Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Introduction to Desktop Support
Figure 1-1: A workgroup is often referred to as a peer-to-peer network.
Figure 1-2: Domains share a common database and are centrally managed.
Figure 1-3: Troubleshooting a problem is best done systematically.
Figure 1-4: The Windows XP Professional default Help And Support Center page offers an abundance of information.
Figure 1-5: Help And Support Center pages can be customized.
Figure 1-6: The Microsoft Knowledge Base offers solutions to known issues.
Figure 1-7: A TechNet page provides a wealth of information that is written for IT professionals.
Chapter 2: Installing Windows XP
Figure 2-1: Partitions offer a way to divide hard drive space for different purposes.
Figure 2-2: Create or select a partition during the text mode phase of Setup.
Figure 2-3: Specify regional, time zone, and other settings during the GUI mode phase of Setup.
Figure 2-4: Specify network settings during the network setup phase.
Figure 2-5: Stop errors are most likely to occur when the GUI mode phase of Setup begins.
Figure 2-6: Using the Windows Update site.
Figure 2-7: You can configure Automatic Updates in many ways.
Figure 2-8: Use Winver.exe to determine the current Windows version and service pack.
Figure 2-9: The main POST screen displays information about the hardware on a computer.
Figure 2-10: Safe mode often allows you to change settings you cannot change in normal mode.
Figure 2-11: Use the boot log file (Ntbtlog.txt) to isolate startup problems.
Chapter 3: Supporting Local Users and Groups
Figure 3-1: Use the Local Users And Groups tool to manage accounts.
Figure 3-2: Creating a new user.
Figure 3-3: Use the General tab of a user account’s Properties dialog box to modify basic account properties.
Figure 3-4: Use the Profile tab of the user account’s Properties dialog box to specify a user profile and home folder.
Figure 3-5: Type a name and description for the new group; then add members.
Figure 3-6: Windows stores user profile folders in the Documents And Settings folder.
Figure 3-7: The gpresult tool displays the RSoP for a computer running Windows XP.
Figure 3-8: Local Security Policy administrative utility.
Figure 3-9: Use Event Viewer to view the Windows XP Security Log.
Figure 3-10: Viewing a failed audit entry.
Chapter 4: Supporting the Windows Desktop
Figure 4-1: Microsoft OneNote offers the option to remove the icon from the tray.
Figure 4-2: The notification area shows active programs and connections.
Figure 4-3: Hidden icons in the notification area are accessed by clicking the arrow.
Figure 4-4: Click Exit to close this program and remove the icon from the notification area.
Figure 4-5: The System Configuration Utility dialog box offers lots of information.
Figure 4-6: An crowded taskbar might make the taskbar seem disorganized.
Figure 4-7: A crowded taskbar might seem better organized with grouping enabled.
Figure 4-8: Quick Launch is shown here with the taskbar unlocked.
Figure 4-9: A personalized and resized Quick Launch area is shown here with the taskbar unlocked.
Figure 4-10: A customized Start menu offers personalized access to programs.
Figure 4-11: The Customize Start Menu dialog box offers many ways to personalize the Start menu.
Figure 4-12: Customizing the Classic Start menu is also achieved through a dialog box.
Figure 4-13: The Regional And Language Options dialog box offers a place to select available languages and customize formatting.
Figure 4-14: Changing standard and format options changes the currency, date, language, and more.
Figure 4-15: Two languages are now available for the user.
Chapter 5: Supporting Windows XP File and Folder Access
Figure 5-1: The Open With dialog box offers personalization options for the user.
Figure 5-2: Use the Advanced Attributes dialog box to enable compression for a folder.
Figure 5-3: Choose the scope of compression.
Figure 5-4: Enable disk quota management before you assign specific quotas to user accounts.
Figure 5-5: Use the Quota Entries dialog box to view quota information for users.
Figure 5-6: Use the Security tab of a folder’s Properties dialog box to assign NTFS permissions.
Figure 5-7: Add user accounts or groups by using the Select Users Or Groups dialog box.
Figure 5-8: Use the Advanced Security Settings dialog box to configure advanced permissions.
Figure 5-9: Windows XP can display the effective permissions for a user or group.
Figure 5-10: Control permissions inheritance at the level of the parent folder.
Figure 5-11: Use the Owner tab in the Advanced Security Settings dialog box to view and take ownership.
Figure 5-12: Share a folder by using the Sharing tab of a folder’s Properties dialog box.
Figure 5-13: After a folder is shared, a New Share button is added that lets you create additional shares.
Figure 5-14: After creating additional shares, the Sharing tab changes so that you can select and modify each share.
Figure 5-15: Users must know the exact name of a hidden share to connect to it.
Figure 5-16: Configure share permissions using the Share Permissions dialog box.
Figure 5-17: Add user accounts or groups to the Share Permissions list and then assign specific permissions.
Figure 5-18: View shared folders in Computer Management.
Figure 5-19: Use Computer Management to modify the properties of a shared folder.
Figure 5-20: View open files and folders by using Computer Management.
Figure 5-21: Share a file in one step when Simple File Sharing is enabled.
Figure 5-22: You can use the Shared Documents folder to share files on a computer or in a workgroup.
Figure 5-23: On the computer sharing the file, configure the caching (offline file) settings.
Figure 5-24: Enable offline files on the client.
Figure 5-25: Enable automatic synchronization of offline files.
Figure 5-26: Enable reminder balloons for offline files.
Figure 5-27: Choose an item to synchronize manually.
Figure 5-28: Configure synchronization settings.
Chapter 6: Installing and Managing Hardware
Figure 6-1: You can specify whether or not you have already connected the hardware device.
Figure 6-2: The Add Hardware Wizard displays a list of detected hardware.
Figure 6-3: If Add Hardware Wizard detects a device, it shows you the device’s status.
Figure 6-4: Use the Add A New Hardware Device option if the device is not detected.
Figure 6-5: Choose whether to perform an automatic search or to select a device manually.
Figure 6-6: Choose from a list of device types.
Figure 6-7: Choose the manufacturer and model of the device.
Figure 6-8: System Information provides a detailed summary of a system.
Figure 6-9: Device Manager provides a central interface for managing hardware devices.
Figure 6-10: A device’s Properties dialog box provides tools for configuring the device.
Figure 6-11: Managing resources by using the Resources tab.
Figure 6-12: The Resources By Type view is useful for troubleshooting resource conflicts on non- Plug and Play devices.
Figure 6-13: Use the Safely Remove Hardware dialog box to stop a device before disconnecting it.
Figure 6-14: Troubleshooters walk you through the potential solutions to a problem.
Figure 6-15: Use the Driver tab of a device’s Properties dialog box to view driver details.
Figure 6-16: You can allow or block the installation of unsigned drivers, or have Windows prompt the user.
Figure 6-17: The File Signature Verification utility scans a system for unsigned drivers.
Figure 6-18: Copy and modify an existing hardware profile.
Figure 6-19: Configure properties for the hardware profile.
Figure 6-20: Manage hardware profiles using the Hardware Profiles dialog box.
Figure 6-21: Choose a hardware profile during Windows startup.
Chapter 7: Supporting Display Devices, I/O Devices, and ACPI
Figure 7-1: Use the Settings tab of the Display Properties dialog box to control display settings.
Figure 7-2: Configure the arrangement of monitors to match your physical setup.
Figure 7-3: Configuring mouse settings with the Mouse tool.
Figure 7-4: Use the Pointers tab to customize the pointer appearance.
Figure 7-5: Use the Pointer Options tab to control the way the pointer behaves in different situations.
Figure 7-6: Configuring keyboard properties with the Keyboard tool.
Figure 7-7: Configure general modem properties on the Modem tab.
Figure 7-8: Troubleshoot modems using the Diagnostics tab of a modem’s Properties dialog box.
Figure 7-9: You can chain USB hubs and devices together to support up to 127 nodes.
Figure 7-10: Use the Power Schemes tab to configure basic power options.
Figure 7-11: Configure the Alarms tab to alert you to low battery situations.
