Operating Systems Flashcards

1
Q

the thing that enables a computer to move information around and communicate with input and output devices in a predictable and structured way

A

operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many operating systems can a computer run at a time?

A

Usually only one at a time, but with virtual machines, it can run two, three, or even more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary role of an operating system?

A

To act as a go-between that makes connections between initiators and responders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where does the operating system reside in relation to the hardware?

A

Above the hardware level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the operating system connect?

A

It connects hardware with applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the major components of an operating system?

A
  • File system
  • Networking capabilities
  • Program and data storage
  • Tools and utilities
  • User interface (GUI or CLI)
  • Device drivers
  • RAM memory
  • System security features
  • Ability to host user accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a graphical user interface often abbreviated as?

A

GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a command-line interface often abbreviated as?

A

CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: An operating system offloads application developers from worrying about hardware management.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: The OS talks to the hardware, and __________ talk to the OS.

A

[Applications]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is time spent configuring and troubleshooting operating systems considered well spent?

A

If the OS isn’t working right, chances are the applications won’t be working right either.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A grouping of bits, each bit being a 0 or 1 that the CPU treats as a chunk for moving data around, listing memory addresses, doing integer math, and running commands.

A

Word

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the typical word sizes used in today’s computers?

A

32 or 64 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What advantage does a 64-bit system have over a 32-bit system?

A

More data can move around in the same amount of time, can handle larger amounts of RAM, and can move more information per command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where might you still find 32-bit systems?

A

On smaller tablets or older PCs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the term x64 refer to?

A

64-bit designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the term x86 refer to?

A

32-bit designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Can a 32-bit processor run a 64-bit operating system?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Can a 64-bit CPU run both 64-bit and 32-bit operating systems?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What type of device drivers does a 64-bit OS demand?

A

64-bit device drivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What type of applications can a 64-bit OS run?

A

Both 64-bit and 32-bit programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is required for a 64-bit application to run?

A

A 64-bit operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why might someone want a 32-bit version of Windows?

A

To use older hardware that requires a 32-bit driver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Where can you check the bitness of the operating system and CPU in Windows 10 and 11?

A

In the System tile of the Settings applet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What happens if you try to do an in-place upgrade from a 32-bit edition to a 64-bit edition?
You are not allowed to change the bitness.
26
What is the maximum address space for a 32-bit operating system?
4 GB.
27
What is the maximum theoretical memory a 64-bit architecture can support?
16 EB.
28
What is the maximum RAM that the 64-bit version of Windows 10 and 11 Pro can accommodate?
2 TB.
29
What is necessary for a lot of memory in a computer?
A 64-bit capable CPU and a 64-bit operating system.
30
Fill in the blank: A bit, or binary digit, can have one of ______ possible values.
two
31
True or False: Windows 11 works on both 32-bit and 64-bit CPUs.
False.
32
A desktop or laptop computer for business use or a computer for technical or scientific use
Workstation ## Footnote Examples include traditional business machines and engineering workstations.
33
Which operating system has the largest market share for workstations?
Microsoft Windows ## Footnote Followed by Apple's macOS and various forms of Linux.
34
When was the first version of Microsoft Windows released?
1985
35
What is a significant limitation of Windows 11 compared to Windows 10?
Windows 11 only runs on 64-bit systems and requires 8th generation or newer processors.
36
What versions of Windows are still available today?
Windows 10 in both 32-bit and 64-bit versions ## Footnote Windows 11 is only available in 64-bit.
37
Which version of Windows was very popular in the early 2000s?
Windows XP
38
Its tablet-friendly graphical interface did not work well on desktops and laptops.
Windows 8
39
Which version of Windows introduced a new design that was broadly accepted?
Windows 10 in 2015
40
What is the current name of the Mac operating system?
macOS
41
What is a key difference between Windows and macOS in terms of hardware compatibility?
macOS only works on Apple hardware.
42
What significant change occurred in macOS in 2011?
Shift to a 64-bit kernel.
43
What was the last version of macOS to support 32-bit applications?
macOS Mojave in 2018.
44
What is the original inspiration for the Linux operating system?
UNIX
45
What are some desktop GUIs that Linux can use?
* KDE * Gnome * Unity
46
What is a notable feature of Linux regarding cost?
It is open source and free of charge.
47
In what year was symmetric multiprocessing introduced to Linux?
1996
48
What is Chrome OS based on?
Linux
49
What type of computers is Chrome OS available on?
Chromebooks
50
What market segment initially popularized Chromebooks?
Primary education markets
51
Which operating system is the basis for Android?
Linux
52
What kind of applications can Chrome OS run?
* Apps from Google Play * Linux apps
53
Which companies produce Chromebooks?
* Hewlett Packard * Acer * Dell * Lenovo * Samsung
54
What is the primary purpose of a mobile operating system compared to a workstation OS?
Portability and convenience
55
What type of support is mandatory for mobile operating systems?
Touchscreen support
56
What design considerations must mobile OS designers focus on due to smaller screen sizes?
User interface design
57
Why must mobile operating systems pay more attention to power drain?
Due to the nature of portable devices
58
What security aspect is heightened in mobile operating systems?
Higher security risk
59
What must mobile devices support for communication?
Cellular communications
60
Which mobile operating system dominates the worldwide market share?
Android
61
Which operating system is second in market share for smartphones?
Apple's iOS
62
What operating system is known for Apple's iPads?
iPadOS
63
In what year was iPadOS introduced?
2019
64
How does iPadOS differ from macOS in terms of capabilities?
1. Supports touchscreen capabilities 2. Split view and multiple instances of the same app
65
True or False: iPadOS is a variation on the iOS theme.
True
66
What is a key feature of mobile operating systems regarding user interaction?
Touchscreen capabilities
67
Fill in the blank: The worldwide market share of tablet operating systems shows _______ with a bigger piece of the pie.
iOS
68
What aspect of mobile devices contributes to their higher security risk?
Portability
69
What does EOS stand for in the context of operating systems?
End of Sale
70
What happens during the End of Sale (EOS) phase?
The vendor stops selling the product, but may continue support
71
What does EOL stand for?
End of Life
72
Stage of operating system's life; Manufacturer stops providing support, updates, patches, and fixes
End of Life (EOL)
73
True or false: an operating system is deemed unsuitable for continued business use at EOL because there are no more updates, patches, fixes, or drivers from the manufacturer
True
74
What is meant by mainstream support for an operating system?
Includes security patches, feature updates, and quality updates
75
How long does mainstream support typically last for Windows OS?
Five years
76
What does extended support include?
Only security patches
77
How long is the extended support period for Windows OS?
Typically five years
78
Can an operating system lose support before reaching EOS or EOL?
Yes, based on business considerations
79
What might lead to an operating system losing support before EOS or EOL?
Very low market share
80
What factors must IT professionals consider when ensuring compatibility across different versions of an OS from the same manufacturer?
1. Antivirus and anti‑malware software 2. Utilities (e.g., disk optimizers) 3. Applications (some may work on one version but not another) 4. Device drivers (often specific to version and architecture) 5. 32‑bit vs. 64‑bit differences
81
Why might a device driver work on one version of an operating system but not another?
Because device drivers are often written for a specific OS version and architecture (32‑bit or 64‑bit). A driver that works on one may be incompatible with the other.
82
What is a common restriction when upgrading Windows from one edition to another?
You generally cannot upgrade from a more powerful edition of Windows to a less powerful edition (e.g., from Windows 10 Pro to Windows 10 Home).
83
How do Windows and macOS differ with respect to file system compatibility?
They have different native file systems with features that don’t always translate between platforms. While some compatibility exists, many file system attributes and utilities are not cross‑compatible.
84
Do all applications work seamlessly across different operating systems?
Not necessarily. Some apps have cross‑platform versions, but they may have different features, interfaces, or release schedules on each platform
85
What is the compatibility concern with device drivers between different operating systems?
Device drivers are OS‑specific and generally won’t work on a different operating system due to fundamental architectural and API differences.
86
Is Apple hardware limited to running macOS?
macOS officially only runs on Apple hardware. However, virtualization tools (like Parallels) allow running Windows on a Mac, providing a form of cross‑platform functionality.
87
What Windows File System is: *Ideal for large flash/external drives *Supports high‑capacity storage *Widely compatible outside of Windows
ExFAT (Extended File Allocation Table)
88
What Windows File System is: *Older but broadly compatible *Works well on smaller drives *Limited to 4 GB file size
FAT32
89
What Windows File System is: *Common for internal Windows drives *Supports file permissions and security *Used for both HDDs and SSDs
NTFS (New Technology File System)
90
What Windows File System is: *Resilient File System based on NTFS *Offers extra reliability and data protection *Primarily used on Windows servers and specialized storage setups
ReFS (Resilient File System)
91
What Windows File System is: *for CD data and audio tracks *Works on both Windows and macOS
CDFS (Compact Disc File System)
92
What macOS and Linux File System is: *Used in UNIX, Linux, and macOS environments *Facilitates file sharing across networks
NFS (Network File System)
93
What macOS and Linux File System is: *A native Linux file systems *4 is newer, supports huge file sizes, offers better performance and reliability *Often the default on modern Linux distributions
ext3 and ext4
94
What macOS and Linux File System is: *Older default file system for Macs *Largely superseded by APFS
HFS+ (Hierarchical File System Plus; Mac OS Extended)
95
Apple’s legacy file system for macOS, gradually replaced by APFS for better performance.
HFS+ (Hierarchical File System Plus; Mac OS Extended)
96
What macOS and Linux File System is: *Newer macOS file system *Optimized for SSDs *Provides better performance and reliability compared to HFS+
APFS (Apple File System)
97
Apple’s modern file system focusing on efficiency, especially for solid‑state storage.
APFS (Apple File System)
98
journaling file systems for Linux, with ext4 offering increased capacity, speed, and stability.
ext3 and ext4
99
a distributed file system protocol enabling networked file sharing among UNIX‑like and macOS systems.
NFS (Network File System)
100
File system type used to read data and audio tracks from CDs, commonly supported by multiple operating systems.
CDFS (Compact Disc File System)
101
File system type that is built on NTFS fundamentals, adding advanced fault tolerance and scalability for server environments
ReFS (Resilient File System)
102
the default Windows file system offering robust security features and reliability for fixed drives.
NTFS (New Technology File System)
103
a legacy file system compatible with most OSs but restricts individual file sizes to 4 GB.
FAT32
104
a Microsoft file system designed for large external storage media and broad cross‑platform compatibility
ExFAT (Extended File Allocation Table)
105
What type of file systems are: *Readable by Windows, macOS, and Linux *Useful for sharing data across different operating systems *neither supports Apple’s Time Machine
ExFAT and FAT32
106
What is the main difference between a 32‑bit and 64‑bit operating system?
*64‑bit OS can address much more RAM *Generally offers better performance and efficiency *32‑bit OS has lower memory limits
107
OS Type that power desktops/laptops with advanced functionality; robust features, multi‑user capabilities, broad hardware support
Workstation OSs
108
OS type that is streamlined for tablets and smartphones; optimized for touch interfaces, lower power usage, and integrated connectivity
mobile OSs
109
tracks an operating system from launch to end of support, influencing maintenance, upgrades, and overall compatibility; Compatibility affects security updates, driver availability, and software functionality
OS product lifecycle
110
oversees hardware resources, schedules processes, manages drivers, and secures user access; includes: *CPU/memory management *Process scheduling *Device drivers/hardware interfacing *Networking and user account security
operating system
111
What part of an OS: *Affects max file sizes, security features, and cross‑platform compatibility *Impacts system performance and data integrity *Determines how backups and permissions are managed
File system type
112
*Flexible file organization *Combines multiple folders into one view *Introduced in Windows 7, but still used in Windows 10 and 11 Example: user’s documents + public documents
Libraries
113
provides a user‑friendly interface for configuring common devices and printers, building on underlying Device Manager functions; first introduced in Windows 7, still used in Windows 10 and 11
Devices and Printers Control Panel
114
helps secure Windows by running even administrator accounts in standard mode until an action demands higher privileges; first introduced in Vista, later Windows 7 made less intrusive
User Account Control (UAC)
115
Microsoft’s built‑in encryption tool that protects data on both fixed and removable drives, offering multiple unlock methods including password and smartcard unlocking
Bitlocker
116
automatically adjust the firewall rules based on the type of network you connect to (corporate, private, or public)
Firewall Profiles
117
*Remote VPN alternative *Seamlessly connects client PCs to corporate networks *Improved user experience over traditional VPNs
DirectAccess
118
a caching solution that stores copies of remote data in branch offices, accelerating file retrieval and reducing WAN congestion
BranchCache
119
gives administrators finer control over application execution, helping secure corporate environments by restricting unauthorized software
AppLocker
120
In which Windows versions was the Start menu changed?
8 and 8.1 and then again in 10/11
121
Windows version that focused on touch‑first design and fullscreen “Modern” apps; it controversially removed the traditional Start button/menu that reappears (in some form) in later versions of Windows
Windows 8
122
In Windows 8: *“Metro”/Modern/Store apps → for touch devices *Introduced the Microsoft Store *Carried forward into Windows 10/11 as “Store Apps” or “Universal Apps”
Modern Apps
123
a gesture‑driven menu in Windows 8 and 8.1. It disappeared in later OS versions, reflecting Microsoft’s shift away from purely touch‑centric UI elements.
Charms Bar
124
updates to this first appeared in 8/8.1. They carry on to Windows 10/11, providing convenient file backups and a more modern Explorer interface
File History and File Explorer
125
Windows version that tried to bridge the gap for traditional desktop users by restoring a visible Start button and refining Modern apps, setting the stage for further UI refinements in later Windows versions
Windows 8.1
126
Windows versions that serve as stepping stones for modern Windows features (like user account control, encryption, and the Microsoft Store)
Windows 8/8.1
127
Windows version that debuted in 2015 where extended support ends late 2025; Hybrid UI (mix of Win7 Start + Win8 tiles)
Windows 10
128
Windows version that introduced a blended Start menu, voice‑enabled Cortana (now optional), and “Universal” apps that run across multiple Windows devices
Windows 10
129
Windows 10 came with a new browser that later replaced Internet Explorer, and has more advanced tab management. What is the name of this browser
Edge
130
Utility in Windows 10 that centralizes system/app messages and includes handy quick actions
Action Center
131
Windows 10 let users group running apps on different desktop “spaces.” What are these called?
Virtual Desktops
132
In Windows 10, offers a fullscreen Start environment for 2‑in‑1 or tablet devices
Tablet mode
133
This Windows 10 addition adds built‑in biometric support (camera or fingerprint)
Windows Hello
134
Introduced in Windows 10; protects against pass‑the‑hash attacks
Credential Guard
135
Introduced in Windows 10; restricts apps via digital signatures
Device Guard
136
brings server‑like virtualization to Windows 10 Pro/Enterprise
Client Hyper‑V
137
This aspect of Windows provided frequent, incremental “feature updates.” Although Microsoft first claimed Win10 would be the final version, Windows 11’s release changed that plan.
Windows 10 Upgrade Model
138
Windows version that adds a more macOS‑like interface, integrated Teams, widgets (reminiscent of Vista’s sidebar), and Android app support. Hardware requirements are higher
Windows 11
139
This version of Windows' UI shifts the Start menu to the center, revamps the Settings layout, and removes some legacy items (Internet Explorer, 32‑bit OS editions, etc.)
Windows 11
140
Which type of use (personal or corporate) require an OS that is consistent across departments, easy to train/support, securely manages data, and can scale to new users/locations (e.g., domain networking, enterprise features).
Corporate
141
Which type of use (personal or corporate) includes features such as domain networking in Windows, Auditing for troubleshooting, BitLocker/EFS for encryption, and password policies and are commonly sold via volume licensing, not retail?
Corporate/Business Editions
142
Which type of use (personal or corporate) offers simpler setup (e.g., workgroup vs. domain), customizable UI, plus tools for media playback and easy device portability
Personal
143
Which Edition of Windows 10/11 is required for the use of BitLocker which secures entire drives (tied to the machine), while EFS encrypts on a per‑user, per‑folder basis
Pro Edition or above
144
Which Edition of Windows 10/11 lacks corporate tools like domain join and some advanced security settings. They focus on personal use, with simpler default configurations and fewer administrative capabilities.
Home Editions
145
Windows edition that targets consumers, limiting hardware support, domain functionality, and advanced administration (like Group Policy or inbound RDP). It enforces a Microsoft account during installation.
Home Edition
146
Windows Edition that has a max of 128 GB RAM, 1 CPU
Home Edition
147
Windows Edition that supports higher RAM/CPU limits, domain networking (both on‑prem and Azure AD), built‑in encryption options (BitLocker, EFS), and robust virtualization features
Pro Edition
148
Windows Edition that has a max of up to 2 TB RAM, 2 CPUs
Pro Edition
149
Windows Edition that is optimized for demanding tasks (e.g., scientific/engineering). It allows larger hardware configs, the Resilient File System (ReFS), and high‑speed networking (SMB Direct)
Pro Workstation
150
Windows Edition that caters to larger organizations with advanced security (e.g., Credential Guard, AppLocker) and remote connectivity (DirectAccess). LTSC versions skip feature updates, focusing on stability
Enterprise Edition
151
Windows Edition that has Enterprise‑level features typically deployed by volume licensing. Omit certain consumer tools like Cortana and add specialized setup options
Education Editions
152
Upgrade type that generally allows the upgrade from a "lesser" to a "higher" edition; for example Home to Pro, but not Home to Enterprise directly; allows you to perform an upgrade without doing a full backup and restore
In-Place Upgrade
153
What is the CLI cmd for an in-place upgrade?
CHANGEPK.EXE
154
What CLI cmd can you use in order to view the edition of Windows you are running?
winver
155
This type of install involves booting from external media (USB, DVD) or a network source. Lets you partition and format the drive as desired before installing the OS; common scenario: shiny new computer with no OS
Clean Install
156
Type of install that works when dealing with corruption or infections, re‑installing the OS from scratch or applying a corporate image can be faster than lengthy troubleshooting—just ensure you backup and verify data first
Clean install
157
Install type that runs setup on the current OS, installs the new OS, and preserves existing applications and data. It’s faster but can leave behind unnecessary files, permissions, or partial configurations. Common scenario is on an existing OS & apps/data to keep
in-place upgrade
158
Advantage of this type of install is speed because there is no reinstallation of apps, but the disadvantage is leftover files/settings, possible permission inconsistencies
In-place upgrade
159
This type of install wipes the existing environment. Advantage is that there are no leftover files but a disadvantage is that it requires data migration and app reinstallation
Clean install
160
Type of install that comes preloaded with apps, settings, security configurations, but wipes the drive first to eliminate old problems; often done in bulk and ensures uniformity
Imaging
161
A command‑line utility to back up user profiles, docs, and app settings before a clean install; offers enterprise‑grade user data migration.
USMT (User State Migration Tool)
162
Type of install category where you troubleshoot, or rather attempt detailed manual fixes
Sherlock
163
Type of install category where you wipe and reinstall
Nuke
164
This type of setup puts more than one OS on a single PC, isolating them on separate partitions. Although this approach avoids conflicts, it’s less common today due to virtual machines and requires rebooting to swap OSes.
multiboot
165
Installation type that automates OS deployment in places without on‑site tech staff. They rely on answer files (pre-filled config) or management tools like Configuration Manager or Microsoft Deployment Toolkit (MDT).
Remote or unattended installs
166
These help create either fully or semi‑automated Windows installations. They streamline setup steps, reducing or eliminating prompts for the end user
Microsoft Deployment Toolkit (MDT) and answer files
167
a free Microsoft utility that creates OS install media. It’s ideal for offline or low‑bandwidth deployments, letting remote users upgrade with a flash drive or DVD.
Media Creation Tool for Windows
168
Installation type that allows a client to boot from network media, retrieve a WIM image, and install the OS.
PXE/NetBoot environment (Network)
169
sends one OS image to many machines simultaneously, saving bandwidth.
Multicasting
170
Must do the following hardware checks: CPU gen, RAM, Disk space before this type of installation
In-place upgrade
171
to load firmware code and then OS code (from media or network) into RAM, where such code can then manage device startup and reach a usable state
boot
172
means that a computer's firmware connects to a server to load a boot program into RAM - then can install on OS
PXE Boot (Pre-boot eXecution Environment
173
a start from a zero-power state
hard boot
174
a restart without a power cycle
soft boot
175
What is the fastest media to boot from?
SSD
176
What is the slowest media to boot from?
Optical drive
177
Which two media are best for daily run boot scenarios?
SSD and internal hard drive
178
a container of storage: a distinct allocation of disk space that can be formatted with a file system and managed separately from others
Partition
179
What are non-bootable partitions often called?
Data partitions
180
Tools like Disk Management (Windows), DISKPART (Windows), Powershell, and Disk Utility (macOS) allow you to do this
Partition a disk
181
Partition type that works with BIOS, most OSs, has 4 partitions max, and 2 TB per partition max
MBR (Master Boot Record)
182
Partition type that works with UEFI, newer OSs, 128 partitions max (Windows), and 18 EB per partition max (Windows), and requires a 64-bit Windows
GPT (GUID Partition Table)
183
What can you do to MBR or GPT partitions with Disk Management, DISKPART, and PowerShell?
Create
184
What can you do with MBR and GPT with DISKPART, PowerShell and 3rd-party tools?
convert between
185
How many partitions does BitLocker require?
At least 2
186
How large are EFI system partitions?
Usually 100MB
187
How large are OEM recovery partition sizes?
they can vary in size
188
A space allocated from one or more partitions on one or more disks that has been configured by the OS and formatted with a file system; can be simple (single disk) or complex (multiple disks) and are specific to the OS and generally not accessible to other OSs
Volume
189
a system for naming, placing, and organizing files on a volume so they can be written, read, copied, deleted, etc.
File System
190
process that prepares a volume for a specific file system that generally wipes everything in the volume
Formatting
191
Which file systems would you NOT choose if you are looking for access controls (permissions)
ExFAT and FAT32, because they lack this feature
192
A Windows network infrastructure where computers and user accounts are centrally managed for security, updates, and configuration consistency.
Domain
193
A major Windows update that adds or removes new functionalities, historically released semi‑annually for Windows 10 and once a year for Windows 11.
Feature Update
194
The Windows scheduling system by which organizations can defer or delay feature updates, allowing time to test changes before deploying them broadly
Semi‑Annual Channel (formerly Current Branch/Current Branch for Business)
195
A specialized branch of Windows Enterprise that opts out of new features for up to 10 years, focusing on stability and consistency over time.
Long‑Term Servicing Channel (LTSC)
196
These are monthly (or more frequent) Windows patches that focus on security and reliability, independent of new feature rollouts
Quality Updates
197
A security mechanism introduced in Windows Vista that helps prevent elevated privileges from being misused by default, prompting the user for consent or credentials for admin tasks.
User Account Control (UAC)
198
A shell interface for executing text-based commands, typically faster for power users, highly scriptable, and consistent across Windows versions, but error-prone for typos.
Command Prompt (cmd.exe)
199
The default user context when running a command‑line session in Windows if the user is an administrator but not actively performing an elevated task
Standard (Low‑Privilege) Context
200
The advanced mode in Command Prompt or PowerShell that grants access to system-level operations, requiring UAC consent or admin credentials to launch.
