Chapter 13 Flashcards Preview

CompTIA A+ > Chapter 13 > Flashcards

Flashcards in Chapter 13 Deck (77):
1

(UCS) stands for what? p613

Unicode Character Set

2

This applet is used when you want to configure the browser environment and such things as the programs used to work with files found online. p613

Internet Options Applet

3

From within this one relatively innocuous panel you can make a large number of configuration changes to a Windows machine. p615

System Control Applet

4

What are some of the system control applets options that are available to use in this applet. p615

General
Network Identification
Device Manager
Hardware
Hardware Profiles
User Profiles
Environment Variables
Startup and Recovery
Performance
System Restore
Automatic Updates
Remote
Computer Name
Advanced

5

Gives you an overview of the system such as OS version registration information basic hardware levels (processor and RAM) and the service pack level that's installed if any. p616

General tab

6

This tab is used to define whether the machine is in a workgroup or a domain environment. p616

Computer Name

7

Loosely associated computers each of which is its own security authority that share a common workgroup name.p616

Workgroup

8

A group of computers that is tightly connected or associated and share a common domain name. Has a single authority (called a domain controller) that manages security for all the computers. p616

Domain

9

This tab includes a number of tools, all of which allow you to change how the hardware on your machine is used. p616

Hardware

10

To minimize the risks involved with adding third-party software to your machine Microsoft came up with a technique called what? p616

Driver Signing

11

Has three subheading, each of which can be configured separately. They're not identical in windows versions, however and this could also be called Etc. tab. p617

Advanced

12

The tab you can find in Advance tab is? p 617

Performance
Environment Variables
User Profiles
Startup and Recovery

13

Environment Variables There are two types of environment variables, and you can access either one by clicking the Environment Variables button: p 618

User Variables: Specify settings that are specific to an individual user and do not affect others who log on to the machine. System Variables: Set for all users on the machine. System variables are used to provide information needed by the system when running applications or performing system tasks

14

System and user variables were extremely important in the early days of what? p618

DOS and Windows

15

This profile contains information about their settings and preferences. p618

User Profiles

16

In the user profile you will be given three options what are the opions. p618

Delete
Change Type
Copy To

17

Removes the user’s profile entirely. When that user logs on again, they will be given a fresh profile taken from the system default. p618

Delete

18

Allows you to configure a profile as local (the default) or roaming. If a user works at two machines, each machine will use a different profile. p618

Change Type

19

Copies a profile from one user to another. Often the source profile is a template set up to provide a standard configuration. p618

Copy To

20

When it’s enabled on one or more drives, the operating system monitors the changes you make on your drives. From time to time it creates what is called a restore point. Then, if you have a system crash, it can restore your data back to the restore point. p619

System Protection/System Restore

21

lets you enable or disable Remote Assistance and Remote Desktop. p619

Remote

22

Windows lets you configure how you want to handle updating the OS. You can specify that you want to automatically download updates or notify the user when updates are available (but not automatically install them), or you can turn off the feature. p620

Automatic Updates (Windows XP Only)

23

knows as Action Center in Windows 7 (WSCUI.CPL) is used to manage the firewall, automatic updates, and virus protection. From here, you can manage settings for Internet options as well and see any maintenance or troubleshooting issues that you need to attend to.
p620

The Security Center Applet

24

can be used to manage the firewall included with the operating system. Figure 13.5 shows the interface for Windows 7. p620

The Windows Firewall Applet

25

allows you to configure a power plan dictating when devices, namely the display and the computer, will to turn off or be put to sleep. p620

The Power Options Applet

26

(MS-DOS) stands for what? p620

Microsoft Disk Operating System (MS-DOS) was never meant to be extremely user friendly. Its roots are in CP/M, which in turn has its roots in UNIX. Both of these older OSs are command line based, and so is MS-DOS.

27

A number of diagnostic utilities are often run at the command prompt, and they can be broken into two categories: p621

networking and operating system

28

The networking command-line tools you are expected to know for this exam are? p621

PING, TRACERT, NETSTAT, IPCONFIG, NET, NSLOOKUP, and NBTSTAT

29

is one of the most useful commands in the TCP/IP protocol. It sends a series of packets to another system, which in turn sends back a response. This utility can be extremely useful for troubleshooting problems with remote hosts. p622

PING command

30

is a command-line utility that enables you to verify the route to a remote host. p623

TRACERT Command

31

is used to check out the inbound and outbound TCP/IP connections on your machine. It can also be used to view packet statistics, such as how many packets have been sent and received and the number of errors. p623

NETSTAT Command

32

With Windows-based operating systems, you can determine the network settings on the client’s network interface cards, as well as any that a DHCP server has leased to your computer, by typing the following at a command prompt: ipconfig /all. p625

IPCONFIG Command

33

You can conduct this test by typing the following sequence of commands from the DHCP client at a command prompt: p625

ipconfig /release ipconfig /renew

34

is one of the first tools to use when experiencing problems accessing resources because it will show you whether an address has been issued to the machine. p625

IPCONFIG

35

(APIPA) stands for what? p625

Automatic Private IP Addressing (APIPA) which will prevent the network card from communicating outside its subnet, if not altogether.

36

the capabilities of it differ based on whether it is server or workstation based and the version of the operating system. p629

NET Command

37

a command-line utility that enables you to verify entries on a DNS server. p631

NSLOOKUP Command

38

You can use the NSLOOKUP command in two modes: p631

In( Interactive) mode, you start a session with the DNS server in which you can make several requests.
In (Noninteractive) mode, you specify a command that makes a single query of the DNS server.

