Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Introduction to Desktop Support
Table 1-1: End Users Have Varying Skill Levels
Table 1-2: An Overview of the Corporate Tier Structure
Table 1-3: Overview of the Telephone Call Center Tier Structure
Table 1-4: Selecting the Right Newsgroup
Chapter 2: Installing Windows XP
Table 2-1: Supported File Systems
Table 2-2: Windows XP Upgrade Paths
Table 2-3: Common Windows XP Installation Errors
Table 2-4: Common Command-Line Parameters for Windows Updates
Table 2-5: Summary of Advanced Boot Options
Table 2-6: Recovery Console Command Descriptions
Chapter 3: Supporting Local Users and Groups
Table 3-1: Auditable Events
Table 3-2: Potential Events to Audit and Reasons to Audit Them
Chapter 4: Supporting the Windows Desktop
Table 4-1: Advanced Taskbar Problems and Solutions
Chapter 5: Supporting Windows XP File and Folder Access
Table 5-1: Common File Type Associations
Table 5-2: Common Folder View Issues and Their Solutions
Table 5-3: Basic NTFS Folder Permissions
Table 5-4: Basic NTFS File Permissions
Table 5-5: Default Permissions at the Root of an NTFS Volume
Table 5-6: Permission Relationships
Table 5-7: Calculating Effective Permissions, Allow Permissions Only
Table 5-6: Calculating Effective Permissions When Deny Permissions Are Assigned
Table 5-9: Controlling Inheritance from the Parent Folder
Table 5-10: Shared Folder Permissions
Table Figure 5-11: Calculating Effective Permissions for Shared Folders on NTFS Partitions
Table 5-12: Troubleshooting Simple File Sharing
Chapter 6: Installing and Managing Hardware
Table 6-1: Tools Available Through System Information
Chapter 10: Supporting Network Connectivity
Table 10-1: IP Address Summary
Table 10-2: Invalid IP Addresses
Table 10-3: Dotted Decimal Versus CIDR Subnet Mask Notation
Table 10-4: Subnet Information for Network 172.16.0.0 with Subnet Mask 255.255.255.0 (172.16.0.0/24)
Table 10-5: Resolving Common Internet Connectivity Calls
Table 10-6: Resolving Common Internet Connectivity Calls
Table 10-7: ICMP Options
Chapter 12: Monitoring System Performance in Windows XP
Table 12-1: Windows XP Visual Effects
Table 12-2: Important Memory-Related Counters
Table 12-3: Important Processor-Related Counters
Table 12-4: Important Disk-Related Counters
Previous page
Table of content
Next page
MCDST Self-Paced Training Exam 70-271(c) Supporting Users and Troubleshooting a Micro[... ]ystem
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 195
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.2 Install SSH Windows Clients to Access Remote Machines Securely
Step 3.1 Use PuTTY as a Graphical Replacement for telnet and rlogin
Step 4.2 Passphrase Considerations
Step 4.4 How to Generate a Key Using PuTTY
Appendix - Sample sshd_config File
Inside Network Security Assessment: Guarding Your IT Infrastructure
What Security Is and Isnt
Common Risk-Assessment Methodologies and Templates
Introducing the Assessment Process
Tools Used for Assessments and Evaluations
Ranking Your Findings
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Presenting InfoPath 2003 SP-1
Filling Out Forms
Adding Basic Controls and Lists
Formatting Forms
Writing Advanced Event Handlers
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 2 Diagnosing and Troubleshooting
Domain 5 Printers
Domain 1 Operating System Fundamentals
Domain 4 Networks
SQL Hacks
Joins, Unions, and Views
Hack 27. Identify Overlapping Ranges
Hack 44. Tunnel into MySQL from Microsoft Access
Hack 55. Import Someone Elses Data
Hack 93. Auto-Create Database Users
Java All-In-One Desk Reference For Dummies
Working with TextPad
Pulling a Switcheroo
Handling Exceptions
Book III - Object-Oriented Programming
Using the Object and Class Classes
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies