Professional Documents
Culture Documents
Mike Meyers Comptia A Guide The Managing and Troubleshooting Pcs Fifth Edition Exams 220 901 220 902 Mike Meyers Full Chapter
Mike Meyers Comptia A Guide The Managing and Troubleshooting Pcs Fifth Edition Exams 220 901 220 902 Mike Meyers Full Chapter
Fifth Edition
(Exams 220 -901 & 220 -902)
■■ About the Authors
Michael Meyers is the industry’s leading authority on CompTIA A+ and
Network+ certification. He is the president and founder of Total Seminars,
LLC, a major provider of PC and network repair seminars for thousands of
organizations throughout the world, and a member of CompTIA.
Mike has written numerous popular textbooks, including the best-
selling CompTIA A+® Certification All-in-One Exam Guide, the CompTIA
Network+® Certification All-in-One Exam Guide, and the Mike Meyers’ CompTIA
Security+® Certification Guide.
Fifth Edition
(Exams 220 -901 & 220 -902)
Mike Meyers
McGraw-Hill Education is an independent entity from CompTIA®. This publication and CD-ROM
may be used in assisting students to prepare for the CompTIA A+ exams. Neither CompTIA nor
McGraw-Hill Education warrants that use of this publication and CD-ROM will ensure passing
any exam. CompTIA and CompTIA A+ are trademarks or registered trademarks of CompTIA in
the United States and/or other countries. All other trademarks are trademarks of their respective
owners.
■■ Acknowledgments
I’d like to acknowledge the many people who contributed their talents to
make this book possible:
To my in-house Editor in Chief, Scott Jernigan: I couldn’t have done it
without you, amigo. Truthfully, has there ever been a better combo than a
wizard and a paladin?
To Christopher Crayton, technical editor: Another great project with
you, Chris. Thanks for keeping my toes to the fire and your relentless push
to update, update, update! This is a much better product than it could have
been without your help.
To Bobby Rogers, mobile devices expert: Thank you for the outstanding
contributions to this book!
To Bill McManus, copy editor: Astonishingly good work in a fast-paced
timeframe. You rock!
To Michael Smyer, Total Seminars’ resident tech guru and photographer:
Your contributions continue to shine, from superb photographs to excellent
illustrations and, in this edition, some nicely styled writing. Well done!
To Dave Rush, crack technologist and ridiculously talented person:
How can I list the many contributions you’ve made to make this book—and
all the crazy products that go with it—so awesome? Researching, writing,
arguing, filming, arguing, researching some more...and the final product.
All fun!
To Travis Everett, Internet guru and writer: Such a wonderful addition
to the team this go-round, not just as a top-notch editor, but as a contributor
as well. Your understanding of the Internet and the cloud added excellent
additions to the book. Looking forward to the next one to see what other
talents you bring to the table!
To Ford Pierson, graphics maven and editor: I know you have a new
prime directive with little Oliver, but thanks for pinch-hitting on some
graphics and editing for the book. Much appreciated. And I’m really glad
we do everything electronically nowadays. Diapers, yikes!
To Sam Huntley and Maggie Jernigan: Thank you for the 11th-hour
assist with proofing. We promise you’ll have more time next time.
To Dudley Lehmer, my partner at Total Seminars: As always, thanks
for keeping the ship afloat while I got to play on this book!
To Amy Stonebraker, acquisitions coordinator at McGraw-Hill:
Thanks for keeping track of everything and (gently) smacking Scott when
he forgot things.
To Claire Yee, acquisitions coordinator at McGraw-Hill: Yay! You arrived
late in the game, but clearly came to play. Thanks for keeping Scott in line
and making the chapters flow. Looking forward to many more with you.
To Richard Camp, proofreader: Thank you, Richard, for catching those
silly typos. Your eagle eyes made the book much better!
To Howie Severson and Jody McKenzie, project editors: It was a joy to
work with you both again. I couldn’t have asked for a better team. In fact,
I asked for the best team and got exactly what I wanted!
ABOUT THIS BOOK
■■ Important Technology Skills
Information technology (IT) offers many career paths, need certain basic computer skills. Mike Meyers’
leading to occupations in such fields as PC repair, CompTIA A+ Guide to Managing and Troubleshooting
network administration, telecommunications, Web PCs builds a foundation for success in the IT field by
development, graphic design, and desktop support. introducing you to fundamental technology concepts
To become competent in any IT field, however, you and giving you essential computer skills.
BaseTech//Mike
BaseTech MikeMeyers’
Meyers’CompTIA
CompTIAA+A+Guide
GuidetotoManaging
Managing and
and Troubleshooting
Troubleshooting PCsPCs / Meyers
/ Meyers / 954-4
/ 954-4 / Ch
/ Ch 7 7 BaseTech // Mike
MikeMeyers’
Meyers’CompTIA
CompTIAA+
A+Guide
GuidetotoManaging
Managingand
andTroubleshooting PCs/ /Meyers
TroubleshootingPCs Meyers/ /954-4
954-4/ /ChCh5 5
BaseTech
daughter boards.
daughter Proprietary motherboards
boards. Proprietary motherboards drive
drive techs
techs crazy
crazy because
because intothetheother’s
other’sslot. slot.DDR
DDRSDRAMSDRAMfor forlaptops
laptopscomes comes
into
replacement parts
replacement parts tend
tendto
tocost
costmore
moreand
andare
arenot
notreadily
readilyavailable.
available. ineither
either200-pin
200-pinSO-DIMMs
SO-DIMMsoror172-pin 172-pinmicro-DIMMs
micro-DIMMs
in
BaseTech / Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs / Meyers / 954-4 / Ch 7
(seeFigure
(see Figure5.13).5.13).
DDR sticks
DDR sticksuse useaarather
ratherinteresting
interestingnaming
namingcon- con-
This!
Try This! ventionbased
vention basedon onthe thenumber
numberofofbytes bytesper persecond
secondofof
MotherboardVarieties
Motherboard Varieties data throughput
data throughputthe theRAMRAMcan canhandle.
handle.To Todetermine
determine
thebytes
bytesper persecond,
second,taketakethetheMHzMHzspeedspeedand andmulti-
multi-
Try This! exercises
Motherboards come
Motherboards come in
in aawide
widevariety
varietyofofform
formfactors.
factors.Go
Gototoyour
yourlocal
local the
daughter boards. Proprietary motherboards drive techs crazy because
computer
computer store
store and
and check
check out
out what
what isisonondisplay.
display.Note
Notethe
thedifferent
different plyby
ply by88bytes
bytes(the (thewidth
widthofofall allDDR
DDRSDRAMSDRAMsticks).sticks).
replacement parts tend to cost more and are not readily available. So 400
400 MHz
MHz multiplied
multipliedby by88isis3200
3200megabytes
megabytesper per
features
features offered
offered by
byATX,
ATX,microATX,
microATX,and
andMini-ITX
Mini-ITXmotherboards.
motherboards. So
apply core skills in 1. Does
Try
Does the
the store
This! storestock
stockMini-ITX
Mini-ITXor
orproprietary
proprietarymotherboards?
motherboards?
second(MBps).
second
to make
to makethe
(MBps).Put
thenew
Putthe
newterm:
theabbreviation
abbreviation“PC”
term:PC3200.
PC3200.Many
“PC”ininthe
Manytechs
thefront
techsalso
front
alsouse use
a new setting. 2. Did
Did the
the clerk
(It’s
clerk use
Motherboard
(It’s what
Motherboards what
come
usetech
most
techslang
Varieties
in aof
most of us
slangand
uscall
wide
andcall
callthem
them
variety
callthe
themotherboards
outside
motherboards“mobos”?
outside
of form ofofformal
factors. formal
“mobos”?
textbooks,
local after
textbooks,
Go to your afterall!)
all!)
the
chips;
naming
chips;for
convention
forexample,
example,DDR400
used
DDR400refers
for
the naming convention used for the individual DDR the individual
referstotoaa400-MHz
400-MHzDDR
DDR
DDR
computer store and check out what is on display. Note the different SDRAMchip
SDRAM chiprunning
runningon onaa200-MHz
200-MHzclock. clock.
features offered by ATX, microATX, and Mini-ITX motherboards. • Figure 5.13 172-pin DDR SDRAM micro-DIMM (photo
SDRAM micro-DIMM (photocourtesy
courtesy Even though
Even though the theterm
termDDRxxx
DDRxxxisisreally reallyjust
justfor for
of Kingston/Joint Harvest)
Harvest)
1. Does the store stock Mini-ITX or proprietary motherboards?
individualDDR
individual DDRchipschipsandandthetheterm
termPCxxxx
PCxxxxisisfor forDDR
DDR
Chipset
2. Did the clerk use tech slang and call the motherboards “mobos”?
sticks, this
sticks, thistradition
traditionof oftwo
twonames
namesfor forevery
everyspeed
speedofofRAM RAMisisa abit bitofofa achal-
chal-
(It’s what most ofhas us call them outside lenge
lenge because
because you’ll
you’lloften
oftenhearhearbothbothterms
termsusedusedinterchangeably.
interchangeably.Table Table5.1 5.1
Every
Every motherboard
motherboard has aachipset,
chipset, oneofor
one formal
or more
more textbooks,
discrete
discrete after all!)
Tech Tip
Tech Tip sidebars
shows
shows allall the
thespeeds
speedsforforDDR—not
DDR—notall allofofthese
thesearearecommonly
commonlyused. used.
integrated
integrated circuit
circuit chips
chips thatthat support
supportthe theCPU’s
CPU’sinter-
inter- Following
Following the the lead
lead ofof AMD
AMD and andother
othermanufacturers,
manufacturers,the thePC PCindus-
indus-
facing
facing to to all
all the
the other
other devices
devices on on thethe motherboard.
motherboard. RAM Slang
try adopted DDR SDRAM as the standard system RAM. InInthe summer
provide inside
try adopted DDR SDRAM as the standard system RAM. the summer
Chipset
The
The chipset
chipset determines
determines the the type
type of of processor
processor the the Most techs drop some or all ofof the
the
of
of 2003,
2003, Intel
Intel relented
relentedandandstopped
stoppedproducing
producingmotherboards
motherboardsand andmemory
memory
motherboard
motherboard accepts,
accepts, the
the type
type and
and capacity
capacity of RAM, SDRAM part of DDR SDRAM SDRAM
Every motherboard has a chipset, one or more discrete of RAM, controllers
controllersthat thatrequired
requiredRDRAM.
RDRAM.
information from and
and
the
the
the sort
integrated sort of
circuit
motherboard
facing
the
of
to all the other
motherboard
internal
internal
chips
supports.
devices on
supports.
and
and external
that support
As
external
the
you
Asthe you learned
devices
devices that
CPU’s inter-
learnedininearlier
motherboard.
that
earlier
when engaged in normal
geekspeak. You’ll hear the memory
memory
be
One
One thing
thing isis sure
sure about
about PC PC technologies:
technologies: any any good
goodidea ideathat
thatcan can
referred to as DDR, DDR RAM, be copied
copied will will bebe copied.
copied. One One ofof Rambus’Rambus’ best best concepts
concepts was was the the
experienced IT chapters, RAM,
chapters, the the chips
chips in inaaPC’s
PC’schipset
chipsetserve
of processorasthe
serve aselectronic
The chipset determines the type
electronic and the
the weird
weird hybrid, dual-channel
dual-channelarchitecture—using
architecture—usingtwo twosticks
sticksofofRDRAM
RDRAMtogethertogethertotoincrease
increase
motherboardthrough
interfaces accepts, which
the typethe andCPU,
capacity of RAM,
RAM, and and hybrid, DDRAM.
DDRAM.
interfaces
and the sortthrough
of internal which the CPU,devicesRAM,that andinput/
input/ Northbridge
Northbridge throughput.
throughput. Manufacturers
Manufacturers have havereleased
releasedmotherboards
motherboardswith withMCCs
MCCsthat that
interact.and external
professionals.
output devices Chipsets vary in features, per-
output devices supports.
the motherboard interact.As Chipsets
you learnedvaryininearlier
features, per- support
support dual-channel
dual-channelarchitecture
architectureusing usingDDR DDRSDRAM.
SDRAM.Dual-channel
Dual-channelDDR DDR
formance, and stability, so they factor hugely in the
formance,
chapters, the and
chips stability, so they
in a PC’s chipset servefactor hugely in the
as electronic motherboards
motherboards use use regular
regular DDRDDRsticks,sticks,although
althoughmanufacturers
manufacturersoften oftensell sell
purchase
interfaces or recommendation
through which the CPU, of a particular
RAM, and input/ mother-
purchase or recommendation of a particular mother- Northbridge
RAM
RAM in in matched
matchedpairs,pairs,branding
brandingthem themas asdual-channel
dual-channelRAM. RAM.
board. Good interact.
output devices techs know Chipsetstheir chipsets!
vary in features, per-
board. Good techs know their chipsets! Dual-channel
Dual-channel DDR DDR requires
requires two two identical
identicalsticks
sticksofofDDR DDRand andthey they
Key Terms, identified
formance,
Because and stability,
the chipset so theyfacilitates
factor hugely in the
communication
Because
purchase or the chipsetof facilitates communication Southbridge must
must snap
snap into
into two
two paired
paired slots.
slots. Many
Many motherboards
motherboards offer
offer four
fourslots
slots (see
(see
between therecommendation
CPU and other adevices
particular in mother-
the system, its Southbridge I’ve got a great Chapter
I’ve got a great Chapter
between
board. Good thetechs
CPU knowandtheirother devices in the system, its
chipsets! Figure
Figure 5.14).
component chips are relatively centrally located on the 55 Challenge!
Challenge! sim
sim on
on calculating
calculating 5.14).
in red, point out component
Because the
motherboard
between the CPU
motherboard
chips
(see
(see
are relatively
chipset
andFigure
facilitates centrally
7.12). inAs
other devices
Figure 7.12). As theyou’ll
located Southbridge
communication
system,recall
you’ll its
recall
on the
from
from
RAM speeds
RAM speeds at
at http://totalsem.
com/90x. Check
com/90x.
http://totalsem.
