transmission (6.3.1.2) 308

        Simplex 308

        Half-Duplex 309

        Full-Duplex 309

    IP Addressing (6.3.2.1) 309

        IPv4 and IPv6 310

    IPv4 (6.3.2.2) 311

        IPv4 Subnet Mask 312

    IPv6 (6.3.2.3) 313

    Static Addressing (6.3.2.4) 314

    DHCP Addressing (6.3.2.5) 315

        Configuring Alternate IP Settings 317

        DNS 317

    ICMP (6.3.2.6) 317

Common Ports and Protocols (6.3.3) 319

    TCP and UDP (6.3.3.1) 319

    TCP and UDP Protocols and Ports (6.3.3.3) 320

Physical Components of a Network (6.4) 322

    Modems (6.4.1.1) 322

    Hubs, Bridges, and Switches (6.4.1.2) 323

        Hubs 323

        Bridges and Switches 324

        Power over Ethernet 325

    Routers and Wireless Access Points (6.4.1.3) 325

        Wireless Access Points 325

        Routers 326

        Multipurpose Devices 326

    NAS (6.4.1.4) 327

    VoIP Phones (6.4.1.5) 327

    Hardware Firewalls (6.4.1.6) 328

    Internet Appliances (6.4.1.7) 329

    Purchasing Authentic Networking Devices (6.4.1.8) 329

Cables and Connectors (6.4.2) 330

    Considerations for Cabling a Network (6.4.2.1) 330

        Cost 331

        Security 331

        Design for the Future 331

        Wireless 331

    Coaxial Cables (6.4.2.2) 332

    Twisted-Pair Cables (6.4.2.3) 332

        Category Rating 333

        Wire Schemes 334

        Straight-Through Cables 335

        Crossover Cable 335

    Fiber-Optic Cables (6.4.2.6) 336

Network Topologies (6.5) 337

    Logical and Physical Topologies (6.5.1.1) 337

        Bus 338

        Ring 339

        Star 339

        Hierarchical 339

        Mesh 339

        Hybrid 339

    Determining the Network Topology (6.5.1.3) 340

Ethernet Standards (6.6) 341

    Standards Organizations (6.6.1.1) 341

    IEEE 802.3 (6.6.1.2) 342

    Ethernet Technologies (6.6.1.3) 342

    IEEE 802.11 (6.6.1.4) 343

OSI and TCP/IP Data Models (6.7) 343

    TCP/IP (6.7.1.1) 343

        Application Layer Protocols 344

        Transport Layer Protocols 344

        Internet Layer Protocols 344

        Network Access Layer Protocols 345

    OSI (6.7.1.2) 345

    Comparing the OSI and TCP/IP Models (6.7.1.3) 346

Computer-to-Network Connection (6.8) 347

    Network Installation Completion List (6.8.1.1) 347

    Selecting a NIC (6.8.2.1) 348

    Installing and Updating a NIC (6.8.2.3) 350

    Configuring a NIC (6.8.2.7) 351

        Configure Alternate IP Settings 352

    Advanced NIC Settings (6.8.2.8) 352

        Duplex and Speed 352

        Wake on LAN 353

        Quality of Service 353

Wireless and Wired Router Configurations (6.8.3) 353

    Connecting to the Router (6.8.3.1) 353

    Setting the Network Location (6.8.3.2) 354

    Logging In to the Router (6.8.3.3) 356

    Basic Network Setup (6.8.3.4) 356

    Basic Wireless Settings (6.8.3.7) 358

        Network Mode 358

        SSID 358

        Channel 359

        Wireless Security 359

    Testing Connectivity with the Windows GUI (6.8.3.12) 360

    Testing Connectivity with the Windows CLI (6.8.3.13) 361

        ipconfig Command Options 362

        ping Command Options 362

        net Commands 363

        tracert Command 364

        nslookup Command 364

OS Configurations (6.8.4) 365

    Domain and Workgroup (6.8.4.1) 365

        Domain 365

        Workgroup 366

    Connecting to a Workgroup or a Domain (6.8.4.2) 366

    Windows 7 Homegroup (6.8.4.3) 366

    Sharing Resources in Windows Vista (6.8.4.4) 368

    Sharing Resources in Windows XP (6.8.4.5) 369

    Network Shares and Mapping Drives (6.8.4.6) 369

        Network File Sharing 369

        Network Drive Mapping 370

    VPN (6.8.4.10) 371

Select an ISP Connection Type (6.9) 372

    Brief History of Connection Technologies (6.9.1.1) 372

        Analog Telephone 373

        Integrated Services Digital Network 373

        Broadband 373

    DSL and ADSL (6.9.1.2) 373

    Line-of-Sight Wireless Internet Service (6.9.1.3) 374

    WiMAX (6.9.1.4) 374

    Other Broadband Technologies (6.9.1.5) 375

        Cellular 375

        Cable 376

        Satellite 376

        Fiber Broadband 376

    Selecting an ISP for the Customer (6.9.1.7) 376

        POTS 377

        ISDN 378

        DSL 378

        Cable 378

        Satellite 378

        Cellular 378

Common Preventive Maintenance Techniques Used for Networks (6.10) 379

    Preventive Maintenance Procedures (6.10.1.1) 379

Basic Troubleshooting Process for Networks (6.11) 380

    Identify the Problem (6.11.1.1) 380

    Establish a Theory of Probable Cause (6.11.1.2) 381

    Test the Theory to Determine Cause (6.11.1.3) 381

    Establish a Plan of Action to Resolve the Problem and

    Implement the Solution (6.11.1.4) 381

    Verify Full System Functionality and Implement Preventive Measures (6.11.1.5) 382

    Document Findings, Actions, and Outcomes (6.11.1.6) 382

Common Problems and Solutions for Networks (6.11.2) 383

    Identify Common Problems and Solutions (6.11.2.1) 383

Summary (6.12.1) 385

Summary of Exercises 387

    Labs 387

    Worksheets 387

    Packet Tracer Activities 388

Check Your Understanding 388

Chapter 7 Laptops 393

Objectives 393

Key Terms 393

Introduction (7.0.1.1) 395

Laptop Components (7.1) 395

    External Features Unique to Laptops (7.1.1.1) 395

    Common Input Devices and LEDs in Laptops (7.1.1.2) 399

    Internal Components (7.1.1.3) 401

        Motherboards 401

        RAM 401

        CPUs 402

    Special Function Keys (7.1.1.4) 402

    Docking Station Versus Port Replicator (7.1.1.5) 403

Laptop Display Components (7.2) 405

    LCD, LED, OLED, and Plasma Monitors (7.2.1.1) 406

Internal Components (7.2.2) 406

    Backlights and Inverters (7.2.2.1) 406

    Wi-Fi Antenna Connectors (7.2.2.2) 407

Laptop Power (7.3) 408

    Power Management (7.3.1.1) 408

    Managing ACPI Settings in the BIOS (7.3.1.2) 409

    Managing Laptop Power Options (7.3.1.4) 410

        Laptop Power Options 410

        Hard Drive and Display Power Management 411

        Sleep Timers 412

        Battery Warnings 412

Laptop Wireless Communication Technologies (7.4) 413

    Bluetooth (7.4.1.1) 413

        Bluetooth Installation and Configuration 414

    Infrared (7.4.1.2) 415

    Cellular WAN (7.4.1.3) 417

    Wi-Fi (7.4.1.4) 417

Laptop Hardware and Component Installation and Configuration (7.5) 419

    Expansion Cards (7.5.1.1) 419

    Flash Memory (7.5.1.2) 421

        External Flash Drive 421

        Flash Cards and Flash Card Readers 421

    SODIMM Memory (7.5.1.3) 422

Replacing Hardware Devices (7.5.2) 424

    Overview of Hardware Replacement (7.5.2.1) 424

    Power (7.5.2.2) 426

        Replacing a Battery 427

        Replacing a DC Jack 427

    Keyboard, Touchpad, and Screen (7.5.2.4) 428

        Replacing a Keyboard 429

        Replacing a Touchpad 429

        Replacing a Screen 430

    Hard Drive and Optical Drive (7.5.2.6) 431

        Replacing a Hard Drive 431

        Replacing an Optical Drive 432

    Wireless Card (7.5.2.8) 433

    Speakers (7.5.2.9) 433

    CPU (7.5.2.10) 434

    System Board (7.5.2.11) 436

    Plastics (7.5.2.12) 436

Preventive Maintenance Techniques for Laptops (7.6) 437

    Scheduling Maintenance (7.6.1.1) 437

        Preventive Maintenance Program 437

    Cleaning Procedures (7.6.1.2) 439

        Keyboard 439

        Vents 439

        LCD Display 440

        Touchpad 440

        Optical Drive 440

        CD and DVD Discs 440

Basic Troubleshooting Process for Laptops (7.7) 441

    Identify the Problem (7.7.1.1) 441

    Establish a Theory of Probable Cause (7.7.1.2) 441

    Test the Theory to Determine Cause (7.7.1.3) 442

    Establish a Plan of Action to Resolve the Problem and

    Implement the Solution (7.7.1.4) 442

