PrintNumber ErrorLocation Error Correction DateAdded
3 pii Third Printing March 2013 Fourth Printing May 2013 8/21/2012
3 p91 Figure 4.4  A 240-pin PC3-12800 4 GB DIMM (DDR3-1333) Figure 4.4  A 240-pin PC3-10600 4 GB DIMM (DDR3-1333) 5/20/2013
3 p149 Table 6.2 add note:

Note: Older, deprecated SCSI connections use 50 pins. An example of a 50-pin SCSI connection is Ultra2 SCSI (Fast-40) which can transmit 40 MB/s. It only allows for a maximum of 8 devices.
fixed 5/21/2013
3 p160 13. A and C. System lockups and failed boot files or other failing file operations are possible symptoms of hard drive failure. The best answers are tape drives and hard drives. Antivirus alerts tell you that the operating system has been compromised and viruses should be quarantined and a full scan should be initiated. Sometimes hard drives can fail due to heavy virus activity, but usually, if the malware is caught quick enough, the hard drive should survive. Network drives are separate from the local hard drive; inability to connect to a network drive suggests a network configuration issue. If the BIOS doesn’t recognize the drive, consider a BIOS update. 13. A and C. System lockups and failed boot files or other failing file operations are possible symptoms of hard drive failure. Antivirus alerts tell you that the operating system has been compromised and viruses should be quarantined and a full scan should be initiated. Sometimes hard drives can fail due to heavy virus activity, but usually, if the malware is caught quick enough, the hard drive should survive. Network drives are separate from the local hard drive; inability to connect to a network drive suggests a network configuration issue. If the BIOS doesn’t recognize the drive, consider a BIOS update. 5/21/2013
3 p187 Now and again you will encounter users reporting that when they type on the keyboard, the mouse pointer scrolls across the screen. This could be because the user’s sleeve is brushing up against the touchpad. To remedy this, pointing devices can be turned off within Windows, usually through the laptop manufacturer’s software. Watch out for situations in which the entire device was disabled or perhaps just the pad portion of the touch pad was disabled. It’s also possible to disable tapping ability of the touch pad, while still allowing movement of the cursor. Now and again you will encounter users reporting that when they type on the keyboard, the mouse pointer scrolls across the screen. This is sometimes referred to as a “ghost cursor.” It could be because the user’s sleeve is brushing up against the touchpad. To remedy this, pointing devices can be turned off within Windows, usually through the laptop manufacturer’s software. Watch out for situations in which the entire device was disabled or perhaps just the pad portion of the touch pad was disabled. It’s also possible to disable tapping ability of the touch pad, while still allowing movement of the cursor. . In rarer cases, a ghost cursor occurring while working in the operating system or in a word processor can be caused by a bad driver or the OS itself. If this happens, reinstall or update the mouse/touchpad driver, the video driver, and update the OS as well. 5/21/2013
3 p217 Note: The Windows System Image Manager (SIM) for Win7 is part of the Windows Automated Installation Kit (AIK), which can be downloaded from www.microsoft.com; just search for Windows Automated Installation Kit (AIK). For detailed instructions on how to use SIM, see the following link:
http://technet.microsoft.com/en-us/library/dd744394(WS.10).aspx.
For general information about Windows 7 deployment, see the following link:
http://technet.microsoft.com/en-us/library/dd744519(WS.10).aspx.
The Windows System Image Manager (SIM) for Win7 is part of the Windows Automated Installation Kit (AIK), which can be downloaded from www.microsoft.com; just search for Windows Automated Installation Kit (AIK). For detailed instructions on how to use SIM, see the following link:
http://technet.microsoft.com/en-us/library/dd744394(WS.10).aspx.
The Windows Preinstallation Environment, known as Windows PE, or simply WinPE is also available as part of the Windows AIK. It can be booted from optical disc, USB flash drive, over the network via PXE or from the hard drive. Windows 7 uses WinPE version 3.0 and 3.1. It can be used to run recovery tools such as the Windows Recovery Environment (WinRE), and Winternals and for running disk cloning utilities.
For general information about Windows 7 deployment, see the following link:
http://technet.microsoft.com/en-us/library/dd744519(WS.10).aspx.
5/21/2013
3 p224-228 Table 8.5, row 6:

%WINDIR%\Inf\Setupapi*.log Used to log Plug and Play device installations.
%WINDIR%\Inf\Setupapi*.log Used to log Plug and Play device installations. setupapi*.log can refer to multiple files (the asterisk is wild) including setupapi.offline.log (as on a Win7 computer), and Online configuration phase files: setupapi.dev.log and setupapi.app.log. This applies to any other references in the book to setupapi*.log. See the following links for more information on Windows setup log files:
http://technet.microsoft.com/en-us/library/dd744583(v=ws.10)
http://support.microsoft.com/kb/927521

(Addition forced pages to wrap)
5/21/2013
3 p264 Msconfig also lets you select from different boot options and can start or stop services. Msconfig also lets you select different boot options and can enable/disable services. 5/21/2013
3 p274-275 Later, individual keys or the entire registry can be imported with the Import option on the File menu, in case a modification was not successful. For example, certain changes to the registry could cause the GUI to fail to load. Or audio could become disabled. Again, be sure to make a backup before playing around with the registry. Later, individual keys or the entire registry can be imported with the Import option on the File menu, in case a modification was not successful. For example, certain changes to the registry could cause the graphical interface (GUI) to fail to load. Or audio could become disabled. Again, be sure to make a backup before playing around with the registry. To repair a missing graphical interface or audio issue that is registry-related, attempt a System Repair from the Windows DVD, or if possible restore an older version of a backed up registry. (More about System Repair in Chapter 11 “Troubleshooting Windows.”) 5/21/2013
3 p282 5. A, B, C, and D. All answers are correct for Windows 7; however, know that Windows XP does not have a Services tab in the Task Manager. 5. B, C, and D. Task Manager, Computer Management, and the Command Prompt. Msconfig is not a correct answer as it lets you enable/disable services, but not start/stop them. 5/21/2013
3 p298 Question 5: The answer to this question should be Winload.exe, not Bootmgr. replace Bootmgr with Winload.exe as answer B and in the explanation. fixed 5/21/2013
3 p315 4. D. To enable (or disable) System Restore in Windows Vista, go to the System Protection tab of the System Properties window. 4. D. To enable (or disable) System Restore in Windows 7/Vista, go to the System Protection tab of the System Properties window. 5/21/2013
3 p315 8. C. When you defrag the disk, all the file sectors are straightened out and made contiguous. 8. A. When you defrag the disk, all the file sectors are straightened out and made contiguous. 5/21/2013
3 p326-327 Add 4th bullet to Windows XP Boot Errors (previous page):
. It should be noted that commands, such as fixboot and fixmbr, can be used in the Windows XP Recovery Console to fix issues such as "NTLDR is Missing" or other issues where a virus has infected the Master Boot Record.
fixed (cause page to wrap) 5/21/2013
3 p358 Add to Table 12.2, last row: A composite video RCA connection (yellow plug) sends an analog video signal; it is sometimes used by older gaming systems and other electronic devices, possibly in combination with stereo RCA audio connections (red and white plugs.) fixed 5/21/2013
3 p428 Add to Answer 8 at the end. “In addition to the explanation listed, it is also possible for the toner cartridge to fail, causing blank pages to print. This would mean that blank pages could be caused by failures during the Developing and the Transferring stages of the laser printing process, with failures during the Developing stage being more common.” fixed 5/21/2013
3 p468 Table 15.8, 3rd row: 802.11g 54 Mbps 2.4 GHz 35 m/115 ft 140 m/460 ft
802.11g 54 Mbps 2.4 GHz 38 m/125 ft 140 m/460 ft
5/21/2013
3 p503 Add to end of 2nd bullet: Another attack similar to session hijacking is browser redirection. This is when a user's web browser is automatically redirected to one or more malicious websites. It can be done when a user inadvertently accesses a malicious website from a search, can be caused by a Trojan that modifies a computer's DNS entries (ex. DNSChanger), or can be caused by spyware or a virus that configures a proxy server address within the browser and/or modifies the HOSTS.txt file. This can be avoided by increasing a browser's security settings, updating antivirus programs, and through user education. It can be fixed by scanning the system with antivirus software, removing the proxy server address from the browser's settings, and deleting and re-writing the HOSTS.txt file. More information about proxy server addresses is available in Chapter 15, “Networking.” More information about browser and session hijacking can be found in Chapter 16, “Security.” fixed (cause major wrapping until page 513) 5/21/2013
3 p602 To acquire your A+ certification, you need to pass two exams: 220-801, and 220-802, each of which is 100 questions. To acquire your A+ certification, you need to pass two exams: 220-801, and 220-802, each of which is 90 questions. 5/21/2013
3 p633 11. Answer A is correct. 802.11a has the shortest indoor range at approximately 115 ft (35 m). 802.11b and g are not far behind though, with an indoor range of 125 ft (38 m). 802.11n has the greatest range of the four at 230 ft (70 m). Outdoor ranges are similar with 802.11a at the bottom, b and g slightly higher, and 802.11n at almost double the range of b and g. See the section titled “SOHO Windows Networking” in Chapter 15, “Networking,” for more information. 11. Answer A and B are both correct. This is because 802.11a and 802.11b are very similar when it comes to indoor range. 802.11g is not far behind. For the exam, remember that 802.11n has close to double the range of 802.11a, b, and g.. See the section titled “SOHO Windows Networking” in Chapter 15, “Networking,” for more information. 5/21/2013