Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Introduction to Desktop Support
Table 1-1: End Users Have Varying Skill Levels
Table 1-2: An Overview of the Corporate Tier Structure
Table 1-3: Overview of the Telephone Call Center Tier Structure
Table 1-4: Selecting the Right Newsgroup
Chapter 2: Installing Windows XP
Table 2-1: Supported File Systems
Table 2-2: Windows XP Upgrade Paths
Table 2-3: Common Windows XP Installation Errors
Table 2-4: Common Command-Line Parameters for Windows Updates
Table 2-5: Summary of Advanced Boot Options
Table 2-6: Recovery Console Command Descriptions
Chapter 3: Supporting Local Users and Groups
Table 3-1: Auditable Events
Table 3-2: Potential Events to Audit and Reasons to Audit Them
Chapter 4: Supporting the Windows Desktop
Table 4-1: Advanced Taskbar Problems and Solutions
Chapter 5: Supporting Windows XP File and Folder Access
Table 5-1: Common File Type Associations
Table 5-2: Common Folder View Issues and Their Solutions
Table 5-3: Basic NTFS Folder Permissions
Table 5-4: Basic NTFS File Permissions
Table 5-5: Default Permissions at the Root of an NTFS Volume
Table 5-6: Permission Relationships
Table 5-7: Calculating Effective Permissions, Allow Permissions Only
Table 5-6: Calculating Effective Permissions When Deny Permissions Are Assigned
Table 5-9: Controlling Inheritance from the Parent Folder
Table 5-10: Shared Folder Permissions
Table Figure 5-11: Calculating Effective Permissions for Shared Folders on NTFS Partitions
Table 5-12: Troubleshooting Simple File Sharing
Chapter 6: Installing and Managing Hardware
Table 6-1: Tools Available Through System Information
Chapter 10: Supporting Network Connectivity
Table 10-1: IP Address Summary
Table 10-2: Invalid IP Addresses
Table 10-3: Dotted Decimal Versus CIDR Subnet Mask Notation
Table 10-4: Subnet Information for Network 172.16.0.0 with Subnet Mask 255.255.255.0 (172.16.0.0/24)
Table 10-5: Resolving Common Internet Connectivity Calls
Table 10-6: Resolving Common Internet Connectivity Calls
Table 10-7: ICMP Options
Chapter 12: Monitoring System Performance in Windows XP
Table 12-1: Windows XP Visual Effects
Table 12-2: Important Memory-Related Counters
Table 12-3: Important Processor-Related Counters
Table 12-4: Important Disk-Related Counters
Previous page
Table of content
Next page
MCDST Self-Paced Training Exam 70-271(c) Supporting Users and Troubleshooting a Micro[... ]ystem
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 195
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Basic Security Principles
Risk Assessment Best Practices
Making Sure You Are Ready to Begin
Contents of a Good Report
Roles, Responsibilities, and Accountabilities
Metrics and Models in Software Quality Engineering (2nd Edition)
Metrics for Software Maintenance
Basic Assumptions
The Rayleigh Model Framework
Satisfaction with Company
Establishing the Alignment Principle
A Practitioners Guide to Software Test Design
Decision Table Testing
State-Transition Testing
Use Case Testing
Section III - Testing Paradigms
Test Planning
C++ How to Program (5th Edition)
Test-Driving a C++ Application
Decision Making: Equality and Relational Operators
Special Section: Building Your Own Computer
Summary
D.5. Converting from Decimal to Binary, Octal or Hexadecimal
Comparing, Designing, and Deploying VPNs
MPLS Layer 3 VPNs Overview
A Detailed Examination of MPLS Layer 3 VPNs
The Carriers Carrier Architecture
Implementing QoS for MPLS Layer 3 VPNs
Programming .Net Windows Applications
RichTextBox
Creating Custom Controls from Scratch
Creating Your First Menu
Managed Providers
Multiuser Updates
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies