Chapter 6 Operating Systems Flashcards

1
Q

A key purpose of operating systems is to:

A

keep track of all the files that are used on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A file system describes:

A

how data and drives are organized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Windows the file system you choose for a hard drive affects the following:

A

The rules for how large a logical drive (Drive letter) can be and whether the hard drive can be used as one big drive letter or several smaller drive letters or whether it must be multiple drive letters

The efficiency of data storage (the less waste space, the better)

The security of a system against tampering

Whether a drive can be accessed by more than one operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FAT32 was introduced in:

A

1995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FAT32 has the following characteristics:

A

It has a 32-bit file allocation table, which allows for 268,435,456 entries per drive. An entry can be a folder or an allocation unit used by a file

The root directory can be located anywhere on the drive and can have an unlimited number of entries, which is a big improvement over FAT

FAT32 uses an 8KB allocation unit size for drives as large as 16GB

The maximum logical partition size allowed is 2TB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The limitations of FAT32 are:

A

it can only support individual files up to 4GB in size

it can’t use file permissions

it doesn’t support journaling systems that can fix file corruption issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

FAT32 is still used:

A

to format flash memory cards and USB flash drives for use in not only workstation but media players

smart TVs

printers

cameras

anything else that has a USB port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

exFAT is also known as:

A

FAT64 because it supports 64-bit addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

exFAT is a:

A

file system designed to enable mobile personal storage media to be used seamlessly on mobile and desktop computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

exFAT is designed to be:

A

as simple as FAT32 but with many improvements in capacity and scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

exFAT’s main features include:

A

It supports volumes larger than 32GB

The recommended and maximum file sizes increase to 512TB and 64ZB respectively

Improvements in file system structure enable better performance with flash media and for movie recording

It supports Universal Time Coordinate (UTC) date stamps

exFAT support is included in Windows 7,8/8.1, and 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Operating systems can be classified as either:

A

open source

closed source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

open source refers to:

A

software that is effectively free to download and modify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

closed source refers to:

A

software that cannot be modified without express permission and licensing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Other terms used to describe closed source software are:

A

vendor specific

proprietary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

vendor specific means:

A

only one company has access to the source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

proprietary means:

A

the software is owned and patented and can only be used with permission and usually by paying a licensing fee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disk Operating Systems (DOS) is a:

A

command line OS, which means commands are entered as strings of text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Graphical User Interface (GUI) allows:

A

commands to be entered with the click of a mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

macOS was released in:

A

2016

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

macOS was designed to:

A

integrate with devices using the iOS operating system, such as the iPhone, Apple TV, and Apple Watch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Linux was derived from:

A

the UNIX operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Linux is named after:

A

Linus Torvalds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Linux was developed in:

A

1991

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What do companies like Red Hat do?

A

They modify Linux source code and then charge individuals and organizations to support the modifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Linux is available as:

A

command line distros

or GUI distros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Smartphones are typically either:

A

Android

iOS

Windows Mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Some differences between Android and iOS smartphones include:

A

Operating system updates are provided by the wireless carrier for Android phones

Wireless carriers provide network-specific updates for iPhones (iOS), but Apple provides OS updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Android’s OS is based on:

A

Linux kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Google also commissioned the:

A

Android Open Source Project (AOSP), whose mission is to maintain and further develop Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

iOS OS is based on:

A

macOS, and therefore has its roots in UNIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Chrome OS is based on:

A

Linux and is installed on Chromebooks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

BranchCache

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Media Center

A

No, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

EFS

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Windows Aero

A

No, No, No, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Sidebar

A

No, No, No, No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Gadgets

A

No, No, No, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Start menu

A

No, No, No, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Start screen

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Pinning apps and files

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Charms

A

No, Yes, Yes, No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Multi-monitor task bars

A

Yes, Yes, Yes, No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Live sign-in (Microsoft accounts for OneDrive, Office 365, and other subscriptions)

A

Feature Comparisons for Windows 10, 8.1, 8, 7

Yes, Yes, Yes, No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Local account

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

User Account Control

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Defender antivirus (Microsoft Security Essentials in 7)

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

BitLocker full disk encryption

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Windows Firewall (Windows Defender in 10)

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Action Center

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Security Center Service

A

Yes, No, No, No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Control Panel

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Administrative Tools

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Settings

A

Yes, Yes, Yes, No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

PowerShell

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Event Viewer

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Image Backup

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

File Backup

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Shadow Copy

A

Yes, No, No, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

System Restore

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Refresh and Reset (Refresh only in 10)

A

Yes, Yes, Yes, No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

OneDrive (formerly SkyDrive)

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

ReadyBoost flash memory disk caching

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Compatibility mode

A

Yes, Yes, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Virtual XP mode

A

No, No, No, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Side-by-side apps

A

Yes, Yes, Yes, No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Windows Easy Transfer

A

No, No, Yes, Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Feature Comparisons for Windows 10, 8.1, 8, 7

Windows (App) Store

A

Yes, Yes, Yes, No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

BitLocker is a:

A

data encryption utility that encrypts hard drives for added security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

BitLocker To Go encrypts:

A

removable disks and USB drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Encrypting File System (EFS) has the capability of:

A

encrypting individual files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

BranchCache is software designed to:

A

allow efficient use of bandwidth for remote clients and offices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

BranchCache caches:

A

the most commonly requested data on a client computer so that bandwidth is not wasted on repetitive data requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

The boot process involves:

A

loading the necessary OS files into RAM so the computer becomes functional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

The OS can be stored on:

A

the local hard drive

CD/DVD

an external USB or eSATA drive

another computer on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is the BIOS/UEFI’s Boot Order settings used for?

A

To tell the computer where to go to find the OS files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

When booting, the PC looks in the:

A

preferred place for files and loads them into RAM, and the computer then becomes operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

There are many methods to boot a system during the installation process:

A

Optical disc (CD-ROM/DVD/Blu-ray)

Network/PXE boot (Preboot Execution Environment

USB/eSATA boot (booting from USB thumb drive)

Internal hard drive (HDD/SSD)

Partition on the internal hard disk drive or SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

The Microsoft Deployment Toolkit (MDT) is used for:

A

automated installation of Windows 7, 8.1, 10 and Windows Server 2008 R2 and newer versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

The Microsoft Deployment Toolkit (MDT) does what?

A

It creates and updates the Unattend.xml file (used to provide answers during the process) automatically during the deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

How do you perform an in-place upgrade installation of Windows?

A

Start the installation process from within the existing version of Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

In-place upgrades do not:

A

delete previous installations, which means the user can retain apps and settings as well as personal files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

You can upgrade an OS only to:

A

the equivalent or better edition of Windows but not a lower edition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Before starting a clean install process check the following:

A

Make sure the drive for installation is placed before the hard drive in the boot sequence

If you will be installing to drive that might require additional drivers (SATA, RAID, or third-party host adapters on the motherboard or in an expansion slot), have the drivers available on any type of removable media supported by the system

If you are installing from optical media, from a disk image (ISO or VXD), or within a virtual machine (VM), after restarting the system with the CD or DVD media or image file in place, press a key when prompted to boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

During the installation process, be prepared to confirm, enter, select, or provide the following settings, information, media, or options when prompted:

A

Custom installation

Edition of Windows you are installing

Location (home, work/office, or public)

Network settings

Partition location, partition type, and file system

Password and password hint

Product key

Time, date, language, and region

Time zone, time, and date

Username and company name

Workgroup or domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

A multiboot installation of Windows enables a choice between:

A

two or more operating systems when you start your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

To use the multiboot support that is built in to Windows, follow these rules:

A

Install the oldest version of Windows first

Install Windows on a separate disk partition from the previous operating systems and prepare that partition as a primary partition

To install multiple editions of Windows for multibooting, ensure that each installation is on its own primary partition

The Windows multiboot support does not cover non-Windows OS such as Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

If a Windows OS installation becomes corrupt, use a:

A

repair installation to restore working files and Registry entries without losing existing programs or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

To perform a repair installation of Windows 10 with a USB flash drive (which needs to be created before you start this process), follow these steps:

A
  1. Boot the computer normally and sign into the Administrator account
  2. Insert the flash drive and run setup.exe to start the setup
  3. When prompted, download and install updates
  4. Accept the end-user licensing agreement. The updates begin
  5. When the updates are ready, click Install when prompted
  6. Choose the keep personal files if that is the preference
  7. Let the Windows 10 Setup process run and repair Windows

The remainder of the installation proceeds as with a normal installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

A remote network installation (which involves installing Windows from a network drive) begins by:

A

starting the computer with a network client and logging on to the server to start the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Why would you use Windows Deployment Services?

A

to automate the remote network installation process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

An image deployment is the:

A

process of installing Windows from a disk image of another installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

The image deployment process is also known as:

A

disk cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

If deploying a disk image to multiple computers, rather than as a backup of a single computer, consider these special issues:

A

Hardware differences

Same security identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

To overcome disk image deployment issues use:

A

cloning programs designed to capture an image that can be deployed to different types of computers with different hardware and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

For Windows 10, use the System Preparation Tool (Sysprep) to:

A

prepare the image for installation over many computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

If you select Generalize in Sysprep, Windows:

A

removes unique PC information, including the SID. When the install completes and the computer is restarted, a new SID is generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

All cloning tools can work with:

A

a target drive that is the same size or larger than the original cloned system drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Some cloning tools can work with:

A

a smaller drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

When is a recovery partition created?

A

When upgrading Windows or doing a clean install with Windows Setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

The recovery partition is:

A

a space that holds the Windows Recovery Environment (WinRE), which can repair some common boot errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Windows Recovery Environment (WinRE) is built into:

A

Windows 10 versions of desktop editions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

A hard drive cannot be used until it is prepared for use. There are two steps involved in preparing a hard drive:

A
  1. Create partitions

2. Format partitions (and assign drive letters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

A disk partition is a logical structure on a hard drive that specifies the following:

A

Whether the drive can be bootable

How many drive letters (one, two, or more) the hard drive will contain

Whether any of the hard drive’s capacity will be reserved for a future operating system or another use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Every hard drive must go through a:

A

partitioning process, even if you want to use the entire hard drive as a single drive letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

All versions of Windows support two or major types of disk partitions:

A

Primary partition

Extended partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

A primary partition can contain only:

A

a single drive letter and can be made active (bootable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Only one primary partition can be:

A

active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Only one primary partition is needed on a drive that contains:

A

a single OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

If installing a new OS in a multiboot configuration with your current OS, install:

A

the new OS to a different disk partition than is used for the previous Windows version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

If using a non-Windows OS along with your current OS, it should be:

A

installed into its own primary partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

A drive partitioned using GPT can have up to:

A

128 primary partitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

an extended partitions differs from a primary partition in two important ways:

A

An extended partition doesn’t get a drive letter but can contain one or more logical drives, each of which is assigned a drive letter

Neither an extended partition nor any drive it contains can be bootable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Only one extended partition can be:

A

stored on each physical drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Extended partitions are used only with:

A

Master Boot Record (MBR) drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Master Boot Record (MBR) partitions are supported by:

A

classic ROM BIOS

UEFI firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Master Boot Record (MBR) supports:

A

a maximum drive size of 2TB and up to four primary partitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

A GUID Partition Table (GPT) supports:

A

drives up to 256TB and up to 128 primary partitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

GUID Partition Table (GPT) is more reliable than Master Boot Record (MBR) because:

A

it protects the partition table with replication and cyclic redundancy check (CRC) of the partition table’s contents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

GUID Partition Table (GPT) provides:

A

a standard way for system vendors to create additional partitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

GUID Partition Table (GPT) are supported by:

A

UEFI firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

If a drive will be used by a single OS using a Master Boot Record (MBR) partition table, one of these three ways of partitioning the drive will be used:

A

Primary partition occupies 100% of the physical drive’s capacity

Primary partition occupies a portion of the physical drive’s capacity, and the remainder of the drive is occupied by an extended partition

Extended partition occupies 100% of the physical drive’s capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Primary partition occupying 100% of the physical drive’s capacity is suitable for:

A

the only drive in a system or an additional drive that can be used to boot a system but should not be used for additional drives in a system that will be used for data storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Primary partition occupying a portion of the physical drive’s capacity, and the remainder of the drive is occupying an extended partition is a common setup for:

A

laptop but requires the partitioning process to be performed with different settings than the defaults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Extended partition occupying 100% of the physical drive’s capacity is suitable for:

A

additional hard drives in a system (not the first drive); an extended partition can contain only one logical drive or multiple logical drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

GPT partitioning creates:

A

one or more primary partitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Windows Disk Management supports two types of disks:

A

basic

dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

A dynamic disk is:

A

more versatile than a basic disk because it can span two physical drives into a single logical drive, create striped or mirrored arrays, and adjust the size of a partition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Only basic disks can be:

A

bootable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

When installing Windows 7/8/8.1/10 to an empty hard drive, there is a prompt for:

A

a location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

To use all the space in the disk for creating partitions, make sure that:

A

the desired disk and partition is highlighted and click Next

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

To use only part of the space in the disk for creating partitions, follow these steps:

A

click Drive Options (Advanced)

click New

specify the partition size, and click Apply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

A file system determines:

A

how data and drives are organized, but it is also general term for how an OS stores various types of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

The New Technology File System (NTFS) is the:

A

native file system of Windows 7/8/8.1/10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

The New Technology File System (NTFS) has many differences from FAT32, including:

A

Access control

Built-in compression

Individual Recycle Bins

Support for Encrypting File System (EFS)

Support for mounting a drive

Disk quota support

Hot-swapping

Indexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Follow these steps to determine what file system was used to prepare a Windows hard drive:

A
  1. Open Windows Explorer or File Explorer

2. Right-click the drive letter in the Explorer window and select Properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

During installation, Windows 7/8/8.1/10 automatically:

A

formats the partitions created by the partition process with NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

System Type Full Name; Details

exFAT

A

Extended File Allocation Table; Microsoft file system used for flash drives larger than 32GB and files larger than 4GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

System Type Full Name; Details

FAT32

A

File Allocation Table; Format for USB flash drives holding files smaller than 4GB, game consoles, and so on. Works with all OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

System Type Full Name; Details

NTFS

A

New Technology File System; Windows default formatting for hard drives. Supports sharing and journaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

System Type Full Name; Details

CDFS

A

Compact Disc File System; Windows legacy format for CDs for storage. Supported by Windows and Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

System Type Full Name; Details

NFS

A

Network File System; Works independently of the OS, allowing network user access. It appears local but is a common network drive. Open source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

System Type Full Name; Details

ext3

A

Third Extended File System; Linux version of NTFS. Allows journaling of changes to minimize damage if crash occurs. Supports a maximum of 32,000 subdirectories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

System Type Full Name; Details

ext4

A

Fourth extended file system; Linux. Supports larger file sizes than ext3. Can disable journaling. Supports a maximum of 64,000 subdirectories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

System Type Full Name; Details

HFS

A

Hierarchical File System; Used like NTFS on macOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

System Type Full Name; Details

HFS Plus

A

Extended Hierarchical File System; Used like NTFS on macOS Lion and later. Improves HFS security, size, and other features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

When should you use an Optical disc (CD-ROM/DVD/Blu-ray) to boot a system during the installation process?

A

to install Windows to one or more systems that have working network connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

When should you use a USB/eSATA boot (booting from USB thumb drive) to boot a system during the installation process?

A

when installing from a DVD isn’t feasible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Windows can be installed in a variety of ways. The most common methods are:

A

As an in-place upgrade to an existing version

As a clean install to an empty hard drive or to the same partition as the current version

As a multi-boot, which means installing to unused disk space (a new partition) to enable a choice between the current version and the new version, as needed)

As a repair installation to fix problems with the current installation

With the recovery partition (which resets the system to its original installed state)

Refresh and Reset in Windows 8/8.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Large-scale or customized installations might use the following methods:

A

Unattended installation

Remote network installation

Image deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

In an attended installation:

A

information must be provided at various points during the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

In an unattended installation:

A

you must create the appropriate type of answer file for the installation type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

A swap partition is:

A

disk space partitioned to be available in case extra RAM is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

A swap partition feature is called what in Windows?

A

virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

A swap partition feature is called what in Linux?

A

swap space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

A swap partition can not be used for:

A

storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

With new hard drives or existing drives that are known to be error free, you can use the quick format option to:

A

quickly clear the arears of the hard drive that store data location records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

With the full format option, Windows must:

A

rewrite the disk structures across the entire disk surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

If Windows does not detect hard drives during installation, an:

A

alternative third-party driver must be provided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

The most likely situations in which Windows does not detect hard drives during installation are when:

A

third-party SATA or RAID onboard or add-on card host adapters are used in Windows 7/8/8.1/10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

In Windows 7/8/8.1/10, device drivers are:

A

added using the same screen that is used for partitioning and clicking Load Driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Device drivers can be installed from:

A

CD

DVD

USB flash drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

During the installation process, Windows can connect to either a:

A

workgroup (the default setting)

network managed by a domain controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Domain controllers are typically used in:

A

large networks at workplaces or schools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

What networks use workgroups?

A

Home networks

small-office networks

computers running Windows 7 or newer might also belong to one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

For individual PCs, the easiest way to perform updates is to:

A

set up Windows Update for automatic updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

What is a factory recovery partition?

