Download as pdf or txt
Download as pdf or txt
You are on page 1of 45

CompTIA A+ guide to software :

managing, maintaining, and


troubleshooting Ninth Edition. Edition
Andrews
Visit to download the full and correct content document:
https://ebookmass.com/product/comptia-a-guide-to-software-managing-maintaining-a
nd-troubleshooting-ninth-edition-edition-andrews/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Mike Meyers' CompTIA A+ Guide to Managing and


Troubleshooting PCs, Seventh Edition (Exams 220-1101 &
220-1102) Mike Meyers

https://ebookmass.com/product/mike-meyers-comptia-a-guide-to-
managing-and-troubleshooting-pcs-seventh-edition-
exams-220-1101-220-1102-mike-meyers/

Mike Meyers CompTIA Network+ Guide to Managing and


Troubleshooting Networks Lab Manual (Exam N10-008), ,
6th Edition Mike Meyers

https://ebookmass.com/product/mike-meyers-comptia-network-guide-
to-managing-and-troubleshooting-networks-lab-manual-
exam-n10-008-6th-edition-mike-meyers/

Mike Meyers’ CompTIA A+ Guide the Managing and


Troubleshooting PCs. Fifth Edition (Exams 220-901 &
220-902) Mike Meyers

https://ebookmass.com/product/mike-meyers-comptia-a-guide-the-
managing-and-troubleshooting-pcs-fifth-edition-
exams-220-901-220-902-mike-meyers/

Mike Meyers’ CompTIA A+™ Guide to Managing and


Troubleshooting PCs Lab Manual, Seventh Edition (Exams
220-1101 & 220-1102) Mike Meyers

https://ebookmass.com/product/mike-meyers-comptia-a-guide-to-
managing-and-troubleshooting-pcs-lab-manual-seventh-edition-
exams-220-1101-220-1102-mike-meyers/
Mike Meyers CompTIA Network+ Guide to Managing and
Troubleshooting Networks Lab Manual, Sixth Edition
(Exam N10-008), 6th Edition Mike Meyers & Jonathan S.
Weissman
https://ebookmass.com/product/mike-meyers-comptia-network-guide-
to-managing-and-troubleshooting-networks-lab-manual-sixth-
edition-exam-n10-008-6th-edition-mike-meyers-jonathan-s-weissman/

Mike Meyers CompTIA Network+ Guide to Managing and


Troubleshooting Networks Lab Manual, Sixth Edition
(Exam N10-008), 6th Edition Mike Meyers & Jonathan S.
Weissman
https://ebookmass.com/product/mike-meyers-comptia-network-guide-
to-managing-and-troubleshooting-networks-lab-manual-sixth-
edition-exam-n10-008-6th-edition-mike-meyers-jonathan-s-
weissman-2/

Complete A+ Guide to IT Hardware and Software: CompTIA


A+ Exams 220-1101 & 220-1102 9th Edition Cheryl A.
Schmidt

https://ebookmass.com/product/complete-a-guide-to-it-hardware-
and-software-comptia-a-exams-220-1101-220-1102-9th-edition-
cheryl-a-schmidt/

Troubleshooting and Maintaining PCs All-in-One For


Dummies 4th Edition Dan Gookin

https://ebookmass.com/product/troubleshooting-and-maintaining-
pcs-all-in-one-for-dummies-4th-edition-dan-gookin/

Complete A+ Guide to IT Hardware and Software: CompTIA


A+ Exams 220-1101 & 220-1102, 9th Edition Cheryl A.
Schmidt & Christopher Lee

https://ebookmass.com/product/complete-a-guide-to-it-hardware-
and-software-comptia-a-exams-220-1101-220-1102-9th-edition-
cheryl-a-schmidt-christopher-lee/
CompTIA® A+ 220-902 Exam
Objectives Chapters
Domain 1.0 Windows Operating Systems
1.1 Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, Windows 8.1). 1, 2, 3, 4, 10
1.2 Given a scenario, install Windows PC operating systems using appropriate methods. 1, 2, 3, 6, 9, 11
1.3 Given a scenario, apply appropriate Microsoft command line tools. 3, 5, 6, 9
1.4 Given a scenario, use appropriate Microsoft operating system features and tools. 1, 2, 3, 4, 5, 9, 10
1.5 Given a scenario, use Windows Control Panel utilities. 1, 2, 3, 4, 9, 10
1.6 Given a scenario, install and configure Windows networking on a client/desktop. 1, 7, 9, 10
1.7 Perform common preventive maintenance procedures using the appropriate Windows OS tools. 3, 6
Domain 2.0 Other Operating Systems and Technologies
2.1 Identify common features and functionality of the Mac OS and Linux operating systems. 11
2.2 Given a scenario, setup and use client-side virtualization. 11
2.3 Identify basic cloud concepts. 9
2.4 Summarize the properties and purpose of services provided by networked hosts. 9, 10
2.5 Identify basic features of mobile operating systems. 8
2.6 Install and configure basic mobile device network connectivity and email. 8
2.7 Summarize methods and data related to mobile device synchronization. 8, 10
Domain 3.0 Security
3.1 Identify common security threats and vulnerabilities. 10
3.2 Compare and contrast common prevention methods. 7, 9, 10
3.3 Compare and contrast differences of basic Windows OS security settings. 1, 3, 9, 10
3.4 Given a scenario, deploy and enforce security best practices to secure a workstation. 3, 9, 10
3.5 Compare and contrast various methods for securing mobile devices. 10
3.6 Given a scenario, use appropriate data destruction and disposal methods. 10
3.7 Given a scenario, secure SOHO wireless and wired networks. 7
Domain 4.0 Software Troubleshooting
4.1 Given a scenario, troubleshoot PC operating system problems with appropriate tools. 3, 4, 5, 6, 11
4.2 Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices. 6, 10, 11
4.3 Given a scenario, troubleshoot common mobile OS and application issues with appropriate tools. 8, 10
4.4 Given a scenario, troubleshoot common mobile OS and application security issues with appropriate tools. 8, 10
Domain 5.0 Operational Procedures
5.1 Given a scenario, use appropriate safety procedures. Appendix A
5.2 Given a scenario with potential environmental impacts, apply the appropriate controls. Appendix A
5.3 Summarize the process of addressing prohibited content/activity, and explain privacy, licensing, and policy concepts. 10
5.4 Demonstrate proper communication techniques and professionalism. 5
5.5 Given a scenario, explain the troubleshooting theory. 5

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Want to turn C’s
into A’s? Obviously, right?
But the right way to go about it isn’t always so obvious. Go digital to
get the grades. MindTap’s customizable study tools and eTextbook
give you everything you need all in one place.

Engage with your course content, enjoy the flexibility of


studying anytime and anywhere, stay connected to assignment due
dates and instructor notifications with the MindTap Mobile app...
and most of all…EARN BETTER GRADES.

TO GET STARTED VISIT


WWW.CENGAGE.COM/STUDENTS/MINDTAP

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ Guide
to Software: Managing,
Maintaining, and
Troubleshooting
Ninth Edition

Jean Andrews, Joy Dark, Jill West

Australia • Canada • Mexico • Singapore • Spain • United Kingdom • United States

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial
review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to
remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous
editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by
ISBN#, author, title, or keyword for materials in your areas of interest.

Important Notice: Media content referenced within the product description or the product text may not be available in the eBook version.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ Guide to Software: Managing, © 2017, 2013 Cengage Learning
Maintaining, and Troubleshooting,
Ninth Edition, Jean Andrews, Joy Dark, Jill West WCN: 02-200-203

SVP, GM Skills & Global Product Management: Dawn ALL RIGHTS RESERVED. No part of this work covered by the copy-
Gerrain right herein may be reproduced or distributed in any form or by any
Product Director: Kathleen McMahon means, except as permitted by U.S. copyright law, without the prior
written permission of the copyright owner.
Product Team Manager: Kristin McNary
Senior Director, Development: Marah Bellegarde For product information and technology assistance, contact us at
Product Development Manager: Leigh Hefferon Cengage Learning Customer & Sales Support, 1-800-354-9706
Senior Content Developer: Michelle Ruelos For permission to use material from this text or product,
Cannistraci submit all requests online at www.cengage.com/permissions
Product Assistant: Abigail Pufpaff Further permissions questions can be e-mailed to
permissionrequest@cengage.com
Vice President, Marketing Services: Jennifer Ann Baker
Marketing Director: Michele McTighe Library of Congress Control Number: 2015957525
Senior Production Director: Wendy Troeger ISBN: 978-1-305-26650-6
Production Director: Patty Stephan Cengage Learning
Senior Content Project Manager: Brooke Greenhouse 20 Channel Center Street
Boston, MA 02210
Managing Art Director: Jack Pendleton USA
Cover image(s):
Cengage Learning is a leading provider of customized learning
©iStockphoto.com/traffic_analyzer ­solutions with employees residing in nearly 40 different countries
©iStockphoto.com/simon2579 and sales in more than 125 countries around the world. Find your
local representative at www.cengage.com.
Cengage Learning products are represented in Canada by Nelson
All screenshots, unless otherwise noted, are used
Education, Ltd.
with permission from Microsoft Corporation.
Microsoft® is a registered trademark of the To learn more about Cengage Learning, visit www.cengage.com
Microsoft Corporation. Purchase any of our products at your local college store or at our
preferred online store www.cengagebrain.com

Notice to the Reader


Publisher does not warrant or guarantee any of the products described herein
or perform any independent analysis in connection with any of the product
information contained herein. Publisher does not assume, and expressly dis-
claims, any obligation to obtain and include information other than that pro-
vided to it by the manufacturer. The reader is expressly warned to consider and
adopt all safety precautions that might be indicated by the activities described
herein and to avoid all potential hazards. By following the instructions con-
tained herein, the reader willingly assumes all risks in connection with such
instructions. The publisher makes no representations or warranties of any kind,
including but not limited to, the warranties of fitness for particular purpose or
merchantability, nor are any such representations implied with respect to the
material set forth herein, and the publisher takes no responsibility with respect
to such material. The publisher shall not be liable for any special, consequen-
tial, or exemplary damages resulting, in whole or part, from the readers’ use of,
or reliance upon, this material.

