Index_P


P

packaging PowerPoint presentations, 7–34

packets, 8–16, 8–36

Page Border Art, 7–5

page faults, invalid, 5–43 to 5–44

pages, home, 5–10

panes, Outlook, 4–40 to 4–41

parallel ports, 12–4, 12–8

parent permissions, 9–12

partially displayed messages, 3–11

partitions, disk, 11–8 to 11–9

Password Must Meet Complexity Requirements option, 9–26

passwords

account policies, 9–25, 9–31

changing, next logon, 9–28

domains, 8–22

encryption, 9–27

Internet Explorer, 5–35

modems, 8–12

Office installations, 6–33

resetting, 9–28

past meeting reminders, Outlook, 7–46

patches, antivirus, 10–22

pathping command, 8–36, 8–38

PDAs (personal digital assistants), 12–10

peer–to–peer networks, 1–8

performance

e–mail

AutoArchive, 4–32

Deleted Items folder, 4–31

Mailbox Cleanup, 4–32 to 4–34

Fast User Switching, 11–4

maintenance tasks, 2–28 to 2–30

Microsoft Baseline Security Analyzer, 10–27 to 10–30

Office updates, 10–6

program compatibility modes, 6–6 to 6–9, 11–16 to 11–17

Windows XP updates, 10–2 to 10–8

peripheral devices. See devices

permanent file opening defaults, 3–34 to 3–35

permanently removing notification area items, 3–7

Permission Denied error, 6–19

permissions

combining, 9–21

granting, 11–14

group memberships, 9–21 to 9–23

Group Policy, 9–35 to 9–40

labs, 9–41, 9–48

large networks, 9–14

local settings, 9–24 to 9–34

multiboot computers, 11–13 to 11–15

overview, 9–3

program installations, 6–10, 11–14

permitting service traffic, 10–15 to 10–17

persistent cookies, 5–24

personal digital assistants (PDAs), 12–10

personal information

removing, 6–34

websites, sending to, 5–5

personal knowledge bases, 2–18

personal storage files, e–mail, 4–14

personalized help files, 2–10

personalizing applications, 15–5

personalizing bulleted or numbered lists, 7–8 to 7–9

personalizing Internet Explorer

accessibility, 5–2 to 5–4

Content Advisor, 5–12 to 5–13

Explorer bar options, 5–9

history, viewing, 5–7

home pages, 5–10

interface requests, 5–6 to 5–13

languages, 5–5 to 5–6

overview, 5–2

Profile Assistant, 5–5

related sites, 5–8 to 5–9

titles, 5–10 to 5–12

toolbar button icons, 5–4

toolbars, 5–10 to 5–12, 5–33

Web page readability, 5–2 to 5–4

personalizing Internet favorites, 5–34

personalizing Internet security settings, 5–41

personalizing Office installations

menus, 6–26 to 6–28

Options dialog boxes, 6–29 to 6–34

overview, 6–23

sample service calls, 6–27 to 6–28

toolbars, 6–23 to 6–29

personalizing operating systems, 15–21

personalizing Outlook Express, 15–16

personalizing programs for files, 3–34 to 3–35

personalizing Start menus

adding items, 3–14 to 3–16

All Programs list, 3–13

overview, 3–13

removing items, 3–14 to 3–16

personally identifiable information, cookies, 5–24

phone call centers, 1–16 to 1–17

phone lines

e–mail account settings, 4–7

problems, 8–3, 8–10 to 8–12

physical connectivity

check list, 8–3

checking connections, 8–3, 8–6

Device Manager, 8–4 to 8–6

hardware, 8–4 to 8–8

modems, 8–7

overview, 8–3

physical layouts vs. logical layouts, 1–10

Picture Editor option, 6–32

pictures, Web pages, 5–42

ping command

gateway addresses, 8–33

ICMP, 10–13

loopback addresses, 8–32

other addresses, 8–33

overview, 8–31

pinning Start menu items, 3–15

piracy prevention, 6–14

platforms. See operating systems

Pocket PCs, 12–10

POP3 (Post Office Protocol 3)

accounts, creating, 4–4

Exchange Server, 4–9

Outlook Express, 4–15

overview, 4–3

settings, 4–8

portable devices. See devices

ports

FireWire, 12–4

IrDA, 12–5

mail servers, 4–8

overview, 12–2

parallel, 12–4, 12–8

serial, 12–3, 12–8

troubleshooting, 12–6 to 12–7, 12–12

USB, 12–4

positions

Internet Explorer toolbars, 5–32 to 5–33

Office menu commands, 6–28

Office toolbars, 6–25

Outlook panes, 4–40

taskbars, 3–8, 3–10 to 3–11

Word toolbars, 7–4

Power Users group, 9–15

PowerPoint

lost files, 7–35

overview, 7–34

sharing presentations, 7–34 to 7–35

PowerPoint Viewer, 7–34

predefined firewall service traffic, 10–17

preferences, user

customizing, 15–1

Explorer bar options, 5–9

home pages, 5–10

Internet Explorer button icons, 5–4

network connectivity, 16–1

personal information, sending, 5–5

program status, 3–6

related sites, 5–8 to 5–9

security, 17–1

toolbars, 5–10 to 5–12

usability, 14–1

Web page languages, 5–5 to 5–6

Web page readability, 5–2 to 5–4

website content restrictions, 5–12 to 5–13

presentations, PowerPoint, 7–34 to 7–37

previewing e–mail messages, 4–40

previews, document, 6–39

primary partitions, 11–9

printers. See also name resolution

Office options, 6–32

ports, 12–4 to 12–5

wireless access points, 12–5

private folders, 9–5, 9–17

problem isolation

questions to ask, 2–2 to 2–6

reproducing, 2–4

solutions

implementing, 2–16 to 2–18

overview, 2–7

researching, 2–9 to 2–16

troubleshooting procedures, 2–7 to 2–8

user education, 2–24 to 2–32

problem reproduction, 2–4

problem solving skills, DSTs, 1–6

processors, Office requirements, 6–5

product activations, Office, 6–14, 6–19

product announcements

Knowledge Base, 2–12

TechNet, 2–14

product ID requirements, Office, 6–5, 6–19

product support call resolutions

overview, 2–1

questions to ask, 2–2 to 2–6

reproducing problems, 2–4

solutions

implementing, 2–16 to 2–18

overview, 2–7

researching, 2–9 to 2–16

troubleshooting procedures, 2–7 to 2–8

user education, 2–24 to 2–32

product support roles

corporate environments

domains, 1–9 to 1–11

entry–level jobs, 1–12

network types, 1–8 to 1–11

overview, 1–8

tier structure, 1–11

workgroups, 1–8

desktop support technicians

expert users, leveraging, 1–4

overview, 1–3

skills, 1–5

user experience levels, 1–3

user past experiences, 1–5

noncorporate environments, 1–16 to 1–19

overview, 1–1 to 1–2

Profile Assistant, 5–5

program compatibility, e–mail attachments, 7–39

program compatibility modes

changing, 6–7

multiple boot computers, 11–16 to 11–17

overview, 6–6

testing programs, 6–8 to 6–9

when not to use, 6–6

Program Compatibility Wizard, 6–8 to 6–9

programs. See also Office installations

adding, 3–13

All Programs list, 3–13

closing, 3–6 to 3–7

configuring, 13–5

customizing, 15–5

default, opening files, 3–34 to 3–35

Disk Cleanup, 2–28

file types listed, 3–33 to 3–34

files, opening, 3–28

frequently used programs area, 3–14

locating installations, 11–16

multiboot computers, 11–15 to 11–17

multiuser computers, 11–5

program compatibility modes, 6–6 to 6–9, 11–16 to 11–17

removing, 3–14

restarting, 7–14

security, 17–1, 17–10

unknown files, 3–36 to 3–37

proofing tools

AutoCorrect, 6–41

AutoFormat, 6–42

AutoSummarize, 6–39 to 6–40

AutoText, 6–43

common problems, 6–44

dictionaries, 6–43

grammar, 6–41 to 6–45

languages, 6–37 to 6–39

overview, 6–37

spelling, 6–41 to 6–45

templates, 6–40 to 6–41

protected system files

folder options, 3–29 to 3–30

missing, determining if, 3–45

protecting system. See computer security; security

protocols. See also connectivity

e–mails, 4–3 to 4–4, 4–8 to 4–9, 4–15, 4–19

Internet Control Message Protocol, 10–13 to 10–15, 10–19

TCP/IP, 8–34

Provide Feedback With Animation and Provide Feedback With Sound option, 6–32

proxy settings, 5–44

.pst files, 4–14




McDst Self-Paced Training Kit (Exam 70-272(c) Supporting Users and Troubleshooting Desktop Applications on a[... ]ystem)
McDst Self-Paced Training Kit (Exam 70-272(c) Supporting Users and Troubleshooting Desktop Applications on a[... ]ystem)
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 237

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net