A

a disk partition containing a special recovery image of the Windows installation is provided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Typically, there are limited choices for restoring a damaged installation with a recovery disc or recovery files on a disk partition. Typical options include:

A

Reformatting the hard drive and restoring it to just-shipped condition (which causes the loss of all data and programs installed after the system was first used

Reinstalling Windows only

Reinstalling support files or additional software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

The following list is a summary of the current requirements for Windows 10:

A

Processor: 1GHz or faster processor or System on a Chip (SoC)

RAM: 1GB for 32-bit OS or 2GB for 64-bit OS

Hard drive space: 16GB for 32-bit OS or 32GB for 64-bit OS

Graphic Card: DirectX 9 or later with WDDM 1.0 driver

Display: 800x600

Internet Connection: Internet connectivity to perform updates and to take advantage of some features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

The Hardware Compatibility List (HCL) provides:

A

information about manufactures and drivers that can be used with Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Although most computer users don’t use the command prompt often, technicians use it to:

A

Recover data from systems that can’t boot normally

Reinstall lost or corrupted system files

Print file listings (which can’t be done in Windows Explorer, File Explorer, This PC, or Computer)

Copy, move, and delete data

Display or configure certain OS settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Most command prompt commands can be run with:

A

standard privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Some command prompt commands can be run only with:

A

administrative privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Administrative privileges are also known as:

A

elevated mode

administrative mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Command Prompt Commands Use

DIR

A

Displays list of the current folder’s files and subfolders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Command Prompt Commands Use

CD (CHDIR)

A

Changes the working directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Command Prompt Commands Use

CD ..

A

Navigates to the previous directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Command Prompt Commands Use

IPCONFIG

A

Displays TCP/IP network information on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Command Prompt Commands Use

PING

A

Sends IP packets to check network connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Command Prompt Commands Use

TRACERT

A

Similar to ping but returns path information to an IP address destination; similar to the traceroute command in macOS and Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

Command Prompt Commands Use

NETSTAT

A

Displays a list of active TCP connections on a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

Command Prompt Commands Use

NSLOOKUP

A

Gather’s the network’s Domain Name System (DNS) information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Command Prompt Commands Use

SHUTDOWN

A

Shuts down the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Command Prompt Commands Use

DISM

A

Services images; stands for Deployment Image Servicing and Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Command Prompt Commands Use

SFC

A

Scans system files and replaces damaged or missing files

must run in elevated mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

Command Prompt Commands Use

CHKDSK

A

Scans specified drive for errors and repairs them

must run in elevated mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Command Prompt Commands Use

DISKPART

A

Creates, removes, and manages disk partitions

must run in elevated mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

Command Prompt Commands Use

TASKKILL

A

Stops specified task(s) on a local or remote computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

Command Prompt Commands Use

GPUPDATE

A

Refreshes group policy on local or Active Directory systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

Command Prompt Commands Use

GPRESULT

A

Displays the resultant set of policy for the specified computer and user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

Command Prompt Commands Use

FORMAT

A

Creates or re-creates the specified file system on recordable or rewritable storage (magnetic, flash, or optical media) and overwrites the contents of the drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

Command Prompt Commands Use

COPY

A

Copies one or more files to another folder or drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

Command Prompt Commands Use

XCOPY

A

Copies one or more files and folders to another folder or drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

Command Prompt Commands Use

ROBOCOPY

A

Copies one or more files and folders; can be configured via various optional GUIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

Command Prompt Commands Use

NET USE

A

Connects to shared folders; similar to mapping a network drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

Command Prompt Commands Use

NET USER

A

Manages user accounts (add, remove, change)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

Command Prompt Commands Use

[Command]/?

A

Displays help for the specified command

198
Q

If FORMAT is used on a hard disk by mistake:

A

third-party data recovery programs can be used to retrieve data from the drive. This is possible because most of the disk surface is not changed by FORMAT when a quick format option is selected

199
Q

What does FORMAT F: /Q do?

A

it performs a quick format on drive F

200
Q

To see the additional options for FORMAT, use:

A

FORMAT /?

201
Q

The number of clusters on a volume for FAT is:

A

<=65,526

202
Q

The number of clusters on a volume for FAT32 is:

A

65,526< Number of clusters< 4,177,918

203
Q

FORMAT immediately stops processing if:

A

it decides that the preceding requirements cannot be met using the specified cluster size

204
Q

NTFS compression is not supported for:

A

allocation unit sizes above 4,096

205
Q

The folder specified by COPY must:

A

already exist on the target drive

206
Q

COPY does not work with:

A

files that have the system or hidden file attributes; to copy these files, use XCOPY or ROBOCOPY instead

207
Q

What does COPY . F do?

A

copies all files in the current folder to the current folder on the F: drive

208
Q

What does COPY *.TXT C:Users/Username do?

A

copies all .txt files in the current folder to the Username folder on the C:drive

209
Q

What does COPY C:\WINDOWS\TEMP*BAK do?

A

copies all *.bak files in the \WindowTemp folder on drive C: to the current folder

210
Q

What does COPY C:\WINDOW*BMP D do?

A

copies all .bmp files in the \Windows folder on drive C: to the current folder on drive D:

211
Q

The XCOPY command can be used in place of COPY in most cases and has the following advantages:

A

Provides faster operation on a group of files

Creates folders as needed

Operates as backup utility

Copies files changed or created on or after a specified date

212
Q

XCOPY can be used to “clone”:

A

an entire drive’s contents to another drive

213
Q

ROBOCOPY has several advantages over XCOPY, including the capability to:

A

tolerate pauses in network connections

mirror the contents of the source and destination folders by removing all files as well as copying files

perform multi-threaded copies for faster copying on multicore PCs

log copy processes

list or copy files matching specified criteria including minimum file size

214
Q

To copy files in sourcefolder that are at least 16MB (16,777,216) in size to targetfolder write this syntax:

A

ROBOCOPY C:/SOURCEFOLDER D:\TARGETFOLDER /MIN:16777216

215
Q

System File Checker (SFC) is a:

A

Windows utility that checks protected system files and replaces incorrect versions or missing files with the correct files

216
Q

System File Checker (SFC) check files such as:

A

.dll files

.sys files

.ocx files

.exe files

font files used by the Windows desktop

217
Q

Use System File Checker (SFC) to:

A

fix problems with Internet Explorer or other built-in Windows programs caused by the installation of obsolete Windows system files, user error, deliberate erasure, virus or Trojan horse infections, and similar problems

218
Q

What does CHKDSK /F do?

A

scans for and fixes errors on the current drive

219
Q

What does CHKDSK F: /F do?

A

scans for and fixes errors on drive F:

220
Q

If CHKDSK /F is run on the system drive, the following message appears:

A

The type of the file system is NTFS

Cannot lock current drive

Chkdsk cannot run becuase the volume is in use by another process. Would you like to schedule this volume to be checked the next time the system restarts? (Y/N)

221
Q

What does GPRESULT /R do?

A

displays summary data

222
Q

What does GPRESULT /H GPReport.html do?

A

saves report as GPReport.html

223
Q

What does GPRESULT /USER targetname /V do?

A

provides verbose information for the specified username

224
Q

The following tools are administrative tools but are found under Computer Management (Windows 10):

A

Device Manager

Local Users and Groups

Data Sources

User Account Management

225
Q

To start any administrative tools, follow these steps:

A
  1. Open Control Panel
  2. Open the System and Security category
  3. Click or tap Administrative Tools
  4. Click or tap the tool you want to use
226
Q

Microsoft Management Console (MMC) is a:

A

blank console that uses various snap-in console windows

227
Q

Microsoft Management Console (MMC) saves:

A

the consoles you snap in and remembers the last place you were working which makes it a valuable and time-saving tool

228
Q

Load Security Policy is a:

A

Microsoft Management Console (MMC) snap-in you can use to view and set security policies for the local system or a system on a workgroup network

229
Q

The Windows Performance Monitor can be used for:

A

real-time performance monitoring or to record performance over time

230
Q

Using Performance Monitor you can measure objects, including:

A

physical devices, such as the processor and memory

software, such as protocols and services

231
Q

Use the System Configuration utility (MSCONFIG.exe) to:

A

configure how Windows starts, to chooses startup programs and services, and to change the boot procedure

232
Q

Windows uses Task Scheduler to:

A

run a task on a specified schedule

233
Q

To create a basic task using Task Scheduler in Windows, follow this procedure:

A
  1. Open Control Panel in Small Icons or Large Icons mode
  2. Open the Administrative Tools folder
  3. Double-click Task Scheduler
  4. Click Create Basic Task in the Actions menu
  5. Enter a name and a description for the task and click Next
  6. Select an interval (for example, daily, weekly, monthly, one-time only, when my computer starts, when I log on, or when a specific event is logged) and click Next
  7. Specify when to start the task and recurrence and whether to synchronize across time zones and then click Next
  8. Specify to start a program (or send an email or display a message) and click Next
  9. Select a program or script to run, add options (arguments), and specify where to start the program or script. Click Next
  10. Review the settings for the task and click Finish
234
Q

The ODBC Data Source Administrator is used to:

A

list and mange data sources and drivers

235
Q

Data sources are listed by:

A

user

system

file

236
Q

Data Source Administrator lists:

A

drivers

237
Q

Data Source Administrator provides:

A

options for tracing and pooling data sources

238
Q

Print Management is:

A

a utility for managing printers connected to the computer or on a network

239
Q

The Windows Memory Diagnostics tool tests:

A

system and cache memory before the Windows desktop is loaded

240
Q

Windows Firewall can:

A

block unwanted traffic going into or out of the computer

241
Q

The Even Viewer allows:

A

an administrator to track and log event logins, security actions, crashes, and other events that have happened in the computer

242
Q

A down-arrow icon on Device Manager indicates what?

A

a disabled device

243
Q

An exclamation point in a yellow triangle indicates what?

A

a device that cannot run

244
Q

Device properties tabs

General

A

Displays device type, manufacturer, location, status, troubleshoot button and usage. Applies to all devices

245
Q

Device properties tabs

Properties

A

Displays device-specific settings. Applies to multimedia devices

246
Q

Device properties tabs

Driver

A

Displays technical details and version information. Applies to all devices

247
Q

Device properties tabs

Policies

A

Optimizes technical details about the device. Applies to USB, FireWire (IEEE 1394), and eSATA drives

248
Q

Device properties tabs

Resources

A

Displays hardware resources such as IRQ, DMA, memory, and I/O port address. Applies to I/O devices

249
Q

Device properties tabs

Volumes

A

Displays drive information such as status, type, and capacity. Click Populate to retrieve information. Applies to hard disk drives

250
Q

Device properties tabs

Power

A

Displays the power available per port. Applies to USB root hubs and generic hubs

251
Q

Device properties tabs

Power Management

A

Specifies device-specific power management settings. Applies to USB, network, keyboard, and mouse devices

252
Q

When you have a malfunctioning device you have several options for resolving the problem:

A

Look up the Device Manage code to determine the problem and its solution

Click the troubleshoot button (if any) shown on the device’s General Properties tab; the buttons name and usage depend on the problem

Manually change resources

Manually update drivers

253
Q

You can use Device Manage to disable a device that is conflicting with another device. To disable a device, follow these steps:

A
  1. Click the + sign next to the device category containing the device
  2. Double-click the device, click the Driver tab, and select Disable
254
Q

To use Device Manager to remove a device, follow these steps:

A
  1. Click the + sign next to the device category containing the device
  2. Double-click the device and select Uninstall
  3. Shut down the system and remove the physical device

OR:

  1. Double-click the device and select Properties
  2. Click the Driver tab and click the Uninstall button
  3. Shut down the system and remove the physical device
255
Q

If a device malfunctions after a driver update, click:

A

the Roll Back Driver button on the Driver tab to return to the preceding driver version

256
Q

To start MSCONFIG in Windows 7 follow these steps:

A
  1. Click Start to open the Windows Desktop Search pane

2. Type MSCONFIG and press Enter

257
Q

To start MSCONFIG in Windows 8/8.1/10 follow these steps:

A
  1. Press Windows+X
  2. Click or tap Run
  3. Type MSCONFIG and press Enter
258
Q

The Task Manager utility provides:

A

a useful real-time look into the inner workings of Windows and the programs that are running

259
Q

There are several ways to display Task Manager, including:

A

Right-click the taskbar and select Task Manager

Press Ctrl+Shift+Esc

Open the Run or Search box and type taskmgr

Press Ctrl+Alt+Del and select Task Manager from the Windows Security dialog

260
Q

The Windows 7 Task Manager includes the following tabs:

A

Applications

Processes

Performance

Networking

Users

Services

261
Q

The Windows 8/8.1 Task Manager includes the following tabs:

A

Processes

Performance

App history

Startup

Users

Details

Services

262
Q

The Disk Management snap-in of the MMC is:

A

a GUI-based application for analyzing and configuring hard drives

263
Q

You can use Disk Management to:

A

mount drives

264
Q

A mounted drive is:

A

a drive that is mapped to an empty folder within a volume that has been formatted as NTFS

265
Q

Instead of using drive letters, mounted drives use:

A

drive paths

266
Q

Mounted drives provide:

A

more space for temporary files and can enable you to move folders to different drives if space runs low on the current drive.

267
Q

To mount a drive, follow these steps:

A
  1. Right-click the partition or volume you want to mount and select Change Drive Letters and Paths
  2. In the displayed window, click Add
  3. Click Mount in the following empty NTFS folder
  4. Browse the empty folder to which you want to mount the volume and click OK
  5. Click Next
  6. Choose the appropriate drive partitioning settings and click Next
  7. Review the settings and click Finish
268
Q

When a new drive is connected, the OS may prompt to:

A

initialize it

269
Q

A new simple volume can:

A

occupy a portion or all of the space on an unallocated disk

270
Q

Follow these steps to create a new simple volume:

A
  1. Right-click unallocated space on a drive (With a new drive, the entire drive is listed as unallocated)
  2. Select New Simple Volume
  3. Click Next
  4. To use the entire space for a volume (drive letter), click Next
  5. Select the drive letter to install and click Next
  6. Specify the file system (NTFS is the default), the volume name, and whether to use a quick format or prepare the drive as compressed. Click Next
  7. Review all options and click Finish
271
Q

Windows enables you to extend the:

A

size of a partition (volume) with the Desk Management utility

272
Q

When extending or shrinking the size of a partition it’s highly recommended to:

A

back up your data before attempting this operation

273
Q

When extending the size of a partition follow these steps:

A
  1. Right-click the volume to be extended
  2. Select Extend Volume
  3. Click Next and select how much space you’d like to add to the partition
  4. Click Finish at the summary screen

(This process can also be done by using the DISKPART command)

274
Q

To split a single partition into two or more using Disk Management, follow this procedure:

A
  1. Shrink the existing partition to make room for an additional partition. If you are unable to shrink the partition sufficiently, back up some of the information in the partition and try again
  2. Create one or more new partitions in the unallocated space created in step 1
275
Q

To free up space on a drive in order to install another OS, it is possible to:

A

shrink the partition

276
Q

To shrink the partition, follow these steps:

A
  1. Right-click the volume to be shrunk
  2. Select Shrink Volume
  3. Select the amount of space you’d like to use the partition
  4. Click Shrink

(The free space created by this process is listed as unallocated)

277
Q

If a volume was created without a drive letter being assigned, use:

A

Change Letters and Paths

278
Q

Here’s how to use Change Letters and Paths:

A
  1. Right-click the partition or volume and select Change Drive Letters and Paths
  2. In the window that appears, click Add
  3. Make sure Assign the Following Drive Letter is selected.
  4. Click OK. The drive is now referred to by the selected drive letter
279
Q

To change the drive letter of a connected drive, follow this procedure:

A
  1. Right-click the partition or volume to be changed and select Change Drive Letters and Paths
  2. When the current drive letter assignment is shown, click Change
  3. Use the pull-down menu to choose the preferred drive letter
  4. Click OK
  5. Click Yes to change the drive letter. The drive is now referred to by the selected drive letter
280
Q

Although dynamic disks can’t be used as boot disks, they can be used in the following types of drive arrays:

A

Spanned

Striped

Mirrored

RAID 5

281
Q

Describe Spanned Arrays:

A

The capacity of all disks is added together

This is the equivalent to just a bunch of disks (JBOD) hardware array and requires at least two disks

282
Q

Describe Striped Arrays:

A

Data is written across all drives to enhance speed

This is equivalent to a RAID 0 hardware array and requires two disks

283
Q

Describe Mirrored Arrays:

A

Copies of data are written to all disks at the same time to enhance data security

If one drive fails, data is still safe, and the array can be rebuilt

This is equivalent to a RAID 1 hardware array and requires two disks

284
Q

Describe RAID 5 Arrays:

A

Data and recovery information is written across all disks to enable recovery if one disk in the array fails

This is equivalent to RAID 5 hardware array and requires at least three disks

285
Q

To create an array, follow these steps:

A
  1. Make sure the disks to be used in the drive array have been backed up. Any disk in an array has its previous information overwritten
  2. Right-click the first drive to add to the array and select the array type
  3. Click Next to continue
  4. Select the next drive to add to the array and click Add
  5. If creating a RAID 5 array, repeat step 3 until the desired number of disks are added to the array
  6. Click Next to continue
  7. Assign a drive letter or mount point. Click Next
  8. Select the option to format the volume and name it. Click Next
  9. Review settings. Click Finish
  10. Click Yes to convert the drives to dynamic disks (required for arrays). The array is created
286
Q

Windows 8/8.1/10 include Storage Spaces, which provides:

A

a way to use multiple hard disks or SSDs for redundant storage

287
Q

Storage Spaces can be used to:

A

expand storage by adding additional drives

288
Q

Storage Spaces Overview Drive Requirement; Description

Simple Configuration

A

Requires at least one drive

The capacity of all drives is grouped together and used as a single logical drive. If any drive fails, all data is lost

289
Q

Storage Spaces Overview Drive Requirement; Description

Two-way mirror Configuration

A

Requires at least two drives

Each drive has a copy of the information. If one drive fails, the mirror can be rebuilt from the surviving drive after a new drive is attached

290
Q

Storage Spaces Overview Drive Requirement; Description

Three-way mirror Configuration

A

Requires at least five drives

The drive pool includes three copies of the data. If one or two drives fail, the mirror can be rebuilt from the surviving drive after new drives are attached

