Chapter 13 Flashcards

1
Q

(UCS) stands for what? p613

A

Unicode Character Set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This applet is used when you want to configure the browser environment and such things as the programs used to work with files found online. p613

A

Internet Options Applet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

From within this one relatively innocuous panel you can make a large number of configuration changes to a Windows machine. p615

A

System Control Applet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some of the system control applets options that are available to use in this applet. p615

A
General
Network Identification
Device Manager
Hardware
Hardware Profiles
User Profiles
Environment Variables
Startup and Recovery
Performance
System Restore
Automatic Updates
Remote 
Computer Name
Advanced
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Gives you an overview of the system such as OS version registration information basic hardware levels (processor and RAM) and the service pack level that’s installed if any. p616

A

General tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This tab is used to define whether the machine is in a workgroup or a domain environment. p616

A

Computer Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Loosely associated computers each of which is its own security authority that share a common workgroup name.p616

A

Workgroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A group of computers that is tightly connected or associated and share a common domain name. Has a single authority (called a domain controller) that manages security for all the computers. p616

A

Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This tab includes a number of tools, all of which allow you to change how the hardware on your machine is used. p616

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To minimize the risks involved with adding third-party software to your machine Microsoft came up with a technique called what? p616

A

Driver Signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Has three subheading, each of which can be configured separately. They’re not identical in windows versions, however and this could also be called Etc. tab. p617

A

Advanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The tab you can find in Advance tab is? p 617

A

Performance
Environment Variables
User Profiles
Startup and Recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Environment Variables There are two types of environment variables, and you can access either one by clicking the Environment Variables button: p 618

A

User Variables: Specify settings that are specific to an individual user and do not affect others who log on to the machine. System Variables: Set for all users on the machine. System variables are used to provide information needed by the system when running applications or performing system tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

System and user variables were extremely important in the early days of what? p618

A

DOS and Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This profile contains information about their settings and preferences. p618

A

User Profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In the user profile you will be given three options what are the opions. p618

A

Delete
Change Type
Copy To

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Removes the user’s profile entirely. When that user logs on again, they will be given a fresh profile taken from the system default. p618

A

Delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Allows you to configure a profile as local (the default) or roaming. If a user works at two machines, each machine will use a different profile. p618

A

Change Type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Copies a profile from one user to another. Often the source profile is a template set up to provide a standard configuration. p618

A

Copy To

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When it’s enabled on one or more drives, the operating system monitors the changes you make on your drives. From time to time it creates what is called a restore point. Then, if you have a system crash, it can restore your data back to the restore point. p619

A

System Protection/System Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

lets you enable or disable Remote Assistance and Remote Desktop. p619

A

Remote

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Windows lets you configure how you want to handle updating the OS. You can specify that you want to automatically download updates or notify the user when updates are available (but not automatically install them), or you can turn off the feature. p620

A

Automatic Updates (Windows XP Only)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

knows as Action Center in Windows 7 (WSCUI.CPL) is used to manage the firewall, automatic updates, and virus protection. From here, you can manage settings for Internet options as well and see any maintenance or troubleshooting issues that you need to attend to.
p620

A

The Security Center Applet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

can be used to manage the firewall included with the operating system. Figure 13.5 shows the interface for Windows 7. p620

A

The Windows Firewall Applet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

allows you to configure a power plan dictating when devices, namely the display and the computer, will to turn off or be put to sleep. p620

A

The Power Options Applet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

(MS-DOS) stands for what? p620

A

Microsoft Disk Operating System (MS-DOS) was never meant to be extremely user friendly. Its roots are in CP/M, which in turn has its roots in UNIX. Both of these older OSs are command line based, and so is MS-DOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A number of diagnostic utilities are often run at the command prompt, and they can be broken into two categories: p621

A

networking and operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The networking command-line tools you are expected to know for this exam are? p621

A

PING, TRACERT, NETSTAT, IPCONFIG, NET, NSLOOKUP, and NBTSTAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

is one of the most useful commands in the TCP/IP protocol. It sends a series of packets to another system, which in turn sends back a response. This utility can be extremely useful for troubleshooting problems with remote hosts. p622

A

PING command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

is a command-line utility that enables you to verify the route to a remote host. p623

A

TRACERT Command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

is used to check out the inbound and outbound TCP/IP connections on your machine. It can also be used to view packet statistics, such as how many packets have been sent and received and the number of errors. p623

A

NETSTAT Command

32
Q

With Windows-based operating systems, you can determine the network settings on the client’s network interface cards, as well as any that a DHCP server has leased to your computer, by typing the following at a command prompt: ipconfig /all. p625

A

IPCONFIG Command

33
Q

You can conduct this test by typing the following sequence of commands from the DHCP client at a command prompt: p625

A

ipconfig /release ipconfig /renew

34
Q

is one of the first tools to use when experiencing problems accessing resources because it will show you whether an address has been issued to the machine. p625

A

IPCONFIG

35
Q

(APIPA) stands for what? p625

A

Automatic Private IP Addressing (APIPA) which will prevent the network card from communicating outside its subnet, if not altogether.

36
Q

the capabilities of it differ based on whether it is server or workstation based and the version of the operating system. p629

A

NET Command

37
Q

a command-line utility that enables you to verify entries on a DNS server. p631

A

NSLOOKUP Command

38
Q

You can use the NSLOOKUP command in two modes: p631

A

In( Interactive) mode, you start a session with the DNS server in which you can make several requests.
In (Noninteractive) mode, you specify a command that makes a single query of the DNS server.

39
Q

a command-line utility that shows NetBIOS over TCP/IP information. p631

A

NBTSTAT Command

40
Q

What are the OS Command-Line Tools: p631

A

TASKKILL, BOOTREC, SHUTDOWN, TASKLIST, MD, RD, CD, DEL, FDISK, FORMAT, COPY, XCOPY, ROBOCOPY, DISKPART, SFC, CHKDSK, and /?

41
Q

is used to terminate processes. Those processes can be identified by either name or process ID number (PID). The process can exist on the machine where the administrator is sitting (the default) or on another machine, in which case you signify the other system by using the /S switch. p631

A

TASKKILL Command

42
Q

can be run in Windows 7 or Windows Vista to interact with the Master Boot Record (MBR), boot sector, or Boot Configuration Data (BCD) store. It cannot be used with Windows XP because it uses a different boot structure. p632

A

BOOTREC Command

43
Q

can be used to schedule a shutdown (complete or a restart) locally or remotely. A variety of reasons can be specified and announced to users for the shutdown. p632

A

SHUTDOWN Command

44
Q

is used at the command line to see a list of all the running processes (and their process ID number), similar to what you see in the GUI by using Task Manager. By default, it shows the processes on the current machine, but the /S switch can be used to see the processes on a remote machine. /SVC will show the services hosted in each process and you can use /U if you need to run the command as another user (/P allows you to specify a password associated with that user).p632

A

TASKLIST Command

45
Q

are used to change (or display), make, and remove directories, respectively. p632

A

CD/MD/RD Commands

46
Q

used to delete files and directories at the command line. Wildcards can be used with it and ERASE performs the same operations. p634

A

DEL Command

47
Q

used to be included with earlier operating systems to make disk partitioning possible. This command does not exist in Windows 7, Vista, or XP, having been replaced with DISKPART. p634

A

FDISK Command

48
Q

s used to wipe data off disks and prepare them for new use. Before a hard disk can be formatted, it must have partitions created on it. p634

A

FORMAT Command

49
Q

It makes a copy of a file in a second location. (To copy a file and then remove it from its original location, use the MOVE command.) p635

A

COPY Command

50
Q

It’s basically an extension of COPY with one notable exception—it’s designed to copy directories as well as files.p635

A

XCOPY Command

51
Q

is included with Windows 7 and has the big advantage of being able to accept a plethora of specifications and keep NTFS permissions intact in its operations. p636

A

ROBOCOPY Command

52
Q

shows the partitions and lets you manage them on the computer’s hard drives. p636