Printed in the United States of America


Print Number: 01 Print Year: 2016

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents
CompTIA A+ 220-902 Exam Mapped to Installing Windows 8.1 and Windows 7 . . . . . . . . 66
Chapters . . . . . . . . . . . . . . . . . . . . . . vii Steps to Perform a Windows 8.1 In-Place
Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Windows 8.1 Upgrade from Microsoft
Website . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Chapter 1 Windows 7 In-Place Upgrade . . . . . . . . . . . . . . 72
Survey of Windows Features and Support Steps to Perform a Windows 8.1
Tools . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Clean Install . . . . . . . . . . . . . . . . . . . . . . . . 74
Steps to Perform a Windows 7 Clean Install . . . 76
Windows Interfaces . . . . . . . . . . . . . . . . . . . . . . . 2 Steps to Set Up a Windows Multiboot . . . . . . . 78
Windows 8 Modern Interface . . . . . . . . . . . . . . . 3 Using an Upgrade Product Key on a New
Windows 8 Desktop . . . . . . . . . . . . . . . . . . . . . 7 Hard Drive . . . . . . . . . . . . . . . . . . . . . . . . . 80
Windows Tools for Users and Technicians . . . . . . . 11 What to Do After a Windows Installation . . . . . . . 84
Windows 8 File Explorer and Windows 7 Verify You Have Network Access . . . . . . . . . . . 85
Windows Explorer . . . . . . . . . . . . . . . . . . . . 11 Activate Windows . . . . . . . . . . . . . . . . . . . . . 86
Control Panel . . . . . . . . . . . . . . . . . . . . . . . . 18 Install Windows Updates and Service Packs . . . 86
Folder Options . . . . . . . . . . . . . . . . . . . . . . . . 20 Install Hardware . . . . . . . . . . . . . . . . . . . . . . 88
Power Options . . . . . . . . . . . . . . . . . . . . . . . . 21 Install Applications . . . . . . . . . . . . . . . . . . . . 95
System Window . . . . . . . . . . . . . . . . . . . . . . . 23 Set Up User Accounts and Transfer User
System Information Window . . . . . . . . . . . . . . 25 Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Action Center . . . . . . . . . . . . . . . . . . . . . . . . 26 Turn Windows Features On or Off . . . . . . . . . . 96
Windows Network Connections . . . . . . . . . . . . . . 28 Special Concerns When Working in a Large
Windows Workgroup and Homegroup . . . . . . . . 28 Enterprise . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Windows Domain . . . . . . . . . . . . . . . . . . . . . . 29 Deployment Strategies for Windows . . . . . . . . . 97
Public and Private Networks . . . . . . . . . . . . . . 30 Using the USMT Software . . . . . . . . . . . . . . . . 99
Make a Windows 8 Network Connection . . . . . . 31
Domain Setup . . . . . . . . . . . . . . . . . . . . . . . . 34
Windows User Accounts . . . . . . . . . . . . . . . . . . . 35 Chapter 3
Using a Microsoft Account with Windows 8 . . . . 38
User Account Control Dialog Box . . . . . . . . . . . 41 Maintaining Windows . . . . . . . . . . . . 107
Schedule Preventive Maintenance . . . . . . . . . . . 108
Verify Critical Windows Settings . . . . . . . . . . 108
Chapter 2 Update Drivers and Firmware . . . . . . . . . . . . 108
Installing Windows . . . . . . . . . . . . . . . 49 Patch Management . . . . . . . . . . . . . . . . . . . . 109
Clean Up the Hard Drive . . . . . . . . . . . . . . . . 110
How to Plan a Windows Installation . . . . . . . . . . 50 Backup Procedures . . . . . . . . . . . . . . . . . . . . . 117
Choose the Edition, License, and Version Planning for Disaster Recovery . . . . . . . . . . . 118
of Windows . . . . . . . . . . . . . . . . . . . . . . . . 50 Back Up User Data with Windows 8 File
Verify Your System Qualifies for History . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Windows . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Back Up Windows System Files . . . . . . . . . . . 124
Installations with Special Considerations . . . . . 57 Windows 8 Custom Refresh Image . . . . . . . . . 126
Choose the Type of Installation: In-Place Managing Files, Folders, and Storage Devices . . . 129
Upgrade, Clean Install, or Dual Boot . . . . . . . 62 How Partitions and File Systems Work . . . . . . 129
Understand the Choices You’ll Make during Commands to Manage Files and Folders . . . . . 133
the Installation . . . . . . . . . . . . . . . . . . . . . 63 Use Disk Management to Manage
Final Checklist before Beginning the Hard Drives . . . . . . . . . . . . . . . . . . . . . . . 144
Installation . . . . . . . . . . . . . . . . . . . . . . . . 64 Windows Storage Spaces . . . . . . . . . . . . . . . . 151

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
iv Table of Contents

Chapter 4 Step 3: Test Your Theory . . . . . . . . . . . . . . . 231


Step 4: Plan Your Solution and Then Fix the
Optimizing Windows . . . . . . . . . . . . . 159 Problem . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Step 5: Verify the Fix and Take
Windows Utilities and Tools to Support
Preventive Action . . . . . . . . . . . . . . . . . . . 233
the OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Step 6: Document What Happened . . . . . . . . 233
What are the Shell and the Kernel? . . . . . . . . 160
Troubleshooting Applications . . . . . . . . . . . . . . 235
How Windows Manages Applications . . . . . . . 161
General Steps for Solving Application Errors . . 235
Task Manager . . . . . . . . . . . . . . . . . . . . . . . 162
Memory Diagnostics . . . . . . . . . . . . . . . . . . . 238
Administrative Tools . . . . . . . . . . . . . . . . . . 169
System File Checker . . . . . . . . . . . . . . . . . . . 240
System Configuration . . . . . . . . . . . . . . . . . . 170
Responding to Specific Error Messages . . . . . . 241
Services Console . . . . . . . . . . . . . . . . . . . . . 174
Computer Management . . . . . . . . . . . . . . . . . 175
Microsoft Management Console (MMC) . . . . . . 175
Event Viewer . . . . . . . . . . . . . . . . . . . . . . . . 177
Chapter 6
Print Management . . . . . . . . . . . . . . . . . . . . 181 Troubleshooting Windows Startup . . . 251
Task Scheduler . . . . . . . . . . . . . . . . . . . . . . 182
Performance Monitor . . . . . . . . . . . . . . . . . . 184 Understanding the Boot Process . . . . . . . . . . . . 252
Registry Editor . . . . . . . . . . . . . . . . . . . . . . 186 Different Ways to Boot . . . . . . . . . . . . . . . . . 252
Display Settings and Graphics Software . . . . . 191 Startup UEFI/BIOS Controls the Beginning
Improving Windows Performance . . . . . . . . . . . . 193 of the Boot . . . . . . . . . . . . . . . . . . . . . . . 253
Step 1: Perform Routine Maintenance . . . . . . 194 Steps to Boot the Computer and Start
Step 2: Clean Windows Startup . . . . . . . . . . . 194 Windows . . . . . . . . . . . . . . . . . . . . . . . . . 254
Step 3: Check If the Hardware Can Tools for Troubleshooting Windows Startup
Support the OS . . . . . . . . . . . . . . . . . . . . . 196 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Step 4: Check for a History of Problems . . . . . 197 What to Do before a Problem Occurs . . . . . . . 262
Step 5: Consider Using ReadyBoost . . . . . . . . 197 Tools for Least Invasive Solutions . . . . . . . . . 266
Manually Removing Software . . . . . . . . . . . . . . 199 Tools That Can Affect Windows System Files
Step 1: First Try the Uninstall Routine . . . . . . 200 and Settings . . . . . . . . . . . . . . . . . . . . . . 276
Step 2: Delete Program Files . . . . . . . . . . . . . 200 Tools for Reinstalling Windows . . . . . . . . . . . 280
Step 3: Delete Registry Entries . . . . . . . . . . . 201 Troubleshooting Windows Startup . . . . . . . . . . . 286
Step 4: Remove Program Shortcuts . . . . . . . . 202 Important Data on the Hard Drive . . . . . . . . . 286
Step 5: Remove Startup Processes . . . . . . . . . 203 Error Messages and Problems . . . . . . . . . . . . . 287

Chapter 5 Chapter 7
Supporting Customers and Connecting To and Setting Up a
Troubleshooting Windows . . . . . . . . 209 Network . . . . . . . . . . . . . . . . . . . . . 297

What Customers Want: Beyond Technical Understanding TCP/IP and Windows


Know-How . . . . . . . . . . . . . . . . . . . . . . . . . . 210 Networking . . . . . . . . . . . . . . . . . . . . . . . . . 298
Becoming a Competent and Helpful Support Layers of Network Communication . . . . . . . . . 298
Technician . . . . . . . . . . . . . . . . . . . . . . . . 210 How IP Addresses Get Assigned . . . . . . . . . . . 302
Planning for Good Service . . . . . . . . . . . . . . 214 How IPv4 Addresses are Used . . . . . . . . . . . . 302
Strategies to Troubleshoot Any Computer How IPv6 Addresses are Used . . . . . . . . . . . . 306
Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 View IP Address Settings . . . . . . . . . . . . . . . 309
Step 1: Interview the User and Back Character-Based Names Identify Computers
Up Data . . . . . . . . . . . . . . . . . . . . . . . . . . 227 and Networks . . . . . . . . . . . . . . . . . . . . . . 310
Step 2: Examine the System and Make TCP/IP Protocol Layers . . . . . . . . . . . . . . . . . 312
Your Best Guess . . . . . . . . . . . . . . . . . . . . 229 Connecting a Computer to a Network . . . . . . . . 317

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Table of Contents v

Connect to an Ethernet Wired or Wireless Update and Restore Windows Phone from
Wi-Fi Local Network . . . . . . . . . . . . . . . . . 317 Backup . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Connect to a Wireless WAN (Cellular) Troubleshoot Windows Mobile Devices . . . . . . 410
Network . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Create a Dial-Up Connection . . . . . . . . . . . . . 323
Create a VPN Connection . . . . . . . . . . . . . . . 325 Chapter 9
Dynamic and Static IP Configurations . . . . . . 328
Alternate IP Address Configuration . . . . . . . . 329
Windows Resources on a Network . . . 417
Manage Network Adapters . . . . . . . . . . . . . . 330 Supporting Client/Server Applications . . . . . . . . 418
Setting Up a Multifunction Router for a SOHO Network Servers . . . . . . . . . . . . . . . . . . . . . 418
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 Internet Explorer . . . . . . . . . . . . . . . . . . . . . 419
Functions of a SOHO Router . . . . . . . . . . . . . 334 Remote Desktop Connection (RDC) . . . . . . . . 427
Install and Configure a Router on the Local Remote Assistance . . . . . . . . . . . . . . . . . . . . 432
Network . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Use Group Policy to Improve QoS for
Limit Internet Traffic on Your Network . . . . . 342 Applications . . . . . . . . . . . . . . . . . . . . . . . 434
Set Up a Wireless Network . . . . . . . . . . . . . . 347 ODBC Data Sources . . . . . . . . . . . . . . . . . . . . 435
Controlling Access to Folders and Files . . . . . . . 437
Classify User Accounts and User Groups . . . . . 437
Chapter 8 Methods to Assign Permissions to Folders
and Files . . . . . . . . . . . . . . . . . . . . . . . . . 440
Supporting Mobile Operating
How to Share Folders and Files . . . . . . . . . . . 442
Systems . . . . . . . . . . . . . . . . . . . . . 359
How to Map a Network Drive or Network
Operating Systems Used on Mobile Devices . . . . . 360 Printer . . . . . . . . . . . . . . . . . . . . . . . . . . 454
Android by the Open Handset Alliance Hidden Network Resources and
and Google . . . . . . . . . . . . . . . . . . . . . . . 360 Administrative Shares . . . . . . . . . . . . . . . . 456
iOS by Apple . . . . . . . . . . . . . . . . . . . . . . . . 363 Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . 458
Windows Phone by Microsoft . . . . . . . . . . . . . 367 Cloud Computing Categories . . . . . . . . . . . . . 459
Comparing Open Source and Closed Source Deployment Models for Cloud Computing . . . . 461
Operating Systems . . . . . . . . . . . . . . . . . . 371
Configure, Sync, and Troubleshoot
iOS Devices . . . . . . . . . . . . . . . . . . . . . . . . . 371 Chapter 10
Configure iOS Network Connections . . . . . . . . 372
Configure iOS Email . . . . . . . . . . . . . . . . . . . 375
Security Strategies . . . . . . . . . . . . . . 467
Sync, Back Up, and Restore from Backup Securing a Windows Personal Computer . . . . . . . 468
in iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 Use Windows to Authenticate Users . . . . . . . . 468
Troubleshoot iOS Devices . . . . . . . . . . . . . . . 388 File and Folder Encryption . . . . . . . . . . . . . . 473
Configure, Sync, and Troubleshoot Windows Firewall Settings . . . . . . . . . . . . . . 474
Android Devices . . . . . . . . . . . . . . . . . . . . . . 393 Local Security Policies Using Group Policy . . . 477
Configure Android Network Connections . . . . . 393 Use BitLocker Encryption . . . . . . . . . . . . . . . 481
Configure Android Email . . . . . . . . . . . . . . . . 398 Use UEFI/BIOS Features to Protect the System 482
Sync, Update, Back Up, and Restore from Securing a Mobile Device . . . . . . . . . . . . . . . . . 483
Backup with Android . . . . . . . . . . . . . . . . 399 Device Access Controls . . . . . . . . . . . . . . . . . 483
Troubleshoot Android Devices . . . . . . . . . . . . 402 Software Security . . . . . . . . . . . . . . . . . . . . 486
Configure, Sync, and Troubleshoot Windows Mobile Security in Corporate Environments . . . 488
Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . 406 Additional Methods to Protect Resources . . . . . . 489
Configure Windows Phone Network Authenticate Users for Large Networks . . . . . . 489
Connections . . . . . . . . . . . . . . . . . . . . . . . 407 Physical Security Methods and Devices . . . . . . 492
Configure Windows Phone Email, Sync, Digital Security Methods and Resources . . . . . 493
and Backup . . . . . . . . . . . . . . . . . . . . . . . 407 Unified Threat Management (UTM) Appliance . 493

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
vi Table of Contents

Data Destruction and Disposal . . . . . . . . . . . . 494 Assigning Permissions to Files


Educate Users . . . . . . . . . . . . . . . . . . . . . . . 495 or Directories . . . . . . . . . . . . . . . . . . . . . . 542
Dealing with Malicious Software on Personal Dual-Boot Systems and a Live CD . . . . . . . . . 544
Computers . . . . . . . . . . . . . . . . . . . . . . . . . . 497 Backups and Updates . . . . . . . . . . . . . . . . . . 546
What are We Up Against? . . . . . . . . . . . . . . . 497 Mac OS X Operating System . . . . . . . . . . . . . . . 548
Step-by-Step Attack Plan . . . . . . . . . . . . . . . 499 Use the Mac . . . . . . . . . . . . . . . . . . . . . . . . 548
Dealing with Malicious Software on Mobile Maintain and Support a Mac . . . . . . . . . . . . . 561
Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510 Troubleshoot OS X Startup . . . . . . . . . . . . . . 570
Common Mobile Device Malware Symptoms . . . 510 Boot Camp . . . . . . . . . . . . . . . . . . . . . . . . . 572
Mobile Device Tools and Malware Removal . . . 512
Software Licensing and Prohibited Content
or Activity . . . . . . . . . . . . . . . . . . . . . . . . . . 515 Appendix A
Software Licensing . . . . . . . . . . . . . . . . . . . . 515
Corporate Policies for Dealing with Prohibited Safety Procedures and Environmental
Content or Activity . . . . . . . . . . . . . . . . . . 516 Concerns . . . . . . . . . . . . . . . . . . . . . . 579

Chapter 11 Appendix B
Virtualization, Linux, and Mac OS X . 523 Entry Points for Startup Processes . . . 595
Virtualization Basics . . . . . . . . . . . . . . . . . . . . 524
Server-Side Virtualization . . . . . . . . . . . . . . . 524
Client-Side Virtualization . . . . . . . . . . . . . . . 525 Appendix c
Virtual Machines and Hypervisors . . . . . . . . . 525
Linux Operating System . . . . . . . . . . . . . . . . . . 530 CompTIA A+ Acronyms . . . . . . . . . . . 599
Directory and File Layout . . . . . . . . . . . . . . . 533
Root Account and User Accounts . . . . . . . . . . 535 Glossary . . . . . . . . . . . . . . . . . . . . . . 607
Linux Commands . . . . . . . . . . . . . . . . . . . . . 536
The Vi Editor . . . . . . . . . . . . . . . . . . . . . . . . 539
Index . . . . . . . . . . . . . . . . . . . . . . . . 637

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ 220-902 Exam Mapped to Chapters
CompTIA A+ Guide to Software, Ninth Edition fully meets all of CompTIA’s A+ 220-902 Exam
Objectives.
DOMAIN 1.0 Windows Operating Systems

1.1 Compare and contrast various features and requirements of Microsoft Operating Systems (Windows Vista,
Windows 7, Windows 8, Windows 8.1).

