Professional Documents
Culture Documents
Full download CompTIA A+ guide to software : managing, maintaining, and troubleshooting Ninth Edition. Edition Andrews file pdf all chapter on 2024
Full download CompTIA A+ guide to software : managing, maintaining, and troubleshooting Ninth Edition. Edition Andrews file pdf all chapter on 2024
https://ebookmass.com/product/mike-meyers-comptia-a-guide-to-
managing-and-troubleshooting-pcs-seventh-edition-
exams-220-1101-220-1102-mike-meyers/
https://ebookmass.com/product/mike-meyers-comptia-network-guide-
to-managing-and-troubleshooting-networks-lab-manual-
exam-n10-008-6th-edition-mike-meyers/
https://ebookmass.com/product/mike-meyers-comptia-a-guide-the-
managing-and-troubleshooting-pcs-fifth-edition-
exams-220-901-220-902-mike-meyers/
https://ebookmass.com/product/mike-meyers-comptia-a-guide-to-
managing-and-troubleshooting-pcs-lab-manual-seventh-edition-
exams-220-1101-220-1102-mike-meyers/
Mike Meyers CompTIA Network+ Guide to Managing and
Troubleshooting Networks Lab Manual, Sixth Edition
(Exam N10-008), 6th Edition Mike Meyers & Jonathan S.
Weissman
https://ebookmass.com/product/mike-meyers-comptia-network-guide-
to-managing-and-troubleshooting-networks-lab-manual-sixth-
edition-exam-n10-008-6th-edition-mike-meyers-jonathan-s-weissman/
https://ebookmass.com/product/complete-a-guide-to-it-hardware-
and-software-comptia-a-exams-220-1101-220-1102-9th-edition-
cheryl-a-schmidt/
https://ebookmass.com/product/troubleshooting-and-maintaining-
pcs-all-in-one-for-dummies-4th-edition-dan-gookin/
https://ebookmass.com/product/complete-a-guide-to-it-hardware-
and-software-comptia-a-exams-220-1101-220-1102-9th-edition-
cheryl-a-schmidt-christopher-lee/
CompTIA® A+ 220-902 Exam
Objectives Chapters
Domain 1.0 Windows Operating Systems
1.1 Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, Windows 8.1). 1, 2, 3, 4, 10
1.2 Given a scenario, install Windows PC operating systems using appropriate methods. 1, 2, 3, 6, 9, 11
1.3 Given a scenario, apply appropriate Microsoft command line tools. 3, 5, 6, 9
1.4 Given a scenario, use appropriate Microsoft operating system features and tools. 1, 2, 3, 4, 5, 9, 10
1.5 Given a scenario, use Windows Control Panel utilities. 1, 2, 3, 4, 9, 10
1.6 Given a scenario, install and configure Windows networking on a client/desktop. 1, 7, 9, 10
1.7 Perform common preventive maintenance procedures using the appropriate Windows OS tools. 3, 6
Domain 2.0 Other Operating Systems and Technologies
2.1 Identify common features and functionality of the Mac OS and Linux operating systems. 11
2.2 Given a scenario, setup and use client-side virtualization. 11
2.3 Identify basic cloud concepts. 9
2.4 Summarize the properties and purpose of services provided by networked hosts. 9, 10
2.5 Identify basic features of mobile operating systems. 8
2.6 Install and configure basic mobile device network connectivity and email. 8
2.7 Summarize methods and data related to mobile device synchronization. 8, 10
Domain 3.0 Security
3.1 Identify common security threats and vulnerabilities. 10
3.2 Compare and contrast common prevention methods. 7, 9, 10
3.3 Compare and contrast differences of basic Windows OS security settings. 1, 3, 9, 10
3.4 Given a scenario, deploy and enforce security best practices to secure a workstation. 3, 9, 10
3.5 Compare and contrast various methods for securing mobile devices. 10
3.6 Given a scenario, use appropriate data destruction and disposal methods. 10
3.7 Given a scenario, secure SOHO wireless and wired networks. 7
Domain 4.0 Software Troubleshooting
4.1 Given a scenario, troubleshoot PC operating system problems with appropriate tools. 3, 4, 5, 6, 11
4.2 Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices. 6, 10, 11
4.3 Given a scenario, troubleshoot common mobile OS and application issues with appropriate tools. 8, 10
4.4 Given a scenario, troubleshoot common mobile OS and application security issues with appropriate tools. 8, 10
Domain 5.0 Operational Procedures
5.1 Given a scenario, use appropriate safety procedures. Appendix A
5.2 Given a scenario with potential environmental impacts, apply the appropriate controls. Appendix A
5.3 Summarize the process of addressing prohibited content/activity, and explain privacy, licensing, and policy concepts. 10
5.4 Demonstrate proper communication techniques and professionalism. 5
5.5 Given a scenario, explain the troubleshooting theory. 5
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Want to turn C’s
into A’s? Obviously, right?
