Index_S


S

safe recipients list, e–mail, 4–34

safe senders list, e–mail, 4–34

Save Word Files As option, 6–33

saving

AutoRecover files, 6–33

backup copies, 7–14

e–mail archive options, 4–32

open files, 7–14

Office save options, 6–33

Outlook backups, 4–14

Internet Explorer passwords, 5–35

scanner ports, 12–4

scanning computers

Microsoft Baseline Security Analyzer, 10–27 to 10–30

Office updates, 10–6

Windows XP updates, 10–2 to 10–8

scanning software, virus, 10–21 to 10–23

scope, addresses, 8–25

screen resolutions, 5–42

ScreenTips options, Office, 6–26

scripts, 2–4, 2–17, 5–37

search engines, 5–36

Search Explorer bar, 5–9, 5–36

Search Results window, 7–15

searches

folder options, 3–29

information resources, 2–9 to 2–16

Internet Explorer options, 5–36

lost files, 7–15

seated devices, 8–6 to 8–7

Secure Password Authentication (SPA), 4–7

security. See also computer security; junk e–mail; passwords; permissions; security zones

account policies, 9–25 to 9–29

antivirus patches, 10–22

domain controllers, 8–19

domains, 1–9

Excel macros, 7–27

group memberships, 9–21 to 9–23

Group Policy, 9–35 to 9–40

IDs, multiple boot computers, 11–15

labs, 9–41, 9–48

large networks, 9–14

local settings, 9–24 to 9–34

multiboot computers, 11–13 to 11–15

multiuser computers, 11–2 to 11–3

Office options, 6–33

overview, 9–1

researching problems, 2–14, 2–16

user accounts, 11–2 to 11–3

workgroups, 1–8

security zones

changing settings, 5–39

common requests, 5–41

default settings, 5–38 to 5–40

overview, 5–38

personalizing settings, 5–41

websites, adding, 5–40 to 5–41

send and receive errors, newgroups, 4–27

Send Immediately When Connected option, 4–47

sending. See also e–mail

attachments, 7–40

blocked newsgroup messages, 4–27

PowerPoint presentations, 7–34 to 7–35

protocols, 4–3

serial ports, 12–3, 12–8

servers. See also name resolution

domains, 1–9

e–mail copy on, 4–44 to 4–45, 4–47

e–mail name or address problems, 4–39

timeouts, 4–8, 4–27

service call resolution

overview, 2–1

questions to ask, 2–2 to 2–5

reproducing problems, 2–4

solutions

documenting service calls, 2–18

implementing, 2–16 to 2–18

overview, 2–7

personal knowledge bases, 2–18

procedures, 2–7 to 2–8

researching, 2–9 to 2–16

task prioritization, 2–17

service definitions, firewall, 10–15 to 10–17

service level agreements (SLAs), 1–12

service packs, 5–43, 10–3

services, troubleshooting, 3–41

sessions cookies, 5–25

SFC (System File Checker), 3–45

SFC/Scannow utility, 3–45

share permissions

folder sharing, 9–8

group memberships, 9–21 to 9–23

multiple, 9–13

network size, 9–14

NTFS and, 9–13

overview, 9–7

troubleshooting, 9–9

types, 9–8

Share This Folder On The Network option, 9–4

shared computers. See multiuser computers

Shared Documents folder, 9–5, 9–17, 11–3

sharing files. See also files

built–in local groups, 9–14 to 9–16

folder options, 3–30

NTFS permissions, 9–10 to 9–13

shared folders, 9–7 to 9–10, 9–13

Simple File Sharing, 9–3 to 9–7

sharing Internet favorites, 5–34 to 5–35

sharing PowerPoint presentations, 7–34 to 7–35

shortcuts. See also macros

Office ScreenTips, 6–26

Quick Launch, 3–18

Start menu, 3–14

Show Full Menus After A Short Delay option, 6–25

Show Readability Statistics option, 6–45

Show ScreenTips On Toolbars option, 6–26

Show Shortcut Keys In ScreenTips option, 6–26

Show Standard And Formatting Toolbars On Two Rows option, 6–25

showing

hidden files and folders, 3–29 to 3–30

Internet Explorer toolbars, 5–32 to 5–33

Office toolbars, 6–24

PowerPoint presentations, 7–34 to 7–35

Word toolbars, 7–4

signatures, e–mail, 4–45

signed ActiveX controls, 5–41

signs, Excel operators, 7–23

similar websites, viewing, 5–8 to 5–9

Simple File Sharing, 3–30, 9–3 to 9–7, 9–17, 17–4

size

e–mail

Deleted Items folder, 4–31, 4–33

folders, 7–42