Figure 7-12: The Power Meter tab shows you the remaining battery power.
Figure 7-13: Configure advanced power options on the Advanced tab.
Figure 7-14: Configure hibernation in the Power Options Properties dialog box.
Chapter 8: Supporting Storage Devices in Windows XP
Figure 8-1: Use the Disk Management tool to manage fixed and removable storage.
Figure 8-2: Creating a partition on a basic disk.
Figure 8-3: Selecting a partition type on a basic disk.
Figure 8-4: Viewing extended and logical partitions in Disk Management.
Figure 8-5: Formatting a partition using the Disk Management tool.
Figure 8-6: Mounting a volume into the C:\mounted folder.
Figure 8-7: Viewing a volume mount point in Windows Explorer (C:\mounted).
Figure 8-8: Viewing a volume mount point at a command prompt (C:\mounted).
Figure 8-9: Use Disk Management to convert a basic disk to a dynamic disk.
Figure 8-10: The dynamic disk type is displayed in Disk Management.
Figure 8-11: Extending a simple dynamic volume in Disk Management.
Figure 8-12: Connecting to another computer in Computer Management.
Figure 8-13: Viewing DiskPart command options.
Figure 8-14: Using the graphical version of Chkdsk.
Figure 8-15: Viewing a Disk Defragmenter analysis report.
Figure 8-16: Viewing a defragmentation in process.
Figure 8-17: Viewing the Defrag.exe command-line parameters.
Figure 8-18: Using the Disk Cleanup utility to delete unnecessary files.
Figure 8-19: Configure CD-ROM and DVD-ROM devices using Device Manager.
Figure 8-20: Using the Removable Storage utility.
Chapter 9: Managing Local and Network Printers
Figure 9-1: The local and remote printing processes in Windows XP are similar.
Figure 9-2: Configure a local printer attached to the computer.
Figure 9-3: Select a printer port.
Figure 9-4: Select the printer to install or provide a driver disk.
Figure 9-5: Name your printer and choose whether it should be the default printer.
Figure 9-6: Specify whether the printer should be shared.
Figure 9-7: Specify whether to print a test page.
Figure 9-8: You can view the new printer in the Printers And Faxes window.
Figure 9-9: Create a TCP/IP printer port.
Figure 9-10: Select a command from a printer’s shortcut menu.
Figure 9-11: Configure basic printer settings using the General tab of a printer’s Properties dialog box.
Figure 9-12: Configure printer port settings using the Ports tab of the printer’s Properties dialog box.
Figure 9-13: Advanced properties vary depending on the type of printer installed.
Figure 9-14: Configure printer-specific settings on the Device Settings tab.
Figure 9-15: Manage print jobs in the printer queue window.
Figure 9-16: Configure settings for a document using the document’s Properties dialog box.
Figure 9-17: Assign print permissions using the Security tab of a printer’s Properties dialog box.
Figure 9-18: Configure advanced printer permissions in the Advanced Security Settings dialog box.
Figure 9-19: Modify the permissions in the Permission Entry dialog box.
Figure 9-20: Control print permission inheritance in the Permission Entry dialog box.
Figure 9-21: Share a printer during installation.
Figure 9-22: Install non-Windows XP print drivers so other users do not have to.
Figure 9-23: Install a printer from within certain applications by using the Find Printer button.
Chapter 10: Supporting Network Connectivity
Figure 10-2: A router can connect several IP networks.
Figure 10-2: A hosts file is a simple text file that stores IP address to host name mappings.
Figure 10-3: Device Manager shows installed hardware, including modems and network adapters.
Figure 10-4: The Network Connections window shows local area network and dial-up connections.
Figure 10-5: Configure a connection by using its Properties dialog box.
Figure 10-6: Choose network components to install.
Figure 10-7: Windows XP is configured to obtain TCP/IP information automatically by default.
Figure 10-8: Configure an alternate TCP/IP configuration for when a DHCP server is not available.
Figure 10-9: Configure TCP/IP information manually.
Figure 10-10: Ping the loopback address to verify that TCP/IP is configured correctly.
