1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.11 Flashcards

(231 cards)

1
Q

The Internet Options in the Control Panel, what Tab Internet Properties sets the home page; set tab settings; delete browsing history, cookies, temporary files, and saved passwords; change appearance; and configure accessibility settings

A

General

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Internet Options in the Control Panel, what Tab Internet Properties configures security zones

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Internet Options in the Control Panel, what Tab Internet Properties selects privacy settings for the current zone, location settings, pop-up blocker, and InPrivate browsing settings

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Internet Options in the Control Panel, what Tab Internet Properties sets options for family safety, SSL certificate management, AutoComplete, and feeds

A

Content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Internet Options in the Control Panel, what Tab Internet Properties sets options for VPNs, dial-up, LAN connections, and proxy servers

A

Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Internet Options in the Control Panel, what Tab Internet Properties selects the default web browser, manage add-ons, select the default HTML editor, and set the default apps for email and other Internet services

A

Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Internet Options in the Control Panel, what Tab Internet Properties enables and disable accelerated graphics; configure accessibility settings, browsing settings, HTTP settings, international settings, multimedia settings, and security settings; and reset Internet Explorer to the default settings

A

Advanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In control panel which one is to adding displays, cameras, scanners, and so on.

A

Devices and Printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In control panel which one is to uninstalling and changing programs.

A

Programs and Features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In control panel which one is to viewing and managing network connections.

A

Network and Sharing Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In control panel which one is to configuring security

A

Windows Defender Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In control panel which one is to Adjusting mail settings for Microsoft Outlook Email users.

A

Mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In control panel which one is to Setting up speakers, headphones, and microphones; managing event sounds and themes.

A

Sound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

From the Control Panel, if you select Accounts, you can manage the _____and access to other users.

A

User Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Device Manager accessed in the_____is the same one discussed under the MMC

A

Control Panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This page in the Control Panel manages the indexing of data on a computer. Using these options can help increase the ease and speed for finding information. Just as the index in the back of this book helps you locate a specific topic, indexing the computer makes it easy for the search tool and selected apps to find useful information.

A

Indexing Options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This page in the Control Panel is an easy way to access tools to manage the computer. Some of these tools are familiar from the previous section, such as the System Information, Resource Monitor, System Configuration, Disk Cleanup, Disk Defragment, Registry Editor, and Event Viewer utilities. Several of the tools in this panel are discussed in other sections.

A

Administrative Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

File Explorer Options which tab is to Displays file and folder information

A

View tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

File Explorer Options which tab is to Selects folders to index for searching

A

Search tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

File Explorer Options which tab is to Opens folders

A

General options tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In Windows 10, _____ is not a listed option for the shutdown menu; however, it can be added by modifying a power plan: Select the Choose What the Power Buttons Do link under Power & Sleep Settings > Additional Power Settings.

A

Hibernate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

stores running programs in RAM and uses little power.

A

Sleep mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

which Power plan Default plan. Balances performance with energy consumption.

A

Balanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

which Power plan Reduces CPU performance and screen brightness more than the Balanced plan, for longest battery life.

A

Power Saver:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
which Power plan Offers the fastest CPU performance, brightest screen, and shortest battery life.
High Performance
26
which Power plan Limited to Windows 10 Pro Workstation edition for high-end computers
Ultimate Performance
27
Settings for power, sleep, and lid closure are managed in the Power Options by choosing the link What Closing the Lid Does. This brings up System Settings for power options. Note that options are set with both check box and drop-down menu
Standby, Lid, and Fast Startup Options
28
a power management setting that allows a computer to awaken from sleep with a signal via the USB port, such as a USB mouse. The setting is necessary because if all USB ports went to sleep, wiggling a mouse would not wake the computer; selective USB ports are set to respond to a signal from an attached device.
Universal Serial Bus (USB) selective suspend
29
settings are used to customize settings to the user’s needs and tastes. Search for ___and select the app. Note that the column on the left has groups of settings for Vision, Hearing, and Interaction. These settings help users of varying abilities more easily interact with the computer.
Ease of access
30
Setting time and date formats and automatic time settings
Date and Time:
31
Setting the country or region and the local format of date and time
Region:
32
Adding languages and changing keyboard language options
Language:
33
Enabling voice recognition and choosing the computer’s voice
Speech:
34
are generally about sharing your usage information and data history with Microsoft for research purposes.
Privacy settings
35
Choosing a background color, picture, or slideshow
Background:
36
Sharing web activity and app launches, managing web advertising settings
General:
37
Collecting speech patterns
Speech:
38
Collecting user handwriting and typing patterns
Inking & Typing Personalization:
39
Sharing software problems and crashes with Microsoft
Diagnostic and Feedback:
40
Managing settings for local storage and external sharing of activity
Activity History:
41
Managing privacy settings for each app or device
App Permissions:
42
Downloading maps to use when offline
Offline Maps:
43
Setting opening sites with an app or the browser
Apps for Websites:
44
Setting video resolution and battery power settings
Video Playback:
45
Managing which apps will start when logging in
Startup:
46
Preference settings for badge display, showing or hiding the taskbar, and setting the command prompt/PowerShell default when right-clicking the taskbar
Taskbar:
47
Installing new apps or removing old ones
Apps & Features:
48
Settings for locking an idle computer and the locked display
Lock Screen:
49
Choices for background sounds, colors, or images
Themes:
50
Light and dark colors for menus (such as the Windows menu)
Colors:
51
The Windows key hints at which keyboard key is being configured
Start (Windows key) Menu:
52
Font choices for Windows text and tools for importing fonts
Fonts:
53
Managing settings for keyboard, mouse, audio, and so on
Bluetooth & Other Devices:
54
Setting shortcuts on an Xbox game bar
Xbox Game Bar:
55
Optimizing the PC for gaming
Game Mode:
56
Monitoring status and performance, handling Xbox Live connectivity
Xbox Networking:
57
Managing settings to capture game play audio and video
Captures:
58
Managing general information on current network settings and activity
Status:
59
Setting specific Wi-Fi settings, handling IP and hardware information
Wi-Fi:
60
Granting access to physical and virtual Ethernet interface settings
Ethernet:
61
Granting access to dial-up settings if phone line and modem are available
Dial-up:
62
Allowing and adding virtual private network access
VPN:
63
Sharing and Internet connection over Bluetooth or Wi-Fi
Mobile Hotspot:
64
Managing settings for using a proxy server (not applicable to VPNs)
Proxy
65
Enabling and disabling wireless, Bluetooth, and cellular data
Airplane Mode:
66
Adding and removing printers and scanners
Printers and Scanners:
67
Managing mouse settings such as the primary button, scrolling, and pointer options
Mouse:
68
Managing settings for sensitivity, scrolling, zoom, and so on
Touchpad:
69
Managing settings for spell checking, text suggestions, and spacebar options
Typing:
70
Handling settings for the handwriting font
Pen and Window Ink:
71
Determining default settings for playing videos or music from apps
AutoPlay:
72
Issuing charging notifications and managing battery settings
USB:
73
Managing profile settings for the user
Your Info:
74
Adding accounts used by other apps for easier sign-in
Email & Accounts:
75
Setting sign-in procedures with security settings and requirements
Sign-in Options:
76
Handling connection settings for managed computers on a domain
Access Work or School:
77
Adding other accounts to the computer
Other Users:
78
Allowing settings to sync across devices on a Microsoft account
Sync Your Settings:
79
Determining the apps chosen for music, pictures, mail, browser, and so on
Default Apps:
80
(files, folders, printers, and devices) and user accounts are stored on servers.
Shared resources
81
server is used to authenticate users, and other servers can be used for print, file, email, and other services.
Active Directory
82
A shared folder or drive can be accessed by other computers on the network.
Network Shares
83
can be accessed by either its mapped drive letters or its folder names in File Explorer.
Network Shares
84
____network can offer unlimited sharing (full control or readonly) for any user who connects to a system if password-protected sharing is disabled. (This is not recommended.)
workgroup
85
On a __ with peer servers that support user/group permissions, shares are protected by lists of authorized users or groups. Windows 10 supports user/group access control.
client/server-based network / peer-to-peer network
86
