1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.11 Flashcards
The Internet Options in the Control Panel, what Tab Internet Properties sets the home page; set tab settings; delete browsing history, cookies, temporary files, and saved passwords; change appearance; and configure accessibility settings
General
The Internet Options in the Control Panel, what Tab Internet Properties configures security zones
Security
The Internet Options in the Control Panel, what Tab Internet Properties selects privacy settings for the current zone, location settings, pop-up blocker, and InPrivate browsing settings
Privacy
The Internet Options in the Control Panel, what Tab Internet Properties sets options for family safety, SSL certificate management, AutoComplete, and feeds
Content
The Internet Options in the Control Panel, what Tab Internet Properties sets options for VPNs, dial-up, LAN connections, and proxy servers
Connections
The Internet Options in the Control Panel, what Tab Internet Properties selects the default web browser, manage add-ons, select the default HTML editor, and set the default apps for email and other Internet services
Programs
The Internet Options in the Control Panel, what Tab Internet Properties enables and disable accelerated graphics; configure accessibility settings, browsing settings, HTTP settings, international settings, multimedia settings, and security settings; and reset Internet Explorer to the default settings
Advanced
In control panel which one is to adding displays, cameras, scanners, and so on.
Devices and Printers
In control panel which one is to uninstalling and changing programs.
Programs and Features
In control panel which one is to viewing and managing network connections.
Network and Sharing Center
In control panel which one is to configuring security
Windows Defender Firewall
In control panel which one is to Adjusting mail settings for Microsoft Outlook Email users.
In control panel which one is to Setting up speakers, headphones, and microphones; managing event sounds and themes.
Sound
From the Control Panel, if you select Accounts, you can manage the _____and access to other users.
User Accounts
The Device Manager accessed in the_____is the same one discussed under the MMC
Control Panel
This page in the Control Panel manages the indexing of data on a computer. Using these options can help increase the ease and speed for finding information. Just as the index in the back of this book helps you locate a specific topic, indexing the computer makes it easy for the search tool and selected apps to find useful information.
Indexing Options
This page in the Control Panel is an easy way to access tools to manage the computer. Some of these tools are familiar from the previous section, such as the System Information, Resource Monitor, System Configuration, Disk Cleanup, Disk Defragment, Registry Editor, and Event Viewer utilities. Several of the tools in this panel are discussed in other sections.
Administrative Tools
File Explorer Options which tab is to Displays file and folder information
View tab
File Explorer Options which tab is to Selects folders to index for searching
Search tab
File Explorer Options which tab is to Opens folders
General options tab
In Windows 10, _____ is not a listed option for the shutdown menu; however, it can be added by modifying a power plan: Select the Choose What the Power Buttons Do link under Power & Sleep Settings > Additional Power Settings.
Hibernate
stores running programs in RAM and uses little power.
Sleep mode
which Power plan Default plan. Balances performance with energy consumption.
Balanced
which Power plan Reduces CPU performance and screen brightness more than the Balanced plan, for longest battery life.
Power Saver:
which Power plan Offers the fastest CPU performance, brightest screen, and shortest battery life.
High Performance
which Power plan Limited to Windows 10 Pro Workstation edition for high-end computers
Ultimate Performance
Settings for power, sleep, and lid closure are managed in the Power Options by choosing the link What Closing the Lid Does. This brings up System Settings for power options. Note that options are set with both check box and drop-down menu
Standby, Lid, and Fast Startup Options
a power management setting that allows a computer to awaken from sleep with a signal via the USB port, such as a USB mouse. The setting is necessary because if all USB ports went to sleep, wiggling a mouse would not wake the computer; selective USB ports are set to respond to a signal from an attached device.
Universal Serial Bus (USB) selective suspend
settings are used to customize settings to the user’s needs and tastes. Search for ___and select the app. Note that the column on the left has groups of settings for Vision, Hearing, and Interaction. These settings help users of varying abilities more easily interact with the computer.
Ease of access
Setting time and date formats and automatic time settings
Date and Time:
Setting the country or region and the local format of date and time
Region:
Adding languages and changing keyboard language options
Language:
Enabling voice recognition and choosing the computer’s voice
Speech:
are generally about sharing your usage information and data history with Microsoft for research purposes.
Privacy settings
Choosing a background color, picture, or slideshow
Background:
Sharing web activity and app launches, managing web advertising settings
General:
Collecting speech patterns
Speech:
Collecting user handwriting and typing patterns
Inking & Typing Personalization:
Sharing software problems and crashes with Microsoft
Diagnostic and Feedback:
Managing settings for local storage and external sharing of activity
Activity History:
Managing privacy settings for each app or device
App Permissions:
Downloading maps to use when offline
Offline Maps:
Setting opening sites with an app or the browser
Apps for Websites:
Setting video resolution and battery power settings
Video Playback:
Managing which apps will start when logging in
Startup:
Preference settings for badge display, showing or hiding the taskbar, and setting the command prompt/PowerShell default when right-clicking the taskbar
Taskbar:
Installing new apps or removing old ones
Apps & Features:
Settings for locking an idle computer and the locked display
Lock Screen:
Choices for background sounds, colors, or images
Themes:
Light and dark colors for menus (such as the Windows menu)
Colors:
The Windows key hints at which keyboard key is being configured
Start (Windows key) Menu:
Font choices for Windows text and tools for importing fonts
Fonts:
Managing settings for keyboard, mouse, audio, and so on
Bluetooth & Other Devices:
Setting shortcuts on an Xbox game bar
Xbox Game Bar:
Optimizing the PC for gaming
Game Mode:
Monitoring status and performance, handling Xbox Live connectivity
Xbox Networking:
Managing settings to capture game play audio and video
Captures:
Managing general information on current network settings and activity
Status:
Setting specific Wi-Fi settings, handling IP and hardware information
Wi-Fi:
Granting access to physical and virtual Ethernet interface settings
Ethernet:
Granting access to dial-up settings if phone line and modem are available
Dial-up:
Allowing and adding virtual private network access
VPN:
Sharing and Internet connection over Bluetooth or Wi-Fi
Mobile Hotspot:
Managing settings for using a proxy server (not applicable to VPNs)
Proxy
Enabling and disabling wireless, Bluetooth, and cellular data
Airplane Mode:
Adding and removing printers and scanners
Printers and Scanners:
Managing mouse settings such as the primary button, scrolling, and pointer options
Mouse:
Managing settings for sensitivity, scrolling, zoom, and so on
Touchpad:
Managing settings for spell checking, text suggestions, and spacebar options
Typing:
Handling settings for the handwriting font
Pen and Window Ink:
Determining default settings for playing videos or music from apps
AutoPlay:
Issuing charging notifications and managing battery settings
USB:
Managing profile settings for the user
Your Info:
Adding accounts used by other apps for easier sign-in
Email & Accounts:
Setting sign-in procedures with security settings and requirements
Sign-in Options:
Handling connection settings for managed
computers on a domain
Access Work or School:
Adding other accounts to the computer
Other Users:
Allowing settings to sync across devices on a Microsoft account
Sync Your Settings:
Determining the apps chosen for music, pictures, mail, browser, and so on
Default Apps:
(files, folders, printers, and devices) and user accounts are stored on servers.
Shared resources
server is used to authenticate users, and other servers can be used for print, file, email, and other services.
Active Directory
A shared folder or drive can be accessed by other computers on the network.
Network Shares
can be accessed by either its mapped drive letters or its folder names in File Explorer.
Network Shares
____network can offer unlimited sharing (full control or readonly) for any user who connects to a system if password-protected sharing is disabled. (This is not recommended.)
workgroup
On a __ with peer servers that support user/group permissions, shares are protected by lists of authorized users or groups. Windows 10 supports user/group access control.
client/server-based network / peer-to-peer network
are hidden shares that can be identified by a $ at the end of the share name. Standard users who are browsing to the computer over the network cannot see these shares; they are meant for administrative use.
Administrative shares
Windows enables shared folders and shared drives to be ____to drive letters on clients. In File Explorer/This PC, these ___ letters show up in the list along with the local drive letters. A shared resource can be accessed either through Network (using the share name) or through a mapped drive letter.
mapped drive
A shared folder ____ can be referred to by the drive name instead of by using a long Universal Naming Convention (UNC) path.
When using MS-DOS programs, keep in mind that using ___is the only way for those programs to access shared folders.
mapped drive
Printers connected to network computers can be shared or printers can be connected directly to a network with Ethernet or wireless Ethernet (Wi-Fi) connections.
share printer
provides protection against unwanted inbound connections and can also be configured to filter outbound connections.
Windows Defender Firewall
Computers that are members of a local network must be configured so that
they can communicate with each other. This is most often done with an
Internet Protocol (IP) addressing scheme
is input using a decimal notation scheme with four 8-bit parts to an address. These parts are called octets because the number represents 8 bits.
