Errata
The errata list is a list of errors and their corrections that were found after the product was released.
The following errata were submitted by our customers and have not yet been approved or disproved by the author or editor. They solely represent the opinion of the customer.
Color Key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update
Version | Location | Description | Submitted by | Date submitted |
---|---|---|---|---|
Printed | Page 2 60, 61 |
Hello there, |
Michael Najar | Jan 18, 2014 |
Printed | Page 3 Table 1-2 |
Physical memory limits for Windows 8 mentioned in the book are not correct according to http://msdn.microsoft.com/en-us/library/windows/desktop/aa366778(v=vs.85).aspx#physical_memory_limits_windows_8 |
Jan Steberl | Jul 31, 2013 |
Printed | Page 6,7,8 page 6, UAC first paragraph, page 7, 4th bullet; page8, last bullet |
The book says in 3 instances that: |
Andy Johnson | Dec 14, 2013 |
Page 11 Second bullet |
There is an extra "C" in Reduced Ccolor mode!! |
Ehsan Salmanpour | Sep 10, 2013 | |
Printed | Page 11 3rd bullet point |
Typo in the word "resolution" - reads as "sesolution". |
Andy Johnson | Dec 14, 2013 |
Printed | Page 12 Thought experiment |
"computers all have less than 3 TB of installed RAM" should read as "less than 3 GB" |
Andy Johnson | Dec 14, 2013 |
Printed | Page 18 step 1 2nd line |
on page 18 it says that it is better to use the x86 ADK tools for x64 and x86 deployment. |
Anonymous | May 07, 2013 |
Printed | Page 23, 34, 52 Question 4 |
Question 4: The correct answer is A. DISM |
JVK25 | Jan 26, 2014 |
Page 28 second paragraph - #2 |
In "Type attach vdisk" the first "a" is not bold. |
Ehsan Salmanpour | Sep 14, 2013 | |
Printed | Page 34,52,53 question 5 |
isn't the answer for this question is A ? |
Anonymous | May 07, 2013 |
Printed | Page 34, 51, 52 Question 2 |
Question 2: the correct answer should be A. |
JVK25 | Jan 26, 2014 |
Printed | Page 35 Last Line |
States that USMT is part of MDT. USMT is provided in the ADK, not MDT. |
Kyle Blagg | Aug 26, 2013 |
Printed | Page 35 Last couple of lines |
The book references that USMT is provided as part of MDT. It's actually part of the ADK, not MDT. |
Kyle Blagg | Aug 26, 2013 |
Printed | Page 79 Second paragraph, second sentence |
This is I think is a bug in the book: page 79 under the title ?Set Program Access And Computer Defaults option?, second sentence ?In some ways this option is similar to the Set Your Default Programs option, except that its windows isn?t as well featured?. I don?t believe that the two options are similar, not by look and not by functions. Because the option one ?Set Your Default Programs option? will set associations of files to programs, while the second option ?Set Program Access And Computer Defaults option? is to choose a program for a certain function or deactivate a program function. |
Michael Najar | Feb 01, 2014 |
Printed | Page 85 below the figure 2-27, numberd 2 |
Type import-module.appx. it does not work with out additional actions as follow: |
Michael Najar | Feb 01, 2014 |
Printed | Page 87 number 3 |
It is written "3. In the next screen that appears should be a Sync licences button (see figure 2-29).". It should be "3. In the next screen that appears, and if you already signed in using Microsoft account, should be a Sync licenses button, otherwise you have to sign in first and then the Sync Licenses button will appear (see figure 2-29). |
Michael Najar | Feb 01, 2014 |
Printed | Page 102 1st paragraph |
Typo: "Activating Hyper-P" should be "Activating Hyper-V" |
Jan Steberl | Jul 31, 2013 |
Printed | Page 115 Numbered 1., A. |
Under number 1. you wrote C, it should be A and C |
Michael Najar | Feb 01, 2014 |
Printed, PDF | Page 123 Last paragraph |
The subnet mask provided in the example, 255.0.0.224, is invalid. It must be 255.255.255.0 |
Jan Eggert | Oct 16, 2013 |
Page 124 Last paragraph |
The subnet mask used in the example, 255.0.0.224, is invalid; it must be 255.255.255.224 |
Jan Eggert | Oct 16, 2013 | |
Printed | Page 129 Top of page |
The book has an incorrect answer for one of the Objective Review questions in Chapter 3.1 question 1. |
Anonymous | Oct 02, 2013 |
Printed | Page 133 |
On page 133 under the 4th doted point with the title "Connect to a work place", line before last on this point you wrote "When you connect to a VNP, you are asked...", "VNP" is wrong, it should be "VPN". |
Michael Najar | Feb 03, 2014 |
Printed | Page 153 The point Administrator , eoughly in the middel of the page |
Under the point administrator you wrote: "enables you to disable Windows Defender if you want to use a different antivirus product on your computers." |
Michael N Najar | Feb 06, 2014 |
Printed | Page 176 Top of the page, also mentioned in Objective review questions |
Book says that "Podcasts" is one of five default libraries. Reality is: Only 4 default libraries exist in Windows 8(Documents, Music, Pictures, Videos). |
Jan Steberl | Jul 29, 2013 |
Printed | Page 182 NFC paragraph |
Book says that for NFC there is no configurable option. This is inacurate. If a device has NFC, you can go to Settings > Change PC settings > Wireless > Turn the NFC on/off (same for GNSS, Wi-Fi, Bluetooth and 3G) |
Jan Steberl | Jul 29, 2013 |
Printed | Page 190 page 190, 191, 252 |
For Homegroups you require little networking knowledge, but on the next page question 3 B. No networking knowledge is required is correct according to page 252. What is correct, I assume little networking knowledge because of the IPV6 that needs to be enabled. |
Michael van Da | Feb 06, 2014 |
Printed | Page 227 Step 10 |
...."Set it to Enabled ould force"....should say "Set it to Enabled would force"... |
Anonymous | Aug 06, 2013 |
Printed, PDF | Page 227 Top of page, step 4 |
Maximum Password Age specifies how many days the password can be used before it must bechanged, not how many times. |
Jan Eggert | Oct 25, 2013 |
Printed, PDF | Page 255 Top op page |
The answers provided do not match the questions: Question 4 referrs to the purpose of UAC, which is covered by answer 5. |
Jan Eggert | Oct 25, 2013 |
Printed | Page 273 3rd Set of Bullets, 2nd Bullet |
In the second bullet it says |
Kyle Blagg | Aug 27, 2013 |
Printed | Page 325 middle of page |
The table in Chapter 6 (the table below Figure 6-2) appears to be missing an option in the brief descriptions list. |
Anonymous | Oct 07, 2013 |
Printed | Page 335 middle of page |
Objective Review 6.1 question 2 states that you would use answer C |
Anonymous | Oct 07, 2013 |
Printed | Page 381 Picture |
In figure 6-40 it shows indexing a folder called pornography. How could this make this into a printed book? This is unacceptable. |
Jason P | Jul 30, 2013 |
Other Digital Version | 394 United Kingdom |
Kindle Edition: Reduced Ccolor mode |
Anonymous | Jul 29, 2013 |
Printed | Page 424 Bottom of the page and onto the next page |
On page 424 and page 425 this lists the answers to the questions from the chapter. The answers start out being numbered 4,5,6,7 instead of 1,2,3,4. |
Anonymous | Jun 02, 2013 |
Printed | Page 424 Answers |
The numbering for Chapter 7 Object Review 7.1 answers appear to be incorrectly numbered. For example, what should be the answer information for question 1 is numbered 4, what should be 2 is 5, 3 is 6 and 4 is 7. |
Anonymous | Oct 07, 2013 |
Printed | Page 425 Last quesiton |
Question 4 (typo 7) shows the correct answer as "C" but in the book on page 396 it says "Windows 8 won't allow you to store this backup on CD/DVD/Blue-Ray removable media". How is this possible? Shouldn't the answer really be D? |
Anonymous | Jun 02, 2013 |
Other Digital Version | 6331 Image does not match caption |
Kindle: |
Anonymous | Sep 10, 2013 |