are hidden shares that can be identified by a $ at the end of the share name. Standard users who are browsing to the computer over the network cannot see these shares; they are meant for administrative use.
Administrative shares
87
Windows enables shared folders and shared drives to be ____to drive letters on clients. In File Explorer/This PC, these ___ letters show up in the list along with the local drive letters. A shared resource can be accessed either through Network (using the share name) or through a mapped drive letter.
mapped drive
88
A shared folder ____ can be referred to by the drive name instead of by using a long Universal Naming Convention (UNC) path. When using MS-DOS programs, keep in mind that using ___is the only way for those programs to access shared folders.
mapped drive
89
Printers connected to network computers can be shared or printers can be connected directly to a network with Ethernet or wireless Ethernet (Wi-Fi) connections.
share printer
90
provides protection against unwanted inbound connections and can also be configured to filter outbound connections.
Windows Defender Firewall
91
Computers that are members of a local network must be configured so that they can communicate with each other. This is most often done with an
Internet Protocol (IP) addressing scheme
92
is input using a decimal notation scheme with four 8-bit parts to an address. These parts are called octets because the number represents 8 bits.
IPv4 address
93
The number of bits representing networks and the number representing the host can change. Just looking at an address, there is no way to tell which bits or part of a bit describes the network address and which describes the host address. This is where the ___ comes in.
subnet mask
94
The purpose of a ___ is to help routers and devices distinguish network bits from host bits. ___ is also 32 bits long and noted in groups of 8 bits. When a subnet mask bit is “on,” or a binary 1, the router does some calculating with the address to determine which is the network and which is the host. An IPv4 address is meaningless to a router (and to humans, for that matter) unless a ___ is configured.
subnet mask
95
A ____ usually belongs to an Internet service provider (ISP).____ are special computers that keep track of the IP addresses of domain names, such as Microsoft.com, IRS.gov, and NYT.com. People use domain names in their browsers because they are much easier to remember than IP addresses (but you can type IP addresses into browsers, too). Each domain name has a specific IP address for locating the server on the Internet. The job of a ____ is to match the domain name with the correct IP address so that packets can be delivered.
Domain Name System (DNS) servers
96
(cellular) connection shows up in the list of network connections after a SIM card is installed and activated by a mobile provider. A corporate network can use a proxy server as an intermediary between a network client and the destination of the request (such as a web page) from the network client.
wireless wide area network (WWAN)
97
Use the option to configure a wired connection if you are setting up a Pointto-Point Protocol over Ethernet (PPPoE) connection. This type of connection is used by cable or DSL ISPs that require the user to log in to the connection:
Wired Connections
98
A _____can be configured when the user clicks on the SSID from the taskbar or Settings menu.
wireless connection
99
are assigned, or leased, temporarily and need to be renewed after a period of time. The network administrator can adjust how much time applies for the lease
Dynamic addresses
100
A network administrator can reserve some network addresses and not allow DHCP to use them.
Static addresses
101
Similarly, network information can be mapped using File Explorer by selecting the Network icon from the menu on the left. To trace a path to a network, and for other information, click the Network tab in the top left to see the ribbon of network options. From here, you can view network paths and add devices to the network.
File Explorer Navigation: Network Paths
102
Many ISPs and mobile companies have data plans with usage thresholds that, when passed, can lead to increased costs and unpleasant surprises in a billing statement. One way to avoid accidental overages is to manage usage in the
Metered Connection
103
A 32-bit system can address up to__of RAM. This includes both the system's RAM and the memory used by applications.
4 GB
104
The minimum Ram requirements for Windows 10 32-bit is
1 GB
105
The minimum Ram requirements for Windows 10 64-bit is
2 GB
106
The minimum free hard disk space requirements for Windows 10 32-bit
16 GB
107
The minimum free hard disk space requirements for Windows 10 64-bit
20 GB
108
are separate components that have their own dedicated memory and processing power. They are more powerful than integrated graphics and are designed for demanding tasks such as 3D rendering, gaming, video editing, and other graphics-intensive applications. _____cards provide better performance, higher frame rates, and improved visual quality compared to integrated graphics.
Dedicated graphics cards/discrete graphics cards,
109
are built into the CPU or the motherboard itself. They share system memory and are generally less powerful than dedicated graphics cards.___are suitable for basic tasks such as web browsing, document editing, and even some lightweight gaming or video playback. They are energy-efficient and often found in laptops and budget-friendly desktop computers.
Integrated graphics
110
is RAM dedicated to processing graphics displays. It can be an assigned part of the system RAM, for an integrated graphics card. For example, a computer might have 4GB of RAM, with 1GB dedicated to the onboard graphics chip. It also refers to the RAM mounted on a dedicated card to support the GPU. This RAM is next to the GPU and does not draw on system resources for high-quality display.