But the right way to go about it isn’t always so obvious. Go digital to
get the grades. MindTap’s customizable study tools and eTextbook
give you everything you need all in one place.
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ Guide
to Software: Managing,
Maintaining, and
Troubleshooting
Ninth Edition
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial
review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to
remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous
editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by
ISBN#, author, title, or keyword for materials in your areas of interest.
Important Notice: Media content referenced within the product description or the product text may not be available in the eBook version.
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ Guide to Software: Managing, © 2017, 2013 Cengage Learning
Maintaining, and Troubleshooting,
Ninth Edition, Jean Andrews, Joy Dark, Jill West WCN: 02-200-203
SVP, GM Skills & Global Product Management: Dawn ALL RIGHTS RESERVED. No part of this work covered by the copy-
Gerrain right herein may be reproduced or distributed in any form or by any
Product Director: Kathleen McMahon means, except as permitted by U.S. copyright law, without the prior
written permission of the copyright owner.
Product Team Manager: Kristin McNary
Senior Director, Development: Marah Bellegarde For product information and technology assistance, contact us at
Product Development Manager: Leigh Hefferon Cengage Learning Customer & Sales Support, 1-800-354-9706
Senior Content Developer: Michelle Ruelos For permission to use material from this text or product,
Cannistraci submit all requests online at www.cengage.com/permissions
Product Assistant: Abigail Pufpaff Further permissions questions can be e-mailed to
permissionrequest@cengage.com
Vice President, Marketing Services: Jennifer Ann Baker
Marketing Director: Michele McTighe Library of Congress Control Number: 2015957525
Senior Production Director: Wendy Troeger ISBN: 978-1-305-26650-6
Production Director: Patty Stephan Cengage Learning
Senior Content Project Manager: Brooke Greenhouse 20 Channel Center Street
Boston, MA 02210
Managing Art Director: Jack Pendleton USA
Cover image(s):
Cengage Learning is a leading provider of customized learning
©iStockphoto.com/traffic_analyzer solutions with employees residing in nearly 40 different countries
©iStockphoto.com/simon2579 and sales in more than 125 countries around the world. Find your
local representative at www.cengage.com.
Cengage Learning products are represented in Canada by Nelson
All screenshots, unless otherwise noted, are used
Education, Ltd.
with permission from Microsoft Corporation.
Microsoft® is a registered trademark of the To learn more about Cengage Learning, visit www.cengage.com
Microsoft Corporation. Purchase any of our products at your local college store or at our
preferred online store www.cengagebrain.com
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents
CompTIA A+ 220-902 Exam Mapped to Installing Windows 8.1 and Windows 7 . . . . . . . . 66
Chapters . . . . . . . . . . . . . . . . . . . . . . vii Steps to Perform a Windows 8.1 In-Place
Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Windows 8.1 Upgrade from Microsoft
Website . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Chapter 1 Windows 7 In-Place Upgrade . . . . . . . . . . . . . . 72
Survey of Windows Features and Support Steps to Perform a Windows 8.1
Tools . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Clean Install . . . . . . . . . . . . . . . . . . . . . . . . 74
Steps to Perform a Windows 7 Clean Install . . . 76
Windows Interfaces . . . . . . . . . . . . . . . . . . . . . . . 2 Steps to Set Up a Windows Multiboot . . . . . . . 78
Windows 8 Modern Interface . . . . . . . . . . . . . . . 3 Using an Upgrade Product Key on a New
Windows 8 Desktop . . . . . . . . . . . . . . . . . . . . . 7 Hard Drive . . . . . . . . . . . . . . . . . . . . . . . . . 80
Windows Tools for Users and Technicians . . . . . . . 11 What to Do After a Windows Installation . . . . . . . 84
Windows 8 File Explorer and Windows 7 Verify You Have Network Access . . . . . . . . . . . 85
Windows Explorer . . . . . . . . . . . . . . . . . . . . 11 Activate Windows . . . . . . . . . . . . . . . . . . . . . 86
Control Panel . . . . . . . . . . . . . . . . . . . . . . . . 18 Install Windows Updates and Service Packs . . . 86