Check it
it out
out right
right now!
now!
Chapter 6,chips
“BIOS,” chipsets centrally
were originally composed of
important vocabulary
component are relatively located on the
Chapter 6, “BIOS,” chipsets were originally composed of
two primary(see
motherboard chips: the Northbridge
Figure 7.12). As you’ll and the Southbridge.
recall from
two primary
Chapter chips:
The6,Northbridge
“BIOS,” the Northbridge
chipsets were originally
chip
and the Southbridge.
handledcomposedRAM, while of the Table
Table5.1
5.1 DDR
DDRSpeeds
Speeds
and definitions that The Northbridge
two primary
Southbridge
Southbridge
The
chip handled
chips: the Northbridge
handled some expansion
handled
Northbridge chip some expansion
handled RAM,
devices and mass • •Figure
RAM, while the
and the Southbridge.
devices
while the and mass
7.12 Northbridge and Southbridge
Figure 7.12 Northbridge and Southbridge
Clock
ClockSpeed
100
Speed DDR
DDRSpeed
SpeedRating
Rating PCPCSpeed
SpeedRating
Rating
storage drives, such as hard drives. Some motherboard
and mass • Figure 7.12 Northbridge and Southbridge 100 MHz
MHz DDR-200
DDR-200 PC-1600
PC-1600
you need to know.
Southbridge
storage handled
drives, some
such expansion
as(orhard devices
manufacturers added stilldrives.
add) aSome
third motherboard
chip called the Super I/O chip to 133
storage drives, such as hard drives. Some motherboard
manufacturers added (or still add) a third chip called the Super I/O chip to 133 MHz
MHz DDR-266
DDR-266 PC-2100
PC-2100
manufacturers added (or still add) a third chip called the Super I/O chip to 166
166 MHz
MHz DDR-333
DDR-333 PC-2700
PC-2700
200 MHz DDR-400 PC-3200
Cross Check 200 MHz DDR-400 PC-3200
CrossCheck
Cross Check 217 MHz
217 MHz
DDR-433
DDR-433
PC-3500
PC-3500
Cross Check Although
Current
Current State
State ofNorthbridge
of the the Northbridge and Southbridge
and Southbridge
Current State of the Northbridge and Southbridge
AlthoughCompTIA
CompTIA continues
continues to discuss
to discuss the Northbridge
the Northbridge and South-and South-
233 MHz
233 MHz
250 MHz
DDR-466
DDR-466
DDR-500
PC-3700
PC-3700
PC-4000
ask, compare, contrast, the discrete Southbridge? How do its functions appear now?
197
and explain.
Chapter 7: Motherboards
197 130
Chapter 7: Motherboards
197 130 Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs
Chapter 7: Motherboards Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs
This pedagogically rich book is designed to make troubleshoot problems. Mike Meyers’ proven ability
learning easy and enjoyable and to help you develop to explain concepts in a clear, direct, even humorous
the skills and critical-thinking abilities that will way makes this book interesting, motivational,
enable you to adapt to different job situations and and fun.
BaseTech / Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs / Meyers / 954-4 / Ch 12
BaseTech / Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs / Meyers / 954-4 / Ch 12
BaseTech / Mike
BaseTech Meyers’
/ Mike CompTIA
Meyers’ A+A+
CompTIA Guide to toManaging
Guide Managingand
andTroubleshooting
Troubleshooting PCs / Meyers
PCs / Meyers//954-4
954-4//Ch
Ch7 7
BaseTech / Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs / Meyers / 954-4 / Ch 7
432
Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs
219
Chapter 7: Motherboards
07-ch07.indd 219 19/02/16 2:46 pm 12-ch12.indd 432 21/01/16 2:21 pm
07-ch07.indd 219 19/02/16 2:46 pm
Tutorials and lab assignments develop Summaries, key terms lists, quizzes,
essential hands-on skills and put essay questions, and lab projects
concepts in real-world contexts. help you practice skills and measure
progress.
Higher Salaries
IT professionals with certifications on their resume command better jobs,
earn higher salaries, and have more doors open to new multi-industry
opportunities.
Verified Strengths
91% of hiring managers indicate CompTIA certifications are valuable in
validating IT expertise, making certification the best way to demonstrate
your competency and knowledge to employers. (Source: CompTIA
Employer Perceptions of IT Training and Certification.)
viii
CompTIA Approved Quality Content
Universal Skills
CompTIA certifications are vendor neutral—which means that certified
professionals can proficiently work with an extensive variety of hardware
and software found in most organizations.
CompTIA Disclaimer
© 2015 CompTIA Properties, LLC, used under license by CompTIA Certifi-
cations, LLC. All rights reserved. All certification programs and education
related to such programs are operated exclusively by CompTIA Certifica-
tions, LLC. CompTIA is a registered trademark of CompTIA Properties,
LLC in the U.S. and internationally. Other brands and company names
mentioned herein may be trademarks or service marks of CompTIA Prop-
erties, LLC or of their respective owners. Reproduction or dissemination of
this courseware sheet is prohibited without written consent of CompTIA
Properties, LLC. Printed in the U.S. 02190-Nov2015.
ix
CompTIA Approved Quality Content
CONTENTS AT A GLANCE
Chapter 4 ■ Microprocessors 80
x
Contents At A Glance
Chapter 16 ■ Working with the Command-Line Interface 550
■ Glossary 1158
■ Index 1218
xi
Contents At A Glance
CONTENTS
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . xx Chapter 3
Instructor Web Site . . . . . . . . . . . . . . . . . . . xxi ■ The Visible Computer 42
Historical/Conceptual . . . . . . . . . . . . . . . 43
The Computing Process . . . . . . . . . . . . . . 43
Chapter 1
The Computing Parts . . . . . . . . . . . . . . 44
■ The Path of the PC Tech 2 Stages . . . . . . . . . . . . . . . . . . . . . . 46
CompTIA A+ Certification . . . . . . . . . . . . . . 2 Why the Process Matters to Techs . . . . . . . 47
Who Is CompTIA? . . . . . . . . . . . . . . . . 2 Breaking It Down . . . . . . . . . . . . . . . . 47
The Path to Other Certifications . . . . . . . . . 3 901 . . . . . . . . . . . . . . . . . . . . . . . . . . 48
CompTIA A+ Objectives . . . . . . . . . . . . . . . 4 Computing Hardware . . . . . . . . . . . . . . . 48
Windows-Centric . . . . . . . . . . . . . . . . . 5 902 . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Windows 10 . . . . . . . . . . . . . . . . . . . . 5 Computing Software . . . . . . . . . . . . . . . . 51
Exam 220–901 . . . . . . . . . . . . . . . . . . 6 Common Operating System Functions . . . . 52
Exam 220-902 . . . . . . . . . . . . . . . . . . 7 User Interfaces . . . . . . . . . . . . . . . . . 52
The Path to Certification . . . . . . . . . . . . . . . 8 File Structures and Paths . . . . . . . . . . . . 62
Finding a Testing Center . . . . . . . . . . . . . 8 The Tech Launch Points . . . . . . . . . . . . 66
Exam Costs . . . . . . . . . . . . . . . . . . . . 9
How to Pass the CompTIA A+ Exams . . . . . 9
Historical/Conceptual . . . . . . . . . . . . . . . 11
Chapter 4
■ Microprocessors 80
Chapter 2 Historical/Conceptual . . . . . . . . . . . . . . . 81
■ Operational Procedures 18 CPU Core Components . . . . . . . . . . . . . . . 81
The Man in the Box . . . . . . . . . . . . . . . 81
902 . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Clock . . . . . . . . . . . . . . . . . . . . . . 85
The Professional Tech . . . . . . . . . . . . . . . . 19 Back to the External Data Bus . . . . . . . . . 88
Appearance . . . . . . . . . . . . . . . . . . . 19 Memory . . . . . . . . . . . . . . . . . . . . . . . 89
The Traits of a Tech . . . . . . . . . . . . . . . 19 Memory and RAM . . . . . . . . . . . . . . . 89
Effective Communication . . . . . . . . . . . . . 23 Address Bus . . . . . . . . . . . . . . . . . . . 91
Assertive Communication . . . . . . . . . . . 23 901 . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Respectful Communication . . . . . . . . . . . 24 Modern CPUs . . . . . . . . . . . . . . . . . . . . 94
Eliciting Answers . . . . . . . . . . . . . . . . 25 Developers . . . . . . . . . . . . . . . . . . . 94
Expectations and Follow-Up . . . . . . . . . . 26 Technology . . . . . . . . . . . . . . . . . . . 97
Tools of the Trade and Personal Safety . . . . . . 27 Selecting and Installing CPUs . . . . . . . . . . 107
Electrostatic Discharge (ESD) . . . . . . . . . 27 Selecting a CPU . . . . . . . . . . . . . . . . 107
Antistatic Tools . . . . . . . . . . . . . . . . . 28 Installation Issues . . . . . . . . . . . . . . . 108
Electromagnetic Interference (EMI) . . . . . . 29 Troubleshooting CPUs . . . . . . . . . . . . . . . 114
Radio Frequency Interference (RFI) . . . . . . 30 Symptoms of Overheating . . . . . . . . . . . 114
Personal Safety . . . . . . . . . . . . . . . . . 30 Catastrophic Failure . . . . . . . . . . . . . . 115
Physical Tools . . . . . . . . . . . . . . . . . . 31 Beyond A+ . . . . . . . . . . . . . . . . . . . . . .116
Software Tools . . . . . . . . . . . . . . . . . . 32
Intel Core M . . . . . . . . . . . . . . . . . . 116
Troubleshooting Theory . . . . . . . . . . . . . 32
xii
Contents
Chapter 5 Chapter 7
■ RAM 122 ■ Motherboards 190
Historical/Conceptual . . . . . . . . . . . . . . 123 Historical/Conceptual . . . . . . . . . . . . . . 191
Understanding DRAM . . . . . . . . . . . . . . 123 How Motherboards Work . . . . . . . . . . . . . 191
Organizing DRAM . . . . . . . . . . . . . . 124 Form Factors . . . . . . . . . . . . . . . . . 191
Practical DRAM . . . . . . . . . . . . . . . 125 901 . . . . . . . . . . . . . . . . . . . . . . . . . . 193
DRAM Sticks . . . . . . . . . . . . . . . . . 126 Chipset . . . . . . . . . . . . . . . . . . . . . 197
Consumer RAM . . . . . . . . . . . . . . . . 127 Motherboard Components . . . . . . . . . . . 198
Types of RAM . . . . . . . . . . . . . . . . . . . 128 Expansion Bus . . . . . . . . . . . . . . . . . . . 201
SDRAM . . . . . . . . . . . . . . . . . . . . 128 Structure and Function of
RDRAM . . . . . . . . . . . . . . . . . . . . 129 the Expansion Bus . . . . . . . . . . . . . 201
901 . . . . . . . . . . . . . . . . . . . . . . . . . . 129 PCI . . . . . . . . . . . . . . . . . . . . . . 203
DDR SDRAM . . . . . . . . . . . . . . . . 129 AGP . . . . . . . . . . . . . . . . . . . . . . 204
DDR2 . . . . . . . . . . . . . . . . . . . . . 131 PCI-X . . . . . . . . . . . . . . . . . . . . . 204
DDR3 . . . . . . . . . . . . . . . . . . . . . 131 Mini-PCI . . . . . . . . . . . . . . . . . . . 204
DDR3L/DDR3U . . . . . . . . . . . . . . . 132 PCI Express . . . . . . . . . . . . . . . . . . 204
DDR4 . . . . . . . . . . . . . . . . . . . . . 132 Installing Expansion Cards . . . . . . . . . . 206
RAM Variations . . . . . . . . . . . . . . . . 133 Troubleshooting Expansion Cards . . . . . . 213
Working with RAM . . . . . . . . . . . . . . . . 136 Upgrading and Installing Motherboards . . . . 214
Do You Need More RAM? . . . . . . . . . . 136 Choosing the Motherboard and Case . . . . . 215
Getting the Right RAM . . . . . . . . . . . . 142 Installing the Motherboard . . . . . . . . . . 217
Installing DIMMs . . . . . . . . . . . . . . . 143 Troubleshooting Motherboards . . . . . . . . . . 219
Installing SO-DIMMs in Laptops . . . . . . 144 Symptoms . . . . . . . . . . . . . . . . . . . 220
Troubleshooting RAM . . . . . . . . . . . . . . . 145 Techniques . . . . . . . . . . . . . . . . . . . 221
Testing RAM . . . . . . . . . . . . . . . . . 146 Options . . . . . . . . . . . . . . . . . . . . 221
Chapter 6 Chapter 8
■ BIOS 154 ■ Power Supplies 230
901 . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Historical/Conceptual . . . . . . . . . . . . . . 231
We Need to Talk . . . . . . . . . . . . . . . . . . 155 Understanding Electricity . . . . . . . . . . . . . 231
Talking to the Keyboard . . . . . . . . . . . . 156 901 . . . . . . . . . . . . . . . . . . . . . . . . . . 232
BIOS . . . . . . . . . . . . . . . . . . . . . . 158 Powering the PC . . . . . . . . . . . . . . . . . . 232
CMOS . . . . . . . . . . . . . . . . . . . . . . . . 161 Supplying AC . . . . . . . . . . . . . . . . . 233
Modify CMOS: The Setup Program . . . . . 162 902 . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Typical CMOS Setup Programs . . . . . . . 166 901 . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Option ROM and Device Drivers . . . . . . . . 174
Supplying DC . . . . . . . . . . . . . . . . . 239
Option ROM . . . . . . . . . . . . . . . . . 174
Installing and Maintaining Power Supplies . . . 247
Device Drivers . . . . . . . . . . . . . . . . . 175
Installing . . . . . . . . . . . . . . . . . . . 247
BIOS, BIOS, Everywhere! . . . . . . . . . . 176
Cooling . . . . . . . . . . . . . . . . . . . . 248
POST . . . . . . . . . . . . . . . . . . . . . . . . 176
Troubleshooting Power Supplies . . . . . . . . . 251
Before and During the Video Test:
No Motherboard . . . . . . . . . . . . . . . . 252
The Beep Codes . . . . . . . . . . . . . . . 176
Switches . . . . . . . . . . . . . . . . . . . . 252
Text Errors . . . . . . . . . . . . . . . . . . . 177
When Power Supplies Die Slowly . . . . . . 252
POST Cards . . . . . . . . . . . . . . . . . . 177
Fuses and Fire . . . . . . . . . . . . . . . . . 253
The Boot Process . . . . . . . . . . . . . . . . 177
Beyond A+ . . . . . . . . . . . . . . . . . . . . . 253
Care and Feeding of BIOS and CMOS . . . . . . 179
Default/Optimized Settings . . . . . . . . . . 179 It Glows! . . . . . . . . . . . . . . . . . . . . 253
Clearing CMOS . . . . . . . . . . . . . . . . 180 Modular Power Supplies . . . . . . . . . . . 254
Losing CMOS Settings . . . . . . . . . . . . 180 Temperature and Efficiency . . . . . . . . . . 254
Flashing the ROM . . . . . . . . . . . . . . 181
xiii
Contents
Chapter 9 Maintaining and Troubleshooting
■ Hard Drive Technologies 262 Hard Drives . . . . . . . . . . . . . . . . . . . 323
Maintenance . . . . . . . . . . . . . . . . . . 323
Historical/Conceptual . . . . . . . . . . . . . . 263 901 . . . . . . . . . . . . . . . . . . . . . . . . . . 328
How Hard Drives Work . . . . . . . . . . . . . . 263 Troubleshooting Hard Drive
Magnetic Hard Drives . . . . . . . . . . . . 263 Implementation . . . . . . . . . . . . . . . 328
901 . . . . . . . . . . . . . . . . . . . . . . . . . . 263 Beyond A+ . . . . . . . . . . . . . . . . . . . . . 333
Solid-State Drives . . . . . . . . . . . . . . . 264 Third-Party Partition Tools . . . . . . . . . . 334
Hybrid Hard Drives . . . . . . . . . . . . . . 265
Parallel and Serial ATA . . . . . . . . . . . . . . 265
PATA . . . . . . . . . . . . . . . . . . . . . . 266
SATA . . . . . . . . . . . . . . . . . . . . . 267 Chapter 11
Protecting Data with RAID . . . . . . . . . . . . 270 ■ Essential Peripherals 344
RAID . . . . . . . . . . . . . . . . . . . . . 272 901 . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Implementing RAID . . . . . . . . . . . . . 273 Supporting Common Ports . . . . . . . . . . . . 345
Software Versus Hardware . . . . . . . . . . 273 USB Ports . . . . . . . . . . . . . . . . . . . 345
Installing Drives . . . . . . . . . . . . . . . . . . 275 FireWire Ports . . . . . . . . . . . . . . . . . 350
Choosing Your Drive . . . . . . . . . . . . . 275 Thunderbolt Ports . . . . . . . . . . . . . . . 352
Jumpers and Cabling on PATA Drives . . . . 276 General Port Issues . . . . . . . . . . . . . . 352
Cabling SATA Drives . . . . . . . . . . . . . 277 Common Peripherals . . . . . . . . . . . . . . . 353
Connecting Solid-State Drives . . . . . . . . 278 Keyboards . . . . . . . . . . . . . . . . . . . 353
BIOS Support: Configuring CMOS Pointing Devices . . . . . . . . . . . . . . . 355
and Installing Drivers . . . . . . . . . . . 278 Biometric Devices . . . . . . . . . . . . . . . 356
Troubleshooting Hard Drive Installation . . . 281 Smart Card Readers . . . . . . . . . . . . . . 356
Bar Code Readers . . . . . . . . . . . . . . . 357
Touch Screens . . . . . . . . . . . . . . . . . 357
Chapter 10 Motion Sensors . . . . . . . . . . . . . . . . 358
■ Implementing Hard Drives 288 KVM Switches . . . . . . . . . . . . . . . . 358
Gamepads and Joysticks . . . . . . . . . . . . 359
Historical/Conceptual . . . . . . . . . . . . . . 289
Digitizers . . . . . . . . . . . . . . . . . . . 360
Hard Drive Partitions . . . . . . . . . . . . . . . 289 Multimedia Devices . . . . . . . . . . . . . . 361
902 . . . . . . . . . . . . . . . . . . . . . . . . . . 289 Video Capture . . . . . . . . . . . . . . . . . 371
Master Boot Record . . . . . . . . . . . . . . 290 TV Tuners . . . . . . . . . . . . . . . . . . . 374
Dynamic Disks . . . . . . . . . . . . . . . . 292 Smart TV and Set-Top Boxes . . . . . . . . . 375
GUID Partition Table . . . . . . . . . . . . . 293 Storage Devices . . . . . . . . . . . . . . . . . . 375
Other Partition Types . . . . . . . . . . . . . 293 Flash Memory . . . . . . . . . . . . . . . . . 376
When to Partition . . . . . . . . . . . . . . . 294 Optical Drives . . . . . . . . . . . . . . . . . 379
Partition Naming Problems . . . . . . . . . . 295
Hard Drive Formatting . . . . . . . . . . . . . . 296
File Systems in Windows . . . . . . . . . . . 296
Chapter 12
FAT . . . . . . . . . . . . . . . . . . . . . . 296
FAT32 . . . . . . . . . . . . . . . . . . . . . 301 ■ Building a PC 394
NTFS . . . . . . . . . . . . . . . . . . . . . 302 901 . . . . . . . . . . . . . . . . . . . . . . . . . . 395
FAT64 . . . . . . . . . . . . . . . . . . . . . 304 Specialized Custom PCs . . . . . . . . . . . . . . 395
File Systems in Mac OS X . . . . . . . . . . 305 Evaluating Parts . . . . . . . . . . . . . . . 395
File Systems in Linux . . . . . . . . . . . . . 305 Workstation PCs . . . . . . . . . . . . . . . 395
The Partitioning, Formatting, Specialized Consumer PCs . . . . . . . . . . 399
and Pooling Process . . . . . . . . . . . . . . 305 902 . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Bootable Media . . . . . . . . . . . . . . . . 305 Installing and Upgrading Windows . . . . . . . 407
Partitioning and Formatting with Media Sources . . . . . . . . . . . . . . . . . 407
the Installation Media . . . . . . . . . . . 306 Types of Installation . . . . . . . . . . . . . . 408
Disk Management . . . . . . . . . . . . . . . 308 The Installation and Upgrade Process . . . . 410
Formatting a Partition . . . . . . . . . . . . 320 Troubleshooting Installation Problems . . . . 421
Storage Spaces . . . . . . . . . . . . . . . . . 321 Post-Installation Tasks . . . . . . . . . . . . . . . 423
Patches, Service Packs, and Updates . . . . . 423
Upgrading Drivers . . . . . . . . . . . . . . 423
xiv
Contents
Restoring User Data Files (If Applicable) . . . 423 Chapter 15
Migrating and Retiring Systems . . . . . . . 424 ■ Maintaining and Optimizing
No Installation Is Perfect . . . . . . . . . . . 427
Operating Systems 514
Beyond A+ . . . . . . . . . . . . . . . . . . . . . 428
902 . . . . . . . . . . . . . . . . . . . . . . . . . . 515
Installing Windows 10 . . . . . . . . . . . . . . . 428
Maintaining Operating Systems . . . . . . . . . 515
Windows Patch Management . . . . . . . . . 515
Patch Management in Mac OS X
Chapter 13 and Linux . . . . . . . . . . . . . . . . . 517
■ Windows Under the Hood 436 Managing Temporary Files in Windows . . . 518
902 . . . . . . . . . . . . . . . . . . . . . . . . . . 437 Registry Maintenance . . . . . . . . . . . . . 519
Registry . . . . . . . . . . . . . . . . . . . . . . . 437 Disk Maintenance Utilities . . . . . . . . . . 520
Accessing the Registry . . . . . . . . . . . . 437 Scheduling Maintenance . . . . . . . . . . . 521
Registry Components . . . . . . . . . . . . . 437 Controlling Autostarting Software . . . . . . 523
Talkin’ Registry . . . . . . . . . . . . . . . . 438 System Information . . . . . . . . . . . . . . 525
Manual Registry Edits . . . . . . . . . . . . 440 Microsoft Management Console . . . . . . . 526
Command-Line Registry Editing Tools . . . . 440 Optimizing Operating Systems . . . . . . . . . . 528
The Boot Process . . . . . . . . . . . . . . . . . . 441 Installing and Removing Software . . . . . . 528
Processes, Services, and Threads . . . . . . . . . 442 Installing/Optimizing a Device . . . . . . . . 532
Task Manager . . . . . . . . . . . . . . . . . 442 Performance Options . . . . . . . . . . . . . 534
Performance Tools . . . . . . . . . . . . . . . 457 Preparing for Problems . . . . . . . . . . . . . . 535
Tools for Programmers . . . . . . . . . . . . . . 462 Backing Up Personal Data . . . . . . . . . . 536
Component Services . . . . . . . . . . . . . . 462 System Restore in Windows . . . . . . . . . . 542
Data Sources . . . . . . . . . . . . . . . . . 463
Chapter 16
Chapter 14 ■ Working with the Command-Line
■ Users, Groups, and Permissions 470 Interface 550
902 . . . . . . . . . . . . . . . . . . . . . . . . . . 471 902 . . . . . . . . . . . . . . . . . . . . . . . . . . 551
Authentication with Users and Groups . . . . . 471 Deciphering the Command-Line Interface . . . 551
User Accounts . . . . . . . . . . . . . . . . . 471 Shells . . . . . . . . . . . . . . . . . . . . . 552
Passwords . . . . . . . . . . . . . . . . . . . 471 Accessing the Command-Line
Groups . . . . . . . . . . . . . . . . . . . . . 473 Interface in Windows . . . . . . . . . . . 552
Configuring Users and Groups . . . . . . . . 474 Accessing the Command-Line Interface
Local Users and Groups . . . . . . . . . . . . 481 in Mac OS X and Linux . . . . . . . . . . 553
Authorization Through NTFS . . . . . . . . . . 484 The Command Prompt . . . . . . . . . . . . 554
NTFS Permissions . . . . . . . . . . . . . . 484 Closing the Terminal . . . . . . . . . . . . . 555
Inheritance . . . . . . . . . . . . . . . . . . . 487 Filenames and File Formats . . . . . . . . . . 555
Permission Propagation . . . . . . . . . . . 488 Drives and Folders . . . . . . . . . . . . . . 555
Techs and Permissions . . . . . . . . . . . . . 489 Mastering Fundamental Commands . . . . . . 557
Permissions in Linux and Mac OS X . . . . . 489 Structure: Syntax and Switches . . . . . . . . 558
Sharing Resources Securely . . . . . . . . . . . . 491 Viewing Directory Contents: dir and ls . . . . 558
Sharing a Folder . . . . . . . . . . . . . . . . 492 Changing Directory Focus: The cd
Add/Edit Users and/or Groups . . . . . . . . 493 Command . . . . . . . . . . . . . . . . . 560
Administrative Shares . . . . . . . . . . . . . 494 Moving Between Drives . . . . . . . . . . . . 562
Protecting Data with Encryption . . . . . . . 495 Making Directories: The md/mkdir
Beyond Sharing Users and Groups . . . . . . . 498 Command . . . . . . . . . . . . . . . . . 563
Security Policies . . . . . . . . . . . . . . . . 498 Removing Directories: The rd/rmdir
User Account Control . . . . . . . . . . . . . 499 Command . . . . . . . . . . . . . . . . . 564
How UAC Works . . . . . . . . . . . . . . . 502 Running a Program in Windows . . . . . . . 565
How to Turn Off UAC . . . . . . . . . . . . 504 Running a Program in Mac OS X
UAC in Modern Windows . . . . . . . . . . 505 and Linux . . . . . . . . . . . . . . . . . 566
Working with Files . . . . . . . . . . . . . . . . . 568
Using Wildcards to Locate Files . . . . . . . . 569
Deleting Files . . . . . . . . . . . . . . . . . 570
xv
Contents
Copying and Moving Files . . . . . . . . . . 571 Chapter 18
Pruning and Grafting Folder Trees . . . . . . 573 ■ Virtualization 648
Assorted Windows Commands . . . . . . . . . 575
chkdsk (/f /r) . . . . . . . . . . . . . . . . . . 575 902 . . . . . . . . . . . . . . . . . . . . . . . . . . 649
format . . . . . . . . . . . . . . . . . . . . . 575 Benefits of Virtualization . . . . . . . . . . . . . 649
hostname . . . . . . . . . . . . . . . . . . . . 576 Power Saving . . . . . . . . . . . . . . . . . 649
gpupdate . . . . . . . . . . . . . . . . . . . . 576 Hardware Consolidation . . . . . . . . . . . 650
gpresult . . . . . . . . . . . . . . . . . . . . 577 System Management and Security . . . . . . 650
sfc . . . . . . . . . . . . . . . . . . . . . . . 577 Research . . . . . . . . . . . . . . . . . . . . 651
shutdown . . . . . . . . . . . . . . . . . . . 578 Implementing Virtualization . . . . . . . . . . . 651
Using Special Keys in Windows . . . . . . . 578 Meet the Hypervisor . . . . . . . . . . . . . . 652
Beyond A+ . . . . . . . . . . . . . . . . . . . . . 579 Emulation Versus Virtualization . . . . . . . 654
The compact and cipher Commands . . . . . . 579 Client-Side Virtualization . . . . . . . . . . . 655
902 . . . . . . . . . . . . . . . . . . . . . . . . . . 582 Server-Side Virtualization . . . . . . . . . . 666
To the Cloud . . . . . . . . . . . . . . . . . . . . 668
PowerShell . . . . . . . . . . . . . . . . . . . 582
The Service-Layer Cake . . . . . . . . . . . . 670
Assorted Mac OS X and Linux Commands . . . 583
Ownership and Access . . . . . . . . . . . . 673
ifconfig . . . . . . . . . . . . . . . . . . . . . 584
Why We Cloud . . . . . . . . . . . . . . . . 675
iwconfig . . . . . . . . . . . . . . . . . . . . 584
ps . . . . . . . . . . . . . . . . . . . . . . . 585
grep . . . . . . . . . . . . . . . . . . . . . . 586
apt-get . . . . . . . . . . . . . . . . . . . . . 587 Chapter 19
vi . . . . . . . . . . . . . . . . . . . . . . . 588 ■ Display Technologies 682
dd . . . . . . . . . . . . . . . . . . . . . . . 589 Video Displays . . . . . . . . . . . . . . . . . . . 683
shutdown . . . . . . . . . . . . . . . . . . . 590 Historical/Conceptual . . . . . . . . . . . . . . 683
passwd . . . . . . . . . . . . . . . . . . . . . 590 CRT Monitors . . . . . . . . . . . . . . . . . 683
901 . . . . . . . . . . . . . . . . . . . . . . . . . . 685
LCD Monitors . . . . . . . . . . . . . . . . . 686
Chapter 17 Projectors . . . . . . . . . . . . . . . . . . . 693
■ Troubleshooting Operating Systems 598 Plasma Displays . . . . . . . . . . . . . . . . 694
902 . . . . . . . . . . . . . . . . . . . . . . . . . . 599 Common Features . . . . . . . . . . . . . . . 695
Failure to Boot . . . . . . . . . . . . . . . . . . . 599 Display Adapters . . . . . . . . . . . . . . . . . 697
Failure to Boot: Hardware or Configuration . . . 600 Historical/Conceptual . . . . . . . . . . . . . . 697
Failure to Boot: Windows XP Modes . . . . . . . . . . . . . . . . . . . . . 697
(A CompTIA Retro Moment) . . . . . . . 601 901 . . . . . . . . . . . . . . . . . . . . . . . . . . 700
Failure to Boot: Modern Windows . . . . . . 605 Motherboard Slot . . . . . . . . . . . . . . . 700
Failure to Boot: Linux . . . . . . . . . . . . . 621 Graphics Processor . . . . . . . . . . . . . . 701
Failure to Start Normally . . . . . . . . . . . . . 621 Video Memory . . . . . . . . . . . . . . . . . 702
Device Drivers . . . . . . . . . . . . . . . . . 622 Integrated GPUs . . . . . . . . . . . . . . . 703
Registry . . . . . . . . . . . . . . . . . . . . 623 Connector Types and Associated Cables . . . 703
Advanced Startup Options . . . . . . . . . . 624 Installing and Configuring Video . . . . . . . . 706
Troubleshooting Tools . . . . . . . . . . . . . 627 Software . . . . . . . . . . . . . . . . . . . . 707
More Control Panel Tools . . . . . . . . . . . 632 902 . . . . . . . . . . . . . . . . . . . . . . . . . . 708
Application Problems . . . . . . . . . . . . . . . 636 Working with Drivers . . . . . . . . . . . . . 715
Application Installation Problems . . . . . . 636 3-D Graphics . . . . . . . . . . . . . . . . . 715
Problems with Uninstalling . . . . . . . . . . 637 Troubleshooting Video . . . . . . . . . . . . . . 720
Compatibility . . . . . . . . . . . . . . . . . 637 Troubleshooting Video Cards/Drivers . . . . . 720
Missing File or Incorrect File Version . . . . 640 Troubleshooting Monitors . . . . . . . . . . . 721
Crashing Programs . . . . . . . . . . . . . . 640 Beyond A+ . . . . . . . . . . . . . . . . . . . . . 723
Volume Shadow Copy Service and Changing Technologies . . . . . . . . . . . . . . 723
System Protection . . . . . . . . . . . . . 640
xvi
Contents
Chapter 20 Installing and Configuring
■ Essentials of Networking 730 Wireless Networking . . . . . . . . . . . . . . 810
Wi-Fi Configuration . . . . . . . . . . . . . . 810
902 . . . . . . . . . . . . . . . . . . . . . . . . . . 731 Bluetooth Configuration . . . . . . . . . . . 816
Roles Hosts Play in Networks . . . . . . . . . . 731 Cellular Configuration . . . . . . . . . . . . 818
Historical/Conceptual . . . . . . . . . . . . . . 733 Troubleshooting Wi-Fi . . . . . . . . . . . . . . . 819
Networking Technologies . . . . . . . . . . . . . 733 Hardware Troubleshooting . . . . . . . . . . 820
901 . . . . . . . . . . . . . . . . . . . . . . . . . . 734 Software Troubleshooting . . . . . . . . . . . 820
Frames and NICs . . . . . . . . . . . . . . . 734 Connectivity Troubleshooting . . . . . . . . . 821
Ethernet . . . . . . . . . . . . . . . . . . . . 736 Configuration Troubleshooting . . . . . . . . 821
Ethernet with Twisted Pair . . . . . . . . . . 739
Ethernet with Alternative Connections . . . . 740
Implementing Ethernet . . . . . . . . . . . . . . 742 Chapter 23
The Typical LAN . . . . . . . . . . . . . . . 742 ■ The Internet 830
Structured Cabling . . . . . . . . . . . . . . 743
Going Wide . . . . . . . . . . . . . . . . . . 751 Historical/Conceptual . . . . . . . . . . . . . . 831
How the Internet Works . . . . . . . . . . . . . . 831
Internet Tiers . . . . . . . . . . . . . . . . . 831
TCP/IP—The Common Language
Chapter 21
of the Internet . . . . . . . . . . . . . . . 832
■ Local Area Networking 756 Internet Service Providers . . . . . . . . . . . 833
901/902 . . . . . . . . . . . . . . . . . . . . . . . 757 Connection Concepts . . . . . . . . . . . . . 833
TCP/IP . . . . . . . . . . . . . . . . . . . . . . . 757 901 . . . . . . . . . . . . . . . . . . . . . . . . . . 834
Network Addressing with IPv4 . . . . . . . . 757 Connecting to the Internet . . . . . . . . . . . . 834
Network Addressing with IPv6 . . . . . . . . 767 Dial-Up . . . . . . . . . . . . . . . . . . . . 835
Installing and Configuring a Wired Network . . . 771 DSL . . . . . . . . . . . . . . . . . . . . . . 838
Installing a NIC . . . . . . . . . . . . . . . . 772 Cable . . . . . . . . . . . . . . . . . . . . . . 839
Configuring a Network Client . . . . . . . . 774 Fiber . . . . . . . . . . . . . . . . . . . . . . 839
Sharing and Security . . . . . . . . . . . . . 774 Wi-Fi . . . . . . . . . . . . . . . . . . . . . 840
Network Shares . . . . . . . . . . . . . . . . 775 Cellular . . . . . . . . . . . . . . . . . . . . 840
Network Organization . . . . . . . . . . . . 775 Satellite . . . . . . . . . . . . . . . . . . . . 841
Troubleshooting Networks . . . . . . . . . . . . 785 Connection to the Internet . . . . . . . . . . 842
Repairing Physical Cabling . . . . . . . . . . 785 Internet Application Protocols . . . . . . . . . . 846
Fixing Common Problems . . . . . . . . . . . 788 902 . . . . . . . . . . . . . . . . . . . . . . . . . . 848
The World Wide Web . . . . . . . . . . . . . 848
E-mail . . . . . . . . . . . . . . . . . . . . . 853
Chapter 22 File Transfer Protocol (FTP) . . . . . . . . . 859
■ Wireless Networking 796 Telnet and SSH . . . . . . . . . . . . . . . . 859
SFTP . . . . . . . . . . . . . . . . . . . . . . 860
Historical/Conceptual . . . . . . . . . . . . . . 797
Voice over IP . . . . . . . . . . . . . . . . . . 860
Wireless Networking Components . . . . . . . 797 Remote Desktop . . . . . . . . . . . . . . . . 861
901 . . . . . . . . . . . . . . . . . . . . . . . . . . 798 Virtual Private Networks . . . . . . . . . . . 864
Wireless Networking Software . . . . . . . . 799 Support Applications (Internet Utilities) . . . 867
Wireless Network Modes . . . . . . . . . . . 800 901 . . . . . . . . . . . . . . . . . . . . . . . . . . 868
902 . . . . . . . . . . . . . . . . . . . . . . . . . . 801 Internet Troubleshooting . . . . . . . . . . . . . 868
Wireless Networking Security . . . . . . . . 801 No Connectivity . . . . . . . . . . . . . . . 869
901 . . . . . . . . . . . . . . . . . . . . . . . . . . 804 Limited Connectivity . . . . . . . . . . . . . 870
Speed and Range Issues . . . . . . . . . . . . 804 Local Connectivity . . . . . . . . . . . . . . 870
Wireless Networking Standards . . . . . . . . . 805 Slow Transfer Speeds . . . . . . . . . . . . . 871
IEEE 802.11-Based Wireless Networking . . . 805 Beyond A+ . . . . . . . . . . . . . . . . . . . . . 872
Other Wireless Standards . . . . . . . . . . . 808 Online Gaming . . . . . . . . . . . . . . . . 872
902 . . . . . . . . . . . . . . . . . . . . . . . . . . 810 Chat . . . . . . . . . . . . . . . . . . . . . . 873
File Sharing . . . . . . . . . . . . . . . . . . 874
xvii
Contents
Chapter 24 Chapter 26
■ Portable Computing 882 ■ Care and Feeding of Mobile Devices 966
Historical/Conceptual . . . . . . . . . . . . . . 883 901/902 . . . . . . . . . . . . . . . . . . . . . . . 967
Portable Computing Devices . . . . . . . . . . . 883 Troubleshooting Mobile Device Issues . . . . . 967
Taxonomy . . . . . . . . . . . . . . . . . . . 883 Troubleshooting Tools . . . . . . . . . . . . . 967
901 . . . . . . . . . . . . . . . . . . . . . . . . . . 887 Touchscreen and Display Issues . . . . . . . . 970
Input Devices . . . . . . . . . . . . . . . . . 887 App Not Loading . . . . . . . . . . . . . . . 972
Display Types . . . . . . . . . . . . . . . . . 889 Overheating . . . . . . . . . . . . . . . . . . 973
Extending Portable Computers . . . . . . . . . . 890 Slow Performance . . . . . . . . . . . . . . . 973
Single-Function Ports . . . . . . . . . . . . . 890 Battery Life . . . . . . . . . . . . . . . . . . 974
Networking Options . . . . . . . . . . . . . 892 Swollen Battery . . . . . . . . . . . . . . . . 976
Portable-Specific Expansion Slots . . . . . . . 893 Frozen System . . . . . . . . . . . . . . . . . 977
Storage Card Slots . . . . . . . . . . . . . . . 894 Cannot Broadcast to an External Monitor . . 977
General-Purpose Ports . . . . . . . . . . . . 894 No Sound from Speakers . . . . . . . . . . . 978
Managing and Maintaining Portable Connectivity and Data Usage Issues . . . . . 978
Computers . . . . . . . . . . . . . . . . . . . . 895 GPS and Location Services Problems . . . . . 979
Batteries . . . . . . . . . . . . . . . . . . . . 896 System Lockout . . . . . . . . . . . . . . . . 980
Power Management . . . . . . . . . . . . . . 896 Encryption Problems . . . . . . . . . . . . . 981
Cleaning . . . . . . . . . . . . . . . . . . . . 902 Securing Mobile Devices . . . . . . . . . . . . . 981
Heat . . . . . . . . . . . . . . . . . . . . . . 904 BYOD versus Corporate-Owned Devices . . . 981
Protecting the Machine . . . . . . . . . . . . 905 Profile Security Requirements . . . . . . . . 982
Upgrading and Repairing Laptop Preventing Physical Damage . . . . . . . . . 983
Computers . . . . . . . . . . . . . . . . . . . . 906 Combating Malware . . . . . . . . . . . . . . 984
Disassembly Process . . . . . . . . . . . . . . 907 Dealing with Loss . . . . . . . . . . . . . . . 984
Standard Upgrades . . . . . . . . . . . . . . 909 Recovering from Theft . . . . . . . . . . . . . 985
Hardware Replacement . . . . . . . . . . . . 912 Securing Your Data . . . . . . . . . . . . . . 986
Troubleshooting Portable Computers . . . . . . 916 Mobile OS and Application Security Issues . . . 989
Power and Performance . . . . . . . . . . . . 916 Troubleshooting Tools . . . . . . . . . . . . . 989
Components . . . . . . . . . . . . . . . . . . 918 Risks, Symptoms, and Clues . . . . . . . . . 991
Chapter 25 Chapter 27
■ Understanding Mobile Devices 930 ■ Printers and Multifunction Devices 1004
901 . . . . . . . . . . . . . . . . . . . . . . . . . . 931 901 . . . . . . . . . . . . . . . . . . . . . . . . . 1005
Mobile Computing Devices . . . . . . . . . . . . 931 Printer and Multifunction Device
Device Variants . . . . . . . . . . . . . . . . 931 Components and Technologies . . . . . . . . 1005
Mobile Hardware Features . . . . . . . . . . 935 Printers . . . . . . . . . . . . . . . . . . . . 1005
902 . . . . . . . . . . . . . . . . . . . . . . . . . . 938 Scanners . . . . . . . . . . . . . . . . . . . 1016
Meet the Big Three Mobile OSs . . . . . . . . . . 938 Copy and Fax Components . . . . . . . . . . 1020
Development Models . . . . . . . . . . . . . 938 Connectivity . . . . . . . . . . . . . . . . . 1020
Apple iOS . . . . . . . . . . . . . . . . . . . 940 The Laser Printing Process . . . . . . . . . . . . 1021
Google Android . . . . . . . . . . . . . . . . 940 Processing . . . . . . . . . . . . . . . . . . . 1022
Microsoft Windows Phone . . . . . . . . . . 941 Charging . . . . . . . . . . . . . . . . . . . 1023
Mobile OS Features . . . . . . . . . . . . . . 941 Exposing . . . . . . . . . . . . . . . . . . . 1023
Configuring a Mobile Device . . . . . . . . . . . 947 Developing . . . . . . . . . . . . . . . . . . 1023
Enhancing Hardware . . . . . . . . . . . . . 947 Transferring . . . . . . . . . . . . . . . . . . 1023
Adding Apps . . . . . . . . . . . . . . . . . 949 Fusing . . . . . . . . . . . . . . . . . . . . . 1024
Network Connectivity . . . . . . . . . . . . . 951 Cleaning . . . . . . . . . . . . . . . . . . . 1024
Data . . . . . . . . . . . . . . . . . . . . . . 952 Installing a Multifunction Device . . . . . . . . 1025
E-mail . . . . . . . . . . . . . . . . . . . . . 953 Setting Up Printers in Windows . . . . . . . 1025
Synchronization . . . . . . . . . . . . . . . . 955 Configuring Print Settings . . . . . . . . . . 1030
Mobile Device Communication and Ports . . 957 Optimizing Print Performance . . . . . . . . 1031
Managing Shared/Public/Networked
Devices . . . . . . . . . . . . . . . . . . . 1032
xviii
Contents
Troubleshooting Printers . . . . . . . . . . . . . 1033 Internet Appliances . . . . . . . . . . . . . . . 1096
Troubleshooting General Issues . . . . . . . . 1033 Authentication and Encryption . . . . . . . . 1096
Troubleshooting Impact Printers . . . . . . . 1036 Wireless Issues . . . . . . . . . . . . . . . . . 1100
Troubleshooting Thermal Printers . . . . . . 1037
Troubleshooting Inkjet Printers . . . . . . . 1038
Troubleshooting Laser Printers . . . . . . . . 1040 Appendix A
■ Mapping to the CompTIA A+
Objectives 1110
Chapter 28 220–901 Exam Objectives . . . . . . . . . . . . . . 1110
■ Securing Computers 1054 220–902 Exam Objectives . . . . . . . . . . . . . . 1131
902 . . . . . . . . . . . . . . . . . . . . . . . . . 1055
Analyzing Threats . . . . . . . . . . . . . . . . . 1055
Unauthorized Access . . . . . . . . . . . . . 1055 Appendix B
Social Engineering . . . . . . . . . . . . . . 1056 ■ About the CD-ROM 1154