Video Random Access Memory (VRAM)
111
32-bit systems require a CPU with a __ architecture.
32-bit
112
64-bit systems require a CPU with a __ architecture.
64-bit
113
These devices connect to a computer's USB port. They often have a physical button that the user presses to generate a one-time password (OTP) for authentication.
USB Tokens
114
Downloadable of _______ 1) Direct from the manufacture 2) Centralized app store 3) Avoid 3rd party download
Distribution Methods
115
Physical media provides a physical copy of the content, such as a DVD, Blu-ray disc, CD, or game cartridge.
Distribution Methods
116
Will adding hardware or software for one user degrade the user experience for another user? Will updating the OS cause legacy software to stop working?
Impact to device:
117
Will adding new users and devices degrade the current network performance? How will adding network storage improve or degrade network capabilities?
Impact to network:
118
Will new software updates take down the network for significant periods? Will moving to the cloud impact the processing time of sales transactions?
Impact to operation:
119
Will adding security software lock out business partners? Can the business financially afford upgrades, and do they make economic sense in the long run?
Impact to business:
120
is closed source, and only some components are open to developers. macOS was released in 2016 and designed to integrate with devices using the iOS operating system, such as the iPhone, Apple TV, and Apple Watch.
macOS
121
is an open source OS, which means that the source code is free. Because ___is open source, it is available free on the Web in the form of distros (distributions). __is available as command-line distros; and others are GUI distros. Popular distros of Linux are Ubuntu, Mint, Kali, and Red Hat.
Linux
122
is a relatively new OS developed by Google. It is an open-source OS, based on an open-source Gentoo Linux OS. The functionality is unique, in that the OS runs off the Google Chrome web browser. ___ can be installed off a USB drive and can run on a PC or Mac.
Chrome OS
123
which is an operating system based on the Linux kernel, is an example of open source software. Used mostly on smartphones and tablet computers, ___ is developed by the Open Handset Alliance, a group directed by Google. Google releases the ___OS code as open source, allowing developers to modify it and freely create applications for it. Google also commissioned the ___Open Source Project (AOSP), whose mission is to maintain and further develop ___.
Android
124
The Apple iOS is an example of closed source software. Known as the iPhone Operating System, this is now simply referred to as ___ because it is used on the iPod Touch, and iPhone.
iOS
125
The iPad once ran on iOS, but with version 13 (2019), it was powerful enough to have its own __, which is more robust than iOS and supports using a keyboard and multitasking.
iPadOS
126
The__ is the native file system of Windows 10.
New Technology File System (NTFS)
127
NTFS has many differences from FAT32, including the following: Individual files, folders, or an entire drive can be compressed without the use of third-party software.
Built-in compression
128
NTFS has many differences from FAT32, including the following: Unlike FAT32, NTFS includes a separate Recycle Bin for each user.
Individual Recycle Bins
129
NTFS has many differences from FAT32, including the following: The Encrypting File System (EFS) enables data to be stored in an encrypted form. It requires no password and no access to files.
Support for the Encrypting File System (EFS):
130
NTFS has many differences from FAT32, including the following: Drive mounting enables you to address a removable-media drive’s contents, possibly as if its contents are stored on your hard drive. The hard drive’s drive letter is used to access data on both the hard drive and the removable media drive.
Support for mounting a drive
131
NTFS has many differences from FAT32, including the following: The administrator of a system can enforce rules about how much disk space each user is allowed to use for storage.
Data Quota Support
132
NTFS has many differences from FAT32, including the following: _____Removable-media drives that have been formatted with NTFS (such as USB) can be connected or removed while the operating system is running. Indexing: The indexing
Hot - swapping:
133
NTFS has many differences from FAT32, including the following: ___: The indexing service helps users locate information more quickly when the Search tool is used.
Indexing
134
NTFS has many differences from FAT32, including the following: ______Different levels of access control, by group or user, can be configured for both folders and individual files.
Access control
135
enables data to be stored in an encrypted form. It requires no password and no access to files.
Encrypting File System (EFS)
136
has a maximum file size limit of 4 GB, so it cannot store individual files larger than this size.
FAT32
137
Use it for cross-platform compatibility, especially when dealing with small files and storage devices with limited capacity.
FAT32:
138
Choose it for cross-platform compatibility, large files, and storage devices with higher capacity
exFAT:
139
Compatibility: Designed for compatibility across platforms, supported by modern Windows, macOS, and many devices. Suitable for cross-platform use. Maximum Volume Size: Supports large volumes, up to 128 petabytes (PB). Maximum File Size: Supports very large individual files, with a maximum size of 16 exabytes (EB). File and Directory Limits: Has higher limits on the number of files and directories in a single directory compared to FAT32. Journaling: Supports optional journaling for data integrity.
exFAT (Extended File Allocation Table):
140