Objectives Chapter section


­ Features:
• 32-bit vs. 64-bit 1 System Window
• Aero, gadgets, user account control, 1 Windows Interfaces
bit-locker, shadow copy, 2 Windows Tools for Users and Technicians
system restore, ready boost, 2 Verify Your System Qualifies for Windows
sidebar, compatibility mode,
2 Installations with Special Considerations
virtual XP mode, easy transfer,
administrative tools, defender, 2 Set Up User Accounts and Transfer User Data
Windows firewall, security 3 Backup Proceures
center, event viewer, file struc- 3 Clean Up the Hard Drive
ture and paths, category view 3 Back Up Windows System Files
vs. classic view.
4 Step 5: Consider Using ReadyBoost
4 Administrative Tools
4 Event Viewer
10 Use BitLocker Encryption
10 Step-by-Step Attack Plan
10 Windows Firewall Settings
10 Dealing with Malicious Software on Personal Computers
• Side by side apps, Metro UI, 1 Windows Interface
Pinning, One Drive, Windows store, 1 Windows Tools for Users and Technicians
Multimonitor task bars, Charms, Start 1 Windows User Accounts
Screen, Power Shell, Live sign in, 3 Display Settings and Graphics Software
Action Center. 4 Commands to Manage Files and Folders
Upgrade paths – differences between 2 Choose the Type of Installation: In-Place Upgrade,
in place upgrades, compatibility tools, Clean Install, or Dual Boot
Windows upgrade OS advisor

1.2 Given a scenario, install Windows PC operating systems using appropriate methods.

Objectives Chapter section


­ B oot methods 2 How to Plan a Windows Installation
• USB 2 How to Plan a Windows Installation
• CD-ROM 2 How to Plan a Windows Installation
• DVD 2 How to Plan a Windows Installation
• PXE 2 Deployment Strategies for Windows
• Solid state/flash drives 2 How to Plan a Windows Installation
• Netboot 11 Troubleshoot OS X Startup
• External/hot swappable drive 2 How to Plan a Windows Installation
• Internal hard drive (partition) 2 How to Plan a Windows Installation
­ Type of installations 2 How to Plan a Windows Installation
• Unattended installation 2 Deployment Strategies for Windows
• Upgrade 2 How to Plan a Windows Installation
• Clean install 2 How to Plan a Windows Installation

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
viii CompTIA A+ 220-902 Exam Mapped to Chapters

• Repair installation 2 How to Plan a Windows Installation


• Multiboot 2 How to Plan a Windows Installation
• Remote network installation 2 Deployment Strategies for Windows
• Image deployment 2 Deployment Strategies for Windows
• Recovery partition 2 Installations with Special Considerations
6 Tools for Reinstalling Windows
• Refresh/restore 6 Tools for Reinstalling Windows
­ Partitioning 3 Managing Files, Folders, and Storage Devices
• Dynamic 3 Managing Files, Folders, and Storage Devices
• Basic 3 Managing Files, Folders, and Storage Devices
• Primary 3 Managing Files, Folders, and Storage Devices
• Extended 3 Managing Files, Folders, and Storage Devices
• Logical 3 Managing Files, Folders, and Storage Devices
• GPT 3 Managing Files, Folders, and Storage Devices
­ File system types/formatting
• ExFAT 3 Managing Files, Folders, and Storage Devices
• FAT32 3 Managing Files, Folders, and Storage Devices
• NTFS 3 Managing Files, Folders, and Storage Devices
• CDFS 3 Managing Files, Folders, and Storage Devices
• NFS 9 How to Map a Network Drive or Network Printer
• ext3, ext4 11 Linux Commands
• Quick format vs. full format 3 Managing Files, Folders, and Storage Devices
­ Load alternate third party drivers 2 Installations with Special Considerations
when necessary
­ Workgroup vs. Domain setup 1 Windows Network Connections
­ Time/date/region/language settings 1 Control Panel
2 Installing Windows 8.1 and Windows 7
­ Driver installation, software and 2 What to Do After a Windows Installation
windows updates
­ Factory recovery partition 2 Installations with Special Considerations
­ Properly formatted boot drive with 2 Installing Windows 8.1 and Windows 7
the correct partitions/format

1.3 Given a scenario, apply appropriate Microsoft command line tools.

Objectives Chapter section


­ T  ASKKILL 5 Responding to Specific Error Messages
­ BOOTREC 6 Error Messages and Problems
­ SHUTDOWN 3 Commands to Manage Files and Folders
­ TASKLIST 5 Responding to Specific Error Messages
­ MD 3 Commands to Manage Files and Folders
­ RD 3 Commands to Manage Files and Folders
­ CD 3 Commands to Manage Files and Folders
­ DEL 3 Commands to Manage Files and Folders
­ FORMAT 3 Commands to Manage Files and Folders
­ COPY 3 Commands to Manage Files and Folders
­ XCOPY 3 Commands to Manage Files and Folders
­ ROBOCOPY 3 Commands to Manage Files and Folders
­ DISKPART 6 Tools That Can Affect Windows System Files
and Settings
­ S FC 5 System File Checker
­ CHKDSK 3 Commands to Manage Files and Folders
­ GPUPDATE 9 Use Group Policy to Improve QoS for Applications
­ GPRESULT 9 How to Share Folders and Files

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ 220-902 ix

­ D  IR 3 Commands to Manage Files and Folders


­ EXIT 3 Commands to Manage Files and Folders
­ HELP 3 Commands to Manage Files and Folders
­ EXPAND 3 Commands to Manage Files and Folders
­ [command name] /? 3 Commands to Manage Files and Folders
­ Commands available with standard 3 Commands to Manage Files and Folders
privileges vs. administrative privileges.

1.4 Given a scenario, use appropriate Microsoft operating system features and tools.

Objectives Chapter section


­ A dministrative 4 Administrative Tools
• Computer management 4 Computer Management
• Device manager 2 Install Hardware
• Local Users and Groups 9 Classify User Accounts and User Groups
• Local security policy 10 Local Security Policies Using Group Policy
• Performance monitor 4 Performance Monitor
• Services 4 Services Console
• System configuration 4 System Configuration
• Task scheduler 4 Task Scheduler
• Component services 5 Responding to Specific Error Messages
• Data sources 9 ODBC Data Sources
• Print management 4 Print Management
• Windows memory diagnostics 5 Memory Diagnostics
• Windows firewall 10 Windows Firewall Settings
• Advanced security 10 Windows Firewall Settings
­ MSCONFIG 4 System Configuration
• General 4 System Configuration
• Boot 4 System Configuration
• Services 4 System Configuration
• Startup 4 System Configuration
• Tools 4 System Configuration
­ Task Manager 4 Task Manager
• Applications 4 Task Manager
• Processes 4 Task Manager
• Performance 4 Task Manager
• Networking 4 Task Manager
• Users 4 Task Manager
­ Disk management 3 Use Disk Management to Manage Hard Drives
• Drive status 3 Use Disk Management to Manage Hard Drives
• Mounting 3 Use Disk Management to Manage Hard Drives
• Initializing 3 Use Disk Management to Manage Hard Drives
• Extending partitions 3 Use Disk Management to Manage Hard Drives
• Splitting partitions 3 Use Disk Management to Manage Hard Drives
• Shrink partitions 3 Use Disk Management to Manage Hard Drives
• Assigning/changing drive letters 3 Use Disk Management to Manage Hard Drives
• Adding drives 3 Use Disk Management to Manage Hard Drives
• Adding arrays 3 Use Disk Management to Manage Hard Drives
• Storage spaces 3 Windows Storage Spaces
­ Other 2
• User State Migration tool (USMT) 2 Using the USMT Software
• Windows Easy Transfer 2 Set Up User Accounts and Transfer User Data
• Windows Upgrade Advisor 2 Verify Your System Qualifies for Windows

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
x CompTIA A+ 220-902 Exam Mapped to Chapters

­ System utilities
• REGEDIT 4 The Registry Editor
• COMMAND 3 Commands to Manage Files and Folders
• SERVICES.MSC 4 Services Console
• MMC 4 Microsoft Management Console (MMC)
• MSTSC 9 Remote Desktop Connection (RDC)
• NOTEPAD 1 Windows Tools for Users and Technicians
• EXPLORER 1 Windows 8 File Explorer and Windows 7 Windows
Explorer
• MSINFO32 1 System Information Window
• DXDIAG 4 Display Settings and Graphics Software
• DEFRAG 3 Schedule Preventive Maintenance
• System restore 3 Back Up Windows System Files
• Windows Update 3 Schedule Preventive Maintenance

1.5 Given a scenario, use Windows Control Panel utilities.

Objectives Chapter section


­ Internet options 9 Internet Explorer
• Connections 9 Internet Explorer
• Security 9 Internet Explorer
• General 9 Internet Explorer
• Privacy 9 Internet Explorer
• Programs 9 Internet Explorer
• Advanced 9 Internet Explorer
­ Display/Display Settings 4 Display Settings and Graphics Software
• Resolution 4 Display Settings and Graphics Software
• Color depth 4 Display Settings and Graphics Software
• Refresh rate 4 Display Settings and Graphics Software
­ User accounts 1 Windows User Accounts
­ Folder options 1 Folder Options
• View hidden files 1 Folder Options
• Hide extensions 1 Folder Options
• General options 1 Folder Options
• View options 1 Folder Options
­ System
• Performance (virtual memory) 3 Schedule Preventive Maintenance
• Remote settings 9 Remote Desktop Connection (RDC)
• System protection 3 Back Up Windows System Files
­ Windows firewall 10 Windows Firewall Settings
­ Power options 1 Power Options
• Hibernate 1 Power Options
• Power plans 1 Power Options
• Sleep/suspend 1 Power Options
• Standby 1 Power Options
­ Programs and features 2 Install Applications
­ HomeGroup 1 Windows Network Connections
­ Devices and Printers 2 Install Hardware
­ Sound 1 Control Panel
­ Troubleshooting 9 How to Share Folders and Files
­ Network and Sharing Center 1 Windows Network Connections
­ Device Manager 2 Install Hardware