291
Q

Storage Spaces Overview Drive Requirement; Description

Parity Configuration

A

Requires at least three drives

The pool is written with data and parity information. If a single drive fails, the surviving drives an rebuild the pool

292
Q

To use Storage Spaces, follow these steps:

A
  1. Open Search and search for Storage Spaces
  2. Click or tap Storage Spaces
  3. Click or tap Create a New Pool and Storage Space
  4. Click Create Pool
  5. When Storage Spaces displays a recommended layout, make any changes desired and then click or tap Create Storage Space
293
Q

Windows includes a variety of command line utilities known as:

A

system utilities that are used for system management

294
Q

System Utilities

REGEDIT

A

Launches Registry Editor

295
Q

System Utilities

CMD

A

Opens the command prompt

296
Q

System Utilities

SERVICES.MSC

A

Shows Windows Services

297
Q

System Utilities

MMC

A

Starts Microsoft Management Console

298
Q

System Utilities

MSTSC

A

Remote Desktop Connection

299
Q

System Utilities

NOTEPAD

A

Opens the Notepad text editor/viewer

300
Q

System Utilities

EXPLORER

A

Starts Windows Explorer in 7 or File Explorer in 8/8.1/10

301
Q

System Utilities

MSINFO32

A

Starts Windows System Information

302
Q

System Utilities

DxDiag

A

Starts DirectX Diagnostic

303
Q

System Utilities

Disk Defragmenter/Optimizer

A

Used to increase performance (access speed) by rearranging files stored on a disk to occupy contiguous locations

304
Q

System Utilities

System Restore

A

Allows the PC to reset to a previous configuration

305
Q

System Utilities

MSCONFIG

A

Starts the System Configuration utility

306
Q

Registry editing might be necessary under the following circumstances:

A

To view a system setting that cannot be viewed through other interfaces

To add, modify (by changing values or data) or remove a Registry key that cannot be changed through normal Windows menus or application settings

To back up the Registry to a file

307
Q

Changes made using REGEDIT are:

A

automatically saved upon exit. However, it may be necessary to log off and log back on or restart the system for changes to take effect

308
Q

Always back up the Registry before editing it. Follow these steps to back up part or all of the Registry to a text file:

A
  1. Start REGEDIT
  2. To make a partial backup, highlight the section of the Registry to be backed up
  3. Click File and select Export
  4. Select a location to store the Registry backup
  5. Enter a name for the backup
  6. Click All to back up the entire Registry. Click Selected Branch to back up only the Registry branch you select in step 2
  7. Click Save
309
Q

Microsoft uses MSTSC, better known as the Remote Desktop connection program to:

A

facilitate connections to remote computers and allow full remote control

310
Q

MSTSC, better known as the Remote Desktop connection program works in three ways:

A

Users can be given limited access to a remote computer’s applications

Administrators can be given full access to a computer so that they can troubleshoot problems from another location

Another part of the program, known as Remote Assistance, allows a user to invite a technician to view his or her desktop in the hopes that the technician can fix any encountered problems

311
Q

MSTSC, better known as the Remote Desktop connection program connections can only be made with PCs that are running these Windows OSs:

A

Windows 8/8.1,10 Pro or Enterprise

Windows 7 Enterprise, Professional, or Ultimate

312
Q

To set up a computer’s remote settings options to receive remote connections, follow these steps:

A
  1. Open the System properties sheet in Control Panel
  2. Click or tap Remote
  3. Click or tap the empty Allow Remote Connections to This Computer check box
  4. Specify which users can connect and whether a connection must use a Network Level Authentication (NLA)
  5. Click OK
313
Q

To run MSTSC in Windows 7, follow these steps:

A
  1. Click Start to open the Windows Desktop Search pane

2. Type MSTSC and press Enter

314
Q

To run MSTSC in Windows 8/8.1, follow these steps:

A
  1. Press Windows+X
  2. Click Run
  3. Type MSTSC and press Enter
315
Q

To connect to the remote computer, follow these steps:

A
  1. Enter the name or IP address of the remote computer
  2. Click Connect
  3. Select or enter the account name and enter the account password. The connection starts
316
Q

Notepad is a simple plain-text editor that has several uses in system management, the uses are:

A

Creating batch files and scripts

Viewing text-based reports

Editing HTML files

317
Q

Notepad is the default program for opening:

A

.txt (plain-text) files

318
Q

To open a text file with a different extension in Notepad, follow these steps:

A
  1. Right-clock the file in Windows Explorer or File Explorer
  2. Select Open With
  3. Choose Notepad
319
Q

Explorer offers the following viewing options:

A

Small icons

Lists

Medium icons, large icons, and extra large icons

Details

Tiles

Contents

320
Q

What does DxDiag do?

A

displays and troubleshoots DirectX components in Windows

321
Q

Defragging a hard disk drive can:

A

help improve system performance, especially if the drive is frequently changed

322
Q

Defragmentation is:

A

the process of reorganizing the data into contiguous blocks

323
Q

System Restore enables:

A

you to fix problems caused by a defective hardware or software installation by resetting the computer’s configuration to the way it was at a specified earlier time (restore points)

324
Q

Restore points can be created by:

A

the user with System Restore and are also created automatically by the system before new hardware or software is installed

325
Q

To create a restore point in Windows 7, follow these steps:

A
  1. Open the Start menu, right-click Computer, and select Properties
  2. Click the System Protection task, and the System Protection tab on the System properties sheet opens
  3. Click the Create button
  4. Type a name for the restore point and click Create
326
Q

To create a restore point in Windows 8/8.1, follow these steps:

A
  1. Swipe in from the right to open the charms menu
  2. Click or tap Search and enter System Restore
  3. Click or tap Create a Restore Point
  4. Click the Create button
  5. Type a name for the restore point and click Create
327
Q

To create a restore point in Windows 10, follow these steps:

A
  1. Click or tap Search and enter System Restore
  2. Click or tap the Create button
  3. Type a name for the restore point and click Create
328
Q

Follow these steps to restore your system to an earlier condition:

A
  1. Open the System Protection tab and click the System Restore button
  2. Click Next, and you see the window Restore Your Computer to the State It Was in Before the Select Event
  3. Select a restore point to restore to and click Next
  4. Click Finish on the Confirm Your Restore Point page
329
Q

Safe mode and other advanced boot options can be used when:

A

the system won’t boot normally

330
Q

To enter Safe mode in Windows 7:

A

press f8 repeatedly when starting the system until you see the Advanced Boot Options menu and then select Safe Mode

331
Q

To enter Safe mode in Windows 8/8.1/10:

A

Press the Power button on the login screen, hold down the Shift key, and click/tap Restart. Select Troubleshoot> Advanced Options> Startup Settings> Restart

332
Q

What does Debugging Mode in Windows 10 Startup Settings do?

A

Enables the use of a debug program to examine the system kernel for troubleshooting

333
Q

What does Enable Boot Logging in Windows 10 Startup Settings do?

A

Creates an ntbtlog.txt file

334
Q

What does Enable Low-Resolution Video in Windows 10 Startup Settings do?

A

Uses a standard VGA driver in place of a GPU-specific display driver but uses all other drivers as normal

335
Q

What does Safe Mode in Windows 10 Startup Settings do?

A

Starts the system with a minimal set of drivers; can be used to start System Restore or to load Windows GUI for diagnostics

336
Q

What does Safe Mode in Windows 10 Startup Settings with Networking do?

A

Starts the system with a minimal set of drivers and enables network support

337
Q

What does Safe Mode in Windows 10 Startup Settings with Command Prompt do?

A

Starts the system with the last configuration known to work; useful for solving problems caused by newly installed hardware or software

338
Q

What does Last Known Good Configuration in Windows 10 Startup Settings do?

A

Starts the system with the last configuration known to work; useful for solving problems caused by newly installed hardware or software

339
Q

What does Disable Driver Signature Enforcement in Windows 10 Startup Settings do?

A

Allows drivers containing

340
Q

What does Disable Automatic Restart on System Failure in Windows 10 Startup Settings do?

A

Prevents Windows from automatically restarting if a STOP (BSOD) error causes Windows to fail

341
Q

What does Disable Early Launch Anti-malware Protection in Windows 10 Startup Settings do?

A

Helps when a legitimate driver is mistaken for malware by Windows 8/8.1/10’s Early Launch Anti-Malware Protection feature

342
Q

What does Start Windows Normally in Windows 10 Startup Settings do?

A

Boots to regular Windows

343
Q

Internet Properties Dialog Tabs Function

General

A

Set the home page

set tab settings

delete browsing history, cookies, temporary files, and saved passwords

change appearance

configure accessibility settings

344
Q

Internet Properties Dialog Tabs Function

Security

A

Configure security zones

345
Q

Internet Properties Dialog Tabs Function

Privacy

A

Select privacy settings for the current zone, location settings, pop-up blocker, and InPrivate browsing settings

346
Q

Internet Properties Dialog Tabs Function

Content

A

Set options for family safety, SSL certificate management, AutoComplete, and feeds

347
Q

Internet Properties Dialog Tabs Function

Connections

A

Set options for VPNs, dial-up, LAN connections, and proxy servers

348
Q

Internet Properties Dialog Tabs Function

Programs

A

Select the default web browser, manage add-ons, select the default HTML editor, and set the default apps for email and other Internet services

349
Q

Internet Properties Dialog Tabs Function

Advanced

A

Enable/disable accelerated graphics

configure accessibility settings, browsing settings, HTTP settings, international settings, multimedia settings, and security settings

reset Internet Explorer to the default settings

350
Q

Configuring Display Settings in Windows 7; Windows 8/8.1/10

Resolution

A

Screen Resolution; Screen Resolution

351
Q

Configuring Display Settings in Windows 7; Windows 8/8.1/10

Color depth

A

Display Advanced/List Monitor; N/A (32-bit color used for all modes)

352
Q

Configuring Display Settings in Windows 7; Windows 8/8.1/10

Screen saver

A

Personalization; Personalization

353
Q

Configuring Display Settings in Windows 7; Windows 8/8.1/10

Background

A

Personalization; Personalization

354
Q

Configuring Display Settings in Windows 7; Windows 8/8.1/10

Theme

A

Personalization; Personalization

355
Q

Configuring Display Settings in Windows 7; Windows 8/8.1/10

Windows color

A

Personalization; Personalization

356
Q

Configuring Display Settings in Windows 7; Windows 8/8.1/10

Add additional displays

A

Screen Resolution; Screen Resolution

357
Q

Configuring Display Settings in Windows 7; Windows 8/8.1/10

Refresh rate

A

Advanced Settings/Monitor; Advanced Settings/Monitor

358
Q

The Folder Options properties sheet affects how Explorer:

A

Displays file and folder information (view tab)

Selects folders to index for searching (search tab)

Opens folders (general options tab)

359
Q

By default, Explorer hides the following file information:

A

File extensions for registered file types

The full path to the current folder

Files or folders with hidden or system attributes

The Windows folder

360
Q

As an alternative to using the Folder Options applet in Control Panel, you can use this procedure in Windows 8/8,1/10:

A
  1. Open File Explorer
  2. Click or tap the View tab
  3. Select the options
  4. Click OK to close the Folder Options window
361
Q

Use the System properties sheet to view:

A

Windows version

Edition (32-bit or 64-bit)

Processor model number and clock speed

Windows Experience Index (WEI) (Windows 7 only)

362
Q

Selecting Change Settings in the System properties sheet for Windows 10 brings up the System applet, which allows you to change the following:

A

Computer name

Workgroup name

Domain name

System protection settings (System Restore)

Hardware profiles

Remote settings

Performance and virtual memory settings

363
Q

Compare Virtual memory to RAM memory:

A

Virtual memory is much slower

364
Q

The performance of the paging file can be improve by:

A

Setting its minimum and maximum sizes to the same amount

Moving the paging file to a physical disk (or disk partition) that is not used as much as others

Using a striped volume for the paging file. A striped volume is an identical area of disk space on two or more dynamic disks referred to using a single letter

Creating multiple paging files on multiple physical disks in the system

Moving the paging file away from the boot drive

365
Q

To adjust the location and size of the paging file in Windows, follow these steps:

A
  1. In the System Properties window, click or tap Advanced System Settings under Tasks
  2. Click or tap the Settings button in the Performance box
  3. Click or tap the Advanced tab and then click or tap the Change button
  4. Clear or tap the Automatically Manage Paging File Size check box
  5. Click or tap the Custom Size radio button
  6. Specify the initial and maximum sizes you want to use for the paging file and its location. Click or tap Set and then click or tap OK to finish
  7. If you make any changes to size or location, restart the computer so that the changes take effect
366
Q

Windows Firewall provides:

A

protection against unwanted inbound connections and can also be configured to filter outbound connections.

367
Q

Windows offers three standard power plans:

A

Balanced

High Performance

Power Saver

368
Q

Describe balanced power:

A

Default plan; balances performance with energy consumption

369
Q

Describe High Performance:

A

Fastest CPU performance, brightest screen, and shortest battery life

370
Q

Describe Power Saver:

A

Reduces CPU performance and screen brightness more than Balanced power for longest battery life

371
Q

You can change power settings for:

A

Hard-disk shutoff timing

Desktop backgrounds

Wireless adapters

Sleep timings

Hibernation options

USB ports and devices

Power buttons and lid

PCI Express devices

CPU performance and cooling

Display shutoff timings

Multimedia idle time and screen quality

Internet Explorer JavaScript timing frequency

372
Q

To create a new power plan, click Create a Power Plan in the Power Options dialog. Then, in the Create a Power Plan dialog, follow these steps:

A
  1. Select a plan to use as the basis for your plan
  2. Enter a plan name and click Next
  3. Specify timings for the display and sleep and then click Create
373
Q

Panel Link Location (Windows 10); Description

Credential Manager

A

User Accounts; View/Change user logon information for networks and websites

374
Q

Panel Link Location (Windows 10); Description

Programs and Features

A

Programs; Install/Uninstall programs, enable/disable Windows features, run programs made for earlier versions of Windows

375
Q

Panel Link Location (Windows 10); Description

Homegroup

A

Network and Internet; Windows 7/8 only

376
Q

Panel Link Location (Windows 10); Description

Devices and Printers

A

Hardware and Sound; Manage webcams, scanners, printers/faxes, and so on and print jobs

377
Q

Panel Link Location (Windows 10); Description

Troubleshooting

A

System and Security; Link to Windows Program Compatibility Troubleshooter app, run the app and select the program causing problems

378
Q

Panel Link Location (Windows 10); Description

Network and Sharing Center

A

Network and Internet; Network preferences, sharing, and status changes

379
Q

Panel Link Location (Windows 10); Description

Device Manager

A

Hardware and Sound; Add/remove devices, check status and roll back device drivers

380
Q

Panel Link Location (Windows 10); Description

BitLocker

A

System and Security; Encrypt drives for enhanced security

381
Q

Panel Link Location (Windows 10); Description

Sync Center

A

Control Panel> Sync Center; Manage synchronization activity and settings and initialize a sync, sync files between the current computer and network folders

382
Q

Installation and Configuration Concepts

System requirements for hard drive space and RAM

A

Make sure the physical hardware can handle the work required of the software

Check the OS and applications requirements to make sure there is enough drive space to store the data and enough RAM installed to open and run the software

If possible, exceed the minimum requirements. Future downloads and updates will consume more drive space and RAM

383
Q

Installation and Configuration Concepts

OS requirements for compatibility

A

Make sure the software version selected will run with the operating system. Make sure the OS updates have not impacted the use of the software

384
Q

Installation and Configuration Concepts

Methods of installation and deployment (local or network based)

A

Be familiar with using image files on USB flash drives, external drives, or CD/DVDs on local installs

Understand the basis of a network-based installation process

385
Q

Installation and Configuration Concepts

Local user permissions Folder/file access for installation

A

Understand what is involved in setting up local user permissions and getting a workstation to work in an organization’s domain. Know how to grant and restrict access to files and folders for different users

386
Q

Installation and Configuration Concepts

Security considerations

A

Understand the threats and vulnerabilities in a network and how to mitigate them. Be able to describe how end-user education is fundamental to an organization’s security and over success

387
Q

Windows 7, 8/8.1, and 10 support two different types of SOHO networks:

A

workgroups

homegroups

388
Q

In a workgroup network:

A

All computers can share folders and devices with other computers in a peer-to-peer arrangement

All computers must be part of the same local network or subnet

The workgroup does not have a password, however, each computer must have a user account for each user who will access that computer (unless password-protected sharing is disabled)

389
Q

The workgroup is identified through the:

A

Computer Name section of the System properties sheet

390
Q

To create a workgroup in Windows follow these steps:

A
  1. Configure all devices in the workgroup to use the same range of IP addresses and the same subnet. If the devices obtain their IP addresses from a router, this step has already been done
  2. Confirm that each device has a unique computer name
  3. Confirm that each device is in the same workgroup
391
Q

HomeGroup networking enables:

A

easier security and sharing than workgroup networking does

392
Q

HomeGroup details:

A

Although one user on one computer creates a homegroup, all computers that join a homegroup can share folders and devices with other homegroup computers in a peer-to-peer arrangement

A single password is used for security for all homegroup shares. The password is generated automatically when a homegroup is created and is used only when a computer/user joins a homegroup

If a computer has two or more user accounts, each user can choose whether to join a homegroup

When custom file or device shares are created, a single share enables all members of a homegroup to access the device or file share

393
Q

To create a homegroup in Windows 7/8/8.1/10, use this procedure:

A
  1. Open the Control Panel
  2. Click or tap Network and Internet
  3. Click or tap HomeGroup
  4. Click or tap Create a Homegroup
  5. Click Next
  6. Select the items (folders, libraries, or printers) you want to share
  7. When the homegroup password appears, write it down. Each user wants to join the homegroup must provide it when prompted
  8. Click or tap Finish
394
Q