Folder Options . . . . . . . . . . . . . . . . . . . . . . . . 20 Install Hardware . . . . . . . . . . . . . . . . . . . . . . 88
Power Options . . . . . . . . . . . . . . . . . . . . . . . . 21 Install Applications . . . . . . . . . . . . . . . . . . . . 95
System Window . . . . . . . . . . . . . . . . . . . . . . . 23 Set Up User Accounts and Transfer User
System Information Window . . . . . . . . . . . . . . 25 Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Action Center . . . . . . . . . . . . . . . . . . . . . . . . 26 Turn Windows Features On or Off . . . . . . . . . . 96
Windows Network Connections . . . . . . . . . . . . . . 28 Special Concerns When Working in a Large
Windows Workgroup and Homegroup . . . . . . . . 28 Enterprise . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Windows Domain . . . . . . . . . . . . . . . . . . . . . . 29 Deployment Strategies for Windows . . . . . . . . . 97
Public and Private Networks . . . . . . . . . . . . . . 30 Using the USMT Software . . . . . . . . . . . . . . . . 99
Make a Windows 8 Network Connection . . . . . . 31
Domain Setup . . . . . . . . . . . . . . . . . . . . . . . . 34
Windows User Accounts . . . . . . . . . . . . . . . . . . . 35 Chapter 3
Using a Microsoft Account with Windows 8 . . . . 38
User Account Control Dialog Box . . . . . . . . . . . 41 Maintaining Windows . . . . . . . . . . . . 107
Schedule Preventive Maintenance . . . . . . . . . . . 108
Verify Critical Windows Settings . . . . . . . . . . 108
Chapter 2 Update Drivers and Firmware . . . . . . . . . . . . 108
Installing Windows . . . . . . . . . . . . . . . 49 Patch Management . . . . . . . . . . . . . . . . . . . . 109
Clean Up the Hard Drive . . . . . . . . . . . . . . . . 110
How to Plan a Windows Installation . . . . . . . . . . 50 Backup Procedures . . . . . . . . . . . . . . . . . . . . . 117
Choose the Edition, License, and Version Planning for Disaster Recovery . . . . . . . . . . . 118
of Windows . . . . . . . . . . . . . . . . . . . . . . . . 50 Back Up User Data with Windows 8 File
Verify Your System Qualifies for History . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Windows . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Back Up Windows System Files . . . . . . . . . . . 124
Installations with Special Considerations . . . . . 57 Windows 8 Custom Refresh Image . . . . . . . . . 126
Choose the Type of Installation: In-Place Managing Files, Folders, and Storage Devices . . . 129
Upgrade, Clean Install, or Dual Boot . . . . . . . 62 How Partitions and File Systems Work . . . . . . 129
Understand the Choices You’ll Make during Commands to Manage Files and Folders . . . . . 133
the Installation . . . . . . . . . . . . . . . . . . . . . 63 Use Disk Management to Manage
Final Checklist before Beginning the Hard Drives . . . . . . . . . . . . . . . . . . . . . . . 144
Installation . . . . . . . . . . . . . . . . . . . . . . . . 64 Windows Storage Spaces . . . . . . . . . . . . . . . . 151
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
iv Table of Contents
Chapter 5 Chapter 7
Supporting Customers and Connecting To and Setting Up a
Troubleshooting Windows . . . . . . . . 209 Network . . . . . . . . . . . . . . . . . . . . . 297
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents v
Connect to an Ethernet Wired or Wireless Update and Restore Windows Phone from
Wi-Fi Local Network . . . . . . . . . . . . . . . . . 317 Backup . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Connect to a Wireless WAN (Cellular) Troubleshoot Windows Mobile Devices . . . . . . 410
Network . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Create a Dial-Up Connection . . . . . . . . . . . . . 323
Create a VPN Connection . . . . . . . . . . . . . . . 325 Chapter 9
Dynamic and Static IP Configurations . . . . . . 328
Alternate IP Address Configuration . . . . . . . . 329
Windows Resources on a Network . . . 417
Manage Network Adapters . . . . . . . . . . . . . . 330 Supporting Client/Server Applications . . . . . . . . 418
Setting Up a Multifunction Router for a SOHO Network Servers . . . . . . . . . . . . . . . . . . . . . 418
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 Internet Explorer . . . . . . . . . . . . . . . . . . . . . 419
Functions of a SOHO Router . . . . . . . . . . . . . 334 Remote Desktop Connection (RDC) . . . . . . . . 427
Install and Configure a Router on the Local Remote Assistance . . . . . . . . . . . . . . . . . . . . 432
Network . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Use Group Policy to Improve QoS for
Limit Internet Traffic on Your Network . . . . . 342 Applications . . . . . . . . . . . . . . . . . . . . . . . 434
Set Up a Wireless Network . . . . . . . . . . . . . . 347 ODBC Data Sources . . . . . . . . . . . . . . . . . . . . 435
Controlling Access to Folders and Files . . . . . . . 437
Classify User Accounts and User Groups . . . . . 437
Chapter 8 Methods to Assign Permissions to Folders
and Files . . . . . . . . . . . . . . . . . . . . . . . . . 440
Supporting Mobile Operating
How to Share Folders and Files . . . . . . . . . . . 442
Systems . . . . . . . . . . . . . . . . . . . . . 359
How to Map a Network Drive or Network
Operating Systems Used on Mobile Devices . . . . . 360 Printer . . . . . . . . . . . . . . . . . . . . . . . . . . 454
Android by the Open Handset Alliance Hidden Network Resources and
and Google . . . . . . . . . . . . . . . . . . . . . . . 360 Administrative Shares . . . . . . . . . . . . . . . . 456
iOS by Apple . . . . . . . . . . . . . . . . . . . . . . . . 363 Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . 458
Windows Phone by Microsoft . . . . . . . . . . . . . 367 Cloud Computing Categories . . . . . . . . . . . . . 459
Comparing Open Source and Closed Source Deployment Models for Cloud Computing . . . . 461
Operating Systems . . . . . . . . . . . . . . . . . . 371
Configure, Sync, and Troubleshoot
iOS Devices . . . . . . . . . . . . . . . . . . . . . . . . . 371 Chapter 10
Configure iOS Network Connections . . . . . . . . 372
Configure iOS Email . . . . . . . . . . . . . . . . . . . 375
Security Strategies . . . . . . . . . . . . . . 467
Sync, Back Up, and Restore from Backup Securing a Windows Personal Computer . . . . . . . 468
in iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 Use Windows to Authenticate Users . . . . . . . . 468
Troubleshoot iOS Devices . . . . . . . . . . . . . . . 388 File and Folder Encryption . . . . . . . . . . . . . . 473
Configure, Sync, and Troubleshoot Windows Firewall Settings . . . . . . . . . . . . . . 474
Android Devices . . . . . . . . . . . . . . . . . . . . . . 393 Local Security Policies Using Group Policy . . . 477
Configure Android Network Connections . . . . . 393 Use BitLocker Encryption . . . . . . . . . . . . . . . 481
Configure Android Email . . . . . . . . . . . . . . . . 398 Use UEFI/BIOS Features to Protect the System 482
Sync, Update, Back Up, and Restore from Securing a Mobile Device . . . . . . . . . . . . . . . . . 483
Backup with Android . . . . . . . . . . . . . . . . 399 Device Access Controls . . . . . . . . . . . . . . . . . 483
Troubleshoot Android Devices . . . . . . . . . . . . 402 Software Security . . . . . . . . . . . . . . . . . . . . 486
Configure, Sync, and Troubleshoot Windows Mobile Security in Corporate Environments . . . 488
Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . 406 Additional Methods to Protect Resources . . . . . . 489
Configure Windows Phone Network Authenticate Users for Large Networks . . . . . . 489
Connections . . . . . . . . . . . . . . . . . . . . . . . 407 Physical Security Methods and Devices . . . . . . 492
Configure Windows Phone Email, Sync, Digital Security Methods and Resources . . . . . 493
and Backup . . . . . . . . . . . . . . . . . . . . . . . 407 Unified Threat Management (UTM) Appliance . 493
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
vi Table of Contents
Chapter 11 Appendix B
Virtualization, Linux, and Mac OS X . 523 Entry Points for Startup Processes . . . 595
Virtualization Basics . . . . . . . . . . . . . . . . . . . . 524
Server-Side Virtualization . . . . . . . . . . . . . . . 524
Client-Side Virtualization . . . . . . . . . . . . . . . 525 Appendix c
Virtual Machines and Hypervisors . . . . . . . . . 525
Linux Operating System . . . . . . . . . . . . . . . . . . 530 CompTIA A+ Acronyms . . . . . . . . . . . 599
Directory and File Layout . . . . . . . . . . . . . . . 533
Root Account and User Accounts . . . . . . . . . . 535 Glossary . . . . . . . . . . . . . . . . . . . . . . 607
Linux Commands . . . . . . . . . . . . . . . . . . . . . 536
The Vi Editor . . . . . . . . . . . . . . . . . . . . . . . . 539
Index . . . . . . . . . . . . . . . . . . . . . . . . 637
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ 220-902 Exam Mapped to Chapters
CompTIA A+ Guide to Software, Ninth Edition fully meets all of CompTIA’s A+ 220-902 Exam
Objectives.
DOMAIN 1.0 Windows Operating Systems
1.1 Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista,
Windows 7, Windows 8, Windows 8.1).
1.2 Given a scenario, install Windows PC operating systems using appropriate methods.
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
viii CompTIA A+ 220-902 Exam Mapped to Chapters
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ 220-902 ix
1.4 Given a scenario, use appropriate Microsoft operating system features and tools.
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
x CompTIA A+ 220-902 Exam Mapped to Chapters
System utilities
• REGEDIT 4 The Registry Editor
• COMMAND 3 Commands to Manage Files and Folders
• SERVICES.MSC 4 Services Console
• MMC 4 Microsoft Management Console (MMC)
• MSTSC 9 Remote Desktop Connection (RDC)
• NOTEPAD 1 Windows Tools for Users and Technicians
• EXPLORER 1 Windows 8 File Explorer and Windows 7 Windows
Explorer
• MSINFO32 1 System Information Window
• DXDIAG 4 Display Settings and Graphics Software
• DEFRAG 3 Schedule Preventive Maintenance
• System restore 3 Back Up Windows System Files
• Windows Update 3 Schedule Preventive Maintenance
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ 220-902 xi
1.7 Perform common preventive maintenance procedures using the appropriate Windows OS tools.
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xii CompTIA A+ 220-902 Exam Mapped to Chapters
2.1 Identify common features and functionality of the Mac OS and Linux operating systems.
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ 220-902 xiii
2.4 Summarize the properties and purpose of services provided by networked hosts.
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xiv CompTIA A+ 220-902 Exam Mapped to Chapters
• App source (play store, app store 8 Operating Systems Used on Mobile Devices
and store)
• Screen orientation (accelerometer/ 8 Operating Systems Used on Mobile Devices
gyroscope)
• Screen calibration 8 Operating Systems Used on Mobile Devices
• GPS and geotracking 8 Operating Systems Used on Mobile Devices
• WiFi calling 8 Operating Systems Used on Mobile Devices
• Launcher/GUI 8 Operating Systems Used on Mobile Devices
• Virtual assistant 8 Operating Systems Used on Mobile Devices
• SDK/APK 8 Operating Systems Used on Mobile Devices
• Emergency notification 8 Operating Systems Used on Mobile Devices
• Mobile payment service 8 Operating Systems Used on Mobile Devices
2.6 Install and configure basic mobile device network connectivity and email.
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ 220-902 xv
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xvi CompTIA A+ 220-902 Exam Mapped to Chapters
DOMAIN 3.0 Security
Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Another random document with
no related content on Scribd:
Fig. 293.
CONTROL OF PIGS.
ANÆSTHESIA.
BLEEDING.
Bovine animals are usually bled from the superficial jugular, or the
mammary vein.
Bleeding from the Jugular.—The animal having been suitably
fixed, the jugular is raised by means of a cord drawn tightly round
the base of the neck, and the vessel is opened with a fleam about the
middle of the neck.
The skin of the ox being thick, a long-bladed instrument is
necessary. When the bleeding ceases, the cord is removed: some
practitioners take no precautions as regards the wound; it is better to
insert a pin suture.
Bleeding from the jugular may also be performed with the trocar,
particularly in animals with fine, thin skin.