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ 220-902 xi

1.6 Given a scenario, install and configure Windows networking on a client/desktop.

Objectives Chapter section


­ H  omeGroup vs. WorkGroup 1 Windows Network Connections
­ Domain setup 1 Windows Network Connections
­ Network shares/administrative shares/
mapping drives 9 Controlling Access to Folders and Files
­ Printer sharing vs. network printer mapping 9 How to Map a Network Drive or Network Printer
­ Establish networking connections 7 Connecting a Computer to a Network
• VPN 7 Create a VPN Connection
• Dialups 7 Create a Dial-Up Connection
• Wireless 7 Connect to an Ethernet Wired or
Wireless Wi-Fi Local Network
• Wired 7 Connect to an Ethernet Wired or
Wireless Wi-Fi Local Network
• WWAN (Cellular) 7 Connect to a Wireless WAN (Cellular) Network
­ P  roxy settings 9 Internet Explorer
­ Remote Desktop Connection 9 Remote Desktop Connection (RDC)
­ Remote Assistance 9 Remote Assistance
­ Home vs. Work vs. Public network settings 1 Windows Network Connections
­ Firewall settings 10 Windows Firewall Settings
• Exceptions 10 Windows Firewall Settings
• Configuration 10 Windows Firewall Settings
• Enabling/disabling Windows firewall 10 Windows Firewall Settings
­ Configuring an alternative IP address 7 Alternate IP Address Configuration
in Windows
• IP addressing 7 Dynamic and Static Configuration
• Subnet mask 7 How IPv4 IP Addresses Are Used
• DNS 7 Dynamic and Static Configuration
• Gateway 7 Dynamic and Static Configuration
­ Network card properties
• Half duplex/full duplex/auto 7 Manage Network Adapters
• Speed 7 Manage Network Adapters
• Wake-on-LAN 7 Manage Network Adapters
• QoS 7 Manage Network Adapters
9 Use Group Policy to Improve QoS for Applications
• BIOS (on-board NIC) 7 Manage Network Adapters

1.7 Perform common preventive maintenance procedures using the appropriate Windows OS tools.

Objectives Chapter section


­ Best practices 3
• Scheduled backups 3 Backup Procedures
• Scheduled disk maintenance 3 Schedule Preventive Maintenance
• Windows updates 3 Schedule Preventive Maintenance
• Patch management 3 Schedule Preventive Maintenance
• Driver/firmware updates 3 Schedule Preventive Maintenance
• Antivirus/ Antimalware updates 3 Schedule Preventive Maintenance
­ Tools
• Backup 3 Backup Procedures
• System restore 3 Backup Procedures
• Recovery image 6 Tools for Troubleshooting Windows Startup Problems
• Disk maintenance utilities 3 Schedule Preventive Maintenance

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xii CompTIA A+ 220-902 Exam Mapped to Chapters

DOMAIN 2.0 Other Operating Systems and Technologies

2.1 Identify common features and functionality of the Mac OS and Linux operating systems.

Objectives Chapter section


­ B est practices 11
• Scheduled backups 11 Backups and Updates
Maintain and Support a Mac
• Scheduled disk maintenance 11 Backups and Updates
Maintain and Support a Mac
• System updates/App store 11 Backups and Updates
Maintain and Support a Mac
• Patch management 11 Backups and Updates
Maintain and Support a Mac
• Driver/firmware updates 11 Backups and Updates
Maintain and Support a Mac
• Antivirus/ Antimalware updates 11 Backups and Updates
Maintain and Support a Mac
­ Tools 11
• Backup/Time Machine 11 Maintain and Support a Mac
• Restore/snapshot 11 Maintain and Support a Mac
• Image recovery 11 Troubleshoot OS X Startup
• Disk maintenance utilities 11 Maintain and Support a Mac
• Shell/Terminal 11 Linux Commands
Use the Mac
• Screen sharing 11 Use the Mac
• Force Quit 11 Use the Mac
­ Features 11
• Multiple desktops/Mission Control 11 Use the Mac
• Key Chain 11 Use the Mac
• Spot Light 11 Use the Mac
• iCloud 11 Use the Mac
• Gestures 11 Use the Mac
• Finder 11 Use the Mac
• Remote Disc 11 Use the Mac
• Dock 11 Use the Mac
• Boot Camp 11 Boot Camp
­ Basic Linux commands
• ls 11 Linux Commands
Use the Mac
• grep 11 Linux Commands
Hands-On Project 20-4: Install FTP Server in Ubuntu
• cd 11 Linux Commands
Use the Mac
• shutdown 11 Linux Commands
• pwd vs. passwd 11 Linux Commands
Use the Mac
• mv 11 Linux Commands
• cp 11 Linux Commands
• rm 11 Linux Commands
• chmod 11 Linux Commands
• mkdir 11 Linux Commands
Use the Mac
• chown 11 Linux Commands

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ 220-902 xiii

• iwconfig/ifconfig 11 Linux Commands


Use the Mac
• ps 11 Linux Commands
• q 11 Linux Commands
• su/sudo 11 Linux Commands
• apt-get 11 Linux Commands
Backups and Updates
• vi 11 Linux Commands
• dd 11 Linux Commands

2.2 Given a scenario, setup and use client-side virtualization.

Objectives Chapter section


­ Purpose of virtual machines 11 Virtualization Basics
­ Resource requirements 11 Virtual Machines and Hypervisors
­ Emulator requirements 11 Virtual Machines and Hypervisors
­ Security requirements 11 Virtual Machines and Hypervisors
­ Network requirements 11 Virtual Machines and Hypervisors
­ Hypervisor 11 Virtual Machines and Hypervisors

2.3 Identify basic cloud concepts.

Objectives Chapter section


­ S aaS 9 Cloud Computing
­ IaaS 9 Cloud Computing
­ Paas 9 Cloud Computing
­ Public vs. Private vs. Hybrid vs. Community 9 Cloud Computing
­ Rapid Elasticity 9 Cloud Computing
­ On-demand 9 Cloud Computing
­ Resource pooling 9 Cloud Computing
­ Measured service 9 Cloud Computing

2.4 Summarize the properties and purpose of services provided by networked hosts.

Objectives Chapter section


­ S erver roles 9 Network Servers
• Web server 9 Network Servers
• File server 9 Network Servers
• Print server 9 Network Servers
• DHCP server 9 Network Servers
• DNS server 9 Network Servers
• Proxy server 9 Network Servers
• Mail server 9 Network Servers
• Authentication server 9 Network Servers
­ Internet appliance 10 Unified Threat Management (UTM) Appliance
• UTM 10 Unified Threat Management (UTM) Appliance
• IDS 10 Unified Threat Management (UTM) Appliance
• IPS 10 Unified Threat Management (UTM) Appliance
­ Legacy / embedded systems 9 Network Servers

2.5 Identify basic features of mobile operating systems.

Objectives Chapter section


­ A ndroid vs. iOS vs. Windows 8 Operating Systems Used on Mobile Devices
• Open source vs. closed source/ 8 Comparing Open Source and Closed Source
vendor specific Operating Systems

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xiv CompTIA A+ 220-902 Exam Mapped to Chapters

• App source (play store, app store 8 Operating Systems Used on Mobile Devices
and store)
• Screen orientation (accelerometer/ 8 Operating Systems Used on Mobile Devices
gyroscope)
• Screen calibration 8 Operating Systems Used on Mobile Devices
• GPS and geotracking 8 Operating Systems Used on Mobile Devices
• WiFi calling 8 Operating Systems Used on Mobile Devices
• Launcher/GUI 8 Operating Systems Used on Mobile Devices
• Virtual assistant 8 Operating Systems Used on Mobile Devices
• SDK/APK 8 Operating Systems Used on Mobile Devices
• Emergency notification 8 Operating Systems Used on Mobile Devices
• Mobile payment service 8 Operating Systems Used on Mobile Devices

2.6 Install and configure basic mobile device network connectivity and email.

Objectives Chapter section


­ Wireless / cellular data network 8 Configure iOS Network Connections
(enable/disable) Configure Android Network Connections
Configure Windows Phone Network Connections
• Hotspot 8 Configure iOS Network Connections
Configure Android Network Connections
Configure Windows Phone Network Connections
• Tethering 8 Configure iOS Network Connections
Configure Android Network Connections
Configure Windows Phone Network Connections
• Airplane mode 8 Configure iOS Network Connections
Configure Android Network Connections
Configure Windows Phone Network Connections
­ Bluetooth 8 Configure iOS Network Connections
Configure Android Network Connections
Configure Windows Phone Network Connections
• Enable Bluetooth 8 Configure iOS Network Connections
Configure Android Network Connections
Configure Windows Phone Network Connections
• Enable pairing 8 Configure iOS Network Connections
Configure Android Network Connections
Configure Windows Phone Network Connections
• Find device for pairing 8 Configure iOS Network Connections
Configure Android Network Connections
Configure Windows Phone Network Connections
• Enter appropriate pin code 8 Configure iOS Network Connections
Configure Android Network Connections
Configure Windows Phone Network Connections
• Test connectivity 8 Configure iOS Network Connections
Configure Android Network Connections
Configure Windows Phone Network Connections
­ Corporate and ISP email configuration 8 Configure iOS Email
Configure Android Email
Configure Windows Phone Email, Sync, and Backup
• POP3 8 Configure iOS Email
Configure Android Email
Configure Windows Phone Email, Sync, and Backup
• IMAP 8 Configure iOS Email
Configure Android Email
Configure Windows Phone Email, Sync, and Backup

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
CompTIA A+ 220-902 xv

• Port and SSL settings 8 Configure iOS Email


Configure Android Email
Configure Windows Phone Email, Sync, and Backup
• Exchange, S/MIME 8 Configure iOS Email
Configure Android Email
Configure Windows Phone Email, Sync, and Backup
­ Integrated commercial 8 Configure iOS Email
provider email configuration Configure Android Email
Configure Windows Phone Email, Sync, and Backup
• Google/Inbox 8 Configure iOS Email
Configure Android Email
Configure Windows Phone Email, Sync, and Backup
• Yahoo 8 Configure iOS Email
Configure Android Email
Configure Windows Phone Email, Sync, and Backup
• Outlook.com 8 Configure iOS Email
Configure Android Email
Configure Windows Phone Email, Sync, and Backup
• iCloud 8 Configure iOS Email
Configure Android Email
Configure Windows Phone Email, Sync, and Backup
­ PRI updates/PRL updates/ 8 Sync, Update, Back Up, and Restore from Backup
Baseband updates with Android
­ Radio firmware 8 Troubleshooting Android Devices
­ IMEI vs. IMSI 8 Configure iOS Network Connections
­ VPN 8 Configure iOS Network Connections
Configure Android Network Connections
Configure Windows Phone Network Connections

2.7 Summarize methods and data related to mobile device synchronization.

Objectives Chapter section


­ T ypes of data to synchronize
8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
• Contacts 8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
• Programs 8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
• Email 8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
• Pictures 8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
• Music 8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
• Videos 8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
• Calendar 8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
• Bookmarks 8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xvi CompTIA A+ 220-902 Exam Mapped to Chapters

• Documents 8 Sync, Back Up, and Restore from Backup in iOS


Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
• Location data 8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
• Social media data 8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
• eBooks 8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
­ Synchronization methods
• Synchronize to the Cloud 8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
• Synchronize to the Desktop 8 Sync, Back Up, and Restore from Backup in iOS
Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup
­ M  utual authentication for 10 Authenticate Users for Large Networks
multiple services
­ Software requirements to 8 Sync, Back Up, and Restore from Backup in iOS
install the application on
the PC
­ Connection types to enable 8 Sync, Back Up, and Restore from Backup in iOS
synchronization Sync, Update, Back Up, and Restore from Backup with Android
Configure Windows Phone Email, Sync, and Backup

DOMAIN 3.0 Security

3.1 Identify common security threats and vulnerabilities.

Objectives Chapter section


­ M alware 10 Dealing with Malicious Software on Personal Computers
Dealing with Malicious Software on Mobile Devices
• Spyware 10 Dealing with Malicious Software on Personal Computers
Dealing with Malicious Software on Mobile Devices
• Viruses 10 Dealing with Malicious Software on Personal Computers
Dealing with Malicious Software on Mobile Devices
• Worms 10 Dealing with Malicious Software on Personal Computers
Dealing with Malicious Software on Mobile Devices
• Trojans 10 Dealing with Malicious Software on Personal Computers
Dealing with Malicious Software on Mobile Devices
• Rootkits 10 Dealing with Malicious Software on Personal Computers
• Ransomware 10 Dealing with Malicious Software on Personal Computers
­ Phishing 10 Dealing with Malicious Software on Personal Computers
Dealing with Malicious Software on Mobile Devices
­ Spear phishing 10 Dealing with Malicious Software on Personal Computers
Dealing with Malicious Software on Mobile Devices
­ Spoofing 10 Dealing with Malicious Software on Personal Computers
Dealing with Malicious Software on Mobile Devices
­ Social engineering 10 Dealing with Malicious Software on Personal Computers
Dealing with Malicious Software on Mobile Devices
­ Shoulder surfing 10 Dealing with Malicious Software on Personal Computers
Dealing with Malicious Software on Mobile Devices

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Another random document with
no related content on Scribd:
Fig. 293.

CONTROL OF PIGS.

No difficulty is usually experienced in controlling young pigs,


either when standing or cast, only one or two assistants being
required, but aged animals are more difficult and more dangerous to
deal with, and by their tusks sometimes inflict severe wounds.
In the standing position they can be partially fixed by passing a
running loop behind the canine teeth of the upper jaw, but should
the examination to be carried out prove to be of a difficult character
it is best to cast the animal.
A strong assistant grasps one of the hind limbs by means of a
running loop, fixed, for example, above the right hock. He rapidly
slides his left knee towards the front of the left side of the chest,
passes his left hand over the withers, and by the combined use of his
knees and arms throws the animal on its left side, controlling as far
as possible the struggles of the right front and hind limbs, which he
grasps with his hands.
The animal is then further secured by rapidly passing a thin rope
in figures of eight around the front and hind limbs. If necessary all
four legs may be brought together and fastened by a rope passed
round the region of the pastern; a muzzle can afterwards be applied
to prevent biting.

ANÆSTHESIA.

Oxen rarely receive general anæsthetics, though in certain


obstetrical cases they may be necessary. Ether and chloroform are
given by inhalation, and chloral of 10 to 20 per cent. strength by
intravenous injection. In utilising the latter method the injection
should be made slowly, the pulse and heart being closely scanned to
prevent cardiac syncope. The dose of chloroform varies with the size
of the animal, 2 ounces often sufficing for a full-grown ox. The same
methods may be used for sheep, goats, and pigs, the doses being
suitably altered. (For fuller particulars see Dollar’s “Operative
Technique,” pp. 44 to 70.)
Most frequently, however, the surgeon contents himself with
producing local anæsthesia by the injection of a 4 to 10 per cent.
solution of cocaine.
CHAPTER II.
CIRCULATORY APPARATUS.

BLEEDING.

Bovine animals are usually bled from the superficial jugular, or the
mammary vein.
Bleeding from the Jugular.—The animal having been suitably
fixed, the jugular is raised by means of a cord drawn tightly round
the base of the neck, and the vessel is opened with a fleam about the
middle of the neck.
The skin of the ox being thick, a long-bladed instrument is
necessary. When the bleeding ceases, the cord is removed: some
practitioners take no precautions as regards the wound; it is better to
insert a pin suture.
Bleeding from the jugular may also be performed with the trocar,
particularly in animals with fine, thin skin.
Bleeding from the Mammary Vein.—The mammary vein may
be opened with the fleam, the straight bistoury, or the lancet. The
head is firmly fixed and the hind limbs controlled by a rope passed in
a figure of eight above the hocks.
In bleeding on the left the operator places himself at an angle to
the animal’s side, opposite the hypochondriac region, with his back
towards the animal’s head, and holds the fleam in his right hand. To
operate on the right-hand side the fleam is held in the left hand.
This method of bleeding always causes thrombus formation, on
account of the low position of the opening in the vein. The animal’s
bed should be kept very clean, in order to prevent any local infection
which might cause hæmorrhagic or suppurative phlebitis. The lancet
or bistoury can only be used in animals with very fine skin.
In bovine animals small quantities of blood are sometimes taken
from the facial vein or the veins of the ear or tail.

BLEEDING IN SHEEP.
On account of the quantity of fatty tissue and wool covering the
jugular furrow in the sheep, bleeding is scarcely practicable at that
point. The operation is usually performed on the angular vein of the
eye, the external saphenous vein, or the subcutaneous vein of the
forearm.
In operating on the facial vein the animal’s head is firmly held, the
operator compresses with the fingers of his left hand the facial vein
at the point where it passes into the maxillary fissure, and with a
lancet opens the angular vein of the eye or one of the other branches
of origin which project prominently beneath the skin. Bleeding
ceases as soon as the pressure is relaxed.
In the case of the external saphenous vein, the vein is raised by
compressing the middle region of the limb and the vessel is opened
with a lancet, a little above and towards the outside of the hock.
The
subcutan
eous vein
of the
forearm
can be
raised by

Fig. 294.—Angular vein of the eye and facial vein.


compressing the fore limb below the elbow. The vein is visible
throughout the length of the inner surface of the radius, and can
easily be opened with a lancet.
It is also possible to withdraw small quantities of blood by opening
the marginal veins of the ear.

BLEEDING IN THE PIG.

Breeders sometimes bleed by slitting one of the animal’s ears or


cutting the tail. It is preferable to bleed with a lancet from the
marginal veins of the ear, the external saphenous vein a little above
the hock, or the subcutaneous vein of the forearm.