Compatibility: Highly compatible with various operating systems, including Windows, macOS, Linux, and many devices. Good for cross-platform compatibility. Maximum Volume Size: Supports up to 2 terabytes (TB). Maximum File Size: Has a maximum file size limit of 4 gigabytes (GB), which can be limiting for large files. File and Directory Limits: Has limitations on the number of files and directories within a single directory. Journaling: Does not support journaling, making it more vulnerable to data corruption.
FAT32 (File Allocation Table 32):
141
Linux-Based: Primarily used on Linux-based systems, offers improved data integrity and reliability. Journaling: Supports journaling to prevent data corruption. Maximum Volume and File Sizes: Supports larger volumes and file sizes compared to FAT32.
ext3 (Third Extended File System):
142
macOS/iOS-Based: Developed by Apple for macOS and iOS devices. Snapshots: Supports file and directory snapshots for data recovery. Clones and Deduplication: Allows for efficient storage management. Encryption: Built-in support for file and disk-level encryption. High Performance: Designed for SSDs and offers improved performance.
APFS (Apple File System):
143
Windows-Based: Developed by Microsoft for Windows, with partial read-only support in some Linux distributions. Journaling: Supports journaling for data integrity. Maximum Volume Size: Supports very large volumes, up to 256 terabytes (TB). Maximum File Size: Supports very large individual files, up to 16 exabytes (EB). Security: Supports file and folder permissions and encryption.
NTFS (New Technology File System):
144
Linux-Based: Successor to ext3, commonly used on Linux systems. Journaling: Supports advanced journaling features, improving data integrity and recovery. Maximum Volume and File Sizes: Supports large volumes and very large individual file sizes. Performance: Offers better performance and faster file system checks compared to ext3.
ext4 (Fourth Extended File System):
145
When a product has reached its scheduled EOL date, the vendor will end support for the product. Tech support and warranties will expire. The vendor will no longer release product updates, security patches, drivers, firmware, etc., leaving the legacy product vulnerable to security attacks. Vendors encourage customers to buy the new, next generation product as a replacement for the legacy product.
End of life (EOL) phase:
146
Not all OS updates are feasible on all products. For example, iOS 15 cannot run on most phone models earlier than iPhone 6s or SE. This is because the software advancements went further than the physical capabilities of the chipset—this can be processing power, video power, or another factor. Be sure to check vendor websites before updating, to make sure the device is compatible with the update. Updating can have hidden costs as well. If users have accessories to go with their devices—video cable, USB adapters, and writing pens, those might also need to be replaced. As devices migrate to USB-C interfaces, many of the old accessories are rendered useless when the new device arrives.
Update Limitations
147
Use this method to install Windows to an individual PC and to create a master PC from which disk images can be created.
Optical disc (CD-ROM/DVD/Blu-ray):
148
Use this method to install Windows to one or more systems that have working network connections. To use this method, network adapters must be configured to boot using the PXE boot ROM to a network location that contains an operating system image.
Network/PXE boot (Preboot Execution Environment):
149
This is the most common place for OS files to reside. After the OS is installed, it is important to change the boot order in BIOS/UEFI so that the computer looks here first for files and does not try to reinstall from the external source. older and install Windows over the network connection.
Solid state/flash or internal hard drives (HDD/SSD):
149
Use this method when installing from a DVD is not feasible, such as installing Windows to a computer that lacks a DVD drive.
USB/eSATA boot (booting from a USB thumb drive):
150
Downloading and installing over the Internet is an option. This involves downloading a server app and then downloading and creating the Windows ISO file. It is then possible to share the Windows installation folder and install Windows over the network connection.
Internet based:
151
are attached in special drive bays that allow the hard disk to be changed out while the computer is running. When a computer is running, the OS is loaded into RAM so that the OS can reside on a hot-swappable drive and be changed out, as long as it is returned to the drive bay that is identified in BIOS/UEFI as the bootable drive.
External/hot-swappable drive:
152
This option is similar to the internal hard drive above, but it involves a designated partition, or a section on the drive reserved for booting.
Partition on the internal hard disk drive or SSD:
153
To perform an _____, create the appropriate type of answer file for the installation type. An _____ uses an answer file where responses are stored
unattended installation
154
To perform an upgrade of the Windows 10/11 OS to the latest version, an __installation of Windows is recommended. Start the installation process from within the existing version of Windows. These___do not delete previous installations, which means that the user can retain apps and settings as well as personal files.
In-place upgrade
155
Laptops and brand-name desktops likely have a ______on the hard drive *Contains a copy of the OS build, device drivers, diagnostics programs, and preinstalled applications *Partition might or might not be hidden
Recovery partition
156
A partition on a hard drive that contains a recovery utility and installation files.
Recovery partition
157
overwrites the existing OS and applications In the Windows setup program, a _____ is called a custom installation. Advantage of _____-: get a fresh start
Clean install
158