Elevated Command Prompt
201
A quick reference parameter that reveals syntax, parameters, and a short description of a Windows command, typically displayed in the command‑line interface.
/? (Help Parameter)
202
A Windows 11 application that can open multiple shells (including cmd.exe) in tabs, providing an all‑in‑one interface for command‑line tools and PowerShell.
Windows Terminal
203
Command to list the contents of the current drive or folder, often customized with switches like /a (attributes), /s (subdirectories), /o (ordering), etc.
dir
204
A parameter style (e.g., /a:h) used to modify a base command by specifying details such as which file attributes to show or how to order results.
Command‑line Switch (Parameter/Qualifier)
205
Changes the current working directory, with the ability to move up one folder level by appending ".." or switch drives with "/d."
cd (Change Directory)
206
The syntax for accessing or switching to another local disk volume, making that volume the active context for subsequent commands.
Drive Letter + Colon (Example: D:)
207
A command that displays the name of the local machine on which the current command‑line session is running.
hostname
208
A command that shows or modifies the current network interface configuration, with parameters such as /all, /release, /renew, /flushdns, and /displaydns.
ipconfig
209
A utility for testing connectivity to remote systems, using ICMP echo requests and replies to check reachability. Often blocked by firewalls.
ping
210
Displays each router hop between the local machine and a specified target, useful for diagnosing routing paths.
tracert (Windows) or traceroute (non‑Windows)
211
Similar to tracert, but provides more detailed path analysis and statistics about packet loss at each hop in a network path.
pathping
212
Shows open or listening ports and current network connections on the local PC, used to troubleshoot active sessions.
netstat
213
A high‑level Windows command with subcommands like use (for drive mappings) or user (for account management), affecting both local and domain resources.
net
214
A command commonly pronounced “net shell,” featuring multiple subcommands to configure IP addresses, Wi‑Fi, proxy, caching, and more at a low level.
netsh
215
A DNS lookup tool that returns the hostname for a given IP (reverse lookup) or the IP for a hostname (forward lookup).
nslookup
216
A scriptable Windows command-line utility for creating, resizing, and managing disk partitions, used similarly to the GUI Disk Management tool.
diskpart
217
Command used to prepare or initialize a partition for a file system, erasing existing data in the process.
format
218
Verifies the integrity of the file system on a disk and can fix errors or locate bad sectors when run with /f or /r parameters.
chkdsk
219
A command that creates a new subdirectory (folder) on a formatted disk, functioning as the opposite of rd (remove directory).
md (make directory)
220
A file-copying tool that also can merge multiple files into one and offers switches like /v (verify) and /y (skip overwrite prompts).
copy
221
Once heralded as an improved file‑copy command but now deprecated. Microsoft recommends using robocopy instead.
xcopy
222
A robust folder replication command that preserves NTFS permissions, can mirror directories, and skips identical files to speed transfers.
robocopy
223
A command that terminates running processes on either a local or remote system, useful when an application is locked up and won’t close normally.
taskkill
224
Allows you to power off or restart a local or remote computer from the command line, typically using the /r switch to reboot immediately or with a specified delay.
shutdown
225
Scans for and repairs corrupted or missing system files in Windows; run with scannow or verifyonly parameters at an elevated command prompt.
sfc (System File Checker)
226
A GUI utility (launchable via cmd.exe) that checks whether device drivers carry valid digital signatures, generating a log of any unsigned or questionable drivers.
sigverif (Signature Verification Tool)
227
A versatile utility to build, modify, and maintain Windows imaging files (WIM), commonly used when creating or servicing custom OS deployment images.
dism (Deployment Image Servicing and Management)
228
Displays a small dialog with details on which Windows edition, version, and build number you’re currently running.
winver
229
The modern successor to Command Prompt, providing both interactive administration features and the ability to run powerful scripts in Windows.
PowerShell
230
A safety measure determining whether only digitally signed scripts or any script can be executed, configured in Windows’ security settings.
Execution Policy
231
The core PowerShell command format typically consisting of a verb followed by a noun (e.g., Get‑Service, Set‑Process), extended by parameters.
Cmdlet Syntax
232
A mechanism that routes the output of one cmdlet as the input to another cmdlet, represented by the vertical bar (|) symbol.
Pipeline
233
A PowerShell command that filters objects in a pipeline based on a specified condition, often using a block with curly braces ({}).
where‑object
234
A variable indicator in PowerShell, placed before a name to store or reference data
Dollar Sign ($)
235
The integrated environment for authoring, testing, and debugging PowerShell scripts in Windows, featuring autocomplete and built‑in help.
PowerShell ISE (Integrated Scripting Environment)
236
A versatile parameter in PowerShell that provides details, examples, or advanced usage instructions for a given cmdlet
Get‑Help
237
A Windows framework (executable: mmc.exe) that hosts multiple snap‑in modules, providing a unified environment for system administration.
Microsoft Management Console (MMC)
238
Modular administrative components with an .msc extension that plug into the MMC, each offering specialized system configuration or monitoring.
Snap‑in
239
A default Windows “master console” bringing together Task Scheduler, Device Manager, Disk Management, Shared Folders, and more under one interface.
Computer Management (compmgmt.msc)
240
A centralized location for advanced admin utilities in Windows 10; renamed to “Windows Tools” in Windows 11.
Administrative Tools
241
A system utility that schedules tasks or programs to run automatically, triggered by specific intervals, user logons, or system events.
Task Scheduler (TASKSCHD.MSC)
242
An MMC snap‑in showing directories shared over the network, including hidden administrative shares like C$ and ADMIN$.
Shared Folders (FSMGMT.MSC)
243
Part of Computer Management that creates and manages user and group accounts on the local machine, independent of domain accounts.
Local Users and Groups (LUSRMGR.MSC)
244
Displays all hardware devices and drivers recognized by Windows, showing issues as yellow icons and disabled devices as black arrows.
Device Manager (DEVMGMT.MSC)
245
Used to partition, format, mount, and manage disk volumes; often accessed through the Computer Management console.
Disk Management (DISKMGMT.MSC)
246
The Windows capability to point an MMC console at another machine on the network for remote monitoring and configuration, if firewall and services allow
Remoting
247
A subset of Group Policy settings that govern password policies, account rules, and other security options for the local system when not domain‑joined.
Local Security Policy (SECPOL.MSC)
248
A broader interface (gpedit.msc) providing hundreds of local Windows policy settings, including security configurations and system component controls.
Local Group Policy Editor
249
An MMC console (certmgr.msc) for managing user‑level certificates, trusted CAs, and more; crucial for secure websites and encrypted communications.
Certificate Manager
250
A separate console (certlm.msc) that displays certificates assigned to the computer itself rather than to individual user profiles.
Local Machine Certificates
251
A tool for overseeing local and remote printers, including network‑based print servers; often used to monitor status, troubleshoot, or deploy printers via Group Policy.
Print Management (PRINTMANAGEMENT.MSC)
252
The MMC version of Microsoft’s built‑in, bidirectional network security feature, enabling inbound/outbound rules and IPsec configuration for added protection.
