What is included with this book?
Introduction | |
Introduction to the Personal Computer Objectives | |
Key Terms | |
Explain IT Industry Certifications | |
Identify Education and Certifications | |
Describe the A Certification | |
Describe the EUCIP Certification | |
Describe a Computer System | |
Identify the Names, Purposes, and Characteristics of Cases and Power Supplies | |
Describe Cases | |
Describe Power Supplies | |
Identify the Names, Purposes, and Characteristics of Internal Components | |
Identify the Names, Purposes, and Characteristics of Motherboards | |
Identify the Names, Purposes, and Characteristics of CPUs | |
Identify the Names, Purposes, and Characteristics of Cooling Systems | |
Identify the Names, Purposes, and Characteristics of ROM and RAM | |
Identify the Names, Purposes, and Characteristics of Adapter Cards | |
Identify the Names, Purposes, and Characteristics of Storage Drives | |
Identify the Names, Purposes, and Characteristics of Internal Cables | |
Identify the Names, Purposes, and Characteristics of Ports and Cables | |
Serial Ports and Cables | |
USB Ports and Cables | |
FireWire Ports and Cables | |
Parallel Ports and Cables | |
SCSI Ports and Cables | |
Network Ports and Cables | |
PS/2 Ports Audio Ports | |
Video Ports and Connectors | |
Identify the Names, Purposes, and Characteristics of Input Devices | |
Identify the Names, Purposes, and Characteristics of Output Devices | |
Monitors and Projectors Printers, Scanners, and Fax Machines | |
Speakers and Headphones | |
Explain System Resources and Their Purposes | |
Interrupt Requests Input/Output (I/O) Port Addresses | |
Direct Memory Access | |
Summary | |
Summary of Exercises | |
Check Your Understanding | |
Safe Lab Procedures and Tool Use Objectives | |
Key Terms | |
Identify Safe Working Conditions and Procedures | |
Identify Safety Procedures and Potential Hazards for Users and Technicians | |
Identify Safety Procedures to Protect Equipment from Damage and Data from Loss | |
Identify Safety Procedures to Protect the Environment from Contamination | |
Identify Tools and Software Used with Personal Computer Components and Know Their Purpose | |
Identify Hardware Tools and Their Purpose | |
Identify Software Tools and Their Purpose | |
Identify Organizational Tools and Their Purpose | |
Implement Proper Tool Use Demonstrate | |
Proper Use of an Antistatic Wrist Strap Demonstrate | |
Proper Use of an Antistatic Mat Demonstrate | |
Proper Use of Various Hand Tools Demonstrate | |
Proper Use of Cleaning Materials | |
Summary | |
Summary of Exercises | |
Check Your Understanding | |
Computer Assembly | |
Step by Step Objectives | |
Key Terms | |
Open the Case Install the Power Supply | |
Attach the Components to the Motherboard and Install the Motherboard | |
Install a CPU and a Heat Sink/Fan Assembly | |
Install the RAM Install the Motherboard | |
Install Internal Drives | |
Install Drives in External Bays | |
Install the Optical Drive | |
Install the Floppy Drive | |
Install Adapter Cards | |
Install the NIC | |
Install the Wireless NIC | |
Install the Video Adapter Card | |
Connect All Internal Cables | |
Connect the Power Cables | |
Connect the Data Cables | |
Reattach the Side Panels and Connect External Cables t | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.