Make sure the drive for installation is placed before the hard drive in the boot sequence. The system needs to boot from the Windows distribution media if you are installing to an empty hard drive. You can perform a clean install of Windows from within an older version of Windows if you want to replace the older installation. If you will be installing to a drive that might require additional drivers (SATA, RAID, or third-party host adapters on the motherboard or in an expansion slot), have the drivers available on any type of removable media that the system supports. If you are installing from optical media, from a disk image (ISO, VXD, or VHDX), or within a virtual machine (VM), then after restarting the system with the CD or DVD media or image file in place, press a key when prompted to boot. During the installation process, be prepared to confirm, enter, select, or provide the following settings, information, media, or options when prompted: Custom installation: Choose this option if performing a “ ” installation to an unused portion of the hard drive or wiping out the existing installation instead of upgrading it.
Clean install
159
If a Windows operating system installation becomes corrupt, use a___to restore working files and Registry entries without losing existing programs or information.___are available in Windows 10. Make a backup copy of your data files (stored in \Users\Username for each user of your PC) before you perform a __, in case of problems.
repair installation
160
The__process is also known as an in-place upgrade.
repair installation
161
To perform a _____of Windows 10 with a USB flash drive (which needs to be created before you start this process), follow these steps: Step 1. Boot the computer normally and sign into the Administrator account. Disable any third-party security software to avoid interruptions of the upgrade. Step 2. Insert the flash drive and run setup.exe to start the setup. Step 3. When prompted, download and install updates. Step 4. Accept the end user licensing agreement. The updates begin. Step 5. When the updates are ready, click Install when prompted. Step 6. Choose to keep personal files, if that is the preference. Step 7. Let the Windows 10 Setup process run and repair Windows. The rest of the installation proceeds as with a normal installation.
repair installation
162
- Boot to the network and deploy the image from a server - A technician does not start the image deployment - The entire___is automated and no user intervention is required A ___ (which involves installing Windows from a network drive) begins by starting the computer with a network client and logging on to the server to start the process.
remote network installation
163
An ____ is the process of installing Windows from a disk image of another installation.
image deployment/disk cloning
164
If a PC is underperforming or appears to be somehow infected by a virus, it might be a good idea to reset the PC to the factory default settings. Resetting a PC in Windows 10 is a straightforward process. Go to Settings > Recovery and click Get Started under Reset This PC. When you click Get Started, you get two choices: Keep My Files or Remove Everything. Keep My Files is for a minor reset; it allows personal files to be kept while removing apps and any settings that have been changed. Remove Everything performs a major reset, removing all files; before you choose this option, you need to back up personal files.
Refresh / restore
165
Third-party drivers refer to drivers sourced from outside Windows, most commonly from a device manufacturer. The Windows OD contains a substantial library of default drivers for devices, such as network adapters and video and sound cards. For the most part, these drivers work fine, but installing a driver from the manufacturer can enhance the features or performance of a device.
Other Considerations/Third-Party Drivers
166
A ____ can contain only a single drive letter and can be made active (bootable). Only one ____ can be active. Although a single physical drive using MBR can hold up to four ____s, only one ____ is needed on a drive that contains a single operating system. If you are installing a new operating system in a multiboot configuration with your current operating system, install the new operating system to a different disk partition than is used for the previous Windows version. If you are using a non-Windows operating system along with your current operating system, it should be installed into its own ____. A drive partitioned using GPT can have up to 128 ____s.
primary partition
167
An __ does not get a drive letter, but it can contain one or more logical drives, each of which is assigned a drive letter. Neither an ___ nor any drive it contains can be bootable.
extended partition
168
partitions are supported by classic ROM BIOS as well as UEFI firmware. ____supports a maximum drive size of 2TB and up to four primary partitions.
Master boot record (MBR)
169
supports drives up to 256TB and up to 128 primary partitions. ____ is also more reliable than MBR because it protects the partition table with replication and a cyclic redundancy check (CRC) of the partition table’s contents. ____ also provides a standard way for system vendors to create additional partitions. ____ partition tables are supported by UEFI firmware. To boot from a ____ drive, the system must have a 64-bit version of Windows. (Newer Windows Server versions also support ____.) 32-bit versions of Windows can use ____ drives for data.
globally unique ID partition table (GPT)
170
is an option with all versions of Windows. With new hard drives or existing drives that are known to be error free, you can use the quick format option to quickly clear the areas of the hard drive that store data location records.
Quick formatting
171
, Windows must rewrite the disk structures across the entire disk surface. This can take several minutes with today’s large hard drives.
full format
172
Before upgrading, a wise strategy is to back up the entire contents of the computer to a selected drive or to another local or network location. A backup program can create a compressed file to store backed-up information and user preferences. Windows asks during an upgrade what to do with current files. They should migrate just fine, but a backup is always a good idea even under normal operations.
Backup Files and User Preferences
173
After Windows is installed, it should be updated with the latest drivers. For individual PCs, the easiest way to perform these steps is to set up Windows Update for automatic updates. However, if you are installing Windows for the first time and the system or motherboard was supplied with a driver disc, perform driver installation first before you run Windows Update.
Application and Driver Support/Backward Compatibility
174
Before attempting to install any version of any OS, it is important to be sure that the hardware and applications to be used will work with (that is, are compatible with) the OS.
Hardware and Application Prerequisites and Compatibility
175
Newer versions of the Windows OS are released every fall and spring. The life cycle for these Windows Update releases is 18 months
Product life cycle
176
downloading a complete installation kit for an application—similar to an ISO file in Windows. Everything necessary is contained in the file, including installation scripts and application files. Simply dragging a file to the hard drive ensures all necessary files are present. This dragand- drop action completes all the installation tasks, similar to the installation wizard in the Windows environment. When the installation is complete, the ____ file can be safely deleted. ____: These are compressed installation files and scripts, similar to the
.dmg
177
.zip files that the macOS uses for Mac software installs. The installation files are in the ____ file, and there is no need to drag and drop them.
.app
178
____: This file extension indicates that a file holds an executable application that will run on the macOS. The folder also holds information such as icons and other properties that the OS uses to make it functional.
.app
179
The ___ is the online market platform for Apple-approved applications. A user can purchase and download apps for the computer or iPhone and tablets and be sure that Apple has vetted the code for quality and security. macOS has a variety of options for system updates in the ___ section of System Preferences. The ___ can be configured to automatically check for updates for apps and macOS, automatically install updates, and download apps installed on other macOS devices under the same user account. To avoid confusion, note that the Apple Store is a place to purchase hardware (phones, computers, accessories, and services); the ___ is for purchasing applications.
App Store
180
from a Mac computer is not a complicated process. From the Finder menu, access the Applications folder. Locate the application to be deleted and drag it to the trash.
Uninstalling apps
181
is the authentication process used to make sure authorized users are accessing the App Store and making software purchases. The ___crosses platforms, and a user account can be used for purchases and access on an iPhone, an iPad, or a Mac computer.
Apple ID
182
Corporations can also have Apple ID accounts that they can assign to employees. The key difference between the personal account and the corporate account is that an administrator in the corporate environment can ___access to the software and services when the user is working in the corporate environment
restrict
183
backs up the entire contents of the computer or selected drive to another local or network location.
full backup
184
A backup program can create a compressed file to store backed-up information. With this type of backup, the backup program must run a __utility to make the files usable again.
restore
185
macOS includes the____backup utility that must be configured and running to be useful in case data is lost.
Time Machine
186
apps should be updated at least daily.
Antivirus and anti-malware
187
macOS has a variety of options for system updates in the Software Update section of ___ . The preferences can be configured to automatically check for updates for apps and macOS, automatically install updates, and download apps installed on other macOS devices under the same user account. When updating software, the Mac or other device must be plugged into AC power. After downloading and installing the update, a password, fingerprint, or face ID is required after restarting. The ___ settings on a Mac can be accessed by selecting the gearwheel icon on the Dock or by using the Apple menu and selecting ___.
System Preferences
188
Which of the Preference in System Preferences is for the following ______: Configuration of a display’s settings, such as brightness and Night Shift, which warms the colors of a display in the evenings for potential sleep improvement.
Displays
189
Which of the Preference in System Preferences is for the following ______Settings for Wi-Fi management, TCP/IP, DNS, and other network settings. Also has auto-join settings for commonly accessed networks
Network
190
Which of the Preference in System Preferences is for the following ______Preferences for printers, print sharing, and scanning.
Printers & Scanners:
191
Which of the Preference in System Preferences is for the following ___Control over location services When enabled, the settings indicate which apps have used location services in the past 24 hours. Security services include firewall settings, FileVault (which automatically encrypts data on the disk), and password controls
Security and Privacy:
192
Users are not limited to one desktop for work. Several can be in use at one time, with workspaces running different applications These desktops can be navigated by swiping up with three or four fingers on the trackpad, using the Control key with the left or right arrows, or using Mission Control.
