Chapter 6 Operating Systems Flashcards

1
Q

A key purpose of operating systems is to:

A

keep track of all the files that are used on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A file system describes:

A

how data and drives are organized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Windows the file system you choose for a hard drive affects the following:

A

The rules for how large a logical drive (Drive letter) can be and whether the hard drive can be used as one big drive letter or several smaller drive letters or whether it must be multiple drive letters

The efficiency of data storage (the less waste space, the better)

The security of a system against tampering

Whether a drive can be accessed by more than one operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FAT32 was introduced in:

A

1995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FAT32 has the following characteristics:

A

It has a 32-bit file allocation table, which allows for 268,435,456 entries per drive. An entry can be a folder or an allocation unit used by a file

The root directory can be located anywhere on the drive and can have an unlimited number of entries, which is a big improvement over FAT

FAT32 uses an 8KB allocation unit size for drives as large as 16GB

The maximum logical partition size allowed is 2TB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The limitations of FAT32 are:

A

it can only support individual files up to 4GB in size

it can’t use file permissions

it doesn’t support journaling systems that can fix file corruption issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FAT32 is still used:

A

to format flash memory cards and USB flash drives for use in not only workstation but media players

smart TVs

printers

cameras

anything else that has a USB port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

exFAT is also known as:

A

FAT64 because it supports 64-bit addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

exFAT is a:

A

file system designed to enable mobile personal storage media to be used seamlessly on mobile and desktop computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

exFAT is designed to be:

A

as simple as FAT32 but with many improvements in capacity and scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

exFAT’s main features include:

A

It supports volumes larger than 32GB

The recommended and maximum file sizes increase to 512TB and 64ZB respectively

Improvements in file system structure enable better performance with flash media and for movie recording

It supports Universal Time Coordinate (UTC) date stamps

exFAT support is included in Windows 7,8/8.1, and 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Operating systems can be classified as either:

A

open source

closed source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

open source refers to:

A

software that is effectively free to download and modify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

closed source refers to:

A

software that cannot be modified without express permission and licensing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Other terms used to describe closed source software are:

A

vendor specific

proprietary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

vendor specific means:

A

only one company has access to the source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

proprietary means:

A

the software is owned and patented and can only be used with permission and usually by paying a licensing fee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disk Operating Systems (DOS) is a:

A

command line OS, which means commands are entered as strings of text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Graphical User Interface (GUI) allows:

A

commands to be entered with the click of a mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

macOS was released in:

A

2016

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

macOS was designed to:

A

integrate with devices using the iOS operating system, such as the iPhone, Apple TV, and Apple Watch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Linux was derived from:

A

the UNIX operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Linux is named after:

A

Linus Torvalds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Linux was developed in:

A

1991

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What do companies like Red Hat do?
They modify Linux source code and then charge individuals and organizations to support the modifications
26
Linux is available as:
command line distros or GUI distros
27
Smartphones are typically either:
Android iOS Windows Mobile
28
Some differences between Android and iOS smartphones include:
Operating system updates are provided by the wireless carrier for Android phones Wireless carriers provide network-specific updates for iPhones (iOS), but Apple provides OS updates
29
Android's OS is based on:
Linux kernel
30
Google also commissioned the:
Android Open Source Project (AOSP), whose mission is to maintain and further develop Android
31
iOS OS is based on:
macOS, and therefore has its roots in UNIX
32
Chrome OS is based on:
Linux and is installed on Chromebooks
33
Feature Comparisons for Windows 10, 8.1, 8, 7 BranchCache
Yes, Yes, Yes, Yes
34
Feature Comparisons for Windows 10, 8.1, 8, 7 Media Center
No, Yes, Yes, Yes
35
Feature Comparisons for Windows 10, 8.1, 8, 7 EFS
Yes, Yes, Yes, Yes
36
Feature Comparisons for Windows 10, 8.1, 8, 7 Windows Aero
No, No, No, Yes
37
Feature Comparisons for Windows 10, 8.1, 8, 7 Sidebar
No, No, No, No
38
Feature Comparisons for Windows 10, 8.1, 8, 7 Gadgets
No, No, No, Yes
39
Feature Comparisons for Windows 10, 8.1, 8, 7 Start menu
No, No, No, Yes
40
Feature Comparisons for Windows 10, 8.1, 8, 7 Start screen
Yes, Yes, Yes, Yes
41
Feature Comparisons for Windows 10, 8.1, 8, 7 Pinning apps and files
Yes, Yes, Yes, Yes
42
Feature Comparisons for Windows 10, 8.1, 8, 7 Charms
No, Yes, Yes, No
43
Feature Comparisons for Windows 10, 8.1, 8, 7 Multi-monitor task bars
Yes, Yes, Yes, No
44
Feature Comparisons for Windows 10, 8.1, 8, 7 Live sign-in (Microsoft accounts for OneDrive, Office 365, and other subscriptions)
Feature Comparisons for Windows 10, 8.1, 8, 7 Yes, Yes, Yes, No
45
Feature Comparisons for Windows 10, 8.1, 8, 7 Local account
Yes, Yes, Yes, Yes
46
Feature Comparisons for Windows 10, 8.1, 8, 7 User Account Control
Yes, Yes, Yes, Yes
47
Feature Comparisons for Windows 10, 8.1, 8, 7 Defender antivirus (Microsoft Security Essentials in 7)
Yes, Yes, Yes, Yes
48
Feature Comparisons for Windows 10, 8.1, 8, 7 BitLocker full disk encryption
Yes, Yes, Yes, Yes
49
Feature Comparisons for Windows 10, 8.1, 8, 7 Windows Firewall (Windows Defender in 10)
Yes, Yes, Yes, Yes
50
Feature Comparisons for Windows 10, 8.1, 8, 7 Action Center
Yes, Yes, Yes, Yes
51
Feature Comparisons for Windows 10, 8.1, 8, 7 Security Center Service
Yes, No, No, No
52
Feature Comparisons for Windows 10, 8.1, 8, 7 Control Panel
Yes, Yes, Yes, Yes
53
Feature Comparisons for Windows 10, 8.1, 8, 7 Administrative Tools
Yes, Yes, Yes, Yes
54
Feature Comparisons for Windows 10, 8.1, 8, 7 Settings
Yes, Yes, Yes, No
55
Feature Comparisons for Windows 10, 8.1, 8, 7 PowerShell
Yes, Yes, Yes, Yes
56
Feature Comparisons for Windows 10, 8.1, 8, 7 Event Viewer
Yes, Yes, Yes, Yes
57
Feature Comparisons for Windows 10, 8.1, 8, 7 Image Backup
Yes, Yes, Yes, Yes
58
Feature Comparisons for Windows 10, 8.1, 8, 7 File Backup
Yes, Yes, Yes, Yes
59
Feature Comparisons for Windows 10, 8.1, 8, 7 Shadow Copy
Yes, No, No, Yes
60
Feature Comparisons for Windows 10, 8.1, 8, 7 System Restore
Yes, Yes, Yes, Yes
61
Feature Comparisons for Windows 10, 8.1, 8, 7 Refresh and Reset (Refresh only in 10)
Yes, Yes, Yes, No
62
Feature Comparisons for Windows 10, 8.1, 8, 7 OneDrive (formerly SkyDrive)
Yes, Yes, Yes, Yes
63
Feature Comparisons for Windows 10, 8.1, 8, 7 ReadyBoost flash memory disk caching
Yes, Yes, Yes, Yes
64
Feature Comparisons for Windows 10, 8.1, 8, 7 Compatibility mode
Yes, Yes, Yes, Yes
65
Feature Comparisons for Windows 10, 8.1, 8, 7 Virtual XP mode
No, No, No, Yes
66
Feature Comparisons for Windows 10, 8.1, 8, 7 Side-by-side apps
Yes, Yes, Yes, No
67
Feature Comparisons for Windows 10, 8.1, 8, 7 Windows Easy Transfer
No, No, Yes, Yes
68
Feature Comparisons for Windows 10, 8.1, 8, 7 Windows (App) Store
Yes, Yes, Yes, No
69
BitLocker is a:
data encryption utility that encrypts hard drives for added security
70
BitLocker To Go encrypts:
removable disks and USB drives
71
Encrypting File System (EFS) has the capability of:
encrypting individual files
72
BranchCache is software designed to:
allow efficient use of bandwidth for remote clients and offices
73
BranchCache caches:
the most commonly requested data on a client computer so that bandwidth is not wasted on repetitive data requests
74
The boot process involves:
loading the necessary OS files into RAM so the computer becomes functional
75
The OS can be stored on:
the local hard drive CD/DVD an external USB or eSATA drive another computer on the network
76
What is the BIOS/UEFI's Boot Order settings used for?
To tell the computer where to go to find the OS files
77
When booting, the PC looks in the:
preferred place for files and loads them into RAM, and the computer then becomes operational
78
There are many methods to boot a system during the installation process:
Optical disc (CD-ROM/DVD/Blu-ray) Network/PXE boot (Preboot Execution Environment USB/eSATA boot (booting from USB thumb drive) Internal hard drive (HDD/SSD) Partition on the internal hard disk drive or SSD
79
The Microsoft Deployment Toolkit (MDT) is used for:
automated installation of Windows 7, 8.1, 10 and Windows Server 2008 R2 and newer versions
80
The Microsoft Deployment Toolkit (MDT) does what?
It creates and updates the Unattend.xml file (used to provide answers during the process) automatically during the deployment
81
How do you perform an in-place upgrade installation of Windows?
Start the installation process from within the existing version of Windows
82
In-place upgrades do not:
delete previous installations, which means the user can retain apps and settings as well as personal files
83
You can upgrade an OS only to:
the equivalent or better edition of Windows but not a lower edition
84
Before starting a clean install process check the following:
Make sure the drive for installation is placed before the hard drive in the boot sequence If you will be installing to drive that might require additional drivers (SATA, RAID, or third-party host adapters on the motherboard or in an expansion slot), have the drivers available on any type of removable media supported by the system If you are installing from optical media, from a disk image (ISO or VXD), or within a virtual machine (VM), after restarting the system with the CD or DVD media or image file in place, press a key when prompted to boot
85
During the installation process, be prepared to confirm, enter, select, or provide the following settings, information, media, or options when prompted:
Custom installation Edition of Windows you are installing Location (home, work/office, or public) Network settings Partition location, partition type, and file system Password and password hint Product key Time, date, language, and region Time zone, time, and date Username and company name Workgroup or domain name
86
A multiboot installation of Windows enables a choice between:
two or more operating systems when you start your computer
87
To use the multiboot support that is built in to Windows, follow these rules:
Install the oldest version of Windows first Install Windows on a separate disk partition from the previous operating systems and prepare that partition as a primary partition To install multiple editions of Windows for multibooting, ensure that each installation is on its own primary partition The Windows multiboot support does not cover non-Windows OS such as Linux
88
If a Windows OS installation becomes corrupt, use a:
repair installation to restore working files and Registry entries without losing existing programs or information
89
To perform a repair installation of Windows 10 with a USB flash drive (which needs to be created before you start this process), follow these steps:
1. Boot the computer normally and sign into the Administrator account 2. Insert the flash drive and run setup.exe to start the setup 3. When prompted, download and install updates 4. Accept the end-user licensing agreement. The updates begin 5. When the updates are ready, click Install when prompted 6. Choose the keep personal files if that is the preference 7. Let the Windows 10 Setup process run and repair Windows The remainder of the installation proceeds as with a normal installation
90
A remote network installation (which involves installing Windows from a network drive) begins by:
starting the computer with a network client and logging on to the server to start the process
91
Why would you use Windows Deployment Services?
to automate the remote network installation process
92
An image deployment is the:
process of installing Windows from a disk image of another installation
93
The image deployment process is also known as:
disk cloning
94
If deploying a disk image to multiple computers, rather than as a backup of a single computer, consider these special issues:
Hardware differences Same security identifier
95
To overcome disk image deployment issues use:
cloning programs designed to capture an image that can be deployed to different types of computers with different hardware and software
96
For Windows 10, use the System Preparation Tool (Sysprep) to:
prepare the image for installation over many computers
97
If you select Generalize in Sysprep, Windows:
removes unique PC information, including the SID. When the install completes and the computer is restarted, a new SID is generated
98
All cloning tools can work with:
a target drive that is the same size or larger than the original cloned system drive
99
Some cloning tools can work with:
a smaller drive
100
When is a recovery partition created?
When upgrading Windows or doing a clean install with Windows Setup
101
The recovery partition is:
a space that holds the Windows Recovery Environment (WinRE), which can repair some common boot errors
102
Windows Recovery Environment (WinRE) is built into:
Windows 10 versions of desktop editions
103
A hard drive cannot be used until it is prepared for use. There are two steps involved in preparing a hard drive:
1. Create partitions | 2. Format partitions (and assign drive letters)
104
A disk partition is a logical structure on a hard drive that specifies the following:
Whether the drive can be bootable How many drive letters (one, two, or more) the hard drive will contain Whether any of the hard drive's capacity will be reserved for a future operating system or another use
105
Every hard drive must go through a:
partitioning process, even if you want to use the entire hard drive as a single drive letter
106
All versions of Windows support two or major types of disk partitions:
Primary partition Extended partition
107
A primary partition can contain only:
a single drive letter and can be made active (bootable)
108
Only one primary partition can be:
active
109
Only one primary partition is needed on a drive that contains:
a single OS
110
If installing a new OS in a multiboot configuration with your current OS, install:
the new OS to a different disk partition than is used for the previous Windows version
111
If using a non-Windows OS along with your current OS, it should be:
installed into its own primary partition
112
A drive partitioned using GPT can have up to:
128 primary partitions
113
an extended partitions differs from a primary partition in two important ways:
An extended partition doesn't get a drive letter but can contain one or more logical drives, each of which is assigned a drive letter Neither an extended partition nor any drive it contains can be bootable
114
Only one extended partition can be:
stored on each physical drive
115
Extended partitions are used only with:
Master Boot Record (MBR) drives
116
Master Boot Record (MBR) partitions are supported by:
classic ROM BIOS UEFI firmware
117
Master Boot Record (MBR) supports:
a maximum drive size of 2TB and up to four primary partitions
118
A GUID Partition Table (GPT) supports:
drives up to 256TB and up to 128 primary partitions
119
GUID Partition Table (GPT) is more reliable than Master Boot Record (MBR) because:
it protects the partition table with replication and cyclic redundancy check (CRC) of the partition table's contents
120
GUID Partition Table (GPT) provides:
a standard way for system vendors to create additional partitions
121
GUID Partition Table (GPT) are supported by:
UEFI firmware
122
If a drive will be used by a single OS using a Master Boot Record (MBR) partition table, one of these three ways of partitioning the drive will be used:
Primary partition occupies 100% of the physical drive's capacity Primary partition occupies a portion of the physical drive's capacity, and the remainder of the drive is occupied by an extended partition Extended partition occupies 100% of the physical drive's capacity
123
Primary partition occupying 100% of the physical drive's capacity is suitable for:
the only drive in a system or an additional drive that can be used to boot a system but should not be used for additional drives in a system that will be used for data storage
124
Primary partition occupying a portion of the physical drive's capacity, and the remainder of the drive is occupying an extended partition is a common setup for:
laptop but requires the partitioning process to be performed with different settings than the defaults
125
Extended partition occupying 100% of the physical drive's capacity is suitable for:
additional hard drives in a system (not the first drive); an extended partition can contain only one logical drive or multiple logical drives
126
GPT partitioning creates:
one or more primary partitions
127
Windows Disk Management supports two types of disks:
basic dynamic
128
A dynamic disk is:
more versatile than a basic disk because it can span two physical drives into a single logical drive, create striped or mirrored arrays, and adjust the size of a partition
129
Only basic disks can be:
bootable
130
When installing Windows 7/8/8.1/10 to an empty hard drive, there is a prompt for:
a location
131
To use all the space in the disk for creating partitions, make sure that:
the desired disk and partition is highlighted and click Next
132
To use only part of the space in the disk for creating partitions, follow these steps:
click Drive Options (Advanced) click New specify the partition size, and click Apply
133
A file system determines:
how data and drives are organized, but it is also general term for how an OS stores various types of files
134
The New Technology File System (NTFS) is the:
native file system of Windows 7/8/8.1/10
135
The New Technology File System (NTFS) has many differences from FAT32, including:
Access control Built-in compression Individual Recycle Bins Support for Encrypting File System (EFS) Support for mounting a drive Disk quota support Hot-swapping Indexing
136
Follow these steps to determine what file system was used to prepare a Windows hard drive:
1. Open Windows Explorer or File Explorer | 2. Right-click the drive letter in the Explorer window and select Properties
137
During installation, Windows 7/8/8.1/10 automatically:
formats the partitions created by the partition process with NTFS
138
System Type Full Name; Details exFAT
Extended File Allocation Table; Microsoft file system used for flash drives larger than 32GB and files larger than 4GB
139
System Type Full Name; Details FAT32
File Allocation Table; Format for USB flash drives holding files smaller than 4GB, game consoles, and so on. Works with all OS
140
System Type Full Name; Details NTFS
New Technology File System; Windows default formatting for hard drives. Supports sharing and journaling
141
System Type Full Name; Details CDFS
Compact Disc File System; Windows legacy format for CDs for storage. Supported by Windows and Linux
142
System Type Full Name; Details NFS
Network File System; Works independently of the OS, allowing network user access. It appears local but is a common network drive. Open source
143
System Type Full Name; Details ext3
Third Extended File System; Linux version of NTFS. Allows journaling of changes to minimize damage if crash occurs. Supports a maximum of 32,000 subdirectories
144
System Type Full Name; Details ext4
Fourth extended file system; Linux. Supports larger file sizes than ext3. Can disable journaling. Supports a maximum of 64,000 subdirectories
145
System Type Full Name; Details HFS
Hierarchical File System; Used like NTFS on macOS
146
System Type Full Name; Details HFS Plus
Extended Hierarchical File System; Used like NTFS on macOS Lion and later. Improves HFS security, size, and other features
147
When should you use an Optical disc (CD-ROM/DVD/Blu-ray) to boot a system during the installation process?
to install Windows to one or more systems that have working network connections
148
When should you use a USB/eSATA boot (booting from USB thumb drive) to boot a system during the installation process?
when installing from a DVD isn't feasible
149
Windows can be installed in a variety of ways. The most common methods are:
As an in-place upgrade to an existing version As a clean install to an empty hard drive or to the same partition as the current version As a multi-boot, which means installing to unused disk space (a new partition) to enable a choice between the current version and the new version, as needed) As a repair installation to fix problems with the current installation With the recovery partition (which resets the system to its original installed state) Refresh and Reset in Windows 8/8.1
150
Large-scale or customized installations might use the following methods:
Unattended installation Remote network installation Image deployment
151
In an attended installation:
information must be provided at various points during the process
152
In an unattended installation:
you must create the appropriate type of answer file for the installation type
153
A swap partition is:
disk space partitioned to be available in case extra RAM is needed
154
A swap partition feature is called what in Windows?
virtual memory
155
A swap partition feature is called what in Linux?
swap space
156
A swap partition can not be used for:
storage
157
With new hard drives or existing drives that are known to be error free, you can use the quick format option to:
quickly clear the arears of the hard drive that store data location records
158
With the full format option, Windows must:
rewrite the disk structures across the entire disk surface.
159
If Windows does not detect hard drives during installation, an:
alternative third-party driver must be provided
160
The most likely situations in which Windows does not detect hard drives during installation are when:
third-party SATA or RAID onboard or add-on card host adapters are used in Windows 7/8/8.1/10
161
In Windows 7/8/8.1/10, device drivers are:
added using the same screen that is used for partitioning and clicking Load Driver
162
Device drivers can be installed from:
CD DVD USB flash drive
163
During the installation process, Windows can connect to either a:
workgroup (the default setting) network managed by a domain controller
164
Domain controllers are typically used in:
large networks at workplaces or schools
165
What networks use workgroups?
Home networks small-office networks computers running Windows 7 or newer might also belong to one
166
For individual PCs, the easiest way to perform updates is to:
set up Windows Update for automatic updates
167
What is a factory recovery partition?
a disk partition containing a special recovery image of the Windows installation is provided
168
Typically, there are limited choices for restoring a damaged installation with a recovery disc or recovery files on a disk partition. Typical options include:
Reformatting the hard drive and restoring it to just-shipped condition (which causes the loss of all data and programs installed after the system was first used Reinstalling Windows only Reinstalling support files or additional software
169
The following list is a summary of the current requirements for Windows 10:
Processor: 1GHz or faster processor or System on a Chip (SoC) RAM: 1GB for 32-bit OS or 2GB for 64-bit OS Hard drive space: 16GB for 32-bit OS or 32GB for 64-bit OS Graphic Card: DirectX 9 or later with WDDM 1.0 driver Display: 800x600 Internet Connection: Internet connectivity to perform updates and to take advantage of some features
170
The Hardware Compatibility List (HCL) provides:
information about manufactures and drivers that can be used with Windows
171
Although most computer users don't use the command prompt often, technicians use it to:
Recover data from systems that can't boot normally Reinstall lost or corrupted system files Print file listings (which can't be done in Windows Explorer, File Explorer, This PC, or Computer) Copy, move, and delete data Display or configure certain OS settings
172
Most command prompt commands can be run with:
standard privileges
173
Some command prompt commands can be run only with:
administrative privileges
174
Administrative privileges are also known as:
elevated mode administrative mode
175
Command Prompt Commands Use DIR
Displays list of the current folder's files and subfolders
176
Command Prompt Commands Use CD (CHDIR)
Changes the working directory
177
Command Prompt Commands Use CD ..
Navigates to the previous directory
178
Command Prompt Commands Use IPCONFIG
Displays TCP/IP network information on the device
179
Command Prompt Commands Use PING
Sends IP packets to check network connectivity
180
Command Prompt Commands Use TRACERT
Similar to ping but returns path information to an IP address destination; similar to the traceroute command in macOS and Linux
181
Command Prompt Commands Use NETSTAT
Displays a list of active TCP connections on a local network
182
Command Prompt Commands Use NSLOOKUP
Gather's the network's Domain Name System (DNS) information
183
Command Prompt Commands Use SHUTDOWN
Shuts down the computer
184
Command Prompt Commands Use DISM
Services images; stands for Deployment Image Servicing and Management
185
Command Prompt Commands Use SFC
Scans system files and replaces damaged or missing files must run in elevated mode
186
Command Prompt Commands Use CHKDSK
Scans specified drive for errors and repairs them must run in elevated mode
187
Command Prompt Commands Use DISKPART
Creates, removes, and manages disk partitions must run in elevated mode
188
Command Prompt Commands Use TASKKILL