IPv4 address
The number of bits representing networks and the number representing the host can change. Just looking at an address, there is no way to tell which bits or part of a bit describes the network address and which describes the host address. This is where the ___ comes in.
subnet mask
The purpose of a ___ is to help routers and devices distinguish network bits from host bits. ___ is also 32 bits long and noted in groups of 8 bits. When a subnet mask bit is “on,” or a binary 1, the router does some calculating with the address to determine which is the network and which is the host. An IPv4 address is meaningless to a router (and to humans, for that matter) unless a ___ is configured.
subnet mask
A ____ usually belongs to an Internet service provider (ISP).____ are special computers that keep track
of the IP addresses of domain names, such as Microsoft.com, IRS.gov, and NYT.com. People use domain names in their browsers because they are much easier to remember than IP addresses (but you can type IP addresses into browsers, too). Each domain name has a specific IP address for locating the server on the Internet. The job of a ____ is to match the domain name with the correct IP address so that packets can be delivered.
Domain Name System (DNS) servers
(cellular) connection shows up in the list of network connections after a SIM card is installed and activated by a mobile provider. A corporate network can use a proxy server as an intermediary between a network client and the destination of the request (such as a web page) from the network client.
wireless wide area network (WWAN)
Use the option to configure a wired connection if you are setting up a Pointto-Point Protocol over Ethernet (PPPoE) connection. This type of connection is used by cable or DSL ISPs that require the user to log in to the connection:
Wired Connections
A _____can be configured when the user clicks on the SSID
from the taskbar or Settings menu.
wireless connection
are assigned, or leased, temporarily and need to be renewed after a period of time. The network administrator can adjust how much time applies for the lease
Dynamic addresses
A network administrator can reserve some network addresses and not allow DHCP to use them.
Static addresses
Similarly, network information can be mapped using File Explorer by selecting the Network icon from the menu on the left. To trace a path to a network, and for other information, click the Network tab in the top left to see the ribbon of network options. From here, you can view network paths and add devices to the network.
File Explorer Navigation: Network Paths
Many ISPs and mobile companies have data plans with usage thresholds that,
when passed, can lead to increased costs and unpleasant surprises in a billing
statement. One way to avoid accidental overages is to manage usage in the
Metered Connection
A 32-bit system can address up to__of RAM. This includes both the system’s RAM and the memory used by applications.
4 GB
The minimum Ram requirements for Windows 10 32-bit is
1 GB
The minimum Ram requirements for Windows 10 64-bit is
2 GB
The minimum free hard disk space requirements for Windows 10 32-bit
16 GB
The minimum free hard disk space requirements for Windows 10 64-bit
20 GB
are separate components that have their own dedicated memory and processing power. They are more powerful than integrated graphics and are designed for demanding tasks such as 3D rendering, gaming, video editing, and other graphics-intensive applications. _____cards provide better performance, higher frame rates, and improved visual quality compared to integrated graphics.
Dedicated graphics cards/discrete graphics cards,
are built into the CPU or the motherboard itself. They share system memory and are generally less powerful than dedicated graphics cards.___are suitable for basic tasks such as web browsing, document editing, and even some lightweight gaming or video playback. They are energy-efficient and often found in laptops and budget-friendly desktop computers.
Integrated graphics
is RAM dedicated to processing graphics displays. It can be an assigned part of the system RAM, for an integrated graphics card. For example, a computer might have 4GB of RAM, with 1GB dedicated to the onboard graphics chip. It also refers to the RAM mounted on a dedicated card to support the GPU. This RAM is next to the GPU and does not draw on system resources for high-quality display.
Video Random Access Memory (VRAM)
32-bit systems require a CPU with a __ architecture.
32-bit
64-bit systems require a CPU with a __ architecture.
64-bit
These devices connect to a computer’s USB port. They often have a physical button that the user presses to generate a one-time password (OTP) for authentication.
USB Tokens
Downloadable of _______
1) Direct from the manufacture
2) Centralized app store
3) Avoid 3rd party download
Distribution Methods
Physical media provides a physical copy of the content, such as a DVD, Blu-ray disc, CD, or game cartridge.
Distribution Methods
Will adding hardware or software for one user degrade the user experience for another user?
Will updating the OS cause legacy software to stop working?
Impact to device:
Will adding new users and devices degrade the current network performance?