A

DISKPART Command

53
Q

a command-line-based utility that checks and verifies the versions of system files on your computer. If system files are corrupted, the SFC will replace the corrupted files with correct versions. p636

A

SFC Command

54
Q

can also correct file system problems (such as cross-linked files) and scan for and attempt to repair disk errors. p638

A

CHKDSK Command

55
Q

Actually, if you just type HELP and press Enter, your computer gives you a list of system commands you can type. p638

A

/? Command

56
Q

This centralized database contains environmental settings for various Windows programs. It also contains registration information that details which types of filename extensions are associated with which applications. p639

A

Registry

57
Q

The Registry is broken down into a series of separate areas called what? p639

A

Hives

58
Q

The basic hives of the Registry are: p639

A
HKEY_CLASSES_ROOT 
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE 
HKEY_USERS
HKEY_CURRENT_USER 
HKEY_CURRENT_CONFIG
59
Q

(ASR) stands for what? p641

A

Automated System Recovery (ASR) which is accessible through the Backup utility, can be used as a last-resort option for system recovery in Windows XP. Both Windows Vista and Windows 7 use the WinRE recovery environment to do a Complete PC Restore to achieve the same goal.

60
Q

Virtual memory uses what’s called? p641

A

swap file, or paging file

61
Q

actually hard drive space into which idle pieces of programs are placed while other active parts of programs are kept in or swapped into main memory. p641

A

swap file

62
Q

If you make the swap file too small, the system can become what? 642

A

unbootable, or at least unstable

63
Q

lets you shut down nonresponsive applications selectively in all Windows versions. p642

A

Task Manager

64
Q

To get to Task Manager directly in any of the Windows versions that include it, you can press? p642

A

Ctrl+Shift+Esc

65
Q

lets you see which tasks are open on the machine. You also see the status of each task, which can be either Running or Not Responding. p643

A

Applications

66
Q

lets you see the names of all the processes running on the machine. You also see the user account that’s running each process as well as how much CPU and RAM resources each process is using. p643

A

Processes

67
Q

The six priorities, from lowest to highest, for the process task manager: p643

A
Low
Below Normal 
Normal
 Above Normal 
High
Realtime
68
Q

For applications that need to complete sometime but that you don’t want interfering with other applications. On a numerical scale from 0 to 31, this equates to a base priority of 4. p643

A

Low

69
Q

For applications that don’t need to drop all the way down to Low. This equates to a base priority of 6. p643

A

Below Normal

70
Q

The default priority for most applications. This equates to a base priority of 8. p643

A

Normal

71
Q

For applications that don’t need to boost all the way to High. This equates to a base priority of 10. p643

A

Above Normal

72
Q

For applications that must complete soon, when you don’t want other applications to interfere with the applications’ performance. This equates to a base priority of 13. p643

A

High

73
Q

For applications that must have the processor’s attention to handle time-critical tasks. Applications can be run at this priority only by a member of the Administrators group. This equates to a base priority of 24. p643

A

Realtime

74
Q

Task Manager has at least five tabs: p642

A

Applications, Processes, Performance, Networking, and Users

75
Q

interface as a front end in which you can run administrative tools. Many administrators don’t even know that applications they use regularly run within an MMC. p644

A

Microsoft Management Console (MMC)

76
Q

can manage all the services running on a computer, in addition to a Device Manager that functions almost identically to the one that has existed since Windows 9x. It contains an Event Viewer to show any system errors and events as well as methods to configure the software components of all the computer’s hardware.p644

A

Computer Management

77
Q

Computer Management, you will see all of the tools available. This is one power-packed interface, which includes the following system tools: p645

A

Device Manager = Lets you manage hardware devices.
Event Viewer = A link to the tool that allows you to view application error logs, security audit records, and system errors.
Shared Folders = Allows you to manage all of your computer’s shared folders.
Local Users And Groups = Allows you to create and manage local user and group accounts.
Performance Logs And Alerts = Shows you how your system hardware is performing, and alerts you if system performance goes under a threshold you set.