Bleeding from the Mammary Vein.—The mammary vein may
be opened with the fleam, the straight bistoury, or the lancet. The
head is firmly fixed and the hind limbs controlled by a rope passed in
a figure of eight above the hocks.
In bleeding on the left the operator places himself at an angle to
the animal’s side, opposite the hypochondriac region, with his back
towards the animal’s head, and holds the fleam in his right hand. To
operate on the right-hand side the fleam is held in the left hand.
This method of bleeding always causes thrombus formation, on
account of the low position of the opening in the vein. The animal’s
bed should be kept very clean, in order to prevent any local infection
which might cause hæmorrhagic or suppurative phlebitis. The lancet
or bistoury can only be used in animals with very fine skin.
In bovine animals small quantities of blood are sometimes taken
from the facial vein or the veins of the ear or tail.
BLEEDING IN SHEEP.
On account of the quantity of fatty tissue and wool covering the
jugular furrow in the sheep, bleeding is scarcely practicable at that
point. The operation is usually performed on the angular vein of the
eye, the external saphenous vein, or the subcutaneous vein of the
forearm.
In operating on the facial vein the animal’s head is firmly held, the
operator compresses with the fingers of his left hand the facial vein
at the point where it passes into the maxillary fissure, and with a
lancet opens the angular vein of the eye or one of the other branches
of origin which project prominently beneath the skin. Bleeding
ceases as soon as the pressure is relaxed.
In the case of the external saphenous vein, the vein is raised by
compressing the middle region of the limb and the vessel is opened
with a lancet, a little above and towards the outside of the hock.
The
subcutan
eous vein
of the
forearm
can be
raised by
RINGING PIGS.
This
operation is
customary
in countries
where pigs
are allowed
to roam
more or less
at liberty,
and it is
necessary to
adopt some
precaution
to prevent
them from
uprooting
the soil and
thus
causing
damage,
but the
practice
Fig. 300.—“Ringing” the pig. tends
nowadays
to
disappear. It simply consists in passing through the nose some object
which on being rubbed against anything causes pain and thus checks
the animal’s natural proclivity.
Numerous methods have been suggested. One of the simplest is as
follows: The animal having been cast, suitably secured and muzzled,
two thick iron wires sharpened at the ends are passed through the
snout, and the two ends are then twisted together in the form of two
rings. These can, if necessary, be united.
Another method, perhaps even more efficacious, consists in
bending a thick wire into the shape of the letter U, and preparing a
small metal plate with two holes corresponding in position to the
distance between the two nostrils. The ends of the wire, being
sharpened, are passed through the nostrils and securely united to the
metal plate by being bent into a spiral or simply at right angles.
ŒSOPHAGUS.
ŒSOPHAGOTOMY.
GASTROTOMY.
Fig. 302.—Gastrotomy. Pa, Skin; 1m, 2m, muscular layers; Pe, peritoneum; R,
rumen, showing line of incision.
LAPAROTOMY.
Laparotomy is
comparatively seldom
performed on animals of the
bovine species, though it may
become necessary in dealing
with cases of hernia, uterine
torsion (where direct taxis is
called for), Cæsarean section,
invagination or strangulation
of the intestine, and under a
few other exceptional
Fig. 304. circumstances.
If simple exploration is
aimed at, the operation is most conveniently performed from the
right flank with the animal in a standing position, but should a
prolonged operation be contemplated the animal should be cast. The
incision varies in length, according to circumstances, from 8 to 16
inches, and, like that in gastrotomy, should correspond in direction
with the fibres of the small oblique abdominal muscle; the seat of
operation should previously be washed, shaved, and disinfected.
The operation comprises the following stages:—
First stage. Incision of the skin.
Second stage. Incision through the muscles and peritoneum.
Third stage. Exploration, inspection, palpation, extraction or
ablation, etc.
Fourth stage. Suture of the peritoneal opening, the lips being
brought together face to face.
Fifth stage. Suture of the muscles and the skin. It is sometimes
advisable to insert a drain of iodoform gauze under the skin.
In small animals, such as the sheep, goat, and pig, laparotomy is
more easily practicable, and can be performed either in the right
flank or towards the white line. The stages of operation are exactly
the same, but after operating near the white line it is extremely
important to use numerous and strong sutures, and afterwards to
apply a suspensory bandage around the abdomen, securing it above
the loins.
HERNIÆ.