Windows Defender Firewall (WF.MSC)
253
A legacy Windows utility (msconfig.exe) that can launch various admin tools for troubleshooting, such as system services, startup programs, and more.
System Configuration (MSConfig)
254
A collection of repair utilities used when Windows cannot start normally, accessible via the OS install media or a specialized recovery disk.
Windows Recovery Environment (WinRE)
255
An MMC console showing logs of application, security, system, setup, and custom events that help track errors, warnings, and informational messages
Event Viewer (eventvwr.msc)
256
An extensive set of Windows logs located under Applications and Services, revealing detailed event data for specific features like Group Policy or device setups.
Applications and Services Logs (in Event Viewer)
257
A Windows logging functionality that can collect logs from multiple machines into a single system, using event subscriptions and forwarded events.
Event Forwarding
258
A node in the Computer Management console that shows and controls scheduled or on‑demand routines for collecting performance data, and can display real‑time or logged metrics.
Performance Monitor (PERFMON.MSC)
259
An MMC console within Computer Management that lists each installed background service and allows start, stop, or configuration of how each service runs.
Services (SERVICES.MSC)
260
A place in the Control Panel or the Windows Tools list that unifies multiple built‑in administrative consoles. Not strictly a single console, but a launch point for many troubleshooting utilities.
Administrative Tools (Windows 10) / Windows Tools (Windows 11)
261
A monitoring utility in the Computer Management console that tracks CPU, disk, memory, and network usage, providing real‑time or logged performance data.
Performance Monitor
262
Displays background programs Windows can start automatically at boot, showing status, startup type, and dependencies, and allowing admins to stop or restart them.
Services Console
263
A utility (msconfig.exe) for adjusting boot settings (including Safe Mode), launching troubleshooting tools, and disabling/enabling startup items in older Windows versions.
System Configuration (MSConfig)
264
A set of Windows wizards that diagnose and attempt to resolve issues with hardware, networking, audio, printing, and more, accessible from Settings or MSConfig.
Windows Troubleshooting
264
A read‑only tool (msinfo32) that displays detailed information about hardware, BIOS version, environment variables, and other system data.
System Information
265
An in‑depth, real‑time performance tracking tool for CPU, memory, disk, and network usage, showing which processes are consuming which resources.
Resource Monitor
266
Shows running processes, startup impact, resource usage (CPU, memory, etc.), and can terminate rogue processes or launch Resource Monitor for deeper analysis.
Task Manager
267
A raw, low‑level Windows configuration database editor that modifies thousands of system and user settings directly—caution advised due to no undo.
Registry Editor (regedit)
268
A Windows feature that stores system snapshots (not user files) so you can revert the OS, drivers, and registry settings back to a previous working state.
System Restore
269
A Windows utility for defragmenting or optimizing disks, improving performance by rearranging file fragments—especially useful for spinning HDDs.
Optimize Drives (Defragment and Optimize Drives)
270
An automatic weekly process on Windows that checks drive fragmentation, though in practice it may fail to run as scheduled, requiring manual checks.
Scheduled Optimization
271
A built‑in Windows tool used to remove unnecessary files (e.g., temporary files, recycle bin, update leftovers) to reclaim storage space.
Disk Cleanup (cleanmgr.exe)
272
In Disk Cleanup, a button that triggers deeper system file removal analysis, showing additional items like outdated restore points or update files.
Clean up system files
273
A more thorough disk cleanup step that can remove large data like old service packs, leftover update files, or all but the latest system restore point.
Advanced (System) Cleanup
274
A Disk Cleanup option that uninstalls unused programs or deletes all but the most recent Windows restore point, saving more space at the expense of rollback potential.
More Options Tab
275
A reference to the standard spinning disk drive format, which is more prone to fragmentation, making defragging and optimization significantly beneficial.
HDD (Hard Disk Drive)
276
A newer storage technology less impacted by fragmentation, still recognized by Optimize Drives though usually optimized differently than traditional spinning drives.
SSD (Solid-State Drive)
277
A long‑standing Windows interface for system configuration, offering classic tabbed dialogs and both Category or Icon views, mostly focused on desktop/laptop usage.
Control Panel
278
A more modern, touch‑friendly Windows interface that debuted in Windows 8 and continues to evolve, gradually replacing old Control Panel functions.
Settings Applet
279
A Windows environment in which certain user configuration pages are locked or inaccessible because administrative policies have been enforced centrally.
Domain/MDM Restrictions
280
Allows users to type multi‑key combinations (like Ctrl+Alt+Del) by pressing each key in sequence rather than all at once.
Sticky Keys
281
Sounds an audible alert whenever the Caps Lock, Num Lock, or Scroll Lock key is pressed, preventing accidental activation.
Toggle Keys
282
Ignores or slows down repeated keystrokes and very short key presses to assist users with unsteady hands or rapid key presses.
Filter Keys
283
Displays shortcut underlines or hints in dialog boxes and menus, showing what keystrokes you can press to make a selection.
Access Keys
284
A newer Windows feature that integrates with compatible hardware to let the user control the on‑screen cursor and keyboard via eye‑tracking devices.
Eye Control
285
A Windows feature restricting local searches to designated folders, though it can be expanded to include the entire PC (with potential performance impacts).
Search Indexer / Indexing Options
286
A link in Settings that launches the older Control Panel for fine-grained inclusion/exclusion of directories, file types, and whether to index file contents.
Advanced Search Indexer Settings
287
Balancing CPU speed and hardware resources versus energy use, especially relevant for extending battery life on laptops.
Power Management
288
A set of prebuilt system configurations in Windows that specify behaviors for sleep, display timeout, and CPU throttling, e.g., Balanced, Power Saver, and High Performance.
Power Plans
289
A Control Panel that defines system behavior for lid closure, power buttons, and advanced hardware power settings, often accessible through the Balanced/High Performance plan interface.
Power Options
290
Windows feature toggles, including Hyper‑V, IIS, and other built-in software components, which can be enabled/disabled but are already present on disk.
Turn Windows features on or off
291
A Control Panel tool used to uninstall or repair installed software, or enable optional OS features, historically found in Add/Remove Programs.
Programs and Features
292
The newer Settings interface that replaces some Control Panel functionality, used for uninstalling or resetting installed apps, plus installing certain “Optional features.”
Apps & features (Settings)
293
A legacy but still comprehensive Windows Control Panel that centralizes network settings and adapter options, accessible from both Settings and Taskbar network icons.
Network and Sharing Center
294
Allows you to create, configure, or troubleshoot network connections, toggle visibility on LANs, and modify file/print sharing preferences
Change adapter settings & advanced sharing settings (in Network and Sharing Center)
295
A Control Panel for browser security, privacy, content settings, and add‑on management, historically affecting Internet Explorer and partially Edge.
Internet Options
296
A method of taking control of a remote PC with no concurrent local session, disabled by default, and managed under System > Remote Desktop in Settings.
Remote Desktop
297
A list or group setting that designates who can connect to a remote system via the Remote Desktop protocol, found under the Remote Desktop page.
Select users that can remotely access this PC
298
A Control Panel utility enabling local caching of shared network folders on a Windows PC, letting users synchronize offline copies with the server.
Sync Center
299
A feature in Sync Center that ensures the local file and network file match, especially useful when reconnecting after being offline.
Manage offline files / force synchronization
300
The built‑in method of acquiring and installing Windows security patches and reliability updates, accessible through Settings and often governed by domain policy.
Windows Update
301
A consolidated interface for managing Windows Defender Antivirus, firewall, SmartScreen, device security, and more, often located next to Windows Update in Settings.
Windows Security
302
A Control Panel for altering local credentials, creating standard vs. admin accounts, and linking over to the Settings-based biometric login options.
User Accounts
303
A feature that encrypts drives so that data remains unreadable if the disk is removed, typically leveraging a TPM chip to store encryption keys.
BitLocker
304
Also called Restore Points, it allows Windows to revert to a previously saved system state if files or registry entries get corrupted or infected.
System Protection
305
A user‑friendly interface for enabling or disabling the built‑in firewall across three profiles (Domain, Private, Public) without drilling into advanced MMC rules.
Windows Defender Firewall (Control Panel)
306
A more granular console (in an MMC) for configuring inbound/outbound rules and IPsec policies, launched from Windows Defender Firewall’s “Advanced settings.”
Windows Firewall with Advanced Security (MMC)
307
A Windows Security module controlling account sign‑in methods (e.g., biometrics), plus network sign‑in options, often integrated with Windows Hello features.
Account Protection
308
A Windows feature that automatically detects and installs new hardware drivers, reducing manual setup by matching devices to entries in the local driver store.
Plug‑and‑Play
309
A tile in Windows Settings that manages Bluetooth, printers, and other peripheries, offering a “Devices and printers” link that opens a more traditional interface.
Devices (Settings Tile)
310
A control panel that organizes printers, multimedia gadgets, and peripheral items in a user‑friendly view, often used for basic printer setup and removal.
Devices and Printers
311
Provides a comprehensive list of recognized system hardware, grouping devices by category, and enabling driver updates, uninstalls, or resource configuration.
Device Manager
312
A panel showing audio output/playback and input/recording devices, allowing configuration of default devices, levels, enhancements, and other sound settings.
Sound Control Panel
313
Found under Windows’ System category in Settings, it supports choosing default input/output devices and linking to the more detailed Sound Control Panel if needed.
Sound Settings (in System)
314
An advanced configuration screen accessed via Settings > System > About, letting you adjust system performance, environment variables, and user profiles, among others.
Advanced system settings (System Control Panel)
315
Disk space used as “backup RAM” when installed memory is insufficient, which can be auto-managed by Windows or set manually for potential performance tweaks.
Page File
316
Enterprise-level tools like Group Policy and Intune that lock or preset certain system options, preventing users from making local changes in Settings or Control Panel.
Configuration Management
317
Reflects whether an application demands a certain CPU speed, architecture (32‑bit vs. 64‑bit), and generation or core count (e.g., quad‑core minimum).
CPU Requirements
318
Specifies which operating system version/build an app supports (e.g., Windows 10 21H2), distinguishing between 32‑bit or 64‑bit editions.
OS Requirements
319
The storage space an application needs to install and maintain data over time, sometimes split between Program Files and hidden user folders (AppData).
Disk Space Requirements
320
The difference between “just enough to run” hardware specs and “enough to run comfortably,” which can greatly affect performance and user satisfaction.
Minimum vs. Recommended Specs
321
For graphics‑intensive apps, hardware demands such as GPU model, DirectX version, and the amount or type (dedicated vs. shared) of graphics memory.
Graphics / VRAM Requirements
322
Ensures the local environment (RAM, disk space) can handle partial workloads (e.g., caches, temp files) even if the primary app is cloud‑hosted.
Local Resource Usage for Cloud Apps
323
A readme file, product website, or store listing containing an app’s CPU, OS, disk, and GPU needs — essential for checking compatibility before installation.
Locating Application Requirements
324
An approach where you install the program on a test machine first; it may auto‑check prerequisites and alert you if CPU, RAM, or disk capacity is insufficient.
Trial Installation / Prerequisite Checking
325
Refers to installing software via physical media (e.g., DVD or USB), or a locally mounted ISO image, especially useful in poor network conditions or for one‑off setups.
Local Installation
326
A container file that mirrors a DVD’s content. Once mounted by the OS, it behaves like a physical disc, enabling faster installs without optical hardware.
ISO File
327
An approach used by organizations to host setup files or leverage tools like Microsoft Configuration Manager/Intune so users can install apps over the company’s internal network.
LAN‑Based Installation
328
Involves downloading or streaming the installer from the internet, possibly requiring authentication (e.g., Microsoft account) and relaxed firewall rules or antivirus settings.
Cloud‑Based Installation
329
It is best practice of reading official documentation (also known as this) to learn about OS prerequisites, old version removal instructions, and any unique install steps.
Release Notes / README Files
330
Typically performed before installing or updating software to ensure a way to revert changes if something goes wrong (e.g., creating restore points or backups).
Fallback Position / Recovery Plan
331
Checking for malicious payloads in installer files (especially when temporarily disabling antivirus) to avoid infection during or after installation.
Malware Scanning
332
Centralized enterprise utilities that can automate and control application deployment across multiple systems, such as Intune or Endpoint Configuration Manager.
Enterprise Deployment Tools
333
The process of verifying setup success by reading installer results, searching for error or warning strings that might point to future issues.
Installer Log Review
334
The higher‑level privileges typically required to install or update software, often needed to write to protected OS folders like Program Files or the registry.
Installer Permissions
335
An OS structure in Windows that contains hardware and software settings, secured so that only privileged applications or administrators can modify it.
Windows Registry
336
A Windows directory where applications typically install their program code and related files; restricted to prevent unauthorized changes.
Program Files Folder
337
Involves using elevated privileges (e.g., “Run as administrator”) for setup programs that fail with normal user rights due to access or write permission errors.
Run as Administrator
338
Temporary changes like lowering firewall rules or antivirus settings so that a program can install or run, followed by restoring stricter protections afterward.
Relaxing and Reinstating Security Controls
339
Ensuring a new application doesn’t conflict with encryption (BitLocker, EFS), DRM, or auditing standards required by regulations or organizational policies.
Security Integration / Compatibility
340
The Windows domain feature used to configure or enforce application policies, possibly restricting or allowing certain app settings across all domain computers.
Group Policy
341
Verifying whether installing or using an application would expose personal or business data to vendors, and ensuring compliance with privacy regulations.
Privacy & Data Exposure Consideration
342
The ongoing help desk, training, and updates needed to keep an application running effectively, often far exceeding the initial license cost.