    Verify Full System Functionality and Implement Preventive Measures (7.7.1.5) 443

    Document Findings, Actions, and Outcomes (7.7.1.6) 443

    Identify Common Problems and Solutions (7.7.2.1) 443

Summary (7.8.1) 447

Summary of Exercises 448

    Worksheets 448

    Virtual Laptop Activities 448

Check Your Understanding 449

Chapter 8 Mobile Devices 451

Objectives 451

Key Terms 451

Introduction (8.0.1) 454

Mobile Device Hardware Overview (8.1) 454

    Non-Field-Serviceable Parts (8.1.1.1) 454

    Non-Upgradeable Hardware (8.1.1.2) 455

    Touchscreens (8.1.1.3) 456

    Solid State Drives (8.1.1.4) 457

Mobile Operating Systems (8.2) 458

    Open Source Versus Closed Source (8.2.1.1) 458

    Application and Content Sources (8.2.1.2) 459

        Push Versus Pull 460

        Sideloading 460

Android Touch Interface (8.2.2) 461

    Home Screen Items (8.2.2.1) 461

        Navigation Icons 461

        Google Search 462

        Special Enhancements 462

        Notification and System Icons 462

        TouchFLO 463

    Managing Apps, Widgets, and Folders (8.2.2.2) 463

        Apps 464

        Widgets 464

        Folders 465

        All Apps Icon 466

iOS Touch Interface (8.2.3) 466

    Home Screen Items (8.2.3.1) 466

        Home Button 467

        Notification Center 467

        Search 468

    Managing Apps and Folders (8.2.3.2) 468

        Apps 468

        Multitasking Bar 469

        Folders 469

Common Mobile Device Features (8.2.4) 470

    Screen Orientation and Calibration (8.2.4.1) 470

        Screen Orientation 470

        Screen Calibration 471

    GPS (8.2.4.2) 472

Network Connectivity and Email (8.3) 473

    Wireless Data Network (8.3.1.1) 473

    Cellular Communications (8.3.1.3) 475

        WiMAX and LTE 476

        Airplane Mode 476

    Bluetooth for Mobile Devices (8.3.2.1) 477

    Bluetooth Pairing (8.3.2.2) 477

    Introduction to Email (8.3.3.1) 479

        POP3 479

        IMAP 480

        SMTP 480

        MIME 480

        SSL 480

        Exchange 480

    Android Email Configuration (8.3.3.3) 481

    iOS Email Configuration (8.3.3.4) 481

Mobile Device Synchronization (8.3.4) 482

    Types of Data to Synchronize (8.3.4.1) 482

    Application Installation Software Requirements (8.3.4.2) 483

    Synchronization Connection Types (8.3.4.3) 484

        Cross-Platform Data Synchronization 484

Methods for Securing Mobile Devices (8.4) 485

    Overview of Passcode Locks (8.4.1.1) 485

    Restrictions on Failed Login Attempts (8.4.1.3) 486

Cloud-Enabled Services for Smart Devices (8.4.2) 487

    Remote Backup (8.4.2.1) 487

    Locator Applications (8.4.2.2) 488

    Remote Lock and Remote Wipe (8.4.2.3) 489

Software Security (8.4.3) 490

    Antivirus (8.4.3.1) 490

        Rooting and Jailbreaking 490

    Patching and Updating Operating Systems (8.4.3.2) 491

Applying the Troubleshooting Process to Mobile Devices (8.5.1) 492

    Identify the Problem (8.5.1.1) 492