Stops specified task(s) on a local or remote computer
189
Command Prompt Commands Use GPUPDATE
Refreshes group policy on local or Active Directory systems
190
Command Prompt Commands Use GPRESULT
Displays the resultant set of policy for the specified computer and user
191
Command Prompt Commands Use FORMAT
Creates or re-creates the specified file system on recordable or rewritable storage (magnetic, flash, or optical media) and overwrites the contents of the drive
192
Command Prompt Commands Use COPY
Copies one or more files to another folder or drive
193
Command Prompt Commands Use XCOPY
Copies one or more files and folders to another folder or drive
194
Command Prompt Commands Use ROBOCOPY
Copies one or more files and folders; can be configured via various optional GUIs
195
Command Prompt Commands Use NET USE
Connects to shared folders; similar to mapping a network drive
196
Command Prompt Commands Use NET USER
Manages user accounts (add, remove, change)
197
Command Prompt Commands Use [Command]/?
Displays help for the specified command
198
If FORMAT is used on a hard disk by mistake:
third-party data recovery programs can be used to retrieve data from the drive. This is possible because most of the disk surface is not changed by FORMAT when a quick format option is selected
199
What does FORMAT F: /Q do?
it performs a quick format on drive F
200
To see the additional options for FORMAT, use:
FORMAT /?
201
The number of clusters on a volume for FAT is:
<=65,526
202
The number of clusters on a volume for FAT32 is:
65,526< Number of clusters< 4,177,918
203
FORMAT immediately stops processing if:
it decides that the preceding requirements cannot be met using the specified cluster size
204
NTFS compression is not supported for:
allocation unit sizes above 4,096
205
The folder specified by COPY must:
already exist on the target drive
206
COPY does not work with:
files that have the system or hidden file attributes; to copy these files, use XCOPY or ROBOCOPY instead
207
What does COPY *.* F do?
copies all files in the current folder to the current folder on the F: drive
208
What does COPY *.TXT C:Users/Username do?
copies all .txt files in the current folder to the Username folder on the C:drive
209
What does COPY C:\WINDOWS\TEMP\*BAK do?
copies all *.bak files in the \WindowTemp folder on drive C: to the current folder
210
What does COPY C:\WINDOW*BMP D do?
copies all .bmp files in the \Windows folder on drive C: to the current folder on drive D:
211
The XCOPY command can be used in place of COPY in most cases and has the following advantages:
Provides faster operation on a group of files Creates folders as needed Operates as backup utility Copies files changed or created on or after a specified date
212
XCOPY can be used to "clone":
an entire drive's contents to another drive
213
ROBOCOPY has several advantages over XCOPY, including the capability to:
tolerate pauses in network connections mirror the contents of the source and destination folders by removing all files as well as copying files perform multi-threaded copies for faster copying on multicore PCs log copy processes list or copy files matching specified criteria including minimum file size
214
To copy files in sourcefolder that are at least 16MB (16,777,216) in size to targetfolder write this syntax:
ROBOCOPY C:/SOURCEFOLDER D:\TARGETFOLDER /MIN:16777216
215
System File Checker (SFC) is a:
Windows utility that checks protected system files and replaces incorrect versions or missing files with the correct files
216
System File Checker (SFC) check files such as:
.dll files .sys files .ocx files .exe files font files used by the Windows desktop
217
Use System File Checker (SFC) to:
fix problems with Internet Explorer or other built-in Windows programs caused by the installation of obsolete Windows system files, user error, deliberate erasure, virus or Trojan horse infections, and similar problems
218
What does CHKDSK /F do?
scans for and fixes errors on the current drive
219
What does CHKDSK F: /F do?
scans for and fixes errors on drive F:
220
If CHKDSK /F is run on the system drive, the following message appears:
The type of the file system is NTFS Cannot lock current drive Chkdsk cannot run becuase the volume is in use by another process. Would you like to schedule this volume to be checked the next time the system restarts? (Y/N)
221
What does GPRESULT /R do?
displays summary data
222
What does GPRESULT /H GPReport.html do?
saves report as GPReport.html
223
What does GPRESULT /USER targetname /V do?
provides verbose information for the specified username
224
The following tools are administrative tools but are found under Computer Management (Windows 10):
Device Manager Local Users and Groups Data Sources User Account Management
225
To start any administrative tools, follow these steps:
1. Open Control Panel 2. Open the System and Security category 3. Click or tap Administrative Tools 4. Click or tap the tool you want to use
226
Microsoft Management Console (MMC) is a:
blank console that uses various snap-in console windows
227
Microsoft Management Console (MMC) saves:
the consoles you snap in and remembers the last place you were working which makes it a valuable and time-saving tool
228
Load Security Policy is a:
Microsoft Management Console (MMC) snap-in you can use to view and set security policies for the local system or a system on a workgroup network
229
The Windows Performance Monitor can be used for:
real-time performance monitoring or to record performance over time
230
Using Performance Monitor you can measure objects, including:
physical devices, such as the processor and memory software, such as protocols and services
231
Use the System Configuration utility (MSCONFIG.exe) to:
configure how Windows starts, to chooses startup programs and services, and to change the boot procedure
232
Windows uses Task Scheduler to:
run a task on a specified schedule
233
To create a basic task using Task Scheduler in Windows, follow this procedure:
1. Open Control Panel in Small Icons or Large Icons mode 2. Open the Administrative Tools folder 3. Double-click Task Scheduler 4. Click Create Basic Task in the Actions menu 5. Enter a name and a description for the task and click Next 6. Select an interval (for example, daily, weekly, monthly, one-time only, when my computer starts, when I log on, or when a specific event is logged) and click Next 7. Specify when to start the task and recurrence and whether to synchronize across time zones and then click Next 8. Specify to start a program (or send an email or display a message) and click Next 9. Select a program or script to run, add options (arguments), and specify where to start the program or script. Click Next 10. Review the settings for the task and click Finish
234
The ODBC Data Source Administrator is used to:
list and mange data sources and drivers
235
Data sources are listed by:
user system file
236
Data Source Administrator lists:
drivers
237
Data Source Administrator provides:
options for tracing and pooling data sources
238
Print Management is:
a utility for managing printers connected to the computer or on a network
239
The Windows Memory Diagnostics tool tests:
system and cache memory before the Windows desktop is loaded
240
Windows Firewall can:
block unwanted traffic going into or out of the computer
241
The Even Viewer allows:
an administrator to track and log event logins, security actions, crashes, and other events that have happened in the computer
242
A down-arrow icon on Device Manager indicates what?
a disabled device
243
An exclamation point in a yellow triangle indicates what?
a device that cannot run
244
Device properties tabs General
Displays device type, manufacturer, location, status, troubleshoot button and usage. Applies to all devices
245
Device properties tabs Properties
Displays device-specific settings. Applies to multimedia devices
246
Device properties tabs Driver
Displays technical details and version information. Applies to all devices
247
Device properties tabs Policies
Optimizes technical details about the device. Applies to USB, FireWire (IEEE 1394), and eSATA drives
248
Device properties tabs Resources
Displays hardware resources such as IRQ, DMA, memory, and I/O port address. Applies to I/O devices
249
Device properties tabs Volumes
Displays drive information such as status, type, and capacity. Click Populate to retrieve information. Applies to hard disk drives
250
Device properties tabs Power
Displays the power available per port. Applies to USB root hubs and generic hubs
251
Device properties tabs Power Management
Specifies device-specific power management settings. Applies to USB, network, keyboard, and mouse devices
252
When you have a malfunctioning device you have several options for resolving the problem:
Look up the Device Manage code to determine the problem and its solution Click the troubleshoot button (if any) shown on the device's General Properties tab; the buttons name and usage depend on the problem Manually change resources Manually update drivers
253
You can use Device Manage to disable a device that is conflicting with another device. To disable a device, follow these steps:
1. Click the + sign next to the device category containing the device 2. Double-click the device, click the Driver tab, and select Disable
254
To use Device Manager to remove a device, follow these steps:
1. Click the + sign next to the device category containing the device 2. Double-click the device and select Uninstall 3. Shut down the system and remove the physical device OR: 1. Double-click the device and select Properties 2. Click the Driver tab and click the Uninstall button 3. Shut down the system and remove the physical device
255
If a device malfunctions after a driver update, click:
the Roll Back Driver button on the Driver tab to return to the preceding driver version
256
To start MSCONFIG in Windows 7 follow these steps:
1. Click Start to open the Windows Desktop Search pane | 2. Type MSCONFIG and press Enter
257
To start MSCONFIG in Windows 8/8.1/10 follow these steps:
1. Press Windows+X 2. Click or tap Run 3. Type MSCONFIG and press Enter
258
The Task Manager utility provides:
a useful real-time look into the inner workings of Windows and the programs that are running
259
There are several ways to display Task Manager, including:
Right-click the taskbar and select Task Manager Press Ctrl+Shift+Esc Open the Run or Search box and type taskmgr Press Ctrl+Alt+Del and select Task Manager from the Windows Security dialog
260
The Windows 7 Task Manager includes the following tabs:
Applications Processes Performance Networking Users Services
261
The Windows 8/8.1 Task Manager includes the following tabs:
Processes Performance App history Startup Users Details Services
262
The Disk Management snap-in of the MMC is:
a GUI-based application for analyzing and configuring hard drives
263
You can use Disk Management to:
mount drives
264
A mounted drive is:
a drive that is mapped to an empty folder within a volume that has been formatted as NTFS
265
Instead of using drive letters, mounted drives use:
drive paths
266
Mounted drives provide:
more space for temporary files and can enable you to move folders to different drives if space runs low on the current drive.
267
To mount a drive, follow these steps:
1. Right-click the partition or volume you want to mount and select Change Drive Letters and Paths 2. In the displayed window, click Add 3. Click Mount in the following empty NTFS folder 4. Browse the empty folder to which you want to mount the volume and click OK 5. Click Next 6. Choose the appropriate drive partitioning settings and click Next 7. Review the settings and click Finish
268
When a new drive is connected, the OS may prompt to:
initialize it
269
A new simple volume can:
occupy a portion or all of the space on an unallocated disk
270
Follow these steps to create a new simple volume:
1. Right-click unallocated space on a drive (With a new drive, the entire drive is listed as unallocated) 2. Select New Simple Volume 3. Click Next 4. To use the entire space for a volume (drive letter), click Next 5. Select the drive letter to install and click Next 6. Specify the file system (NTFS is the default), the volume name, and whether to use a quick format or prepare the drive as compressed. Click Next 7. Review all options and click Finish
271
Windows enables you to extend the:
size of a partition (volume) with the Desk Management utility
272
When extending or shrinking the size of a partition it's highly recommended to:
back up your data before attempting this operation
273
When extending the size of a partition follow these steps:
1. Right-click the volume to be extended 2. Select Extend Volume 3. Click Next and select how much space you'd like to add to the partition 4. Click Finish at the summary screen (This process can also be done by using the DISKPART command)
274
To split a single partition into two or more using Disk Management, follow this procedure:
1. Shrink the existing partition to make room for an additional partition. If you are unable to shrink the partition sufficiently, back up some of the information in the partition and try again 2. Create one or more new partitions in the unallocated space created in step 1
275
To free up space on a drive in order to install another OS, it is possible to:
shrink the partition
276
To shrink the partition, follow these steps:
1. Right-click the volume to be shrunk 2. Select Shrink Volume 3. Select the amount of space you'd like to use the partition 4. Click Shrink (The free space created by this process is listed as unallocated)
277
If a volume was created without a drive letter being assigned, use:
Change Letters and Paths
278
Here's how to use Change Letters and Paths:
1. Right-click the partition or volume and select Change Drive Letters and Paths 2. In the window that appears, click Add 3. Make sure Assign the Following Drive Letter is selected. 4. Click OK. The drive is now referred to by the selected drive letter
279
To change the drive letter of a connected drive, follow this procedure:
1. Right-click the partition or volume to be changed and select Change Drive Letters and Paths 2. When the current drive letter assignment is shown, click Change 3. Use the pull-down menu to choose the preferred drive letter 4. Click OK 5. Click Yes to change the drive letter. The drive is now referred to by the selected drive letter
280
Although dynamic disks can't be used as boot disks, they can be used in the following types of drive arrays:
Spanned Striped Mirrored RAID 5
281
Describe Spanned Arrays:
The capacity of all disks is added together This is the equivalent to just a bunch of disks (JBOD) hardware array and requires at least two disks
282
Describe Striped Arrays:
Data is written across all drives to enhance speed This is equivalent to a RAID 0 hardware array and requires two disks
283
Describe Mirrored Arrays:
Copies of data are written to all disks at the same time to enhance data security If one drive fails, data is still safe, and the array can be rebuilt This is equivalent to a RAID 1 hardware array and requires two disks
284
Describe RAID 5 Arrays:
Data and recovery information is written across all disks to enable recovery if one disk in the array fails This is equivalent to RAID 5 hardware array and requires at least three disks
285
To create an array, follow these steps:
1. Make sure the disks to be used in the drive array have been backed up. Any disk in an array has its previous information overwritten 2. Right-click the first drive to add to the array and select the array type 3. Click Next to continue 4. Select the next drive to add to the array and click Add 5. If creating a RAID 5 array, repeat step 3 until the desired number of disks are added to the array 6. Click Next to continue 7. Assign a drive letter or mount point. Click Next 8. Select the option to format the volume and name it. Click Next 9. Review settings. Click Finish 10. Click Yes to convert the drives to dynamic disks (required for arrays). The array is created
286
Windows 8/8.1/10 include Storage Spaces, which provides:
a way to use multiple hard disks or SSDs for redundant storage
287
Storage Spaces can be used to:
expand storage by adding additional drives
288
Storage Spaces Overview Drive Requirement; Description Simple Configuration
Requires at least one drive The capacity of all drives is grouped together and used as a single logical drive. If any drive fails, all data is lost
289
Storage Spaces Overview Drive Requirement; Description Two-way mirror Configuration
Requires at least two drives Each drive has a copy of the information. If one drive fails, the mirror can be rebuilt from the surviving drive after a new drive is attached
290
Storage Spaces Overview Drive Requirement; Description Three-way mirror Configuration
Requires at least five drives The drive pool includes three copies of the data. If one or two drives fail, the mirror can be rebuilt from the surviving drive after new drives are attached
291
Storage Spaces Overview Drive Requirement; Description Parity Configuration
Requires at least three drives The pool is written with data and parity information. If a single drive fails, the surviving drives an rebuild the pool
292
To use Storage Spaces, follow these steps:
1. Open Search and search for Storage Spaces 2. Click or tap Storage Spaces 3. Click or tap Create a New Pool and Storage Space 4. Click Create Pool 5. When Storage Spaces displays a recommended layout, make any changes desired and then click or tap Create Storage Space
293
Windows includes a variety of command line utilities known as:
system utilities that are used for system management
294
System Utilities REGEDIT
Launches Registry Editor
295
System Utilities CMD
Opens the command prompt
296
System Utilities SERVICES.MSC
Shows Windows Services
297
System Utilities MMC
Starts Microsoft Management Console
298
System Utilities MSTSC
Remote Desktop Connection
299
System Utilities NOTEPAD
Opens the Notepad text editor/viewer
300
System Utilities EXPLORER
Starts Windows Explorer in 7 or File Explorer in 8/8.1/10
301
System Utilities MSINFO32
Starts Windows System Information
302
System Utilities DxDiag
Starts DirectX Diagnostic
303
System Utilities Disk Defragmenter/Optimizer
Used to increase performance (access speed) by rearranging files stored on a disk to occupy contiguous locations
304
System Utilities System Restore
Allows the PC to reset to a previous configuration
305
System Utilities MSCONFIG
Starts the System Configuration utility
306
Registry editing might be necessary under the following circumstances:
To view a system setting that cannot be viewed through other interfaces To add, modify (by changing values or data) or remove a Registry key that cannot be changed through normal Windows menus or application settings To back up the Registry to a file
307
Changes made using REGEDIT are:
automatically saved upon exit. However, it may be necessary to log off and log back on or restart the system for changes to take effect
308
Always back up the Registry before editing it. Follow these steps to back up part or all of the Registry to a text file:
1. Start REGEDIT 2. To make a partial backup, highlight the section of the Registry to be backed up 3. Click File and select Export 4. Select a location to store the Registry backup 5. Enter a name for the backup 6. Click All to back up the entire Registry. Click Selected Branch to back up only the Registry branch you select in step 2 7. Click Save
309
Microsoft uses MSTSC, better known as the Remote Desktop connection program to:
facilitate connections to remote computers and allow full remote control
310
MSTSC, better known as the Remote Desktop connection program works in three ways:
Users can be given limited access to a remote computer's applications Administrators can be given full access to a computer so that they can troubleshoot problems from another location Another part of the program, known as Remote Assistance, allows a user to invite a technician to view his or her desktop in the hopes that the technician can fix any encountered problems
311
MSTSC, better known as the Remote Desktop connection program connections can only be made with PCs that are running these Windows OSs:
Windows 8/8.1,10 Pro or Enterprise Windows 7 Enterprise, Professional, or Ultimate
312
To set up a computer's remote settings options to receive remote connections, follow these steps:
1. Open the System properties sheet in Control Panel 2. Click or tap Remote 3. Click or tap the empty Allow Remote Connections to This Computer check box 4. Specify which users can connect and whether a connection must use a Network Level Authentication (NLA) 5. Click OK
313
To run MSTSC in Windows 7, follow these steps:
1. Click Start to open the Windows Desktop Search pane | 2. Type MSTSC and press Enter
314
To run MSTSC in Windows 8/8.1, follow these steps:
1. Press Windows+X 2. Click Run 3. Type MSTSC and press Enter
315
To connect to the remote computer, follow these steps:
1. Enter the name or IP address of the remote computer 2. Click Connect 3. Select or enter the account name and enter the account password. The connection starts
316
Notepad is a simple plain-text editor that has several uses in system management, the uses are:
Creating batch files and scripts Viewing text-based reports Editing HTML files
317
Notepad is the default program for opening:
.txt (plain-text) files
318
To open a text file with a different extension in Notepad, follow these steps:
1. Right-clock the file in Windows Explorer or File Explorer 2. Select Open With 3. Choose Notepad
319
Explorer offers the following viewing options:
Small icons Lists Medium icons, large icons, and extra large icons Details Tiles Contents
320
What does DxDiag do?
displays and troubleshoots DirectX components in Windows
321
Defragging a hard disk drive can:
help improve system performance, especially if the drive is frequently changed
322
Defragmentation is:
the process of reorganizing the data into contiguous blocks
323
System Restore enables:
you to fix problems caused by a defective hardware or software installation by resetting the computer's configuration to the way it was at a specified earlier time (restore points)
324
Restore points can be created by:
the user with System Restore and are also created automatically by the system before new hardware or software is installed
325
To create a restore point in Windows 7, follow these steps:
1. Open the Start menu, right-click Computer, and select Properties 2. Click the System Protection task, and the System Protection tab on the System properties sheet opens 3. Click the Create button 4. Type a name for the restore point and click Create
326
To create a restore point in Windows 8/8.1, follow these steps:
1. Swipe in from the right to open the charms menu 2. Click or tap Search and enter System Restore 3. Click or tap Create a Restore Point 4. Click the Create button 5. Type a name for the restore point and click Create
327
To create a restore point in Windows 10, follow these steps:
1. Click or tap Search and enter System Restore 2. Click or tap the Create button 3. Type a name for the restore point and click Create
328
Follow these steps to restore your system to an earlier condition:
1. Open the System Protection tab and click the System Restore button 2. Click Next, and you see the window Restore Your Computer to the State It Was in Before the Select Event 3. Select a restore point to restore to and click Next 4. Click Finish on the Confirm Your Restore Point page
329
Safe mode and other advanced boot options can be used when:
the system won't boot normally
330
To enter Safe mode in Windows 7:
press f8 repeatedly when starting the system until you see the Advanced Boot Options menu and then select Safe Mode
331
To enter Safe mode in Windows 8/8.1/10:
Press the Power button on the login screen, hold down the Shift key, and click/tap Restart. Select Troubleshoot> Advanced Options> Startup Settings> Restart
332
What does Debugging Mode in Windows 10 Startup Settings do?
Enables the use of a debug program to examine the system kernel for troubleshooting
333
What does Enable Boot Logging in Windows 10 Startup Settings do?
Creates an ntbtlog.txt file
334
What does Enable Low-Resolution Video in Windows 10 Startup Settings do?
Uses a standard VGA driver in place of a GPU-specific display driver but uses all other drivers as normal
335
What does Safe Mode in Windows 10 Startup Settings do?
Starts the system with a minimal set of drivers; can be used to start System Restore or to load Windows GUI for diagnostics
336
What does Safe Mode in Windows 10 Startup Settings with Networking do?
Starts the system with a minimal set of drivers and enables network support
337
What does Safe Mode in Windows 10 Startup Settings with Command Prompt do?
Starts the system with the last configuration known to work; useful for solving problems caused by newly installed hardware or software
338
What does Last Known Good Configuration in Windows 10 Startup Settings do?
Starts the system with the last configuration known to work; useful for solving problems caused by newly installed hardware or software
339
What does Disable Driver Signature Enforcement in Windows 10 Startup Settings do?
Allows drivers containing
340
What does Disable Automatic Restart on System Failure in Windows 10 Startup Settings do?
Prevents Windows from automatically restarting if a STOP (BSOD) error causes Windows to fail
341
What does Disable Early Launch Anti-malware Protection in Windows 10 Startup Settings do?
Helps when a legitimate driver is mistaken for malware by Windows 8/8.1/10's Early Launch Anti-Malware Protection feature
342
What does Start Windows Normally in Windows 10 Startup Settings do?
Boots to regular Windows
343
Internet Properties Dialog Tabs Function General
Set the home page set tab settings delete browsing history, cookies, temporary files, and saved passwords change appearance configure accessibility settings
344
Internet Properties Dialog Tabs Function Security
Configure security zones
345
Internet Properties Dialog Tabs Function Privacy
Select privacy settings for the current zone, location settings, pop-up blocker, and InPrivate browsing settings
346
Internet Properties Dialog Tabs Function Content
Set options for family safety, SSL certificate management, AutoComplete, and feeds
347
Internet Properties Dialog Tabs Function Connections
Set options for VPNs, dial-up, LAN connections, and proxy servers
348
Internet Properties Dialog Tabs Function Programs
Select the default web browser, manage add-ons, select the default HTML editor, and set the default apps for email and other Internet services
349
Internet Properties Dialog Tabs Function Advanced
Enable/disable accelerated graphics configure accessibility settings, browsing settings, HTTP settings, international settings, multimedia settings, and security settings reset Internet Explorer to the default settings
350
Configuring Display Settings in Windows 7; Windows 8/8.1/10 Resolution
Screen Resolution; Screen Resolution
351
Configuring Display Settings in Windows 7; Windows 8/8.1/10 Color depth
Display Advanced/List Monitor; N/A (32-bit color used for all modes)
352
Configuring Display Settings in Windows 7; Windows 8/8.1/10 Screen saver
Personalization; Personalization
353
Configuring Display Settings in Windows 7; Windows 8/8.1/10 Background
Personalization; Personalization
354
Configuring Display Settings in Windows 7; Windows 8/8.1/10 Theme
Personalization; Personalization
355
Configuring Display Settings in Windows 7; Windows 8/8.1/10 Windows color
Personalization; Personalization
356
Configuring Display Settings in Windows 7; Windows 8/8.1/10 Add additional displays
Screen Resolution; Screen Resolution
357
Configuring Display Settings in Windows 7; Windows 8/8.1/10 Refresh rate
Advanced Settings/Monitor; Advanced Settings/Monitor
358
The Folder Options properties sheet affects how Explorer:
Displays file and folder information (view tab) Selects folders to index for searching (search tab) Opens folders (general options tab)
359
By default, Explorer hides the following file information:
File extensions for registered file types The full path to the current folder Files or folders with hidden or system attributes The Windows folder
360
As an alternative to using the Folder Options applet in Control Panel, you can use this procedure in Windows 8/8,1/10:
1. Open File Explorer 2. Click or tap the View tab 3. Select the options 4. Click OK to close the Folder Options window
361
Use the System properties sheet to view:
Windows version Edition (32-bit or 64-bit) Processor model number and clock speed Windows Experience Index (WEI) (Windows 7 only)
362
Selecting Change Settings in the System properties sheet for Windows 10 brings up the System applet, which allows you to change the following:
Computer name Workgroup name Domain name System protection settings (System Restore) Hardware profiles Remote settings Performance and virtual memory settings
363
Compare Virtual memory to RAM memory:
Virtual memory is much slower
364
The performance of the paging file can be improve by:
Setting its minimum and maximum sizes to the same amount Moving the paging file to a physical disk (or disk partition) that is not used as much as others Using a striped volume for the paging file. A striped volume is an identical area of disk space on two or more dynamic disks referred to using a single letter Creating multiple paging files on multiple physical disks in the system Moving the paging file away from the boot drive
365
To adjust the location and size of the paging file in Windows, follow these steps:
1. In the System Properties window, click or tap Advanced System Settings under Tasks 2. Click or tap the Settings button in the Performance box 3. Click or tap the Advanced tab and then click or tap the Change button 4. Clear or tap the Automatically Manage Paging File Size check box 5. Click or tap the Custom Size radio button 6. Specify the initial and maximum sizes you want to use for the paging file and its location. Click or tap Set and then click or tap OK to finish 7. If you make any changes to size or location, restart the computer so that the changes take effect
366
Windows Firewall provides:
protection against unwanted inbound connections and can also be configured to filter outbound connections.
367
Windows offers three standard power plans:
Balanced High Performance Power Saver
368
Describe balanced power:
Default plan; balances performance with energy consumption
369
Describe High Performance:
Fastest CPU performance, brightest screen, and shortest battery life
370
Describe Power Saver:
Reduces CPU performance and screen brightness more than Balanced power for longest battery life
371
You can change power settings for:
Hard-disk shutoff timing Desktop backgrounds Wireless adapters Sleep timings Hibernation options USB ports and devices Power buttons and lid PCI Express devices CPU performance and cooling Display shutoff timings Multimedia idle time and screen quality Internet Explorer JavaScript timing frequency
372
To create a new power plan, click Create a Power Plan in the Power Options dialog. Then, in the Create a Power Plan dialog, follow these steps:
1. Select a plan to use as the basis for your plan 2. Enter a plan name and click Next 3. Specify timings for the display and sleep and then click Create
373
Panel Link Location (Windows 10); Description Credential Manager
User Accounts; View/Change user logon information for networks and websites
374
Panel Link Location (Windows 10); Description Programs and Features
Programs; Install/Uninstall programs, enable/disable Windows features, run programs made for earlier versions of Windows
375
Panel Link Location (Windows 10); Description Homegroup
Network and Internet; Windows 7/8 only
376
Panel Link Location (Windows 10); Description Devices and Printers
Hardware and Sound; Manage webcams, scanners, printers/faxes, and so on and print jobs
377
Panel Link Location (Windows 10); Description Troubleshooting
System and Security; Link to Windows Program Compatibility Troubleshooter app, run the app and select the program causing problems
378
Panel Link Location (Windows 10); Description Network and Sharing Center
Network and Internet; Network preferences, sharing, and status changes
379
Panel Link Location (Windows 10); Description Device Manager
Hardware and Sound; Add/remove devices, check status and roll back device drivers
380
Panel Link Location (Windows 10); Description BitLocker
System and Security; Encrypt drives for enhanced security
381
Panel Link Location (Windows 10); Description Sync Center
Control Panel> Sync Center; Manage synchronization activity and settings and initialize a sync, sync files between the current computer and network folders
382
Installation and Configuration Concepts System requirements for hard drive space and RAM
Make sure the physical hardware can handle the work required of the software Check the OS and applications requirements to make sure there is enough drive space to store the data and enough RAM installed to open and run the software If possible, exceed the minimum requirements. Future downloads and updates will consume more drive space and RAM
383
Installation and Configuration Concepts OS requirements for compatibility
Make sure the software version selected will run with the operating system. Make sure the OS updates have not impacted the use of the software
384
Installation and Configuration Concepts Methods of installation and deployment (local or network based)
Be familiar with using image files on USB flash drives, external drives, or CD/DVDs on local installs Understand the basis of a network-based installation process
385
Installation and Configuration Concepts Local user permissions Folder/file access for installation
Understand what is involved in setting up local user permissions and getting a workstation to work in an organization's domain. Know how to grant and restrict access to files and folders for different users
386
Installation and Configuration Concepts Security considerations
Understand the threats and vulnerabilities in a network and how to mitigate them. Be able to describe how end-user education is fundamental to an organization's security and over success
387
Windows 7, 8/8.1, and 10 support two different types of SOHO networks:
workgroups homegroups
388
In a workgroup network:
All computers can share folders and devices with other computers in a peer-to-peer arrangement All computers must be part of the same local network or subnet The workgroup does not have a password, however, each computer must have a user account for each user who will access that computer (unless password-protected sharing is disabled)
389
The workgroup is identified through the:
Computer Name section of the System properties sheet
390
To create a workgroup in Windows follow these steps:
1. Configure all devices in the workgroup to use the same range of IP addresses and the same subnet. If the devices obtain their IP addresses from a router, this step has already been done 2. Confirm that each device has a unique computer name 3. Confirm that each device is in the same workgroup
391
HomeGroup networking enables:
easier security and sharing than workgroup networking does
392
HomeGroup details:
Although one user on one computer creates a homegroup, all computers that join a homegroup can share folders and devices with other homegroup computers in a peer-to-peer arrangement A single password is used for security for all homegroup shares. The password is generated automatically when a homegroup is created and is used only when a computer/user joins a homegroup If a computer has two or more user accounts, each user can choose whether to join a homegroup When custom file or device shares are created, a single share enables all members of a homegroup to access the device or file share
393
To create a homegroup in Windows 7/8/8.1/10, use this procedure:
1. Open the Control Panel 2. Click or tap Network and Internet 3. Click or tap HomeGroup 4. Click or tap Create a Homegroup 5. Click Next 6. Select the items (folders, libraries, or printers) you want to share 7. When the homegroup password appears, write it down. Each user wants to join the homegroup must provide it when prompted 8. Click or tap Finish
394
Some of the special features of domain networking include:
Shared resources and user accounts are stored on servers. An Active Directory server is used to authenticate users, and other servers can be used for print, file, email, and other services User accounts are not tied to a particular computer. A user on a domain can use any computer or computers on the domain and have access to their files and shared resources Resources available to a particular user can be limited by group policy Group policy can also be used to limit configuration settings that are available to a user Different local networks with hundred to thousands of users can be part of a single domain
395
The domain setup for a computer is performed from:
the Computer Name section of the System properties sheet
396
To join a domain follow these steps:
1. Open the System properties sheet 2. Click or tap Change Settings 3. On the Computer Name tab, click or tap Network ID 4. Confirm that This Computer Is Part of a Business Network is selected. Click or tap Next 5. Confirm that My Company Uses a Network with a Domain is selected. Click or tap Next 6. Review the information needed to connect to a domain and click Next 7. Enter the username, password, and domain name and click Next 8. Click OK on the Welcome to the Domain message
397
A shared folder or drive can be accessed by other computers on the network. Shares can be provided in three ways:
On a client/server-based network or on a peer-to-peer network with peer servers that support user/group permissions, shares are protected by lists of authorized user or groups A workgroup network can offer unlimited sharing (full control or read-only) for any user who connects to a system if password-protected sharing is disabled (this is not recommended) A homegroup network offers read-only access for any shared resource to any homegroup user.
398
A network share can be accessed by either its:
mapped drive letters folder names in File Explorer
399
Administrative shares are:
hidden shares that can be identified by a S at the end of the share name
400
Administrative shares cannot be:
seen by standard users when browsing the computer over the network; they are meant for administrative use
401
To share a folder with Windows 7/8/8.1/10, follow these steps:
1. Ensure that file sharing is enabled by opening the Control Panel and double-clicking the Network and Sharing Center icon 2. Open Windows Explorer/File Explorer and click Computer/This PC 3. In the Computer/This PC window, navigate to a folder that you want to share 4. Right-click the folder that you want to share and choose Share With 5. If password-protected sharing is enabled, click Select People and select which users will have access to the shared folder and select their permission levels 6. When finished configuring permissions, click Share and then click Done
402
When joining a homegroup in Windows 7/8/8.1, joining the homegroup and configuring default sharing settings is a simple process:
1. In the Network and Internet window, click HomeGroup 2. Click Join Now 3. Click Next 4. Select the items you want to share 5. Click Next 6. Type the homegroup password 7. Click Next 8. Click Finish
403
To set up custom access for a particular folder follow these steps:
1. In the Computer/This PC window, navigate to a folder that you want to share 2. Right-click the folder that you want to share and choose Share With. The File Sharing window appears 3. In Windows 7, choose from Homegroup (Read), Homegroup (Read/Write), Nobody, or Specific People. In Windows 8/8.1/10, choose from Homegroup (View), Homegroup (View/Edit), Stop Sharing, and Specific People 4. When you are done configuring permissions, click Share and then click Done
404
Drive mapping has the following benefits:
A shared folder mapped as a drive can be referred to by the drive name instead of by using a long Universal Naming Convention (UNC): path When using MS-DOS programs, keep in mind that using mapped drives is the only way for those programs to access shared folders
405
Mapping drives is done by these steps:
1. Open the Network view in Windows Explorer/File Explorer 2. Right-click the shared folder in Network view and select Map Network Drive 3. Select a drive letter from a list of available drive letters; only drive letters not used by local drives are listed 4. Click the Reconnect at Login box if you want to use the mapped drive every time you connect to the network 5. Click the Connect Using Different Credentials box if you want to use a different username/password to connect to the shared resource 6. Click Finish
406
The Universal Naming Convention (UNC) is designed to:
enable users to access network resources such as folders or printers without mapping drive letters to network drives or specifying the type of device that stores the file or hosts the print
407
The Universal Naming Convention (UNC) enables:
files and printers to be accessed by the user with 32-bit and 64-bit Windows applications
408
To perform printer sharing, follow these steps:
1. Open the Devices and Printers or Printers and Faxes folder 2. Right-click a printer and select Sharing 3. Select Share This Printer and specify a share name 4. Click Additional Drivers to select additional drivers to install for other OSs that will use the printer on the network. Supply driver media when prompted
409
Whether a printer has its own IP address or is connected to a computer as a shared printer, use this procedure to install it on a system in a process called network printer mapping:
1. Open Devices and Printers in the Control Panel 2. Click or tap Add a Printer 3. Click or tap Add a Network, Wireless, or Bluetooth. Click The Printer I Want Isn't Listed 4. To find a printer on an Active Directory (domain-based) network, choose Find a Printer in the Directory, Based on Location or Features. Click Next 5. After the printer is selected, specify whether you want to use the new printer as the default printer. Click Next 6. Specify whether you want to print a test page 7. Click Finish to complete the setup process
410
The Network and Sharing Center includes a Set Up a New Connection or Network wizard for the following connection types:
Virtual private networking Dialup networking Broadband
411
A VPN connections creates:
a secure tunnel over a public network, such as the Internet, between computers
412
To configure a new VPN connection follow these steps:
1. In the Set Up a Connection or Network dialog, click or tap Connect to a Workplace and click or tap Next 2. Click or tap Use My Internet Connection (VPN) 3. In Windows 7, 8/8.1, enter the Internet address and the destination name, and click Create. 4. In Windows 8/8.1, to display the VPN connection, click the network connection icon in the taskbar or from the charms menu
413
Windows can create two types of dial-up connections on systems with analog modems:
Dial-up networking connections to an ISP Direct dial-in connections to a corporate computer
414
To configure a new dial-up connection to an ISP follow these steps:
1. In the Set Up a Connection or Network dialog, click or tap Connect to the Internet and click Next 2. Click or tap Dial-up and click or tap Next 3. Enter the ISP's dial-up phone number, username, and password
415
To configure a new direct dial-in connection to a corporate computer follow these steps:
1. In the Set Up a Connection or Network dialog, click or tap Connect a Workplace and click or tap Next 2. Click or tap Dial Directly and click or tap Next 3. Enter the remote computer's dial-up phone number and destination name. Click or tap Next 4. Enter the username and password. Enter the domain. Click or tap Connect or Create
416
You can create a wireless connection by following these steps:
1. In the Set Up a Connection or Network dialog, click or tap Connect to a Wireless Network and click or tap Next 2. Enter the network name. Select the Security type and enter the security key. Click or tap Next 3. Click or tap Close. The connection is added to the list of connections
417
Follow these steps to set up a wired connection:
1. In the Set Up a Connection or Network dialog, click or tap Connect to the Internet and click or tap Next 2. Click or tap Broadband (PPPoE) and click or tap Next 3. Enter the username and password. Enter the domain. Check the Remember This Password box if the user doesn't want to enter the password again. Click or tap Connect
418
A WWAN (cellular) connection shows up in the list of network connections after:
a SIM card is installed and activated by a mobile provider.