Data Destruction . . . . . . . . . . . . . . . 1057 Playing the Mike Meyers Introduction Video . . . 1154
Administrative Access . . . . . . . . . . . . 1058 System Requirements . . . . . . . . . . . . . . . . 1154
System Crash/Hardware Failure . . . . . . . 1058 Total Tester Exam Software . . . . . . . . . . . . . 1155
Physical Theft . . . . . . . . . . . . . . . . . 1058 Pre-assessment Test . . . . . . . . . . . . . . . 1155
Malware . . . . . . . . . . . . . . . . . . . . 1059 TotalSims for CompTIA A+ . . . . . . . . . . . . 1155
Environmental Threats . . . . . . . . . . . . 1059 Mike’s Video Training . . . . . . . . . . . . . . . 1155
Security Concepts and Technologies . . . . . . 1061 Mike’s Cool Tools . . . . . . . . . . . . . . . . . . 1156
Access Control . . . . . . . . . . . . . . . . 1061 PDF Copy of the Book . . . . . . . . . . . . . . . 1156
Data Classification and Compliance . . . . . 1068 Technical Support . . . . . . . . . . . . . . . . . . 1156
Licensing . . . . . . . . . . . . . . . . . . . 1069 Total Seminars Technical Support . . . . . . . 1156
Reporting . . . . . . . . . . . . . . . . . . . 1070 McGraw-Hill Education Content Support . . . 1157
Network Security . . . . . . . . . . . . . . . . . 1073
Malicious Software . . . . . . . . . . . . . . 1073
Malware Signs and Symptoms . . . . . . . . 1080 ■ Glossary 1158
Malware Prevention and Recovery . . . . . . 1081
Firewalls . . . . . . . . . . . . . . . . . . . 1088 ■ Index 1218
xix
Contents
PREFACE
I started writing computer books for the simple reason that no one wrote the
kind of books I wanted to read. The books were either too simple (Chapter 1,
“Using Your Mouse”) or too complex (Chapter 1, “TTL Logic and Transistors”),
and none of them provided a motivation for me to learn the information.
I believed that there were geeky readers just like me who wanted to know
why they needed to know the information in a computer book.
Good books motivate readers to learn what they are reading. For ex-
ample, if a book discusses binary arithmetic but doesn’t explain why I need
to learn it, that’s not a good book. Tell me that understanding binary makes
it easier to understand how a CPU works or why a megabyte is different
from a million bytes—then I get excited, no matter how geeky the topic. If
I don’t have a good motivation to do something, then I’m simply not going
to do it (which explains why I haven’t jumped out of an airplane!).
In this book, I teach you why you need to understand the technology
that runs almost every modern business. You’ll learn to build and fix com-
puters, exploring every nook and cranny, and master the art of the PC tech.
In the process, you’ll gain the knowledge you need to pass the CompTIA
A+ certification exams.
Enjoy, my fellow geek.
xx
Preface
INSTRUCTOR WEB SITE
xxi
Instructor Web Site
BaseTech / Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs / Meyers / 954-4 / Ch 1
p
cha ter
1
Chapter 1: The Path of the PC Tech
This book teaches you everything you need to know to become a great
tech. It might seem like a lot of information at first, but I’ll show you how
each system functions and interacts, so you learn the patterns they all follow.
At some point in the process of reading this book and working on computers,
it will all click into place. You’ve got this!
Along the way, you’ll pick up credentials that prove your skill to employers
and clients. The rest of this chapter explains those credentials and the steps
you need to take to gain them.
■■ CompTIA A+ Certification
Nearly every profession has some criteria that you must meet to show your
competence and ability to perform at a certain level. Although the way
this works varies widely from one profession to another, all of them will at
some point make you take an exam or series of exams. Passing these exams
proves that you have the necessary skills to work at a certain level in your
profession, whether you’re an aspiring plumber, teacher, barber, or lawyer.
If you successfully pass these exams, the organization that administers
them grants you certification. You receive some piece of paper or pin or
membership card that you can show to potential clients or employers. This
certification gives those potential clients or employers a level of confidence
that you can do what you say you can do. Without this certification, either
you will not find suitable work in that profession or no one will trust you
to do the work.
Modern PC techs attain the CompTIA A+ certification, the essential cre-
dential that shows competence in the modern field of information technology
(IT), a fancy way of saying computing technology plus all the other stuff needed
to connect and support computers. CompTIA A+ is an industry-wide, vendor-
neutral certification program developed and sponsored by the Computing
Technology Industry Association (CompTIA). You achieve this certification by
taking two computer-based exams consisting of multiple-choice and per-
formance-based questions. The tests cover what technicians should know
after 12 months of hands-on work on personal computing devices, either
from a job or as a student in the lab. CompTIA A+ certification enjoys wide
recognition throughout the computer industry. To date, more than 1,000,000
technicians have become CompTIA A+ certified, making it the most popu-
lar of all IT certifications.
Who Is CompTIA?
CompTIA is a nonprofit industry trade association based in Oakbrook Ter-
race, Illinois. It consists of over 20,000 members in 102 countries. You’ll find
CompTIA offices in such diverse locales as Amsterdam, Dubai, Johannes-
burg, Tokyo, and São Paulo.
CompTIA provides a forum for people in these industries to network
(as in meeting people), represents the interests of its members to the gov-
ernment, and provides certifications for many aspects of the computer
2
Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs
3
Chapter 1: The Path of the PC Tech
www.microsoft.com/learning/en-us/default.aspx
Cisco Certification
Cisco routers pretty much run the Internet and most intranets in the world.
A router is a networking device that controls and directs the flow of infor-
mation over networks, such as e-mail messages, Web browsing, and so on.
Cisco provides multiple levels of IT certification for folks who want to show
their skills at handling Cisco products, such as the Cisco Certified Network
Associate (CCNA), plus numerous specialty certifications. See the Cisco IT
Certification Web site here for more details:
www.cisco.com/web/learning/certifications/index.html
■■ CompTIA A+ Objectives
CompTIA splits A+ certification into two exams: CompTIA A+ 220-901 and
CompTIA A+ 220-902. It’s common to refer to these two exams as the “2015”
exams to differentiate them from older CompTIA exams.
Although you may take either of the two exams first, I recommend tak-
ing 220-901 followed by 220-902. The 220-901 exam concentrates on under-
standing terminology and technology, how to do fundamental tasks such as
upgrading RAM, and basic network and mobile device support. The 220-902
exam builds on the first exam, concentrating on operating system support,
advanced configuration, and troubleshooting scenarios.
Both of the exams are extremely practical, with little or no interest in
theory, aside from troubleshooting. All questions are multiple-choice, simu-
lation, or “click on the right part of the picture” questions. The following is
an example of the type of questions you will see on the exams:
Your laser printer is printing blank pages. Which item should you check
first?
A. Printer drivers
B. Toner cartridge
C. Printer settings
D. Paper feed
The correct answer is B, the toner cartridge. You can make an argument
for any of the others, but common sense (and skill as a PC technician) tells
you to check the simplest possibility first.
The 2015 exams use a regular test format in which you answer a set
number of questions and are scored based on how many correct answers
4
Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs
you give. CompTIA makes changes and tweaks over time, so always check
the CompTIA Web site before final preparation for the exams. These exams
have no more than 90–100 questions each.
Be aware that CompTIA may add new questions to the exams at any time
to keep the content fresh. The subject matter covered by the exams won’t
change, but new questions may be added periodically at random intervals.
This policy puts strong emphasis on understanding concepts and having solid
PC-tech knowledge rather than on trying to memorize specific questions and
answers that may have been on the tests in the past. No book or Web resource
will have all the “right answers” because those answers change constantly.
Luckily for you, however, this book not only teaches you what steps to follow
in a particular case, but also explains how to be a knowledgeable tech who
understands why you’re doing those steps. That way, when you encounter a
new problem (or test question), you can work out the answer. This will help
you pass the exams and function as a master tech.
To keep up to date, we monitor the CompTIA A+ exams for new content
and update the special Tech Files section of the Total Seminars Web site
(www.totalsem.com) with new articles covering subjects we believe may
appear on future versions of the exams.
Windows-Centric
The CompTIA A+ exams cover five different operating systems and many
versions within each OS. When you review the objectives a little later in
this section, though, you’ll see that the majority of content focuses on the
Microsoft Windows operating systems you would expect to find on a PC at
a workstation or in a home. The exams cover a specific and limited scope of
questions on Linux, Mac OS X, iOS, and Android.
Objectives in the exams cover the following operating systems:
■■ Windows Vista Home Basic, Windows Vista Home Premium, Windows
Vista Business, Windows Vista Ultimate, Windows Vista Enterprise
■■ Windows 7 Starter, Windows 7 Home Premium, Windows 7
Professional, Windows 7 Ultimate, Windows 7 Enterprise
■■ Windows 8, Windows 8 Pro, Windows 8 Enterprise
■■ Windows 8.1, Windows 8.1 Pro, Windows 8.1 Enterprise
■■ Linux
■■ Mac OS X
■■ iOS
■■ Android
Windows 10
CompTIA has the darnedest luck when it comes to the timing of new
CompTIA A+ exams compared to releases of new Windows versions. In
2006, CompTIA released an update to the CompTIA A+ exams about four
months before Microsoft released Windows Vista. In 2009, CompTIA missed
Windows 7 by about one month (though CompTIA released a Windows 7
update to the exams in late 2009). The 2012 objectives similarly missed the
rollout of Windows 8.
5
Chapter 1: The Path of the PC Tech
Exam 220–901
The questions on the CompTIA A+ 220-901 exam fit into one of four
domains. The number of questions for each domain is based on the per-
centages shown in Table 1.1.
The 220-901 exam tests your knowledge of computer components,
expecting you to be able to identify just about every common device on
PCs, including variations within device types. Here’s a list:
6
Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs
The 220-901 exam tests your ability to install, configure, and maintain
all the hardware technology involved in a personal computer. You need to
be able to install and set up a hard drive, for example, and configure devices
in Windows Vista, Windows 7, Windows 8, and Windows 8.1. You have to
understand device drivers.
The 220-901 exam tests you on mobile devices. While the smartphone
and tablet market covers an impossibly wide array of hardware and soft-
ware, the 220-901 exam focuses on Apple iOS and Google Android devices.
You’ll need to know how to interact with the hardware and software.
The 220-901 exam tests extensively on networking. You need to know
how to set up a typical local area network (LAN), for example, understand-
ing cabling standards, network protocols, and Windows configuration.
The 220-901 exam requires you to know a lot about hardware and net-
work troubleshooting. You’ll get questions, for example, on how to fix a
network failure.
Exam 220-902
The CompTIA A+ 220-902 exam covers five domains. Table 1.2 lists the
domains and the percentage of questions dedicated to each domain.
The 220-902 exam covers the configuration, repair, and troubleshoot-
ing of the Windows operating system. You have to know your way around
Windows and understand the tasks involved in updating, upgrading, and
installing Windows Vista, Windows 7, Windows 8, and Windows 8.1. You
need to know the standard diagnostic tools available in Windows so that
you can fix problems and work with higher-level techs. Make sure you
know Windows; 29% of the 220-902 questions are going to challenge you
on this.
You need to know your way around the Linux and Mac OS X interfaces.
Plus, the 220-902 exam tests you on accessing and properly using various
tech tools for running maintenance, backup, and so forth. The exam goes
into lots of detail on iOS and Android configuration, such as setting up
e-mail and securing the devices. But it’s not just mobile devices . . .
In general, security is a big topic on the 220-902 exam. You need to know
quite a bit about computer security, from physical security (door locks to
retinal scanners), to knowledge of security threats (malware and viruses),
to the ways in which to secure an individual computer. This also includes
coverage of how to recycle and dispose of computer gear properly.
You’ll also be tested on methods for securing networks. You’ll need to
know how to access a small office/home office (SOHO) router or wireless
access point and configure that device to protect your network.
7
Chapter 1: The Path of the PC Tech
https://certification.comptia.org/stayCertified.aspx
www.vue.com
Alternatively, in the United States and Canada, call Pearson VUE at 877-
551-PLUS (7587) to schedule the exams and to locate the nearest testing
center. International customers can find a list of Pearson VUE international
contact numbers for various regions of the world on their Web site here:
www.pearsonvue.com/comptia/contact/
8
Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs
You must pay for the exam when you call to schedule. Be prepared to sit on
hold for a while. Have your Social Security number (or international equiva-
lent) and a credit card ready when you call. Pearson VUE will be glad to invoice
you, but you won’t be able to take the exam until they receive full payment.
Pearson VUE will accommodate any special needs, although this may
limit your selection of testing locations.
Exam Costs
The cost of the exam depends on whether you work for a CompTIA mem-
ber or not. At this writing, the cost for non-CompTIA members is $194 (U.S.)
for each exam. International prices vary, but you can check the CompTIA
Web site for international pricing. Of course, the prices are subject to change
without notice, so always check the CompTIA Web site for current pricing.
Very few people pay full price for the exam. Virtually every organiza-
tion that provides CompTIA A+ training and testing also offers discount
vouchers. You buy a discount voucher and then use the voucher number
instead of a credit card when you schedule the exam. Vouchers are sold per
exam, so you’ll need two vouchers to take the two CompTIA A+ exams.
Total Seminars is one place to get discount vouchers. You can call Total Semi-
nars at 800-446-6004 or 281-922-4166, or get vouchers via the Web site: www.
totalsem.com. No one should ever pay full price for CompTIA A+ exams.
Obligate Yourself
The very first step you should take is to schedule yourself for the exams.
Have you ever heard the old adage, “Heat and pressure make diamonds?”
Well, if you don’t give yourself a little “heat,” you’ll end up procrastinating
and delay taking the exams, possibly forever. Do yourself a favor. Using the
following information, determine how much time you’ll need to study for
the exams, and then call Pearson VUE or visit their Web site and schedule
the exams accordingly. Knowing the exams are coming up makes it much
easier to put down the game controller and crack open the book. You can
schedule an exam as little as a few weeks in advance, but if you schedule an
exam and can’t take it at the scheduled time, you must reschedule at least a
day in advance or you’ll lose your money.
9
Chapter 1: The Path of the PC Tech
10
Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs
Historical/Conceptual
Those of you who fall into the Old Tech group may want to skip everything
except the 901 and 902 parts in each chapter. After reading the sections in
those parts, jump immediately to the questions at the end of the chapter. The
end-of-chapter questions concentrate on information in the 901 and 902 sec-
tions. If you run into problems, review the Historical/Conceptual sections in
that chapter. Note that you may need to skip back to previous chapters to get
the Historical/Conceptual information you need for later chapters.
11
Chapter 1: The Path of the PC Tech
After going through every chapter as described, Old Techs can move
directly to testing their knowledge by using the free practice exams on
the media that accompanies the book. Once you start scoring above 90%,
you’re ready to take the exams. If you’re a New Tech—or if you’re an Old
Tech who wants the full learning experience this book can offer—start by
reading the book, the whole book, as though you were reading a novel, from
page one to the end without skipping around. Because so many computer
terms and concepts build on each other, skipping around greatly increases
the odds that you will become confused and end up closing the book and
firing up your favorite game. Not that I have anything against games, but
unfortunately that skill is not useful for the CompTIA A+ exams!
Your goal on this first read is to understand concepts, the whys behind
the hows. Having a PC nearby as you read is helpful so you can stop and
inspect the PC to see a piece of hardware or how a particular concept mani-
fests in the real world. As you read about hard drives, for example, inspect
the cables. Do they look like the ones in the book? Is there a variation? Why?
It is imperative that you understand why you are doing something, not just
how to do it on one particular system under one specific set of conditions.
Neither the exams nor real life as a PC tech will work that way.
If you’re reading this book as part of a managing and troubleshooting
PCs class rather than a certification-prep course, I highly recommend going
the New Tech route, even if you have a decent amount of experience. The
book contains a lot of details that can trip you up if you focus only on the
test-specific sections of the chapters. Plus, your program might stress his-
torical and conceptual knowledge as well as practical, hands-on skills.
The CompTIA A+ certification exams assume that you have basic user
skills. The exams really try to trick you with questions on processes that you
may do every day and not think much about. Here’s a classic: “To move
a file from the C:\DATA folder to the D:\ drive using File Explorer, what
key must you hold down while dragging the file?” If you can answer that
without going to your keyboard and trying a few likely keys, you’re better
than most techs! In the real world, you can try a few wrong answers before
you hit on the right one, but for the exams, you have to know it. Whether
Old Tech or New Tech, make sure you are proficient at user-level Windows
skills, including the following:
■■ Recognizing all the components of the standard Windows desktop
(Start menu, notification area, etc.)
■■ Manipulating windows—resizing, moving, and so on
■■ Creating, deleting, renaming, moving, and copying files and folders
within Windows
■■ Understanding file extensions and their relationship with program
associations
■■ Using common keyboard shortcuts/hotkeys
■■ Installing, running, and closing a Windows application
When you do your initial read-through, you may be tempted to skip
the Historical/Conceptual sections—don’t! Understanding the history and
technological developments behind today’s personal computing devices
helps you understand why they work—or don’t work—the way they do.
12
Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs
Basically, I’m passing on to you the kind of knowledge you might get by
apprenticing yourself to an older, experienced PC tech.
After you’ve completed the first read-through, go through the book
again, this time in textbook mode. If you’re an Old Tech, start your studying
here. Try to cover one chapter at a sitting. Concentrate on the 901 and 902
sections. Get a highlighter and mark the phrases and sentences that bring
out major points. Be sure you understand how the pictures and illustrations
relate to the concepts being discussed.
Once you feel you have a good grasp of the material in the book, you
can check your knowledge by using the practice exams included on the
media accompanying this book. You can take these in Practice mode or
Final mode. In Practice mode, you can use the Assistance window to get a
helpful hint for the current questions, use the Reference feature to find the
chapter that covers the question, check your answer for the question, and
see an explanation of the correct answer. In Final mode, you answer all the
questions and receive an exam score at the end, just like the real thing. You
can also adjust the number of questions on a Practice or Final mode exam
with the Customize option.
Both modes show you an overall grade, expressed as a percentage,
as well as a breakdown of how well you did on each exam domain. The
Review Questions feature lets you see which questions you missed and
what the correct answers are. Use these results to guide further studying.
Continue reviewing the topics you miss and taking additional exams until
you are consistently scoring in the 90% range. When you get there, you are
ready to pass the CompTIA A+ certification exams.
Study Tactics
Perhaps it’s been a while since you had to study for a test. Or perhaps it
hasn’t, but you’ve done your best since then to block the whole experience
from your mind. Either way, savvy test-takers know that certain techniques
make studying for tests more efficient and effective.
Here’s a trick used by students in law and medical schools who have
to memorize reams of information: write it down. The act of writing some-
thing down (not typing, writing) in and of itself helps you to remember it,
even if you never look at what you wrote again. Try taking separate notes
on the material and re-creating diagrams by hand to help solidify the infor-
mation in your mind.
Another oldie but goodie: Make yourself flash cards with questions and
answers on topics you find difficult. A third trick: Take your notes to bed
and read them just before you go to sleep. Many people find they really do
learn while they sleep!
Contact
If you have any problems, any questions, or if you just want to argue about
something, feel free to send an e-mail to the author—michaelm@totalsem
.com—or to the editorscottj@totalsem.com.
For any other information you might need, contact CompTIA directly at
their Web site: www.comptia.org.
13
Chapter 1: The Path of the PC Tech
Chapter 1 Review
■■ Chapter Summary
After reading this chapter and completing the exercises, Detail the CompTIA A+ certification objectives
you should understand the following about the path of ■■ CompTIA splits A+ certification into two exams:
the PC tech. CompTIA A+ 220-901 and CompTIA A+ 220-902.
It’s common to refer to these two exams as the 2015
Explain the importance of CompTIA A+ certification exams to differentiate them from older CompTIA
■■ Certifications prove to employers that you have exams. Although you may take either of the
the necessary skills to perform the job. To become two exams first, I recommend taking the 220-901
certified, you take and successfully pass exams. followed by the 220-902.
Then the organization that developed those exams ■■ Both of the exams are extremely practical, with little
grants you certification. Gaining certification is or no interest in theory aside from troubleshooting.
particularly important for IT workers. All questions are multiple-choice, simulation, or
■■ CompTIA A+ certification is an industry-wide, “click on the right part of the picture” questions.
vendor-neutral certification program that shows CompTIA may add new questions to the exams at
you have a basic competence in supporting any time to keep the content fresh, although the
IT. You achieve this certification by taking two subject matter covered by the exams won’t change.
computer-based exams consisting of multiple- ■■ Although the exam objectives list five operating
choice and performance-based questions. The systems and many varieties within those OS
tests cover what technicians should know after families, the percentage of questions on how to
12 months of hands-on work on personal computing accomplish something in Windows far outweighs
devices, either from a job or as a student in the lab. those about other OSs. You’ll need to know a
CompTIA A+ certification enjoys wide recognition lot about four editions of Windows: Windows
throughout the computer industry. Vista, 7, 8, and 8.1. You don’t need to know about
■■ CompTIA is a nonprofit, industry trade Windows 10 for the exams.
association based in Oakbrook Terrace, Illinois. It ■■ The 220-901 exam tests your ability to install,
consists of over 20,000 members in 102 countries. configure, and maintain all the hardware
CompTIA provides a forum for people in these technology involved in a personal computer.
industries to network, represents the interests The 220-901 exam tests you on mobile devices.
of its members to the government, and provides Network hardware and installation is tested, as is
certifications for many aspects of the computer hardware and network troubleshooting.
industry. CompTIA sponsors CompTIA A+,
■■ The 220-902 exam dives into installing,
CompTIA Network+, CompTIA Security+, and
configuring, maintaining, and troubleshooting
other certifications.
Windows in a big way. You’ll also get a pinch of
■■ The CompTIA A+ certification is the de facto Linux and Mac OS X, and a bigger dose of iOS
entry point to IT. From CompTIA A+, you have and Android. The exam looks at security, such as
a number of certification options, depending on avoiding and recovering from malware.
whether you want to focus more on hardware
and operating systems or move into network Describe how to become CompTIA A+ certified
administration. You can get CompTIA Network+
■■ You become CompTIA A+ certified by taking
certification, for example, or go on to get
and passing two computer-based exams consisting
Microsoft or Cisco certified. CompTIA Network+
of multiple-choice and performance-based
certification is the most obvious certification to get
questions. There are no prerequisites for taking the
after becoming CompTIA A+ certified.
14
Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs
CompTIA A+ certification exams. There is exams. You should obligate yourself by scheduling
no required training course and no training your exams. This keeps you focused on study.
materials to buy. You do have to pay a testing fee ■■ Read the book all the way through once.
for each of the two exams. To stay current, you Experienced techs (“Old Techs”) should then
need to retest every three years or gain continuing concentrate on the test-specific sections to prepare
education credits. for the exams. Less experienced techs (“New
■■ The Pearson VUE company administers the Techs”) should read the book all the way through
CompTIA A+ exams. You can schedule the exam again until everything makes sense.
times and location via the Pearson VUE Web ■■ If you’re reading this book as part of a managing
site at www.vue.com. Check their Web site for and troubleshooting PCs class rather than a
international links. certification-prep course, I highly recommend
■■ To achieve success with the CompTIA A+ going the New Tech route, even if you have a
certification exams, think in terms of practical decent amount of experience. The book contains a
knowledge. Read the book. Work through the lot of details that can trip you up if you focus only
problems. Work with computers. Take the practice on the test-specific sections of the chapters.
■■ Key Terms
certification (2) information technology (IT) (2)
Cisco Certified Network Associate (CCNA) (4) Microsoft Certified Solutions Expert (MCSE) (4)
CompTIA A+ 220-901 (4) network (3)
CompTIA A+ 220-902 (4) PC tech (1)
CompTIA A+ certification (2) Pearson VUE (8)
CompTIA Network+ certification (3) voucher (9)
Computing Technology Industry www.comptia.org (3)
Association (CompTIA) (2)
15
Chapter 1: The Path of the PC Tech
■■ Multiple-Choice Quiz
1. Which of the following certifications is the de facto 6. How much practical IT experience do you need
requirement for entrance into the PC industry? to become CompTIA A+ certified?
A. Certified Cisco Network Associate A. Six months
B. CompTIA A+ B. One year
C. CompTIA Network+ C. Two years
D. Microsoft Certified Solutions Expert D. None
2. John loves the Internet and wants a career working 7. How many questions should you expect on the
on the machines that make the Internet work. He 220-901 exam?
has completed both CompTIA A+ and CompTIA A. 25
Network+ certifications. Which of the following
B. 50
certifications would make a good next step?
C. 90
A. Cisco Certified Network Associate
D. The number of questions varies because the
B. Certified Cisco Network Professional
exams are adaptive.
C. CompTIA Security+
D. Microsoft Certified Solutions Expert 8. The CompTIA A+ certification covers which of
the following operating systems? (Select three.)
3. Which of the following exams focuses on A. Linux
installing, configuring, and maintaining all the
B. Mac OS X
standard hardware technology involved in a
personal computer? C. Windows XP Media Center
A. Certified Cisco Network Associate D. Windows 7
B. CompTIA A+ 220-901
9. What percentage of questions should you expect on
C. CompTIA A+ 220-902 Windows operating systems in the 220-902 exam?
D. Microsoft Certified Solutions Expert A. 12%
B. 22%
4. At which of the following Web sites can you
register to take the CompTIA A+ certification C. 24%
exams? D. 29%
A. www.comptia.org
10. What percentage of questions should you expect
B. www.microsoft.com
on networking in the 220-901 exam?
C. www.totalsem.com
A. 34%
D. www.vue.com
B. 17%
5. How many exams must you pass to become C. 28%
CompTIA A+ certified? D. 21%
A. One
B. Two
C. Three
D. Four
16
Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs
11. How much does it cost to take each exam (at the 13. The 220-901 exam will not test you on which of
time of this book’s publication)? the following computer components?
A. $100 each A. Biometric devices
B. $138 each B. Keyboards
C. $194 each C. Printers
D. $150 each D. Zip drives
12. What percentage of questions should you expect 14. If you skip the continuing education path to
on Windows 10 in the 220-902 exam? recertify, how often do you need to take the
A. 10% CompTIA A+ exams to retain your status as a
CompTIA A+ certified technician?
B. 13%
A. Every year
C. 20%
B. Every three years
D. 0%
C. Every ten years
D. Never
■■ Essay Quiz
1. Write a short essay on the benefits of certification Why do you suppose people get certifications
in the field of computers. Include discussion on rather than (or in addition to) two- and four-year
how the CompTIA certifications function within college degrees in IT?
the broader category of computer certification.
Lab Project
•• Lab Project 1.1
If you have access to the Internet, do some interest you. Which certifications would be useful
searching on computer certifications. Make a if you want to be a graphics designer, for example?
personal certification tree or pathway that maps What if you want to create computer games?
out a series of certifications to pursue that might
17
Chapter 1: The Path of the PC Tech
12 Operational
Procedures
“The real problem is not whether
machines think but whether men do.”
—B. F. Skinner
18
902
Appearance
Americans live in a casual society. The problem with casual is that perhaps
our society is becoming too casual. Customers often equate casual clothing
with a casual attitude. You might think you’re just fixing somebody’s
computer, but you’re doing much more than that. You are saving precious
family photos. You are keeping a small business in operation. This is serious •• Figure 2.1 Casual Ford
stuff, and nobody wants an unclean, slovenly person doing these important
jobs. Take a look at Figure 2.1. This is our resident illustrator (among other
job descriptions), Ford Pierson, casually dressed to hang with his buddies.
I have a question for you. If you ran a small business and your primary
file server died, leaving 15 employees with nothing to do, how would you
feel about Ford as a tech coming into your office looking like this? I hope
your answer would be “not too confident.” Every company has some form
of dress code for techs. Figure 2.2 shows Ford dressed in a fairly typical
example, with a company polo shirt, khaki pants, and dark shoes (trust me
on that score). Please also note that both his shirt and his pants are wrinkle-
free. All techs either know how to iron or know the location of the nearest
cleaners.
While we are looking at this model of a man, do you appreciate that
his hair is combed and his face is cleanly shaven? It’s too bad I can’t use
scratch-and-sniffs, but if I could, you’d also notice that Professional Ford
took a shower, used some deodorant, and brushed his teeth.
I hope that most of the people who read this smile quietly to themselves
and say, “Well, of course.” The sad truth tells me otherwise. Next time
you look at a tech, ask yourself how many of these simple appearance
and hygiene issues were missed. Then make a point not to be one of the
unkempt techs.
19
Chapter 2: Operational Procedures
creation, but it does a great job of covering the CompTIA A+ objectives.
Let’s dive into the traits of a tech: honesty/integrity, dependability/
responsibility, adaptability/versatility, and sensitivity.
Honesty/Integrity
Honesty and integrity are not the same thing, but for a tech, they are so
closely related that it is best to think of them as one big ethic. Honesty means
to tell the truth, and integrity means doing the right thing.
It’s simple to say you have to be honest, but be warned that our industry
often makes it difficult. IT technicians get a lot of leeway compared to most
starting jobs, making dishonesty tempting. One of the biggest temptations
is lying to your boss. A new tech driving around in a van all day may find
it convenient to stretch the truth on how long he took for lunch or how far
along he is on the next job. Being up front and honest with your boss is
pretty obvious and easy to understand.
Being honest with your customers is a lot harder. Don’t sell people
goods and services they don’t need, even if you get a cut of what you
sell. Don’t lie to your customers about a problem. If you can’t explain the
Techno-babble is the use
of (often nonsensical) jargon problem to them in plain English, don’t create techno-babble (see note) and
and technical terms to intimidate don’t be afraid to say, “I don’t know.” Too many techs seem to think that
and silence a challenge to a not knowing exactly what a problem might be is a reflection of their skill.
technical issue. A skilled tech can say, “I don’t know, but I know how to figure it out, and I
will get you the right answer.”
A computer tech must bring integrity to the job, just like any other service
professional. You should treat anything said to you and anything you see
as a personal confidence, not to be repeated to customers, coworkers, or
bosses. Here’s Mike’s Rule of Confidentiality: “Unless it’s a felony or an
imminent physical danger, you didn’t see nothin’.” You’ll learn more about
dealing with prohibited content in Chapter 28.
There is an exception to this rule. Sometimes you need to separate paying
customers from in-house users. A paying customer is someone who doesn’t
work for your company and is paying for your services. An in-house user is
someone who works for the same company you work for and is not directly
paying for your services. It’s often your job (but not always) to police
in-house IT policies. Here’s a great example. If you are at a customer’s site
and you see a Post-it note with a password on a user’s monitor, you say
nothing. If you are in-house and you see the same thing, you probably need
to speak to the user about the dangers of exposing passwords.
You have a lot of power when you sit in front of someone’s computer. You
can readily read private e-mail, discover Web sites surfed, and more. With a
click of the Start button, you can know the last five programs the user ran,
including Word and Solitaire, and the last few documents the user worked
on. Don’t do this; you really don’t want to know. Plus, if you are caught
violating a customer’s privacy, you not only will lose credibility and respect,
but you could also lose your job. You need to deal appropriately with customers’
confidential and private materials. This includes files on the computer, items on
a physical desktop, and even pages sitting in a printer tray.
Every user’s password represents a potential danger spot for techs. We
have to reboot computers and access shares and other jobs that require
passwords. The rule here is to avoid learning other folks’ passwords at all
costs (see Figure 2.3). If you know a password to access a mission-critical
20
Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs
machine and that machine ends up compromised or
with data missing, who might be blamed? You, that’s
who, so avoid learning passwords! If you only need
a password once, let the user type it in for you. If
you anticipate accessing something multiple times
(the more usual situation), ask the user to change the
password temporarily.
It’s funny, but people assume ownership of things
they use at work. John in accounting doesn’t call the
computer he uses anything but “my PC.” The phone
on Susie’s desk isn’t the company phone, it’s “Susie’s
phone.” Regardless of the logic or illogic involved
with this sense of ownership, a tech needs to respect
that feeling. You’ll never go wrong if you follow the
Ethic of Reciprocity, also known as the Golden Rule: “Do •• Figure 2.3 Don’t do this!
unto others as you would have them do unto you.” In a
tech’s life, this can translate as “treat people’s things as you would have other
people treat yours.” Don’t use or touch anything—keyboard, printer, laptop,
monitor, mouse, phone, pen, paper, or cube toy—without first asking permis-
sion. Follow this rule at all times, even when the customer isn’t looking.
Dependability/Responsibility
Dependability and responsibility are another pair of traits that, while they
don’t mean the same thing, often go together. A dependable person per-
forms agreed-upon actions. A responsible person is answerable for her
actions. Again, the freedom of the typical IT person’s job makes depend-
ability and responsibility utterly critical.
Dependable techs show up for job appointments and show up on
time. Failure to show up for an appointment not only inconveniences the
customer, but also can cost your customer a lot of money in lost time and
productivity. So, be on time.
If you or your company makes an appointment for you, show up. Be
there. Don’t let simple problems (such as bad traffic) prevent you from show-
ing up on time. Take some time to prepare. Figure out traffic times. Figure out
if preceding appointments will cause a problem, and check for traffic. There is
a popular old saying in the United States, “Five minutes early is on time, and
on time is late.” Sometimes events take place that prevent you from being on
time. If late, contact the customer immediately and give him or her your best esti-
mate of when you will arrive. A simple apology wouldn’t hurt, either.
Responsibility is a tricky subject for IT folks. Certainly you should be
responsible for your actions, but the stakes are high when critical data and
expensive equipment are at risk. Before you work on a computer, always
ask the customer if there are up-to-date backups of the data. If there aren’t,
offer to make backups for the customer, even if this incurs an extra charge
for the customer. If the customer chooses not to make a backup, make sure
he or she understands, very clearly, the risk to the data on the system you
are about to repair.
Adaptability/Versatility
Adaptability defines how someone adjusts to changes. Versatility, at least
within the scope of an IT technician, is bringing a broad set of skills to the
21
Chapter 2: Operational Procedures
computer repair process. Every repair is to some degree a guessing game.
Tech Tip No one knows all the possible problems a computer can have. There is no
Paperwork universal computing devices repair manual to which you can refer to tell
Most computer repair companies you how to fix computers. Good techs must be able to adapt to any situ-
require a signed Authorization ation, both technically and in the environment. For example, good techs
of Work or Work Authorization should be able to fix most peripherals, even if they are not experts on that
form to document the company particular device. As you progress through the book, you’ll discover that
name, billing information, date, most devices fit into one family or another and that there are certain diag-
scope of work, and that sort of nostic/repair steps that you can at least try to enact a repair.
thing. Even if you do your own Adaptability isn’t required just for technical issues. Computing devices
repairs, these forms can save you find themselves broken in the strangest places and ways. An adaptable tech
from angst and from litigation. doesn’t have a problem if a computer sits at the top of a suspension bridge
You can create your own or do an
or behind a desk. An adaptable tech can work around mean dogs, broken
Internet search for examples.
water lines, and noisy little kids (but there are some very important rules to
dealing with kids; see later in this chapter).
A technician has to be versatile. The best example of this is what I call
the User Advocate. User Advocates are technicians who not only take the
time to learn the processes of whatever organization they work for, but also
look to create technology solutions for problems and inefficiencies. This
also means a tech should be at least competent if not expert at working
with all the computer applications used by the organization. When you
combine your IT skills with an understanding of how the business works,
you become amazingly versatile, quickly finding yourself with more
responsibility and (hopefully) more money.
A big part of versatility is offering different repair options in certain
situations. When there is more than one way to fix things, make sure the
customer knows all the options, but also give them your recommendation.
Tell the customer why you feel your recommendation is the best course of
action, but give them knowledge necessary to make their own decision.
A tech’s versatility isn’t limited to IT skills. Woe to the tech who doesn’t
understand basic electrical wiring and building codes. Skilled techs need to
act in compliance with local government regulations on this sort of issue. I’ve
had hundreds of repair scenarios where the fix was as simple as knowing
how to turn on an electrical breaker or moving a computing device away
from an electrical motor. No, these aren’t IT skills, but a versatile tech knows
these problems exist.
Sensitivity
Sensitivity is the ability to appreciate another’s feeling and emotions. Sensi-
tivity requires observing others closely, taking time to appreciate their feel-
ings, and acting in such a way that makes them feel comfortable. I’ve rarely
felt that technicians I’ve met were good at sensitivity. The vast majority of
nerds I know, including myself, tend to be self-centered and unaware of
what’s going on around them. Let me give you a few tips I’ve learned along
the way.
Understand that the customer is paying for your time and skills. Also
understand that your presence invariably means something is wrong or bro-
ken, and few things make users more upset than broken computers. When
you are “on the clock,” you need to show possibly very upset customers
that you are giving their problem your full attention. To do this, you need
to avoid distractions. If you get a personal call, let it roll over to voicemail.
22
Mike Meyers’ CompTIA A+ Guide to Managing and Troubleshooting PCs
If you get a work-related call, politely excuse yourself, walk away for pri-
vacy, and keep the call brief. Never talk to coworkers while interacting with
customers. Never speak badly of a customer; you never know where you’ll
run into them next.
Last, be culturally sensitive. We live in a diverse world of races, religions,
etiquettes, and traditions. If a customer’s religious holiday conflicts with
your work schedule, the customer wins. If the customer wants you to take
off your shoes, take them off. If the customer wants you to wear a hat, wear
one. Use appropriate professional titles, when applicable. If a customer’s title is
“Doctor,” for example, use the title even if you don’t recognize the field of
medicine. When in doubt, always ask the customer for guidance.
■■ Effective Communication
When you deal with users, managers, and owners who are frustrated and
upset because a computer or network is down and they can’t work, your
job requires you to take on the roles of detective and psychologist. Talk-
ing with frazzled and confused people and getting answers to questions
about how the personal computing device got into the state it’s in takes
skill. Communicating clearly and effectively is important.
This section explores techniques for effective communication. It starts
with assertive communication and then looks at issues involving respect.
We’ll examine methods for eliciting useful answers in a timely fashion. The
section finishes with a discussion about managing expectations and profes-
sional follow-up actions.
Assertive Communication
In many cases, a computer problem results from user error or neglect. As
a technician, you must show users the error of their ways without creat-
ing anger or conflict. You do this by using assertive communication.
Assertive communication isn’t pushy or bossy, but it’s also not the language
of a pushover. Assertive communication first requires you to show the other
person that you understand and appreciate the importance of his feelings.
Use statements such as “I know how frustrating it feels to lose data,” or “I
understand how infuriating it is when the network goes out and you can’t
get your job done.” Statements like these cool off the situation and let cus-
tomers know you are on their side. Avoid using the word “you,” as it can
sound accusatory.
The second part of assertive communication is making sure you state
the problem clearly without accusing the user directly: “Not keeping up
with defragmenting your hard drive slows it down,” or “Help me under-
stand how the network cable keeps getting unplugged during your lunch
hour.” Last, tell the user what you need to prevent this error in the future.
“Please call me whenever you hear that buzzing sound,” or “Please check
the company’s approved software list before installing anything.” Always
use “I” and “me,” and never make judgments. “I can’t promise the key-
board will work well if it’s always getting dirty” is much better than “Stop
eating cookies over the keyboard, you slob!”
23
Chapter 2: Operational Procedures
Another random document with
no related content on Scribd:
daturas, poinsettias nine or ten feet high, and many other plants and
trees one would go some way to see growing with the freedom and
luxuriance they exhibit in this bright, winterless climate, in which the
transparent sunlight is never the mere mocking garb of a withering
Liebig-extract of East wind.
CHAPTER L.
ANIMAL LIFE IN EGYPT.—THE CAMEL.
The Horse.
Little need be said of the horse in Egypt. He is not remarkable
there for size or beauty, nor does he obtrude himself much on the
traveller’s notice. Out of Cairo and Alexandria he is not frequently
seen, and in those cities he generally appears in harness, drawing,
always in pairs, the multiform public vehicles which have been
culled, one would suppose, from all parts of Europe. He is seldom
seen in good condition, unless he comes from the stable of the
Viceroy, or of some grandee, a governor or pasha, or of some rich
European resident. Taking the whole country, the number of them in
good case would thus not be great. He suffers from his double
competition with the ass and the camel; and from the absence,
except in a few towns, of the use of wheeled vehicles. He is also
affected injuriously by the dearness of his keep, compared with that
of his competitors for man’s favour; barley and clover being
indispensable for him. All this reduces him to the degrading position
of selling for less than, at present not half as much as, a good
donkey. A fair horse might have been purchased last spring for
twenty, or even fifteen pounds. He is seldom more than fourteen
hands high. With a tall Arab on his back, he looks too small for a
cavalry horse. It is his great merit to be better than he looks. He is
very docile, very hardy, and can go through a great deal of work.
Trotting is not one of his paces. Egypt used to have a celebrated
breed of horses of its own, but that is now nearly extinct.
CHAPTER LII.
THE DOG.—THE UNCLEAN ANIMAL.—THE
BUFFALO.—THE OX.—THE GOAT AND THE
SHEEP.—FERÆ NATURÆ.
The dog has, in the East, been spurned from the companionship
of man. He is no longer allowed to guard a master’s property, or to
be the playfellow of his children. He has been expelled from the
home, and the door has been closed against him; every contumely
has been heaped upon him; religion has pronounced him unclean,
and his contact double defilement.
But centuries of ill-usage have not obliterated nature. He cannot
divest himself of his old, hereditary, unreasoning feelings of eternal
dependence, and fidelity. Man has, it is true, with injurious
harshness, renounced the compact first indented in some distant
age, perhaps in some remote northern clime; but the dog neither
makes retort, nor claims his liberty. He remains faithful to his part of
the broken bond. Only let him be near his old master, allow him no
more companionship than to see him pass by, and he will bear all
the scorn, and all the hardnesses, of his cruel lot, and will ever be
forward to do him any service, however unhonoured. And so it is that
he has become homeless and masterless, the scavenger, and the
knacker, of eastern cities.
Among wild animals, every individual, or if the species be
gregarious, every association of individuals, has its own beat, which
is as much its own property as a landed estate is the property of its
human owner. In this we have the germ, and the rationale, of the
human developments of the natural necessity, and idea of property.
Each of these beats is an appropriated hunting ground. Any outsider
who appears within its limits is an invader, and is treated as such. So
it is with the dogs of a large eastern city. They are divided into
associations, and each association occupies its own district of the
city. If a dog sets his foot beyond the boundaries of his own district,
he is instantly attacked by those whose district he has invaded. An
alarm is given, and all concerned rush to drive off the intruder, who is
often seriously mauled. These raids, and their repulses, generally
take place at night. To sybarite travellers, and to those who take no
interest in the life of the world around them, the canine uproar
caused in these affairs is simply insufferable. The growling is
certainly very harsh: you might think it issued from the throats of
packs of hyænas. Many of these dogs are badly wounded, we may
infer, from one another’s teeth in these night rows, because if such
results do not ensue, for what earthly purpose do they make all this
uproar? It would then be made out of pure cussedness, which one
cannot believe of them.
I never saw a bitch with more than two pups—seldom with more
than one. I supposed some inhabitant of the district had knocked the
rest of the family on the head, to prevent the pack becoming too
numerous.
If a dog in the interior of the city makes himself disagreeable, he is
taken up by the scruff of the neck, and carried outside the city. He is
never known to return again to his old haunts: in fact, he is unable to
do so, being always hindered by those in possession of the
intervening districts from passing through them. He thus remains on
the outside of the city, an outcast from the dog community, a pariah
among dogs, for the rest of his days.
They never show any disposition to molest one in the day-time; at
night, however, it is always necessary to go about provided with a
good stick, for they will then scarcely ever allow a Frank to pass
without assailing him, if not with their teeth, at all events with their
tongues. The town dogs are about the size of our English pointers,
but with longer coats, generally of a yellowish colour. The tail is
somewhat bushy. The village dogs are larger and much fiercer. They
are dark brown or black. Their size, courage, and social position
improve as the river is ascended. I met a Scotchman, who carried
his dislike, and fear, of these ill-used animals so far, that he never
went out, night or day without a revolver, or a kind of fire-arm, of
German manufacture, which goes off without a report. He boasted of
the hecatombs he had slain—perhaps more had been maimed than
slain—during his residence in the country. At one time he had
cleared off so many in the quarter of the city in which he was living,
that the natives, inferring from the number of dead dogs found in the
neighbourhood of his house that it was his doing, laid a complaint
against him before the cadi for canicide. He was admonished to
abstain for the future from taking the life of, or wounding, useful and
unoffending animals.
Although the Arab can give the dog no place in his affections, nor
allow him the smallest familiarity, yet in his treatment of him you may
trace the working of a sort of compassionate kindliness. He sets up
for him water-troughs about the city; and I often observed a poor
man, as he ate his scanty meal, throw a morsel to a canine
mendicant, probably, and if so not misthinkingly, in the name of God.
The Buffalo.
The buffalo, if it were only for his uncouthness, ought not to be
unnoticed here. He has, however, another claim to a place in our
picture, from his so frequently coming into view. He is hardier, and
heavier, than the ox, and has, therefore, to a great extent, taken its
place both at the plough, and at the water-wheel. The Egyptian
buffalo has no resemblance to the brawny-shouldered, shaggy-
maned, clean-legged, American prairie bison, injuriously miscalled a
buffalo. What our Egyptian’s hairless, slate-coloured carcass is most
like is that of some ill-shaped primæval pachyderm. You would
hardly take him for a congener of the ox, even after you had noticed
his horns; such horns as they are, for they are so reflexed, and
twisted, as to give you the idea that something must have gone
wrong with them, till you find that they are alike in all. The little
buffalo calf, by the side of its ugly, dull, soulless dam, seems a far
more creditable piece of nature’s handicraft. You can hardly believe
that a few months will metamorphose it into such ugliness.
The Ox.
Of the existing ox so little is seen that nothing need be said here,
except that it is a diminutive specimen of its kind; and that it gives
dry, stringy beef. It was different in the time of the old Egyptians.
They had (what had they not?) a polled breed as well as long-horns,
and also some breeds that were curiously-marked. But both bull and
cow were then divine. The latter was sacred to Athyr, the Venus of
Egypt. The former was worshipped as the symbol of strength, and of
the generative powers of nature; and, besides, his quiet rumination
suggested the idea of the sufficiency, and wisdom, of reflective
meditation. Since they ceased to be divine the couple have much
degenerated.
Feræ Naturæ.
As to the Feræ Naturæ, Egypt offers little cover or feeding-ground
for them. I saw none but jackals and foxes. They can, therefore,
have no place in a traveller’s sketch of the country. The crocodile is
all but extinct below the cataract. The steamboat it is, which in this
part of the river, is scaring it away.[9] Formerly, both the crocodile and
the hippopotamus appear to have disported themselves even in the
Delta.
CHAPTER LIII.
BIRDS IN EGYPT.
In the picture of Nature the birds’ place must not be left quite in
blank. The first to greet you in Egypt are two familiar home
companions. As you near the harbour of Alexandria—and even
sometimes before you sight the land—the wagtail comes on board,
and, without a moment lost in reconnoitring, begins to look about the
deck for crumbs. He flirts his tail as usual. Here, in our bird-
persecuting part of the world, it means that he is on the alert; but on
the deck of the steamer, that is entering the harbour of Alexandria, it
means, ‘All right. I am not afraid: I am quite at home. Every one here
is glad to see me, and I am glad to see you. Here no boys throw
stones at me.’ Every flirt of his tail sends a little ripple of pleasure
over your heart.
On entering Alexandria your only thought is of what is new and
strange: the last that would occur to you would be that you were
about to encounter an old friend. But the first object that meets your
eye, as you step through the custom-house gate into the street, is a
very old cosmopolitan friend you left in London a few weeks back—
the house sparrow. ‘What!’ you exclaim. ‘You here, you ornithological
gamin?’
As you go by rail to Cairo, and as you ascend the river, you are
never long out of sight of a mud-built village. The saddest and
sorriest of habitations for men and women are these Egyptian
villages I have ever anywhere seen. West India negro huts are
better-furnished abodes. Their best-lodged inhabitants are the
pigeons. The only storey that is ever raised above the ground-floor—
which is of the ground as well as on it—is the dovecot. This,
therefore, is the only object in a village which attracts the eye of the
passer-by. In the Delta the fashion appears to be to raise a rude
roundish mud tower, full of earthenware pots for the pigeons to breed
in. These are inserted—of course, lying horizontally—in the mud of
which the tower is built. In Upper Egypt these towers have assumed
the square form, about twelve feet each side. Three or four tiers of
branches are carried round the building for the pigeons to settle on;
these are stuck into the wall, and as the branches depart from the
straight line, each according to its own bent, each belt of branches
presents a very irregular appearance. No village is without its
dovecotes. From the summit of the propylæa of the grand Ptolemaic
temple of Edfou, I counted about forty of these dovecotes on the
tops of the mud hovels below me. The number of domestic pigeons
in Egypt must be several times as great as that of the population. I
suppose if they kept pigs they would not keep so many pigeons.
They must consume a great quantity of corn—more, perhaps, than
would be required for the pigs of a pig-eating population as large as
that of Egypt.
In going up the river from Cairo, the first birds that put in their
appearance are the pelicans. They are generally in parties of eight or
ten. They are fishing, in a line across the stream. They always keep
out of gun-shot. They loom large, showing about the size of swans,
and, as seen from a distance, of the colour of cygnets. They do not
care to go more than about two hundred miles above Cairo.
All up the river you see herons of several species: like their
English congeners, they are patient watchers for passing fish; and
when watching, more or less solitary.
The wet sand and mud banks are thronged with countless mobs of
ducks of various kinds, of geese, and of other aquatic birds.
Experience has taught them also how far guns carry.
As to the geese, you frequently hear and see overhead large
flights of them. Sometimes as many as four or five flocks are in sight
at one time. They are going to and from their feeding grounds. When
aloft they are generally in some figure; but very far from always, as
some say, in the form of a wedge. Perhaps the figure in which they
place themselves depends on the currents of wind where they are. If
they are driving against the wind, the wedge would of course be the
best figure for them to move in; but if they are going down the wind a
line one deep would be better, as it would give the full help of the
current to every individual of the flock; and this is a figure they are
often seen in. In the lately disinterred temple of Serapis, between the
dilapidated pyramids of Sakkarah, and the marvellous catacomb of
the sacred bulls, I saw, in painted relief, a scene which tells us how
geese were fattened in old Egypt. Men are seated at each end of a
table which is covered with pellets, probably of some kind of meal.
Each man has a goose in his lap, down the throat of which he is
cramming one of these pellets. The priests of Serapis liked their
geese fat.
In the neighbourhood of Siout I saw several flocks of flamingoes
on the wing. As they approached with the sun upon them, they
showed like discs of silver, supported on black wings. When they
had passed, the eye was charmed with their backs of rosy pink.
Among the land birds the commonest in the village palm groves
are the Egyptian turtle-dove, and the hopoe. Where there are so
many pigeons you might expect a great many hawks: these you see
of several species. Larks are everywhere in the fields. You frequently
fall in with bevies of quail, and with plovers. A small owl is common: I
heard and saw it during the day-time, in the tamarisks near the pool
in the sacred enclosure of Karnak, and elsewhere.
Our English rook—it has a wide range, being a denizen of Africa
as well as of every part of Europe—appears among the birds of
Egypt. My bedroom at Zech’s, late Shepheard’s, Hotel at Cairo was
off the back gallery, looking across a road on to a large garden.
Exactly opposite the window was the sakia which supplied the
garden with water. The creaking and shrieking, every morning, of its
lumbering wooden wheel whilst it was being worked by a patient,
plodding bullock, was far from unpleasant to one who wished to
become acquainted with the sights and sounds of Egypt. In this
garden were many palms. These were tenanted by a colony of
rooks. I was, day after day, interested in noting that they had just the
same bearing and manners as their English relatives. Like them,
they sought the society of man, and seemed to watch his doings with
the same kind of satisfied observation, accompanied with the same
harsh cries, expressive of security and confidence. They were in
every respect quite undistinguishable from our London rooks, and
those that affect our rural homesteads. I looked upon them with the
thought that just as we, at this day, are pleased with their social and
familiar ways, so must, many thousand years ago, have been the old
Egyptians.
The banks of the river are full of bird life, as every bird in Egypt
must daily come to the river to drink.