    Establish a Theory of Probable Cause (8.5.1.2) 493

    Test the Theory to Determine Cause (8.5.1.3) 493

    Establish a Plan of Action to Resolve the Problem and

    Implement the Solution (8.5.1.4) 494

    Verify Full System Functionality and Implement Preventive Measures (8.5.1.5) 494

    Document Findings, Actions, and Outcomes (8.5.1.6) 494

    Identify Common Problems and Solutions (8.5.2.1) 495

Summary (8.6.1) 498

Summary of Exercises 499

    Labs 499

    Worksheets 499

Check Your Understanding 499

Chapter 9 Printers 503

Objectives 503

Key Terms 503

Introduction (9.0.1) 504

Common Printer Features (9.1) 504

    Characteristics and Capabilities of Printers (9.1.1.1) 504

        Capabilities and Speed 505

        Color or Black and White 505

        Quality 505

        Reliability 505

        Total Cost of Ownership 506

    Wired Printer Connection Types (9.1.1.2) 506

        Serial 506

        Parallel 507

        SCSI 507

        USB 507

        FireWire 507

        Ethernet 507

Types of Printers (9.2) 507

    Inkjet Printers (9.2.1.1) 508

    Laser Printers (9.2.1.2) 509

        Printing Process 509

    Thermal Printers (9.2.1.3) 511

    Impact Printers (9.2.1.4) 511

        Types of Impact Printers 512

Installing and Configuring Printers (9.3) 513

    Installing a Printer (9.3.1.1) 513

Types of Print Drivers (9.3.1.5) 514

    Updating and Installing Print Drivers (9.3.1.6) 515

    Printer Test Page (9.3.1.7) 516

        Print Test Page 516

        Print from an Application 517

        Test the Printer 517

        Test the Printer from the Printer Panel 518

Configuring Options and Default Settings (9.3.2) 518

    Common Configuration Settings (9.3.2.1) 518

    Global and Individual Document Options (9.3.2.2) 520

        Global Method 520

        Per Document Method 520

Optimizing Printer Performance (9.3.3) 520

    Software Optimization (9.3.3.1) 521

    Hardware Optimization (9.3.3.2) 521

        Firmware 521

        Printer Memory 521

        Additional Printer Upgrades 522

Sharing Printers (9.4) 523

    Configuring Printer Sharing (9.4.1.1) 523

    Wireless Printer Connections (9.4.1.2) 525

Print Servers (9.4.2) 526

    Purposes of Print Servers (9.4.2.1) 526

    Network, Dedicated, and Computer Shared Print Servers (9.4.2.2) 526

        Hardware Print Servers 526

        Dedicated PC Print Servers 527

        Computer-Shared Printers 527

Preventive Maintenance Techniques for Printers (9.5) 528

    Vendor Guidelines (9.5.1.1) 528

    Replacing Consumables (9.5.1.2) 529

    Cleaning Methods (9.5.1.3) 530

        Printer Maintenance 531

    Operational Environment (9.5.1.4) 532

Basic Troubleshooting Process for Printers (9.6) 532

    Identify the Problem (9.6.1.1) 533

    Establish a Theory of Probable Cause (9.6.1.2) 533

    Test the Theory to Determine Cause (9.6.1.3) 534

    Establish a Plan of Action to Resolve the Problem and Implement the Solution (9.6.1.4) 534