Support Requirements
343
A standardized disk image (thick or hybrid) containing Windows plus core corporate apps, possibly requiring changes if new software increases hardware or OS needs.
Corporate Standard Platform / Image
344
The hidden expense when an application demands new or upgraded devices (CPUs, GPUs, etc.), changing replacement schedules and inflating IT budgets.
Hardware Demands & Lifecycle Impact
345
Potential strain on internal or external bandwidth due to frequent software updates, license checks, or data synchronization tasks.
Network Traffic Considerations
346
The up‑front purchase price plus recurring fees (e.g., subscriptions, renewals), and sometimes unfriendly terms regarding data collection or usage reporting.
License Costs & Contractual Obligations
347
An application’s ability to exchange data or work seamlessly with other software, both internally (other departments) and externally (customers, partners).
Interoperability
348
Mandatory adherence to legal or contractual requirements (e.g., privacy, encryption) that may render certain apps unsuitable or noncompliant.
Security & Privacy Constraints
349
A specialized product that might meet a narrow technical need but fails to create universally usable files or outputs, limiting overall organizational benefit.
Niche Application Limitations
350
chkdsk parameter that scans and fixes errors on the disk, but requires exclusive access to the volume (often leading to a prompt to schedule at next reboot).
/f
351
chkdsk parameter that locates bad sectors, recovers readable data, and implicitly includes fixing errors; can be time‑consuming for large volumes.
/r
352
Chkdsk parameter that Shows clean‑up messages on FAT32 volumes and detailed file processing messages on NTFS volumes, providing more verbose output.
/v
353
Netstat parameter that shows all active TCP connections and all listening ports, including TCP and UDP, rather than just established connections.
-a
354
Netstat parameter that displays the executable or service responsible for each open port or connection, useful for tracing a connection back to its owning program.
-b
355
Netstat parameter that lists addresses and ports numerically instead of attempting to resolve names (hostnames or service names), speeding up the display.
-n
356
Netstat parameter that displays Ethernet statistics, including bytes and packets sent/received, unicast packets, discards, and errors.
-e
357
The xcopy parameter that copies all subdirectories inside the folder
/e
358
The xcopy parameter that denotes that the destination provided in the command is a directory
/i
359
Robocopy parameter that denotes to mirror the directory to the destination
/mir
360
Robocopy parameter that allows to resume the transfer if interruption happens
/z
361
a CLI used to refresh Group Policy settings on a computer
gpupdate
362
a CLI used to display the Resultant Set of Policy (RSoP) information for a user or computer
gpresult
363
gpresult parameter that gives a report of the policies in place for a user or computer
/r
364
Linux command that lists files and directories in the current working directory.
ls
365
Linux command that displays the current working directory's full path.
pwd
366
Linux command that moves or renames files and directories.
mv
367
Linux command that copies files and directories.
cp
368
Linux command that removes files or directories.
rm
369
Linux command that changes file or directory permissions.
chmod
370
Linux command that changes file or directory ownership.
chown
371
Linux command that switches to another user account (commonly root) by opening a new shell, requiring that user’s password.
su
372
Linux command that executes a single command with elevated/root privileges using your own password (if authorized).
sudo
373
Linux command that installs, updates, or removes packages on Debian-based systems
apt-get
374
Linux command that installs, updates, or removes packages on Red Hat-based systems.
yum
375
Linux command that displays or configures network interface parameters
ip
376
Linux command that shows disk space usage for mounted filesystems.
df
377
Linux command that searches for patterns in text using regular expressions.
grep
378
Linux command that displays information about running processes.
ps
379
Linux command that displays the manual (help) pages for commands, showing usage syntax, options, and descriptions. Pages are organized by sections (e.g., user commands, system calls, config files).
man
380
Linux command that displays a real-time, updating view of running processes and system resource usage, including CPU, memory, uptime, and load averages. You can sort, filter, or kill processes directly from the interface.
top
381
Linux command that searches for files and directories in a directory hierarchy
find
382
Linux command that performs DNS lookups to resolve hostnames or IP addresses
dig
383
Linux command that concatenates and displays the contents of one or more text files. Commonly used to quickly view file contents, combine multiple files, or redirect file output. Does not offer editing capabilities.
cat
384
Linux command that acts as a simple command-line text editor for editing file
nano
385
A disk image file that mounts as a virtual drive when opened; commonly used to distribute macOS applications.
.dmg
386
A macOS installer package used to install software system-wide; often includes scripts and components for full application setup.
.pkg
387
Represents a complete macOS application bundle; appears to the user as a single app file but contains the executable and all required resources.
.app
388
Which file system supports file and folder permissions and is standard on Windows? (Set 757) A) FAT32 B) NTFS C) exFAT D) EXT4
Answer: B) NTFS
389
Which of the following allows you to create and manage virtual machines in Windows 10 Pro or Enterprise? (Set 276) A) VirtualBox B) Hyper-V C) VMware D) VNC
Answer: B) Hyper-V
390
In Linux, which command is used to change file permissions? (Set 573) A) chmod B) chown C) ls D) mv
Answer: A) chmod
391
What is the purpose of the 'df' command in Linux? (Set 745) A) Display file contents B) Check disk usage C) Format drives D) Fix file systems
Answer: B) Check disk usage
392
Put the steps in order to perform a clean installation of Windows 10: 1) Create installation media 2) Choose partition 3) Boot from USB 4) Run Setup 5) Format drive
1. Create installation media 2. Boot from USB 3. Run Setup 4. Choose partition 5. Format drive
393
Put the steps in order to enable a Windows feature using Control Panel: 1) Open Control Panel 2) Click Programs 3) Select 'Turn Windows features on or off' 4) Check feature 5) Restart if prompted
1. Open Control Panel 2. Click Programs 3. Select 'Turn Windows features on or off' 4. Check feature 5. Restart if prompted
394
Arrange the Linux commands to create a new file and move it to a directory: 1) cd /home/user 2) touch file.txt 3) mkdir files 4) mv file.txt files/
1. cd /home/user 2. touch file.txt 3. mkdir files 4. mv file.txt files/
395
Put the Windows boot process components in the correct order: 1) POST 2) Boot manager 3) BIOS/UEFI 4) OS loader 5) Kernel loading
1. POST 2. BIOS/UEFI 3. Boot manager 4. OS loader 5. Kernel loading
396
Put the steps to map a network drive in Windows in order: 1) Open File Explorer 2) Click 'This PC' 3) Click 'Map network drive' 4) Enter path and credentials 5) Finish
1. Open File Explorer 2. Click 'This PC' 3. Click 'Map network drive' 4. Enter path and credentials 5. Finish
397
"Where are most user settings stored in Windows? (Set 241) A) Registry B) Boot.ini C) Group Policy D) Control Panel"
Answer: A) Registry
398
"Which utility helps users back up and restore system files in Windows? (Set 637) A) System Restore B) Backup and Restore C) File Explorer D) Task Scheduler"
Answer: B) Backup and Restore
399
"Which macOS utility allows access to system and security logs? (Set 180) A) Activity Monitor B) Console C) Disk Utility D) System Preferences"
Answer: B) Console
400
"Which of the following commands displays hidden files in a Linux directory? (Set 583) A) ls -a B) ls -h C) ls -l D) ls -r"
Answer: A) ls -a
401
"What command would you use in Windows to check for file system errors? (Set 618) A) sfc /scannow B) chkdsk C) ipconfig D) format"
Answer: B) chkdsk