Mailbox Cleanup, 4–32 to 4–34

sorting by size, 4–34

embedded objects, 7–13

Internet Explorer button icons, 5–4

linked objects, 7–13

Office icons, 6–25

passwords, 9–26

Quick Launch, 3–9

taskbar, 3–8, 3–11

Web page text, 5–2

Word toolbars, 7–4

SLAs (service level agreements), 1–12

slow browsing, temporary Internet files, 5–18 to 5–24

slow connections, 8–13

slow response times, fragmentation, 3–44

smart displays, 12–5, 12–11

SMTP (Simple Mail Transfer Protocol), 4–3, 4–8

software. See also updating computers

antivirus, 10–21 to 10–23

handheld devices, 12–12

licenses, 6–5, 6–13

software–based firewalls. See Internet Connection Firewall (ICF)

sort orders

All Programs list, 3–14

e–mail messages, 4–34, 4–40

frequently used programs area, 3–14

websites, previously viewed, 5–7

sounds

e–mail notifications, 7–42

embedding, 7–11 to 7–13

modem dialing, 8–12

Office options, 6–32

Web pages, 5–42

source code editors, 5–37

source files, embedding and linking, 7–11

SPA (Secure Password Authentication), 4–7

space

Disk Cleanup, 2–28

disk partitions, 11–8 to 11–9

freeing up, 5–20

mail folder size, 7–42

notification area, 3–5

Office system requirements, 6–5, 6–19

taskbar items, 3–8 to 3–10

taskbars, 3–5

temporary Internet files, 5–23

spam

deleting, 4–33

incoming mail settings, 4–7

locating, 4–33

management options, 4–34 to 4–36

practice exercises, 4–48

speech recognition, 6–4

speed

Internet connections, 8–13

networks, 10–15

ports, 12–8

Web browsing, 5–18 to 5–24

spelling

e–mail messages, 4–46

Office options, 6–41 to 6–45

spreadsheets. See Excel

Standard accounts, 11–3

Standard toolbar, 4–40, 5–10, 5–32, 6–23

standardizing computer settings, 9–35 to 9–40

Start menu

adding items, 3–14 to 3–16

All Programs list, 3–13

Classic Start menu, 3–16 to 3–17

common issues, 3–3

customizing, 3–16 to 3–17

described, 3–3

frequently used programs area, 3–14

notification area, 3–4 to 3–7

operating system components, 3–15

overview, 3–3, 3–13

pinning, 3–15

previous, 3–16 to 3–17

removing items, 3–14 to 3–16

shortcuts, creating, 3–14

unpinning, 3–15

starting IP addresses, 8–35

startup errors, 3–41

Startup programs, 3–18

Startup Task Pane option, 6–31

static IP addresses, 8–24, 8–47

stationery, e–mail messages, 4–46

statistical formulas, Excel, 7–22

statistics, connectivity, 8–34

Status bars, 4–40, 5–32

status information

collecting, tools for, 3–42

Group Policy settings, 9–38

stealing data, viruses, 10–23

Stop Error message, 2–13

Store Password Using Reversible Encryption For All Users In The Domain option, 9–27

storing

e–mail archive options, 4–32

Outlook backups, 4–14

Outlook Express information, 4–46

passwords, 9–27

temporary file folders, 5–24

strong passwords, 9–26

styles. See formatting

subnet masks

APIPA connections, 8–25

ICMP options, 10–15

statistics, 8–34

TCP/IP issues, 8–35

subnets, 8–31

subscriptions, TechNet, 2–15

summarizing documents automatically, 6–39 to 6–40

support, previous experience with, 1–5

switching

languages, 3–24 to 3–25

user accounts, 11–4

synchronization

devices, 12–4, 12–12

e–mail copy on servers, 4–45

System File Checker (SFC), 3–45

system files, 3–29 to 3–30, 3–45

system monitoring

Microsoft Baseline Security Analyzer, 10–27 to 10–30

Office updates, 10–6

Windows XP updates, 10–2 to 10–8

system requirements

Office components, 6–3

Office installations, 6–4 to 6–5

verifying, 6–11

System Restore, 6–9 to 6–11

system tools, 6–6




McDst Self-Paced Training Kit (Exam 70-272(c) Supporting Users and Troubleshooting Desktop Applications on a[... ]ystem)
McDst Self-Paced Training Kit (Exam 70-272(c) Supporting Users and Troubleshooting Desktop Applications on a[... ]ystem)
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 237

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net