Multiple desktops:
193
Which of the Preference in System Preferences is for the following Settings to configure the Mac to adapt to the user’s vision, hearing, motor, and other requirements for ease of use.
Accessibility:
194
facilitates a display of all open windows, available desktops, and other settings. Among these settings is the capability to use hot corners, in which mousing over a chosen corner of the screen opens a shortcut to a preselected feature, such as the Launchpad or Quick Notes.
Mission Control:
195
This encrypted container on the Mac stores passwords, usernames, account numbers, and other private information. It provides security and ease when accessing sites that require authentication. __ works across platforms, so an update on a Mac updates the information in an iPhone on the same account.
Keychain
196
This is a highly intuitive search engine for documents, text references, and more. It does not reside on the desktop, but you can access it instantly by pressing Cmd+spacebar. __ can be configured to search up to 18 different topics and areas, such as apps, documents, music libraries, and definitions. It can also be configured to not search items in the privacy settings.
Spotlight
197
__is the Apple shared cloud storage product. For a monthly or annual fee, users can store documents and photos. __is not confined to Mac users; it is available to Windows and Linux users as well.
iCloud
198
This feature allows for an enhanced haptic- or touch-based mouse experience, with different configurable responses for swiping with one, two, or three fingers; using pinching motions; and so on. The __ are configured under the Track Pad settings in System Preferences.
Gestures
199
allows for disk and file management in macOS. It creates blank disk images that can be used as containers for other files, including image backups. It also erases non-macOS drives and prepares them for use with macOS. Repairing, restoring, and mounting disks is also possible. Partitioning can happen here, but since iOS 10.13, Apple File System (APFS) formatted volumes automatically adjust as needed
Disk Utility
200
The __tab enables and disables (with a password or biometric authentication) the automatic encryption of data on the computer
FileVault
201
macOS includes a powerful __app that opens a command-line environment. The macOS __utility is used to run commands, scripts, and programs without a GUI. __has its roots in a UNIX shell and can be used to manage other computers on a network.
Terminal
202
was designed to extend the power of the command shell, adding scripting functions and interoperability.
PowerShell
203
is an extremely lightweight but useful text editor in Linux. Type in the command then the file name. Cltr + G for help page , Cltr+ X for saving the file.
nano
204
this command helps archive, compress, and extract archived files.
tar
205
A _____backs up the entire contents of the computer or selected drive to another local or network location. A backup program can create a compressed file to store backed-up information. With this type of backup, the backup program must run a restore utility to make the files usable again.
full backup
206
In Linux ,this command is to view the contents of a file.
cat
207
This command provides useful information on DNS servers for troubleshooting DNS issues.
dig
208
This command is used to find files and directories and information about them. You can search by name, date, owners, and so on.
find
209
This command provides summary information on resource use for tasks and processes in the form of a dashboard. It can also be used to monitor CPU and memory usage.
top
210
Use pid = 14 To kill a process, you'd use the SIGKILL signal.
kill -kill 14
211
Use PID = 14 To stop or suspend a running process, you'd send the SIGTSTP signal.
kill -TSTP 14
212
To list processes owned by all users:
ps aux
213
To list processes of the current user:
ps
214
The command stands for process status and displays the process table so that you can identify process IDs for currently running processes. (Once you know the process ID, you can use the kill command to terminate a process.)
ps
215
An open source software that enables Linux machines to work in a Windows environment.
Samba
216
It bridges the gap between Linux and Windows. It allows SMB to work inside of the Linux OS.It means that Linux can share files and print to Windows.It also allows you to integrate with Active Directory. ____can turn your Linux server into Windows Server.
Samba
217
Remote Desktop Protocol (RDP) TCP Port :
TCP 3389
218
Windows 10 built in Remote Desktop Connection program called
RDP
219
Search for a specific pattern in a file or in multiple files.
GREP
220
This command is used to manage network interfaces. It can bring up the network interfaces or shut them down, manage IP addresses, and look at routing and ARP tables.
ip
221
This command is normally used to display the amount of space available on the file system. It lists all block devices with the available space on them. Use the -h option to display file sizes in human readable format.
df
222
Change ownership of a file or directory
chown
223
An open-source utility that provides for automatic updates and package management in Linux. Different distributions of Linux use distinct package managers.
yum
224
recursive copy over the directory to get all the contents.
cp -r
225
Remove or delete the file or files that are specified:
rm
226
Move a file or rename it, if the source and destination are the same
mv
227
It copies the file
cp
228
list the directories
ls
229
it shows the name of the current or present working dir
pwd
230
elevates a user's permissions to administrator or root. Commands that change system configuration require elevated privilege.
sudo