SETONS, ROWELS, PLUGS, OR ISSUES.

Although the application of setons is still practised in horses, that


of “issues” has largely been given up in bovine animals, although
some practitioners still regard issues as of considerable value and as
producing effects similar to, or better than, those of sinapisms.
They are usually inserted in the region of the dewlap; the materials
employed comprise black and white hellebore, veratrine and stems of
clematis.
Two methods are practised.
In the first, a transverse fold is raised in the skin of the dewlap,
which is divided with a stroke of the bistoury, leaving a little aperture
in the skin. By introducing the rounded ends of a pair of curved
scissors the subcutaneous connective tissue is broken down, leaving
a little space beneath the skin, into which the plug is introduced.
Swelling takes places very rapidly—in twenty-four to forty-eight
hours it is very considerable—and if the substance employed is
violent in its action, like hellebore, it must be withdrawn, as
otherwise considerable sloughing takes place. To facilitate this object
a thread or piece of string is usually attached to the plug before it is
inserted.
In the second method, the irritant material is attached to, or
smeared on, a strip of broad linen tape which is passed in precisely
the same manner as in the horse (see Dollar’s “Operative Technique,”
pp. 107–111).
CHAPTER III.
APPARATUS OF LOCOMOTION.

The customary operations on the


apparatus of locomotion are almost
entirely confined to the feet. They consist
in operations for sand crack, picked-up
nail, stabs by nails and bruising of the
sole, elsewhere mentioned. As they call for
no special precautions they need not be
further mentioned here.

SURGICAL DRESSING FOR A CLAW.

The surgical dressing necessitated by


the operation for sand crack, picked-up
nail, or injury to the heels is often very
difficult to fix in the ox, and necessitates a
support round the pastern. It can,
however, be secured in the following way:
The seat of operation is covered with
small antiseptic pads, which are also
applied round the pastern and in the
Fig. 295.—Dressing for interdigital space. A bandage is then
claw after operation. passed twice round the pastern and over
the posterior two-thirds of the claw, as in
fixing the dressing used after removal of
the lateral cartilage in the horse. The bandage is then passed
repeatedly round the pastern in an upward direction and tied above
the interdigital space.

AMPUTATION OF THE CLAW OR OF THE TWO LAST


PHALANGES.
It sometimes happens that certain grave diseases in the foot or
pastern (stabs or picked-up nails, panaritium of the interdigital
space, necrosis of the ends of the flexor tendons, etc.) are
accompanied by necrosis of the bones, suppurative synovitis, and
even suppurative arthritis of the second and first inter-phalangeal
joints.
If carefully treated these forms of arthritis may disappear, leaving
the joints anchylosed, but unfortunately the application of the
necessary antiseptic injections (free injection with warm boiled
water, injection of 10 per cent. iodised glycerine, 3 per cent. carbolic
glycerine or ·1 per cent. sublimate) is difficult and costly.
It is better,
in such cases,
to remove the
claw or the two
last phalanges.
With antiseptic
precautions the
stump heals,
and recovery
takes place
without the
interminable
suppuration
and pain which
otherwise
cause such
grave loss of
condition.
(1.)
Disarticulati
on of the
Claw and Fig. 297.—
Fig. 296.—Anatomical Third
Disarticulation of the
relations of the inter- Phalanx.—
claw and third phalanx.
phalangeal joints. The patient is
cast and
suitably fixed. The horn-secreting coronary band of the claw must be
preserved.
First stage. The horny wall immediately beneath the coronary
band is thoroughly thinned and the tissues are divided as far as the
bone.
Second stage. Disarticulation: The tendon of the extensor pedis
is divided and the joint opened. The claw is pressed backwards, and
first the external and internal ligaments, then the flexor tendons of
the phalanges, are divided.
This
operation
is of no
great use,
because,
on
account of
the
position of
the joint
and the
arrangem
ent of the
articular
surfaces,
the end of
the
second
phalanx
extends
beyond
the line of
Fig. 298.—Amputation Fig. 299.—Amputation of the
section.
of the two last two last phalanges. Third
To avoid
phalanges. First and phase.
complicati
second phases.
ons,
therefore, it is better to remove the lower
extremity of the second phalanx, which, moreover, is always injured
to a greater or less extent in cases of pedal arthritis. To effect this it is
only necessary to draw back the flap of skin a little and rapidly divide
the second phalange at its upper third with a fine saw. The points of
section of the tendons and ligaments must be carefully examined,
and if they exhibit necrosis should be further shortened.
The stump is enveloped in a surgical dressing fixed to the pastern.
Amputation of the two First Phalanges.—When necrosis is
very serious and has extended a long way upwards, it is often better
immediately to resort to amputation of the two last phalanges.
The region is first shaved and thoroughly cleansed. The coronary
band of the claw is also preserved in this case.
First stage. The horn below the coronary band is thoroughly
thinned and the tissues are divided as far as the bone.
Second stage. The skin covering the front of the limb is vertically
incised from the lower third of the first phalanx (Fig. 298) to the
coronary band; the skin is separated and external and internal flaps
are formed.
Third stage. The extensor pedis tendon is divided, the first inter-
phalangeal joint opened, the internal and external lateral ligaments
are divided, the claw is pressed backwards, and the flexor tendons
are also divided.
To facilitate disarticulation, and particularly to facilitate section of
the lateral ligaments, the claw is rotated successively outwards and
inwards.
According to circumstances, the lower extremity of the first
phalange is either scraped or divided and the stumps of the tendons
are carefully trimmed to a regular shape.
A surgical antiseptic dressing is applied over the whole of the seat
of operation.
Several other methods of performing this operation will be found
in Möller and Dollar’s “Regional Surgery,” pp. 831–835.
CHAPTER IV.
DIGESTIVE APPARATUS.

RINGING PIGS.

This
operation is
customary
in countries
where pigs
are allowed
to roam
more or less
at liberty,
and it is
necessary to
adopt some
precaution
to prevent
them from
uprooting
the soil and
thus
causing
damage,
but the
practice
Fig. 300.—“Ringing” the pig. tends
nowadays
to
disappear. It simply consists in passing through the nose some object
which on being rubbed against anything causes pain and thus checks
the animal’s natural proclivity.
Numerous methods have been suggested. One of the simplest is as
follows: The animal having been cast, suitably secured and muzzled,
two thick iron wires sharpened at the ends are passed through the
snout, and the two ends are then twisted together in the form of two
rings. These can, if necessary, be united.
Another method, perhaps even more efficacious, consists in
bending a thick wire into the shape of the letter U, and preparing a
small metal plate with two holes corresponding in position to the
distance between the two nostrils. The ends of the wire, being
sharpened, are passed through the nostrils and securely united to the
metal plate by being bent into a spiral or simply at right angles.

ŒSOPHAGUS.

The operations practised on the œsophagus comprise passage of


the œsophageal sound or probang, taxis, crushing of foreign bodies
within the œsophagus, and œsophagotomy.

PASSING THE PROBANG.

Passage of the probang is called for in cases of marked tympanites,


suspected dilatation or contraction of the œsophagus, and accidental
obstruction. Special or improvised instruments may be used,
according to circumstances.
The animal is secured in a standing position with the head
extended on the neck and in a straight line with the body. A gag is
placed in the mouth and the tongue is grasped and withdrawn by an
assistant, whilst the operator, having carefully oiled the probang,
passes it through the gag towards the back of the pharynx. Violence
should be avoided, the probang being gently slid along the centre of
the vault of the palate. When the animal makes swallowing
movements, the apparatus is slowly pushed onwards.
This manipulation, though simple, requires some dexterity,
because at the moment when the instrument enters the pharynx the
animal often thrusts it to one side or the other with the base of its
tongue, bringing it between the molar teeth, and so crushing, or at
least injuring it.
The passage of hollow probangs gives comparatively little relief in
cases of tympanites, because the probang is almost always obstructed
by semi-digested material from the rumen, or plunges into the semi-
solid masses of food contained therein.
When the œsophagus is dilated at a point within the thorax, the
progress of the probang is checked by the accumulated food material,
and it becomes possible to determine approximately the place where
the dilatation occurs. In the same way, should a slender probang be
arrested at a given point in the œsophagus, this indicates that there
is contraction of the tube at that point.
In cases of obstruction the cupped probang is always arrested by
the foreign body. Efforts to thrust the latter onwards should always
be made with great caution, otherwise the œsophagus may be greatly
distended or its walls even ruptured.

CRUSHING THE FOREIGN BODY.

No attempt should be made to crush a foreign body within the


cervical portion of the œsophagus unless it is quite certain that that
body is of comparatively soft character. Crushing may be performed
by lateral pressure with the fingers within the region between the two
jugular furrows, or mechanical means may be adopted.
In the latter case a small piece of board is applied to one side of the
neck behind the foreign body, whilst gentle blows are given from the
opposite side with a little wooden mallet. Whatever precautions may
be taken, however, this method cannot be recommended.
The same remark applies to the use of forceps, the jaws of which
are so fashioned as to escape pressing on the trachea whilst they
grasp directly the foreign body through the walls of the œsophagus.

ŒSOPHAGOTOMY.