How will adding network storage improve or degrade network capabilities?
Impact to network:
Will new software updates take down the network for significant periods?
Will moving to the cloud impact the processing time of sales transactions?
Impact to operation:
Will adding security software lock out business partners?
Can the business financially afford upgrades, and do they make economic sense in the long run?
Impact to business:
is closed source, and only some components are open to developers. macOS was released in 2016 and designed to integrate with devices using the iOS operating system, such as the iPhone, Apple TV, and Apple Watch.
macOS
is an open source OS, which means that the source code is free.
Because ___is open source, it is available free on the Web in the form of distros (distributions). __is available as command-line distros; and others are GUI distros. Popular distros of Linux are Ubuntu, Mint, Kali, and Red Hat.
Linux
is a relatively new OS developed by Google. It is an open-source OS, based on an open-source Gentoo Linux OS. The functionality is unique, in that the OS runs off the Google Chrome web browser. ___ can be installed off a USB drive and can run on a PC or Mac.
Chrome OS
which is an operating system based on the Linux kernel, is an example of open source software. Used mostly on smartphones and tablet computers, ___ is developed by the Open Handset Alliance, a group directed by Google. Google releases the ___OS code as open source, allowing developers to modify it and freely create applications for it. Google also commissioned the ___Open Source Project (AOSP), whose mission is to maintain and further develop ___.
Android
The Apple iOS is an example of closed source software. Known as the iPhone Operating System, this is now simply referred to as ___ because it is used on the iPod Touch, and iPhone.
iOS
The iPad once ran on iOS, but with version 13 (2019), it was powerful enough to have its own __, which is more robust than iOS and supports using a keyboard and multitasking.
iPadOS
The__ is the native file system of Windows 10.
New Technology File System (NTFS)
NTFS has many differences from FAT32, including the following:
Individual files, folders, or an entire drive can be compressed without the use of third-party software.
Built-in compression
NTFS has many differences from FAT32, including the following:
Unlike FAT32, NTFS includes a separate Recycle Bin for each user.
Individual Recycle Bins
NTFS has many differences from FAT32, including the following:
The Encrypting File System (EFS) enables data to be stored in an encrypted form. It requires no password and no access to files.
Support for the Encrypting File System (EFS):
NTFS has many differences from FAT32, including the following:
Drive mounting enables you to address a removable-media drive’s contents, possibly as if its contents are stored on your hard drive. The hard drive’s drive letter is used to access data on both the hard drive and the removable media drive.
Support for mounting a drive
NTFS has many differences from FAT32, including the following:
The administrator of a system can enforce rules about how much disk space each user is allowed to use for storage.
Data Quota Support
NTFS has many differences from FAT32, including the following:
_____Removable-media drives that have been formatted with NTFS (such as USB) can be connected or removed while the operating system is running.
Indexing: The indexing
Hot - swapping:
NTFS has many differences from FAT32, including the following:
___: The indexing service helps users locate information more quickly when the Search tool is used.
Indexing
NTFS has many differences from FAT32, including the following:
______Different levels of access control, by group or user, can be configured for both folders and individual files.
Access control
enables data to be stored in an encrypted form. It requires no password and no access to files.
Encrypting File System (EFS)
has a maximum file size limit of 4 GB, so it cannot store individual files larger than this size.
FAT32
Use it for cross-platform compatibility, especially when dealing with small files and storage devices with limited capacity.
FAT32:
Choose it for cross-platform compatibility, large files, and storage devices with higher capacity
exFAT:
Compatibility: Designed for compatibility across platforms, supported by modern Windows, macOS, and many devices. Suitable for cross-platform use.
Maximum Volume Size: Supports large volumes, up to 128 petabytes (PB).
Maximum File Size: Supports very large individual files, with a maximum size of 16 exabytes (EB).
File and Directory Limits: Has higher limits on the number of files and directories in a single directory compared to FAT32.
Journaling: Supports optional journaling for data integrity.
exFAT (Extended File Allocation Table):
Compatibility: Highly compatible with various operating systems, including Windows, macOS, Linux, and many devices. Good for cross-platform compatibility.
Maximum Volume Size: Supports up to 2 terabytes (TB).
Maximum File Size: Has a maximum file size limit of 4 gigabytes (GB), which can be limiting for large files.
File and Directory Limits: Has limitations on the number of files and directories within a single directory.
Journaling: Does not support journaling, making it more vulnerable to data corruption.