    Verify Full System Functionality and Implement Preventive Measures (9.6.1.5) 535

    Document Findings, Actions, and Outcomes (9.6.1.6) 535

Common Problems and Solutions for Printers (9.6.2) 536

    Identify Common Problems and Solutions (9.6.2.1) 536

Summary (9.7.1.1) 537

Summary of Exercises 537

    Labs 538

    Worksheets 538

Check Your Understanding 538

Chapter 10 Security 541

Objectives 541

Key Terms 541

Introduction (10.0.1) 544

Security Threats (10.1) 545

    Adware, Spyware, and Phishing (10.1.1.1) 545

        Adware 545

        Spyware 545

        Grayware 545

        Phishing 545

    Viruses, Worms, Trojans, and Rootkits (10.1.1.2) 546

        Viruses 546

        Worms 546

        Trojans 546

        Virus Protection Software 547

        Rootkits 547

    Web Security (10.1.1.3) 547

        ActiveX Filtering 548

        Pop-Up Blocker 548

        SmartScreen Filter 549

    InPrivate Browsing (10.1.1.4) 550

    Spam (10.1.1.5) 551

    TCP/IP Attacks (10.1.1.6) 552

        Denial of Service 552

        Distributed DoS 552

        SYN Flood 552

        Spoofing 553

        Man-in-the-Middle 553

        Replay 553

        DNS Poisoning 553

    Social Engineering (10.1.2.1) 554

    Data Wiping, Hard Drive Destruction, and Recycling (10.1.2.2) 554

        Data Wiping 555

        Degaussing 555

        Hard Drive Destruction 556

        Solid State Drives 556

        Hard Drive Recycling 556

Security Procedures (10.2) 556

    What Is a Security Policy? (10.2.1.1) 557

    Security Policy Requirements (10.2.1.3) 557

    Usernames and Passwords (10.2.1.4) 559

        Requiring Passwords 559

    Password Requirements (10.2.1.5) 560

        Screensaver Required Password 561

    File and Folder Permissions (10.2.1.6) 561

        Principle of Least Privilege 564

        Restricting User Permissions 565

    Software Firewalls (10.2.2.1) 565

    Biometrics and Smart Cards (10.2.2.2) 567

        Smart Card Security 568

        Security Key Fob 568

    Data Backups (10.2.2.3) 568

    Data Encryption (10.2.2.4) 569

    Malicious Software Protection Programs (10.2.3.1) 571

        Rogue Antivirus 571

        Remediating Infected Systems 572

    Signature File Updates (10.2.3.3) 573

    Common Communication Encryption Types (10.2.4.1) 575

        Hash Encoding 575

        Symmetric Encryption 575

        Asymmetric Encryption 576

    Service Set Identifiers (10.2.4.2) 577

    MAC Address Filtering (10.2.4.3) 578

    Wireless Security Modes (10.2.4.4) 578

        Additions to WPA and WPA2 579

    Wireless Access (10.2.4.6) 579

        Wireless Antennae 580

        Network Device Access 580

        Wi-Fi Protected Setup 581

    Firewalls (10.2.4.7) 581

        Demilitarized Zone 582

    Port Forwarding and Port Triggering (10.2.4.9) 583

    Physical Equipment Protection Methods (10.2.5.1) 585

        Disabling AutoRun 585

        Two-Factor Authentication 586

    Security Hardware (10.2.5.2) 586

        Protecting Data While in Use 587

        The Right Security Mix 588

Security Maintenance (10.3.1) 589

    Operating System Service Packs and Security Patches (10.3.1.1) 589

    Data Backups (10.3.1.3) 591

    Configuring Firewall Types (10.3.1.7) 593

    Maintaining Accounts (10.3.1.11) 595

        Terminating Employee Access 595

        Guest Accounts 595

Applying the Troubleshooting Process to Security (10.4.1) 596

    Identify the Problem (10.4.1.1) 596

    Establish a Theory of Probable Cause (10.4.1.2) 597

    Test the Theory to Determine Cause (10.4.1.3) 597

    Establish a Plan of Action to Resolve the Problem and Implement the Solution (10.4.1.4) 598

    Verify Full System Functionality and, If Applicable, Implement Preventive Measures (10.4.1.5) 598

    Document Findings, Actions, and Outcomes (10.4.1.6) 599

    Identify Common Problems and Solutions (10.4.2.1) 599

Summary (10.5.1.1) 602

Summary of Exercises 602

    Labs 602

    Worksheets 603

Check Your Understanding 603

Chapter 11 The IT Professional 607

Objectives 607

Key Terms 607

Introduction (11.0.1) 608

Communication Skills and the IT Professional (11.1) 608

    Relationship Between Communication Skills and Troubleshooting (11.1.1.1) 608

    Relationship Between Communication Skills and Professional Behavior (11.1.1.2) 609

Working with a Customer (11.1.2) 610

    Using Communication Skills to Determine Customer Problems (11.1.2.1) 610

    Displaying Professional Behavior with Customers (11.1.2.2) 611

    Keeping the Customer Focused on the Problem (11.1.2.5) 613

        Talkative Customers 613

        Rude Customers 613

        Angry Customers 614

        Knowledgeable Customers 614

        Inexperienced Customers 615

    Using Proper Netiquette (11.1.2.6) 615

Employee Best Practices (11.1.3) 616

    Time and Stress Management Techniques (11.1.3.1) 616

    Workstation Ergonomics 616

        Time Management 616

        Stress Management 617

    Observing Service Level Agreements (11.1.3.2) 618

    Following Business Policies (11.1.3.3) 619

        Customer Call Rules 619

        Call Center Employee Rules 619

        Customer Satisfaction 620

Ethical and Legal Issues in the IT Industry (11.2) 620

    Ethical Considerations in IT (11.2.1.1) 620

    Legal Considerations in IT (11.2.1.2) 621

Legal Procedures Overview (11.2.2) 621

    Computer Forensics (11.2.2.1) 622

    Cyber Law and First Response (11.2.2.2) 622

        Cyber Law 622

        First Response 623

    Documentation and Chain of Custody (11.2.2.3) 623

        Documentation 624

        Chain of Custody 624

Call Center Technicians (11.3) 625

    Call Centers (11.3.1.1) 625

    Level One Technician Responsibilities (11.3.1.2) 626

    Level Two Technician Responsibilities (11.3.1.3) 627

Summary (11.4.1) 628

Summary of Exercises 629

    Worksheets 629

Check Your Understanding 629

Chapter 12 Advanced Troubleshooting 633

Objectives 633

Key Terms 633

Introduction (12.0.1) 634

Apply Troubleshooting Process to Computer Components and Peripherals (12.1.1) 634

    Six Steps for Advanced Troubleshooting Computer Components and Peripherals (12.1.1.1) 634

    Common Problems and Solutions for Components and Peripherals (12.1.1.2) 637

    Apply Troubleshooting Skills to Computer Components and Peripherals (12.1.1.3) 639

Operating Systems (12.2) 641

    Six Steps for Advanced Troubleshooting Operating Systems (12.2.1.1) 641

    Common Problems and Solutions for Operating Systems (12.2.1.2) 643

    Apply Troubleshooting Skills to Operating Systems (12.2.1.3) 648

Apply Troubleshooting Process to Networks (12.3.1) 650

    Six Steps for Advanced Troubleshooting Networks (12.3.1.1) 650

    Common Problems and Solutions for Networks (12.3.1.2) 652

        Network Connection Problems 652

        Email Failure 654

        FTP and Secure Internet Connection Problems 654

        Problems Revealed by CLI Commands 655

    Apply Troubleshooting Skills to Networks (12.3.1.3) 656

Apply Troubleshooting Process to Laptops (12.4.1) 658

    Six Steps for Advanced Troubleshooting Laptops (12.4.1.1) 658

    Common Problems and Solutions for Laptops (12.4.1.2) 661

    Apply Troubleshooting Skills to Laptops (12.4.1.3) 664

    Apply Troubleshooting Process to Printers (12.5.1) 665

    Six Steps for Advanced Troubleshooting Printers (12.5.1.1) 665

    Common Problems and Solutions for Printers (12.5.1.2) 668

    Apply Troubleshooting Skills to Printers (12.5.1.3) 669

Apply Troubleshooting Process to Security (12.6.1) 670

    Six Steps for Advanced Troubleshooting Security (12.6.1.1) 670

    Common Problems and Solutions for Security (12.6.1.2) 673

        Malware Settings 673

        User Accounts and Permissions 674

        Computer Security 674

        Firewall and Proxy Settings 675

    Apply Troubleshooting Skills to Security (12.6.1.3) 676

Summary (12.7.1) 678

Summary of Exercises 678

    Labs 678

Check Your Understanding 679

Appendix A Answers to “Check Your Understanding” Questions 683

Glossary 699

9781587133084   TOC   6/6/2013

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020