39

a command-line utility that shows NetBIOS over TCP/IP information. p631

NBTSTAT Command

40

What are the OS Command-Line Tools: p631

TASKKILL, BOOTREC, SHUTDOWN, TASKLIST, MD, RD, CD, DEL, FDISK, FORMAT, COPY, XCOPY, ROBOCOPY, DISKPART, SFC, CHKDSK, and /?

41

is used to terminate processes. Those processes can be identified by either name or process ID number (PID). The process can exist on the machine where the administrator is sitting (the default) or on another machine, in which case you signify the other system by using the /S switch. p631

TASKKILL Command

42

can be run in Windows 7 or Windows Vista to interact with the Master Boot Record (MBR), boot sector, or Boot Configuration Data (BCD) store. It cannot be used with Windows XP because it uses a different boot structure. p632

BOOTREC Command

43

can be used to schedule a shutdown (complete or a restart) locally or remotely. A variety of reasons can be specified and announced to users for the shutdown. p632

SHUTDOWN Command

44

is used at the command line to see a list of all the running processes (and their process ID number), similar to what you see in the GUI by using Task Manager. By default, it shows the processes on the current machine, but the /S switch can be used to see the processes on a remote machine. /SVC will show the services hosted in each process and you can use /U if you need to run the command as another user (/P allows you to specify a password associated with that user).p632

TASKLIST Command

45

are used to change (or display), make, and remove directories, respectively. p632

CD/MD/RD Commands

46

used to delete files and directories at the command line. Wildcards can be used with it and ERASE performs the same operations. p634

DEL Command

47

used to be included with earlier operating systems to make disk partitioning possible. This command does not exist in Windows 7, Vista, or XP, having been replaced with DISKPART. p634

FDISK Command

48

s used to wipe data off disks and prepare them for new use. Before a hard disk can be formatted, it must have partitions created on it. p634

FORMAT Command

49

It makes a copy of a file in a second location. (To copy a file and then remove it from its original location, use the MOVE command.) p635

COPY Command

50

It’s basically an extension of COPY with one notable exception—it’s designed to copy directories as well as files.p635

XCOPY Command

51

is included with Windows 7 and has the big advantage of being able to accept a plethora of specifications and keep NTFS permissions intact in its operations. p636

ROBOCOPY Command

52

shows the partitions and lets you manage them on the computer’s hard drives. p636

DISKPART Command

53

a command-line-based utility that checks and verifies the versions of system files on your computer. If system files are corrupted, the SFC will replace the corrupted files with correct versions. p636

SFC Command

54

can also correct file system problems (such as cross-linked files) and scan for and attempt to repair disk errors. p638

CHKDSK Command

55

Actually, if you just type HELP and press Enter, your computer gives you a list of system commands you can type. p638

/? Command

56

This centralized database contains environmental settings for various Windows programs. It also contains registration information that details which types of filename extensions are associated with which applications. p639

Registry

57

The Registry is broken down into a series of separate areas called what? p639

Hives

58

The basic hives of the Registry are: p639

HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CURRENT_USER
HKEY_CURRENT_CONFIG

59

(ASR) stands for what? p641

Automated System Recovery (ASR) which is accessible through the Backup utility, can be used as a last-resort option for system recovery in Windows XP. Both Windows Vista and Windows 7 use the WinRE recovery environment to do a Complete PC Restore to achieve the same goal.

60

Virtual memory uses what’s called? p641

swap file, or paging file

61

actually hard drive space into which idle pieces of programs are placed while other active parts of programs are kept in or swapped into main memory. p641

swap file

62

If you make the swap file too small, the system can become what? 642

unbootable, or at least unstable

63

lets you shut down nonresponsive applications selectively in all Windows versions. p642

Task Manager

64

To get to Task Manager directly in any of the Windows versions that include it, you can press? p642

Ctrl+Shift+Esc

65

lets you see which tasks are open on the machine. You also see the status of each task, which can be either Running or Not Responding. p643

Applications

66

lets you see the names of all the processes running on the machine. You also see the user account that’s running each process as well as how much CPU and RAM resources each process is using. p643

Processes

67

The six priorities, from lowest to highest, for the process task manager: p643

Low
Below Normal
Normal
Above Normal
High
Realtime

68

For applications that need to complete sometime but that you don’t want interfering with other applications. On a numerical scale from 0 to 31, this equates to a base priority of 4. p643

Low

69

For applications that don’t need to drop all the way down to Low. This equates to a base priority of 6. p643

Below Normal

70

The default priority for most applications. This equates to a base priority of 8. p643

Normal

71

For applications that don’t need to boost all the way to High. This equates to a base priority of 10. p643

Above Normal

72

For applications that must complete soon, when you don’t want other applications to interfere with the applications’ performance. This equates to a base priority of 13. p643

High

73

For applications that must have the processor’s attention to handle time-critical tasks. Applications can be run at this priority only by a member of the Administrators group. This equates to a base priority of 24. p643

Realtime

74

Task Manager has at least five tabs: p642

Applications, Processes, Performance, Networking, and Users

75

interface as a front end in which you can run administrative tools. Many administrators don’t even know that applications they use regularly run within an MMC. p644

Microsoft Management Console (MMC)

76

can manage all the services running on a computer, in addition to a Device Manager that functions almost identically to the one that has existed since Windows 9x. It contains an Event Viewer to show any system errors and events as well as methods to configure the software components of all the computer’s hardware.p644

Computer Management

77

Computer Management, you will see all of the tools available. This is one power-packed interface, which includes the following system tools: p645

Device Manager = Lets you manage hardware devices.
Event Viewer = A link to the tool that allows you to view application error logs, security audit records, and system errors.
Shared Folders = Allows you to manage all of your computer’s shared folders.
Local Users And Groups = Allows you to create and manage local user and group accounts.
Performance Logs And Alerts = Shows you how your system hardware is performing, and alerts you if system performance goes under a threshold you set.