FAT32 (File Allocation Table 32):
Linux-Based: Primarily used on Linux-based systems, offers improved data integrity and reliability.
Journaling: Supports journaling to prevent data corruption.
Maximum Volume and File Sizes: Supports larger volumes and file sizes compared to FAT32.
ext3 (Third Extended File System):
macOS/iOS-Based: Developed by Apple for macOS and iOS devices.
Snapshots: Supports file and directory snapshots for data recovery.
Clones and Deduplication: Allows for efficient storage management.
Encryption: Built-in support for file and disk-level encryption.
High Performance: Designed for SSDs and offers improved performance.
APFS (Apple File System):
Windows-Based: Developed by Microsoft for Windows, with partial read-only support in some Linux distributions.
Journaling: Supports journaling for data integrity.
Maximum Volume Size: Supports very large volumes, up to 256 terabytes (TB).
Maximum File Size: Supports very large individual files, up to 16 exabytes (EB).
Security: Supports file and folder permissions and encryption.
NTFS (New Technology File System):
Linux-Based: Successor to ext3, commonly used on Linux systems.
Journaling: Supports advanced journaling features, improving data integrity and recovery.
Maximum Volume and File Sizes: Supports large volumes and very large individual file sizes.
Performance: Offers better performance and faster file system checks compared to ext3.
ext4 (Fourth Extended File System):
When a product has reached its scheduled EOL date, the vendor will end support for the product. Tech support and warranties will expire. The vendor will no longer release product updates, security patches, drivers, firmware, etc., leaving the legacy product vulnerable to security attacks. Vendors encourage customers to buy the new, next generation product as a replacement for the legacy product.
End of life (EOL) phase:
Not all OS updates are feasible on all products. For example, iOS 15 cannot run on most phone models earlier than iPhone 6s or SE. This is because the software advancements went further than the physical capabilities of the chipset—this can be processing power, video power, or another factor. Be sure to check vendor websites before updating, to make sure the device is compatible with the update.
Updating can have hidden costs as well. If users have accessories to go with their devices—video cable, USB adapters, and writing pens, those might also need to be replaced. As devices migrate to USB-C interfaces, many of the old accessories are rendered useless when the new device arrives.
Update Limitations
Use this method to install Windows to an individual PC and to create a master PC from which disk images can be created.
Optical disc (CD-ROM/DVD/Blu-ray):
Use this method to install Windows to one or more systems that have working network connections. To use this method, network adapters must be configured to boot using the PXE boot ROM to a network location that contains an operating system image.
Network/PXE boot (Preboot Execution Environment):
This is the most common place for OS files to reside. After the OS is installed, it is important to change the boot order in BIOS/UEFI so that the computer looks here first for files and does not try to reinstall from the external source. older and install Windows over the network connection.
Solid state/flash or internal hard drives (HDD/SSD):
Use this method when installing from a DVD is not feasible, such as installing Windows to a computer that lacks a DVD drive.
USB/eSATA boot (booting from a USB thumb drive):
Downloading and installing over the Internet is an option. This involves downloading a server app and then downloading and creating the Windows ISO file. It is then possible to share the Windows installation folder and install Windows over the network connection.
Internet based:
are attached in special drive bays that allow the hard disk to be changed out while the computer is running. When a computer is running, the OS is loaded into
RAM so that the OS can reside on a hot-swappable drive and be changed out, as long as it is returned to the drive bay that is identified in BIOS/UEFI as the bootable drive.
External/hot-swappable drive:
This option is similar to the internal hard drive above, but it involves a designated partition, or a section on the drive reserved for booting.
Partition on the internal hard disk drive or SSD:
To perform an _____, create the appropriate type of answer file for the installation type.
An _____ uses an answer file where responses are stored
unattended installation
To perform an upgrade of the Windows 10/11 OS to the latest version, an __installation of Windows is recommended. Start the installation process from within the existing version of Windows. These___do not delete previous installations, which means that the user can retain apps and settings as well as personal files.
In-place upgrade
Laptops and brand-name desktops likely have a ______on the hard drive
*Contains a copy of the OS build, device drivers, diagnostics programs, and preinstalled applications
*Partition might or might not be hidden
Recovery partition
A partition on a hard drive that contains a recovery utility and installation files.
Recovery partition
overwrites the existing OS and applications In the Windows setup program, a _____ is called a custom installation.
Advantage of _____-: get a fresh start
Clean install
Make sure the drive for installation is placed before the hard drive in the boot sequence. The system needs to boot from the Windows distribution media if you are installing to an empty hard drive. You can perform a clean install of Windows from within an older version of Windows if you want to replace the older installation.
If you will be installing to a drive that might require additional drivers (SATA, RAID, or third-party host adapters on the motherboard or in an expansion slot), have the drivers available on any type of removable media that the system supports.
If you are installing from optical media, from a disk image (ISO, VXD, or VHDX), or within a virtual machine (VM), then after restarting the system with the CD or DVD media or image file in place, press a key when prompted to boot.
During the installation process, be prepared to confirm, enter, select, or provide the following settings, information, media, or options when
prompted:
Custom installation: Choose this option if performing a “ ” installation to an unused portion of the hard drive or wiping out the existing installation instead of upgrading it.
Clean install
If a Windows operating system installation becomes corrupt, use a___to restore working files and Registry entries without losing existing programs or information.___are available in Windows 10. Make a backup copy of your data files (stored in \Users\Username for each user of your PC) before you perform a __, in case of problems.
repair installation
The__process is also known as an in-place upgrade.
repair installation
To perform a _____of Windows 10 with a USB flash drive (which needs to be created before you start this process), follow these steps:
Step 1. Boot the computer normally and sign into the Administrator account. Disable any third-party security software to avoid interruptions of the upgrade.
Step 2. Insert the flash drive and run setup.exe to start the setup.
Step 3. When prompted, download and install updates.
Step 4. Accept the end user licensing agreement. The updates begin.
Step 5. When the updates are ready, click Install when prompted.
Step 6. Choose to keep personal files, if that is the preference.
Step 7. Let the Windows 10 Setup process run and repair Windows. The rest of the installation proceeds as with a normal installation.
repair installation
- Boot to the network and deploy the image from a server
- A technician does not start the image deployment
- The entire___is automated and no user intervention is required
A ___ (which involves installing Windows from a network drive) begins by starting the computer with a network client and logging on to the server to start the process.
remote network installation
An ____ is the process of installing Windows from a disk image of another installation.
image deployment/disk cloning
If a PC is underperforming or appears to be somehow infected by a virus, it might be a good idea to reset the PC to the factory default settings. Resetting a PC in Windows 10 is a straightforward process. Go to Settings > Recovery and click Get Started under Reset This PC. When you click Get Started, you get two choices: Keep My Files or Remove Everything. Keep My Files is for a minor reset; it allows personal files to be kept while removing apps and any settings that have been changed. Remove Everything performs a major reset, removing all files; before you choose this option, you need to back up personal files.
Refresh / restore
Third-party drivers refer to drivers sourced from outside Windows, most commonly from a device manufacturer. The Windows OD contains a substantial library of default drivers for devices, such as network adapters and video and sound cards. For the most part, these drivers work fine, but installing a driver from the manufacturer can enhance the features or performance of a device.
Other Considerations/Third-Party Drivers
A ____ can contain only a single drive letter and can be made active (bootable). Only one ____ can be active. Although a single physical drive using MBR can hold up to four ____s, only one ____ is needed on a drive that contains a single operating system. If you are installing a new operating system in a multiboot configuration with your current operating system, install the new operating system to a different disk partition than is used for the previous Windows version. If you are using a non-Windows operating system along with your current operating system, it should be installed into its own ____. A drive partitioned using GPT can have up to 128 ____s.
primary partition
An __ does not get a drive letter, but it can contain one or more logical drives, each of which is assigned a drive letter.
Neither an ___ nor any drive it contains can be bootable.
extended partition
partitions are supported by classic ROM BIOS as well as UEFI firmware. ____supports a maximum drive size of 2TB and up to four primary partitions.
Master boot record (MBR)
supports drives up to 256TB and up to 128 primary partitions. ____ is also more reliable than MBR because it protects the partition table with replication and a cyclic redundancy check (CRC) of the partition table’s contents. ____ also provides a standard way for system vendors to create additional partitions. ____ partition tables are supported by UEFI firmware. To boot from a ____ drive, the system must have a 64-bit version of Windows. (Newer Windows Server versions also support ____.) 32-bit versions of Windows can use ____ drives for data.
globally unique ID partition table (GPT)
is an option with all versions of Windows. With new hard drives or existing drives that are known to be error free, you can use the quick format option to quickly clear the areas of the hard drive that store data location records.
Quick formatting
, Windows must rewrite the disk structures across the entire disk surface. This can take several minutes with today’s large hard drives.
full format
Before upgrading, a wise strategy is to back up the entire contents of the computer to a selected drive or to another local or network location. A backup program can create a compressed file to store backed-up information and user preferences. Windows asks during an upgrade what to do with current files. They should migrate just fine, but a backup is always a good idea even under normal operations.
Backup Files and User Preferences
After Windows is installed, it should be updated with the latest drivers. For individual PCs, the easiest way to perform these steps is to set up Windows Update for automatic updates. However, if you are installing Windows for the first time and the system or motherboard was supplied with a driver disc, perform driver installation first before you run Windows Update.
Application and Driver Support/Backward Compatibility
Before attempting to install any version of any OS, it is important to be sure
that the hardware and applications to be used will work with (that is, are
compatible with) the OS.
Hardware and Application Prerequisites and Compatibility
Newer versions of the Windows OS are released every fall and spring. The
life cycle for these Windows Update releases is 18 months
Product life cycle
downloading a complete installation kit for an application—similar to
an ISO file in Windows. Everything necessary is contained in the file,
including installation scripts and application files. Simply dragging a
file to the hard drive ensures all necessary files are present. This dragand-
drop action completes all the installation tasks, similar to the
installation wizard in the Windows environment. When the installation
is complete, the ____ file can be safely deleted.
____: These are compressed installation files and scripts, similar to the
.dmg
.zip files that the macOS uses for Mac software installs. The installation files are in the ____ file, and there is no need to drag and drop them.
.app
____: This file extension indicates that a file holds an executable application that will run on the macOS. The folder also holds information such as icons and other properties that the OS uses to make it functional.
.app
The ___ is the online market platform for Apple-approved applications. A user can purchase and download apps for the computer or iPhone and tablets and be sure that Apple has vetted the code for quality and security. macOS has a variety of options for system updates in the ___ section of System Preferences. The ___ can be configured to automatically check for updates for apps and macOS, automatically install updates, and download apps installed on other macOS devices under the same user account. To avoid confusion, note that the Apple Store is a place to purchase hardware (phones, computers, accessories, and services); the ___ is for purchasing applications.
App Store
from a Mac computer is not a complicated process. From the Finder menu, access the Applications folder. Locate the application to be deleted and drag it to the trash.
Uninstalling apps
is the authentication process used to make sure authorized users are accessing the App Store and making software purchases. The ___crosses platforms, and a user account can be used for purchases and access on an iPhone, an iPad, or a Mac computer.
Apple ID
Corporations can also have Apple ID accounts that they can assign to employees. The key difference between the personal account and the corporate account is that an administrator in the corporate environment can ___access to the software and services when the user is working in the corporate environment
restrict
backs up the entire contents of the computer or selected drive to another local or network location.
full backup
A backup program can create a compressed file to store backed-up information. With this type of backup, the backup program must run a __utility to make the files usable again.
restore
macOS includes the____backup utility that must be configured and running to be useful in case data is lost.
Time Machine
apps should be updated at least daily.
Antivirus and anti-malware
macOS has a variety of options for system updates in the Software Update section of ___ . The preferences can be configured to automatically check for updates for apps and macOS, automatically install updates, and download apps installed on other macOS devices under the same user account. When updating software, the Mac or other device must be plugged into AC power. After downloading and installing the update, a password, fingerprint, or face ID is required after restarting. The ___ settings on a Mac can be accessed by selecting the gearwheel icon on the Dock or by using the Apple menu and selecting ___.
System Preferences
Which of the Preference in System Preferences is for the following
______: Configuration of a display’s settings, such as brightness and Night Shift, which warms the colors of a display in the evenings for potential sleep improvement.
Displays
Which of the Preference in System Preferences is for the following
______Settings for Wi-Fi management, TCP/IP, DNS, and other network settings. Also has auto-join settings for commonly accessed networks
Network
Which of the Preference in System Preferences is for the following
______Preferences for printers, print sharing, and scanning.
Printers & Scanners:
Which of the Preference in System Preferences is for the following
___Control over location services When enabled, the settings indicate which apps have used location services in the past 24 hours. Security services include firewall settings, FileVault (which automatically encrypts data on the disk), and password
controls
Security and Privacy:
Users are not limited to one desktop for work. Several can be in use at one time, with workspaces running different applications These desktops can be navigated by swiping up with three or four fingers on the trackpad, using the Control key with the left or right arrows, or using Mission Control.
Multiple desktops:
Which of the Preference in System Preferences is for the following
Settings to configure the Mac to adapt to the user’s vision, hearing, motor, and other requirements for ease of use.
Accessibility:
facilitates a display of all open windows, available desktops, and other settings. Among these settings is the capability to use hot corners, in which mousing over a chosen corner of the screen opens a shortcut to a preselected feature, such as the Launchpad or Quick Notes.
Mission Control:
This encrypted container on the Mac stores passwords, usernames, account numbers, and other private information. It provides security and ease when accessing sites that require authentication. __ works across platforms, so an update on a Mac updates the information in an iPhone on the same account.
Keychain
This is a highly intuitive search engine for documents, text references, and more. It does not reside on the desktop, but you can access it instantly by pressing Cmd+spacebar. __ can be configured to search up to 18 different topics and areas, such as apps, documents, music libraries, and definitions. It can also be configured to not search items in the privacy settings.
Spotlight
__is the Apple shared cloud storage product. For a monthly or annual fee, users can store documents and photos. __is not confined to Mac users; it is available to Windows and Linux users as well.
iCloud
This feature allows for an enhanced haptic- or touch-based mouse experience, with different configurable responses for swiping with one, two, or three fingers; using pinching motions; and so on. The __ are configured under the Track Pad settings in System Preferences.
Gestures
allows for disk and file management in macOS. It creates blank disk images that can be used as containers for other files, including image backups. It also erases non-macOS drives and prepares them for use with macOS. Repairing, restoring, and mounting disks is also possible. Partitioning can happen here, but since iOS 10.13, Apple File System (APFS) formatted volumes automatically adjust as needed
Disk Utility
The __tab enables and disables (with a password or biometric authentication) the automatic encryption of data on the computer
FileVault
macOS includes a powerful __app that opens a command-line environment. The macOS __utility is used to run commands, scripts, and programs without a GUI. __has its roots in a UNIX shell and can be used to manage other computers on a network.
Terminal
was designed to extend the power of the command shell, adding scripting functions and interoperability.
PowerShell
is an extremely lightweight but useful text editor in Linux.
Type in the command then the file name. Cltr + G for help page , Cltr+ X for saving the file.
nano
this command helps archive, compress, and extract archived files.
tar
A _____backs up the entire contents of the computer or selected drive to another local or network location. A backup program can create a compressed file to store backed-up information. With this type of backup, the backup program must run a restore utility to make the files usable again.
full backup
In Linux ,this command is to view the contents of a file.
cat
This command provides useful information on DNS servers for troubleshooting DNS issues.
dig
This command is used to find files and directories and information about them. You can search by name, date, owners, and so on.
find
This command provides summary information on resource use for tasks and processes in the form of a dashboard. It can also be used to monitor CPU and memory usage.
top
Use pid = 14
To kill a process, you’d use the SIGKILL signal.
kill -kill 14
Use PID = 14
To stop or suspend a running process, you’d send the SIGTSTP signal.
kill -TSTP 14
To list processes owned by all users:
ps aux
To list processes of the current user:
ps
The command stands for process status and displays the process table so that you can identify
process IDs for currently running processes. (Once you know the process ID, you can use the kill command to terminate a process.)
ps
An open source software that enables Linux machines to work in a Windows environment.
Samba
It bridges the gap between Linux and Windows. It allows SMB to work inside of the Linux OS.It means that Linux can share files and print to Windows.It also allows you to integrate with Active Directory. ____can turn your Linux server into Windows Server.
Samba
Remote Desktop Protocol (RDP) TCP Port :
TCP 3389
Windows 10 built in Remote Desktop Connection program called
RDP
Search for a specific pattern in a file or in multiple files.
GREP
This command is used to manage network interfaces. It can bring up the network interfaces or shut them down, manage IP addresses, and look at routing and ARP tables.
ip
This command is normally used to display the amount of space available on the file system. It lists all block devices with the available space on them. Use the -h option to display file sizes in human readable format.
df
Change ownership of a file or directory
chown
An open-source utility that provides for automatic updates and package management in Linux. Different distributions of Linux use distinct package managers.
yum
recursive copy over the directory to get all the contents.
cp -r
Remove or delete the file or files that are specified:
rm
Move a file or rename it, if the source and destination are the same
mv
It copies the file
cp
list the directories
ls
it shows the name of the current or present working dir
pwd
elevates a user’s permissions to administrator or root. Commands that change system configuration require elevated privilege.
sudo