Some of the special features of domain networking include:

A

Shared resources and user accounts are stored on servers. An Active Directory server is used to authenticate users, and other servers can be used for print, file, email, and other services

User accounts are not tied to a particular computer. A user on a domain can use any computer or computers on the domain and have access to their files and shared resources

Resources available to a particular user can be limited by group policy

Group policy can also be used to limit configuration settings that are available to a user

Different local networks with hundred to thousands of users can be part of a single domain

395
Q

The domain setup for a computer is performed from:

A

the Computer Name section of the System properties sheet

396
Q

To join a domain follow these steps:

A
  1. Open the System properties sheet
  2. Click or tap Change Settings
  3. On the Computer Name tab, click or tap Network ID
  4. Confirm that This Computer Is Part of a Business Network is selected. Click or tap Next
  5. Confirm that My Company Uses a Network with a Domain is selected. Click or tap Next
  6. Review the information needed to connect to a domain and click Next
  7. Enter the username, password, and domain name and click Next
  8. Click OK on the Welcome to the Domain message
397
Q

A shared folder or drive can be accessed by other computers on the network. Shares can be provided in three ways:

A

On a client/server-based network or on a peer-to-peer network with peer servers that support user/group permissions, shares are protected by lists of authorized user or groups

A workgroup network can offer unlimited sharing (full control or read-only) for any user who connects to a system if password-protected sharing is disabled (this is not recommended)

A homegroup network offers read-only access for any shared resource to any homegroup user.

398
Q

A network share can be accessed by either its:

A

mapped drive letters

folder names in File Explorer

399
Q

Administrative shares are:

A

hidden shares that can be identified by a S at the end of the share name

400
Q

Administrative shares cannot be:

A

seen by standard users when browsing the computer over the network; they are meant for administrative use

401
Q

To share a folder with Windows 7/8/8.1/10, follow these steps:

A
  1. Ensure that file sharing is enabled by opening the Control Panel and double-clicking the Network and Sharing Center icon
  2. Open Windows Explorer/File Explorer and click Computer/This PC
  3. In the Computer/This PC window, navigate to a folder that you want to share
  4. Right-click the folder that you want to share and choose Share With
  5. If password-protected sharing is enabled, click Select People and select which users will have access to the shared folder and select their permission levels
  6. When finished configuring permissions, click Share and then click Done
402
Q

When joining a homegroup in Windows 7/8/8.1, joining the homegroup and configuring default sharing settings is a simple process:

A
  1. In the Network and Internet window, click HomeGroup
  2. Click Join Now
  3. Click Next
  4. Select the items you want to share
  5. Click Next
  6. Type the homegroup password
  7. Click Next
  8. Click Finish
403
Q

To set up custom access for a particular folder follow these steps:

A
  1. In the Computer/This PC window, navigate to a folder that you want to share
  2. Right-click the folder that you want to share and choose Share With. The File Sharing window appears
  3. In Windows 7, choose from Homegroup (Read), Homegroup (Read/Write), Nobody, or Specific People. In Windows 8/8.1/10, choose from Homegroup (View), Homegroup (View/Edit), Stop Sharing, and Specific People
  4. When you are done configuring permissions, click Share and then click Done
404
Q

Drive mapping has the following benefits:

A

A shared folder mapped as a drive can be referred to by the drive name instead of by using a long Universal Naming Convention (UNC): path

When using MS-DOS programs, keep in mind that using mapped drives is the only way for those programs to access shared folders

405
Q

Mapping drives is done by these steps:

A
  1. Open the Network view in Windows Explorer/File Explorer
  2. Right-click the shared folder in Network view and select Map Network Drive
  3. Select a drive letter from a list of available drive letters; only drive letters not used by local drives are listed
  4. Click the Reconnect at Login box if you want to use the mapped drive every time you connect to the network
  5. Click the Connect Using Different Credentials box if you want to use a different username/password to connect to the shared resource
  6. Click Finish
406
Q

The Universal Naming Convention (UNC) is designed to:

A

enable users to access network resources such as folders or printers without mapping drive letters to network drives or specifying the type of device that stores the file or hosts the print

407
Q

The Universal Naming Convention (UNC) enables:

A

files and printers to be accessed by the user with 32-bit and 64-bit Windows applications

408
Q

To perform printer sharing, follow these steps:

A
  1. Open the Devices and Printers or Printers and Faxes folder
  2. Right-click a printer and select Sharing
  3. Select Share This Printer and specify a share name
  4. Click Additional Drivers to select additional drivers to install for other OSs that will use the printer on the network. Supply driver media when prompted
409
Q

Whether a printer has its own IP address or is connected to a computer as a shared printer, use this procedure to install it on a system in a process called network printer mapping:

A
  1. Open Devices and Printers in the Control Panel
  2. Click or tap Add a Printer
  3. Click or tap Add a Network, Wireless, or Bluetooth. Click The Printer I Want Isn’t Listed
  4. To find a printer on an Active Directory (domain-based) network, choose Find a Printer in the Directory, Based on Location or Features. Click Next
  5. After the printer is selected, specify whether you want to use the new printer as the default printer. Click Next
  6. Specify whether you want to print a test page
  7. Click Finish to complete the setup process
410
Q

The Network and Sharing Center includes a Set Up a New Connection or Network wizard for the following connection types:

A

Virtual private networking

Dialup networking

Broadband

411
Q

A VPN connections creates:

A

a secure tunnel over a public network, such as the Internet, between computers

412
Q

To configure a new VPN connection follow these steps:

A
  1. In the Set Up a Connection or Network dialog, click or tap Connect to a Workplace and click or tap Next
  2. Click or tap Use My Internet Connection (VPN)
  3. In Windows 7, 8/8.1, enter the Internet address and the destination name, and click Create.
  4. In Windows 8/8.1, to display the VPN connection, click the network connection icon in the taskbar or from the charms menu
413
Q

Windows can create two types of dial-up connections on systems with analog modems:

A

Dial-up networking connections to an ISP

Direct dial-in connections to a corporate computer

414
Q

To configure a new dial-up connection to an ISP follow these steps:

A
  1. In the Set Up a Connection or Network dialog, click or tap Connect to the Internet and click Next
  2. Click or tap Dial-up and click or tap Next
  3. Enter the ISP’s dial-up phone number, username, and password
415
Q

To configure a new direct dial-in connection to a corporate computer follow these steps:

A
  1. In the Set Up a Connection or Network dialog, click or tap Connect a Workplace and click or tap Next
  2. Click or tap Dial Directly and click or tap Next
  3. Enter the remote computer’s dial-up phone number and destination name. Click or tap Next
  4. Enter the username and password. Enter the domain. Click or tap Connect or Create
416
Q

You can create a wireless connection by following these steps:

A
  1. In the Set Up a Connection or Network dialog, click or tap Connect to a Wireless Network and click or tap Next
  2. Enter the network name. Select the Security type and enter the security key. Click or tap Next
  3. Click or tap Close. The connection is added to the list of connections
417
Q

Follow these steps to set up a wired connection:

A
  1. In the Set Up a Connection or Network dialog, click or tap Connect to the Internet and click or tap Next
  2. Click or tap Broadband (PPPoE) and click or tap Next
  3. Enter the username and password. Enter the domain. Check the Remember This Password box if the user doesn’t want to enter the password again. Click or tap Connect
418
Q

A WWAN (cellular) connection shows up in the list of network connections after:

A

a SIM card is installed and activated by a mobile provider.

419
Q

A corporate network may use a proxy server as:

A

an intermediary between a network client and destination of the request (such as a web page) from the network client

420
Q

To configure manual proxy settings for a LAN connection in Windows follow these steps:

A
  1. Open the Internet properties (Internet options) dialog from the Control Panel
  2. On the Connections tab, click LAN Settings
  3. In the Local Area Network (LAN) Settings window, choose the appropriate option under Proxy Server
  4. Specify the correct server and port number to use
  5. Click OK to save changes in each dialog until you return to the browser display
421
Q

Remote Desktop also includes Remote Assistance, which allows:

A

a user to invite a technician to view his or her desktop in the hopes that the technician can fix any encountered problems

422
Q

In Windows, the settings Home, Work, Public, and Private refer to:

A

network locations

423
Q

When a computer running Windows 7 is connected to a network for the first time, Windows prompts the user to select a location. The location options are:

A

Home

Work (Windows 7)

Public

424
Q

By choosing Home or Work (Office) as location, you can:

A

configure the network connection as private

425
Q

By choosing Public as location, you can:

A

configure a non-secured network. This option turns off network discovery, so the computer is not visible to other computers using the network

426
Q

When a computer running Windows 8/8.1 is connected to a network for the first time, Windows prompts the user to select a location. In Windows 8, the dialog has two options:

A

Yes, Turn on Sharing and Connect to Devices (for home or work networks)

No, Don’t Turn on Sharing or Connect to Devices (for networks in public places)