Œsophagotomy, or incision of the œsophagus, is an operation


which, though sometimes necessary, should only be regarded as a
last resort after all other methods have failed. Unfortunately it can be
performed only in the region of the neck, and even then the most
favourable point (viz., the lower third of the jugular furrow) cannot
always be selected, the operation having to be performed directly
over the foreign body.
The animal may be either standing or lying down. The seat of
operation should be thoroughly cleansed and disinfected.
First stage. Incision through the skin and subcutaneous
connective tissue above the level of the jugular vein and opposite the
foreign body.
Second stage. Isolation of the œsophagus by dissection and
tearing through of the connective and fibro-aponeurotic tissue at the
base of the jugular furrow.
Third stage. Incision through the œsophagus for a distance just
sufficient to enable the foreign body to be extracted.
Fourth stage. Suturing of the mucous membrane, suturing of the
muscular walls of the œsophagus, suturing of the skin, precautions
being taken to allow of drainage at the lower part of the operative
wound.

SUB-MUCOUS DISSECTION OF THE FOREIGN BODY.

As œsophagotomy, despite every precaution, often leads to fistula


formation, Nocard has recommended submucous dissection of the
obstructive body, such body being usually semi-solid. This method
has considerable advantages.
The first and second stages of the operation are exactly the same as
those above mentioned.
The third stage consists in puncturing the walls of the œsophagus
with a straight tenotome immediately behind the foreign body, as in
tenotomy. A curved, button-pointed tenotome having next been
introduced and passed with the blade flat between the foreign body
and the mucous membrane of the œsophagus, it is turned on its axis,
and attempts are made to divide the obstruction. A few moments are
often sufficient to effect this, after which the substance may be
further broken up by the fingers.
These various methods may lead to delayed complications, such as
dilatation or contraction of the mucous membrane of the œsophagus,
muscular atrophy of the œsophageal walls, œsophageal fistula, and,
sometimes, abscess formation.
RUMEN.

Two operations are currently performed on the rumen, puncture


and gastrotomy.

PUNCTURE OF THE RUMEN.

Puncture of the rumen is essentially an


urgent operation for the relief of acute and
rapidly progressive tympanites. It is
performed in the left flank, at an equal
distance between the last rib and the angle
of the haunch, and an inch or two beyond
the transverse processes of the lumbar
region.
First stage. Incision of the skin to the
extent of about one inch (not absolutely
necessary).
Second stage. Puncture with a sharp
trocar directed forwards, downwards, and
inwards. In making this puncture the point
of the trocar is passed through the incision,
and a sharp push is given. The sensation of
resistance overcome indicates that the
trocar has penetrated the cavity of the
Fig. 301.—Trocar for
rumen. Gas then escapes. When the
puncture of the
operation is completed, and the canula is
rumen.
being withdrawn, care should be taken to
press down the skin on either side with the
fingers of the left hand, to prevent accidental lifting and laceration of
the connective tissue. Even so slight an accident as this might cause
serious complications at a later stage.
In the absence of a trocar, and in cases of extreme urgency, the
rumen may be directly punctured with a straight bistoury, and after
the punctured wound is slightly enlarged, but before the blade of the
bistoury is withdrawn, an improvised canula, consisting of a hollow
elder twig, may be introduced. Were the blade of the bistoury
withdrawn before the introduction of the canula, the rumen would be
displaced, and the points punctured would no longer correspond.
Complications, such as respiratory or circulatory syncope,
attacks of vertigo, etc., have been noted, but these in reality are very
rare.
Subcutaneous Emphysema.—When the canula is carelessly
removed, and the subcutaneous connective tissue is torn, local
emphysema may occur if the pressure of gas in the rumen is very
great. This gas enters the puncture, proceeds along the connective
tissue, particularly the subcutaneous connective tissue, and causes
crepitant subcutaneous emphysema, very easy to recognise. This
emphysema may remain localised in the neighbourhood of the
puncture and gradually become absorbed. It may, however, extend to
the whole of the flank or even beyond, and in exceptional cases bring
about generalised subcutaneous emphysema. Such very extensive
emphysema as this rarely becomes reabsorbed without
complications.
The suppuration which follows puncture of the rumen may
assume one of two forms:—
(a) That of a little local abscess at the point of puncture, when
foreign matter or the microbes of suppuration have been left in the
path made by the withdrawal of the canula. Such abscesses are of
little importance. They rapidly heal if opened and treated with
antiseptic injections.
(b) That of diffuse subcutaneous or interstitial suppuration
following accidental emphysema.
The pressure of gas forces fragments of food material between the
layers of tissue, and suppuration is set up, the pus escaping by a
fistula at the point of puncture. Such suppuration is decidedly
dangerous, because it may result in necrosis of the aponeurotic
layers of the small oblique muscle, in which case recovery is tedious
and uncertain.
Treatment consists in laying open the orifice and fistula, and
making a counter-opening at the lowest point of the swelling. Free
drainage and abundant irrigation with boiled water at the body
temperature, followed by antiseptic injections, complete the
treatment.
Peritonitis is not altogether exceptional as a sequel to puncture
of the rumen, if ordinary precautions are neglected or if infective
material or fragments of food pass into the peritoneal cavity.
At first the condition is usually local, but it may extend and assume
the form of general peritonitis two or three weeks later. The
symptoms are those of acute peritonitis.
Speaking generally, however, puncture of the rumen in cattle and
sheep is seldom followed by any complication.

GASTROTOMY.

Gastrotomy is performed for the relief of impaction of the rumen


and to remove foreign bodies, such as linen, nails, bits of leather,
etc., which have been swallowed.

Fig. 302.—Gastrotomy. Pa, Skin; 1m, 2m, muscular layers; Pe, peritoneum; R,
rumen, showing line of incision.

A vertical or slightly oblique incision is made in the left flank,


extending from the fourth transverse process of the lumbar vertebræ
towards the last rib. The operation comprises the following stages:—
First stage. Incision through the skin
for a distance of from 6 to 10 inches,
according to the size of the animal.
Second stage. Incision through the
muscles and peritoneum and torsion of any
small muscular arterioles, which may be
divided.
Third stage. Fixation and
immobilisation of the rumen with from four
to six sutures (Fig. 303).
Fourth stage. Vertical incision into the
rumen; manual examination of the cavity
and its contents.
Formerly the operation was confined to
these stages. In such cases localised
adhesive peritonitis follows, causing the
rumen to adhere to the internal surface of
the abdominal wall, and the fistula
continues in existence for months before
complete cicatrisation. It is better,
therefore, to insert sutures in the rumen, in
order to secure more rapid and complete Fig. 303.
closure.
Fifth stage. Suture of the rumen with
carbolised silk. The lips of the wound should be brought together
face to face, or they can be slightly inverted, but the sutures should
only pass through the peritoneum and muscular coats, avoiding the
mucous coat. If the silk threads pass through the mucous membrane
and come in contact with the gas in the upper zone of the rumen they
are rapidly macerated, and the sutures tear out before the wounds
can heal. The rumen should always be kept fixed to the abdominal
wall towards the upper and lower extremities of the operative
wound, in order to avoid displacement and occurrence of peritonitis.
For a similar reason the passing of the silk sutures should be
preceded by careful disinfection of the operative wound, and free
washing of the parts with boiled water.
The operation is concluded
by bringing the skin together
with a few silk sutures and
inserting a strip of iodoform
gauze into the lower portion
of the wound, to serve as a
drain.

LAPAROTOMY.

Laparotomy is
comparatively seldom
performed on animals of the
bovine species, though it may
become necessary in dealing
with cases of hernia, uterine
torsion (where direct taxis is
called for), Cæsarean section,
invagination or strangulation
of the intestine, and under a
few other exceptional
Fig. 304. circumstances.
If simple exploration is
aimed at, the operation is most conveniently performed from the
right flank with the animal in a standing position, but should a
prolonged operation be contemplated the animal should be cast. The
incision varies in length, according to circumstances, from 8 to 16
inches, and, like that in gastrotomy, should correspond in direction
with the fibres of the small oblique abdominal muscle; the seat of
operation should previously be washed, shaved, and disinfected.
The operation comprises the following stages:—
First stage. Incision of the skin.
Second stage. Incision through the muscles and peritoneum.
Third stage. Exploration, inspection, palpation, extraction or
ablation, etc.
Fourth stage. Suture of the peritoneal opening, the lips being
brought together face to face.
Fifth stage. Suture of the muscles and the skin. It is sometimes
advisable to insert a drain of iodoform gauze under the skin.
In small animals, such as the sheep, goat, and pig, laparotomy is
more easily practicable, and can be performed either in the right
flank or towards the white line. The stages of operation are exactly
the same, but after operating near the white line it is extremely
important to use numerous and strong sutures, and afterwards to
apply a suspensory bandage around the abdomen, securing it above
the loins.

HERNIÆ.

The situation and nature of the hernia determine whether or not a


radical cure should be attempted.
When a decision has been
arrived at the seat of
operation must first of all be
thoroughly cleansed and
disinfected. The animal is cast
in a convenient position, and
a general anæsthetic is given
or a subcutaneous injection of
1 per cent. cocaine solution
administered.
The operation comprises:—
First stage. Incision
through the skin covering the
hernial sac, opposite the
orifice of the hernia.
Second stage. Isolation of
the hernial sac.
Third stage. Reduction of
the hernia and breaking down

You might also like