419
A corporate network may use a proxy server as:
an intermediary between a network client and destination of the request (such as a web page) from the network client
420
To configure manual proxy settings for a LAN connection in Windows follow these steps:
1. Open the Internet properties (Internet options) dialog from the Control Panel 2. On the Connections tab, click LAN Settings 3. In the Local Area Network (LAN) Settings window, choose the appropriate option under Proxy Server 4. Specify the correct server and port number to use 5. Click OK to save changes in each dialog until you return to the browser display
421
Remote Desktop also includes Remote Assistance, which allows:
a user to invite a technician to view his or her desktop in the hopes that the technician can fix any encountered problems
422
In Windows, the settings Home, Work, Public, and Private refer to:
network locations
423
When a computer running Windows 7 is connected to a network for the first time, Windows prompts the user to select a location. The location options are:
Home Work (Windows 7) Public
424
By choosing Home or Work (Office) as location, you can:
configure the network connection as private
425
By choosing Public as location, you can:
configure a non-secured network. This option turns off network discovery, so the computer is not visible to other computers using the network
426
When a computer running Windows 8/8.1 is connected to a network for the first time, Windows prompts the user to select a location. In Windows 8, the dialog has two options:
Yes, Turn on Sharing and Connect to Devices (for home or work networks) No, Don't Turn on Sharing or Connect to Devices (for networks in public places)
427
The Network and Sharing Center in Windows 8.1 displays:
the current network connection and location
428
To change the network in Windows 8.1 you must follow these steps:
1. Sweep in from the right to open the charms menu 2. Click or tap Settings 3. Click or tap the active network connection icon in the Settings pan. If no network connection is active, click or tap Change PC Settings, Network 4. Click or tap the connection to change 5. Use the Find Devices and Content slider to change the location. Turn it on for a private network. Turn it off for a public network 6. Close the menu (by dragging it down until it disappears)
429
Windows Firewall can be configured to:
permit specified applications to pass through the firewall open specific ports needed by applications block all traffic
430
An exception is:
each application or port that is opened by a firewall
431
An alternative IP address enables:
a system to stay on the network if the DHCP server fails or if the system is sometimes on a different network than normal
432
To view or change the settings on the Alternate Configuration tab for a network adapter follow these steps:
1. Open the Network and Sharing Center 2. Click or tap Change Adapter Settings 3. Click or tap the connection to change 4. Click or tap Change Settings of This Connection 5. Click or tap Internet Protocol Version 4 (TCP/IPv4) 6. Click or tap Properties 7. Click or tap Alternate Configuration
433
The Alternate Configuration tab is used to:
set up a different TCP/IPv4 configuration for use when a DHCP server is not available or when a different set of user-configured settings is needed, as when a laptop is being used as a secondary location
434
To access network properties follow these steps:
1. Open the Network and Sharing Center 2. Click or tap Change Adapter Settings 3. Click or tap a wired connection 4. Click or tap Change Settings of This Connection 5. Click or tap Configure
435
Half duplex/full duplex/ auto are settings that:
determine how a network card communicates with the rest of the network
436
Full duplex modes enables:
the adapter to send and receive data at the same time, which doubles network speed compared to the default half-duplex mode
437
To change duplex and speed settings for a network follow these steps:
1. Click or tap Configure on the adapter properties sheet 2. Click or tap the Advanced tab 3. Click or tap Speed & Duplex 4. Select the value desired 5. Click OK when done
438
Wake-on-LAN (WOL or WoL) enables:
a computer to a wired network to be awakened from sleep mode via a special "magic packet" signal delivered by the network
439
Wake-on-LAN (WOL or WoL) can be used to:
awaken a computer for updates, backup, or other tasks, as needed, and allow it to run in low-power mode when not in use
440
The successful configuration of Wake-on-LAN (WOL or WoL) requires:
changes to the default settings of a computer's BIOS or UEFI firmware, network adapter, Windows services, firewall settings, and router port forwarding.
441
The following change in system configuration are needed to make Wake-on-LAN (WOL or WoL) work properly:
Enable Wake-on-LAN in the system BIOS or UEFI firmware and save changes Open the Control Panel's Windows Features dialog and turn on Simple TCP/IP Services Open Computer Management's Services dialog, start Simple TCP/IP Services, and configure it to run automatically Ensure the UDP port 9 (recommended) or port 7 (if 9 isn't working) is open in your firewall Configure your router to forward UDP 9 (or 7) to the computers that need WOL services
442
Quality of server (QoS) enables:
a computer connected to a wired network to optimize real-time streaming traffic, such as VoIP, streaming video, or streaming music services
443
The BIOS in an on-board NIC can be used to:
boot the computer if it is configured as a bootable device in the BIOS or UEFI firmware setup. Enable this setting to obtain an installable OS image from the network
444
To maintain any computer system, you should follow best practices related to:
Scheduled backups Scheduled disk maintenance System updates/App store Patch management Driver/firmware updates Antivirus/antimalware updates
445
Scheduled backups help prevent:
major data loss in case of system failure, accident, or loss.
446
Backups can be used to safeguard:
Contacts Email Media files (photos, videos, and music) Documents
447
The default backup app in macOS is:
Time Machine
448
Backup features to look for include:
Compression Support for incremental as well as full backups Local and network backup destinations
449
Describe Backup Compression:
Reduces the amount of file space and often the amount of time needed to make a backup
450
Describe Support for incremental as well as full backups:
Good backup practice calls for periodic full backups followed by backups of files changed since the last full backup (incremental backups)
451
Describe Local and network backup destinations:
Some backup utilities might require additional configuration before a network backup can be performed
452
To enable and configure Time Machine in macOS follow these steps:
1. Connect a suitable external disk to a macOS system 2. When prompted, click Use as Backup Disk. You can also check the Encrypt Backup Disk box to protect the backup 3. If you select the option to encrypt your backup in step 2, enter a password, confirm it, and enter a password hint 4. Make sure Time Machine is turned on. After the selected disk is encrypted, the backup starts
453
Disk Utility in macOS can be used to:
create blank disk images that can be used as containers for other files, including image backups
454
When a file is deleted from a macOS system or when a different version of an existing file is needed, you can restore a file from a Time Machine backup follow these steps:
1. Open a Finder window where the restored file belongs 2. Open Time Machine from Dock 3. Scroll through the backups shown to find the file(s) to restore 4. Select the file(s) to restore and click Restore (The file is restored to its original location)
455
macOS offers several image recovery options likes:
After you create an image with Disk Utility, the image can be restored by using Edit> Restore Disk Utility can also be used to reinstall macOS
456
macOS First Aid can:
repair problems with the file system, partitions, and other issues
457
Some useful disk maintenance commands for the Linux Terminal mode include:
df -h: List files and free space in a computer >directory path/filename: Removes the contents of the specified file without removing the file itself ls -lsr | tail -5: Finds the five largest files in the current directory
458
macOS and Linux bot include shell/terminal apps that:
open a command line environment
459
Screen Sharing enables:
local users on the network or remote users running virtual network computing (VNC) to control the screen for training or troubleshooting
460
The Force Quit feature in macOS enables:
the use to shut down a malfunctioning app
461
To access Force Quit in macOS from the keyboard, press:
Cmd+Option+Esc
462
Mission Control displays:
all apps open on the desktop so you can copy or move them between different desktops
463
Spotlight is the macOS:
search tool for files, apps, photos, web results, dictionary entries, news, moving listings, and more
464
To open Spotlight in macOS from the keyboard press:
Cmd+Spacebar
465
macOS uses iCloud cloud storage for:
photo sharing, document, and data storage, and Find My Mac
466
Use iCloud Keychain to:
safely store Safari usernames and passwords, credit card information, and WiFi network information across Apple devices
467
With gestures on macOS a user can:
convert common touch patterns to customizable commands such as "fast forward" zoom commands
468
Finder is macOS's:
file manager
469
Recent Apple models do not have optical disks. Remote Disc enables:
access to files from a CD or DVD on another computer on a network
470
macOS uses the Dock to:
display and switch between running apps along the bottom of the display
471
Boot Camp is the macOS:
multiboot utility for installing Windows on a macOS computer
472
Basic Linux Commands ls
lists the contents of a directory (folder), including permissions and other information
473
Basic Linux Commands grep
performs text searches. The command line specifies what to search for and where to search
474
Basic Linux Commands cd
use this to change directories (folders)
475
Basic Linux Commands shutdown
shuts down the system
476
Basic Linux Commands pwd
Displays the name of the current/working directory
477
Basic Linux Commands passwd
Starts the password change process
478
Basic Linux Commands mv
moves files to a specified location
479
Basic Linux Commands cp
copies files to a specified location
480
Basic Linux Commands rm
removes (deletes) files from the system
481
Basic Linux Commands chmod
changes permissions of files and directories
482
Basic Linux Commands chown
changes file ownership using the syntax sudo chown newowner filename
483
Basic Linux Commands iwconfig
displays wireless network connections (Linux only)
484
Basic Linux Commands ps
lists the currently running processes
485
Basic Linux Commands sudo
runs a command as another user
486
Basic Linux Commands su
switches between user accounts
487
Basic Linux Commands apt-get
installs or manages Advanced Packaging Tool (APT) software packages
488
Basic Linux Commands vi
starts the vi text editor
489
Basic Linux Commands dd
performs a block file copy to convert between formats
490
Basic Linux Commands kill
stops specified applications