427
Q

The Network and Sharing Center in Windows 8.1 displays:

A

the current network connection and location

428
Q

To change the network in Windows 8.1 you must follow these steps:

A
  1. Sweep in from the right to open the charms menu
  2. Click or tap Settings
  3. Click or tap the active network connection icon in the Settings pan. If no network connection is active, click or tap Change PC Settings, Network
  4. Click or tap the connection to change
  5. Use the Find Devices and Content slider to change the location. Turn it on for a private network. Turn it off for a public network
  6. Close the menu (by dragging it down until it disappears)
429
Q

Windows Firewall can be configured to:

A

permit specified applications to pass through the firewall

open specific ports needed by applications

block all traffic

430
Q

An exception is:

A

each application or port that is opened by a firewall

431
Q

An alternative IP address enables:

A

a system to stay on the network if the DHCP server fails or if the system is sometimes on a different network than normal

432
Q

To view or change the settings on the Alternate Configuration tab for a network adapter follow these steps:

A
  1. Open the Network and Sharing Center
  2. Click or tap Change Adapter Settings
  3. Click or tap the connection to change
  4. Click or tap Change Settings of This Connection
  5. Click or tap Internet Protocol Version 4 (TCP/IPv4)
  6. Click or tap Properties
  7. Click or tap Alternate Configuration
433
Q

The Alternate Configuration tab is used to:

A

set up a different TCP/IPv4 configuration for use when a DHCP server is not available or when a different set of user-configured settings is needed, as when a laptop is being used as a secondary location

434
Q

To access network properties follow these steps:

A
  1. Open the Network and Sharing Center
  2. Click or tap Change Adapter Settings
  3. Click or tap a wired connection
  4. Click or tap Change Settings of This Connection
  5. Click or tap Configure
435
Q

Half duplex/full duplex/ auto are settings that:

A

determine how a network card communicates with the rest of the network

436
Q

Full duplex modes enables:

A

the adapter to send and receive data at the same time, which doubles network speed compared to the default half-duplex mode

437
Q

To change duplex and speed settings for a network follow these steps:

A
  1. Click or tap Configure on the adapter properties sheet
  2. Click or tap the Advanced tab
  3. Click or tap Speed & Duplex
  4. Select the value desired
  5. Click OK when done
438
Q

Wake-on-LAN (WOL or WoL) enables:

A

a computer to a wired network to be awakened from sleep mode via a special “magic packet” signal delivered by the network

439
Q

Wake-on-LAN (WOL or WoL) can be used to:

A

awaken a computer for updates, backup, or other tasks, as needed, and allow it to run in low-power mode when not in use

440
Q

The successful configuration of Wake-on-LAN (WOL or WoL) requires:

A

changes to the default settings of a computer’s BIOS or UEFI firmware, network adapter, Windows services, firewall settings, and router port forwarding.

441
Q

The following change in system configuration are needed to make Wake-on-LAN (WOL or WoL) work properly:

A

Enable Wake-on-LAN in the system BIOS or UEFI firmware and save changes

Open the Control Panel’s Windows Features dialog and turn on Simple TCP/IP Services

Open Computer Management’s Services dialog, start Simple TCP/IP Services, and configure it to run automatically

Ensure the UDP port 9 (recommended) or port 7 (if 9 isn’t working) is open in your firewall

Configure your router to forward UDP 9 (or 7) to the computers that need WOL services

442
Q

Quality of server (QoS) enables:

A

a computer connected to a wired network to optimize real-time streaming traffic, such as VoIP, streaming video, or streaming music services

443
Q

The BIOS in an on-board NIC can be used to:

A

boot the computer if it is configured as a bootable device in the BIOS or UEFI firmware setup. Enable this setting to obtain an installable OS image from the network

444
Q

To maintain any computer system, you should follow best practices related to:

A

Scheduled backups

Scheduled disk maintenance

System updates/App store

Patch management

Driver/firmware updates

Antivirus/antimalware updates

445
Q

Scheduled backups help prevent:

A

major data loss in case of system failure, accident, or loss.

446
Q

Backups can be used to safeguard:

A

Contacts

Email

Media files (photos, videos, and music)

Documents

447
Q

The default backup app in macOS is:

A

Time Machine

448
Q

Backup features to look for include:

A

Compression

Support for incremental as well as full backups

Local and network backup destinations

449
Q

Describe Backup Compression:

A

Reduces the amount of file space and often the amount of time needed to make a backup

450
Q

Describe Support for incremental as well as full backups:

A

Good backup practice calls for periodic full backups followed by backups of files changed since the last full backup (incremental backups)

451
Q

Describe Local and network backup destinations:

A

Some backup utilities might require additional configuration before a network backup can be performed

452
Q

To enable and configure Time Machine in macOS follow these steps:

A
  1. Connect a suitable external disk to a macOS system
  2. When prompted, click Use as Backup Disk. You can also check the Encrypt Backup Disk box to protect the backup
  3. If you select the option to encrypt your backup in step 2, enter a password, confirm it, and enter a password hint
  4. Make sure Time Machine is turned on. After the selected disk is encrypted, the backup starts
453
Q

Disk Utility in macOS can be used to:

A

create blank disk images that can be used as containers for other files, including image backups

454
Q

When a file is deleted from a macOS system or when a different version of an existing file is needed, you can restore a file from a Time Machine backup follow these steps:

A
  1. Open a Finder window where the restored file belongs
  2. Open Time Machine from Dock
  3. Scroll through the backups shown to find the file(s) to restore
  4. Select the file(s) to restore and click Restore

(The file is restored to its original location)

455
Q

macOS offers several image recovery options likes:

A

After you create an image with Disk Utility, the image can be restored by using Edit> Restore

Disk Utility can also be used to reinstall macOS

456
Q

macOS First Aid can:

A

repair problems with the file system, partitions, and other issues

457
Q

Some useful disk maintenance commands for the Linux Terminal mode include:

A

df -h: List files and free space in a computer

> directory path/filename: Removes the contents of the specified file without removing the file itself

ls -lsr | tail -5: Finds the five largest files in the current directory

458
Q

macOS and Linux bot include shell/terminal apps that:

A

open a command line environment

459
Q

Screen Sharing enables:

A

local users on the network or remote users running virtual network computing (VNC) to control the screen for training or troubleshooting

460
Q

The Force Quit feature in macOS enables:

A

the use to shut down a malfunctioning app

461
Q

To access Force Quit in macOS from the keyboard, press:

A

Cmd+Option+Esc

462
Q

Mission Control displays:

A

all apps open on the desktop so you can copy or move them between different desktops

463
Q

Spotlight is the macOS:

A

search tool for files, apps, photos, web results, dictionary entries, news, moving listings, and more

464
Q

To open Spotlight in macOS from the keyboard press:

A

Cmd+Spacebar

465
Q

macOS uses iCloud cloud storage for:

A

photo sharing, document, and data storage, and Find My Mac

466
Q

Use iCloud Keychain to:

A

safely store Safari usernames and passwords, credit card information, and WiFi network information across Apple devices

467
Q

With gestures on macOS a user can:

A

convert common touch patterns to customizable commands such as “fast forward” zoom commands

468
Q

Finder is macOS’s:

A

file manager

469
Q

Recent Apple models do not have optical disks. Remote Disc enables:

A

access to files from a CD or DVD on another computer on a network

470
Q

macOS uses the Dock to:

A

display and switch between running apps along the bottom of the display

471
Q

Boot Camp is the macOS:

A

multiboot utility for installing Windows on a macOS computer

472
Q

Basic Linux Commands

ls

A

lists the contents of a directory (folder), including permissions and other information

473
Q

Basic Linux Commands

grep

A

performs text searches. The command line specifies what to search for and where to search

474
Q

Basic Linux Commands

cd

A

use this to change directories (folders)

475
Q

Basic Linux Commands

shutdown

A

shuts down the system

476
Q

Basic Linux Commands

pwd

A

Displays the name of the current/working directory

477
Q

Basic Linux Commands

passwd

A

Starts the password change process

478
Q

Basic Linux Commands

mv

A

moves files to a specified location

479
Q

Basic Linux Commands

cp

A

copies files to a specified location

480
Q

Basic Linux Commands

rm

A

removes (deletes) files from the system

481
Q

Basic Linux Commands

chmod

A

changes permissions of files and directories

482
Q

Basic Linux Commands

chown

A

changes file ownership using the syntax sudo chown newowner filename

483
Q

Basic Linux Commands

iwconfig

A

displays wireless network connections (Linux only)

484
Q

Basic Linux Commands

ps

A

lists the currently running processes

485
Q

Basic Linux Commands

sudo

A

runs a command as another user

486
Q

Basic Linux Commands

su

A

switches between user accounts

487
Q

Basic Linux Commands

apt-get

A

installs or manages Advanced Packaging Tool (APT) software packages

488
Q

Basic Linux Commands

vi

A

starts the vi text editor

489
Q

Basic Linux Commands

dd

A

performs a block file copy to convert between formats

490
Q

Basic Linux Commands

kill

A

stops specified applications