Figure 10-11: Use the Ipconfig /all command to display a complete TCP/IP configuration.
Figure 10-12: Enable Internet Connection Firewall via the local area connection’s Properties dialog box.
Figure 10-13: The default ICMP settings are shown here.
Figure 10-14: You must configure ICF to allow traffic for services that your computer provides.
Figure 10-15: Add the Web Server (HTTP) service by inputting the appropriate information.
Figure 10-16: Choose the method to create an invitation.
Figure 10-17: The user requesting assistance sees the Remote Assistance User Console.
Figure 10-18: The helper sees the Remote Assistance Helper Console.
Figure 10-19: Enable Remote Desktop on a computer running Windows XP Professional.
Figure 10-20: Configure options for connecting to a remote computer.
Figure 10-21: Establish a Remote Desktop session.
Figure 10-22: After connecting, you have complete control of the remote computer.
Chapter 11: Supporting Internet Explorer in Windows XP
Figure 11-1: Configure basic settings on the General tab of the Internet Options dialog box.
Figure 11-2: Configure temporary Internet files settings.
Figure 11-3: Use the Content tab to control Content Advisor, certificates, and personal information.
Figure 11-4: Configure the way Internet Explorer connects to the Internet.
Figure 11-5: Configure proxy server settings.
Figure 11-6: Configure programs associated with certain services.
Figure 11-7: Configure advanced settings on the Internet Options dialog box.
Figure 11-8: Configure security zones in Internet Explorer.
Figure 11-9: Configure a custom security level.
Figure 11-10: Configure privacy settings in Internet Explorer.
Figure 11-11: You can customize Internet Explorer toolbars to suit any user’s needs.
Figure 11-12: Use the Programs tab of the Internet Options dialog box to configure the programs that Internet Explorer uses.
Chapter 12: Monitoring System Performance in Windows XP
Figure 12-1: Use the System Configuration Utility to control Windows startup.
Figure 12-2: Use the Performance Options dialog box to disable unnecessary visual effects.
Figure 12-3: Use the Virtual Memory dialog box to control the paging file.
Figure 12-4: Use the Advanced tab of the Performance Options dialog box to adjust processor scheduling and memory usage.
Figure 12-5: The Performance tab of Task Manager shows real-time processor and memory usage.
Figure 12-6: The Networking tab of Task Manager shows current network activity.
Figure 12-7: The Performance Tool starts working right away.
Figure 12-8: Select a counter to add to the Performance tool graph.
Figure 12-9: A histogram represents values as vertical bars.
Figure 12-10: A report displays values as simple text.
Figure 12-11: Configure general log properties.
Figure 12-12: Configure log-scheduling properties.
Figure 12-13: Choose the log file to view in System Monitor.
Figure 12-14: Configure an alert to warn you when counters cross performance thresholds.
Previous page
Table of content
Next page
MCDST Self-Paced Training Exam 70-271(c) Supporting Users and Troubleshooting a Micro[... ]ystem
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 195
BUY ON AMAZON
Strategies for Information Technology Governance
Assessing Business-IT Alignment Maturity
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Governing Information Technology Through COBIT
Governance in IT Outsourcing Partnerships
C & Data Structures (Charles River Media Computer Engineering)
C Operators
Storage of Variables
Strings
Arrays, Searching, and Sorting
Miscellaneous Problems
Competency-Based Human Resource Management
Why a Focus on Jobs Is Not Enough
Competency-Based HR Planning
Competency-Based Employee Recruitment and Selection
Competency-Based Employee Development
Appendix B Further Suggestions on Employee Development
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
NFR Security
Data Correlation
Incident Response
The Future of Intrusion Detection and Prevention
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 200 Use and Identification of Grounded Conductors
Article 210 Branch Circuits
Article 340 Underground Feeder and Branch-Circuit Cable Type UF
Article 402: Fixture Wires
Notes to Tables
Microsoft WSH and VBScript Programming for the Absolute Beginner
Constants, Variables, and Arrays
Handling Script Errors
Combining Different Scripting Languages
Appendix A WSH Administrative Scripting
Appendix B Built-In VBScript Functions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies