CMN Unit 3 Flashcards

1
Q

What was the first storage method used by early computers?

A

Punch cards, paper tape, magnetic tape, audio cassettes

These were the initial methods before modern storage devices like hard drives and flash storage became available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of the Disk Operating System (DOS)?

A

To enable data storage devices to read and write files

DOS provides a file system which organizes files on the disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who developed MS-DOS?

A

Microsoft

Microsoft bought DOS and developed MS-DOS as a version of the Disk Operating System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of interface does MS-DOS use?

A

Command line interface

Users interact with MS-DOS by typing commands at the prompt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: MS-DOS is a single-process, single-user operating system.

A

True

This contrasts with modern operating systems that support multiple user processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Windows NT stand for?

A

New Technologies

Windows NT is the architecture that modern versions of Windows are built upon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What significant change occurred with the release of Windows XP?

A

Introduction of a 64-bit edition

This was a major architecture shift allowing for more memory addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How much RAM can a 32-bit Windows OS address?

A

Less than 4 GB

In contrast, a 64-bit OS can theoretically address up to 16.8 million terabytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: Windows 10 is considered the last version of Windows, as Microsoft states that Windows has become a _______.

A

Service

Users will update Windows 10 rather than purchasing new operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main area of the Windows GUI called?

A

Desktop

The Desktop is where users can manage files, folders, and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What functionality does the Task Bar provide?

A

Access to Start menu, quick launch icons, and notification area

These components help users manage applications and receive notifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Context Menu in Windows?

A

A list of additional functions that appears upon right-clicking an icon

This menu provides commonly used functions like copy, delete, and share.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a vulnerability in the context of operating systems?

A

A flaw or weakness that can be exploited by an attacker

Vulnerabilities can lead to unauthorized control over the computer or theft of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the goal of an attacker exploiting a vulnerability?

A

To gain unauthorized control, change permissions, or manipulate/stole data

Attackers aim to bypass the intended design of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List some common recommendations for Windows OS security.

A
  • Regular updates
  • Use antivirus software
  • Implement firewalls
  • Back up data
  • Practice safe browsing

These measures help protect against vulnerabilities and attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the significance of the NT operating system in Windows versions?

A

More than 20 releases of Windows have been based on the NT operating system, primarily for public and business use due to enhanced file security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What types of Windows operating systems were built specifically for businesses?

A
  • Workstation
  • Professional
  • Server
  • Advanced Server
  • Datacenter Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What major architectural change occurred with the introduction of Windows XP?

A

The introduction of a 64-bit edition, featuring a 64-bit address space instead of a 32-bit address space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How much RAM can 32-bit and 64-bit Windows theoretically address?

A

32-bit Windows can address a little less than 4 GB, while 64-bit Windows can theoretically address 16.8 million terabytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some applications that benefit from 64-bit operating systems?

A
  • Very large databases
  • Scientific computing
  • Manipulation of high definition digital video with special effects
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

True or False: 64-bit programs can be run on older, 32-bit hardware.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How many editions were offered with Windows 7?

A

Six different editions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What did Microsoft announce regarding Windows 10?

A

Windows 10 is the last version of Windows, transitioning to a service model rather than standalone OS purchases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the main area of the Windows graphical user interface (GUI) called?

A

The Desktop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What features can be found on the Windows Task Bar?

A
  • Start Menu
  • Quick Launch Icons
  • Notification Area
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the function of the Recycle Bin in Windows?

A

Stores deleted files, which can be restored or permanently deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a Context Menu in Windows?

A

A list of additional functions that can be accessed by right-clicking an icon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are some common functions found in a Context Menu for a file?

A
  • Copy
  • Delete
  • Share
  • Print
29
Q

What is the role of Windows File Explorer?

A

Used to open folders and manipulate files.

30
Q

What is a vulnerability in the context of operating systems?

A

A flaw or weakness that can be exploited by an attacker to compromise a computer’s information.

31
Q

What is the general goal of exploiting an operating system vulnerability?

A

To gain unauthorized control of the computer, change permissions, or manipulate or steal data.

32
Q

Fill in the blank: Operating systems consist of millions of lines of _______.

33
Q

What is the purpose of the Hardware Abstraction Layer (HAL) in Windows?

A

Manages communication between hardware and the kernel

34
Q

What are the two operational modes in Windows?

A

User Mode and Kernel Mode

35
Q

In User Mode, what is the impact of an application crash?

A

Affects only the app

36
Q

What is the consequence of a crash in Kernel Mode?

A

Can crash the entire system

37
Q

How do kernel-mode drivers affect system stability?

A

Share address space, causing potential instability

38
Q

What is the primary Windows file system?

39
Q

List the key components of NTFS.

A
  • Partition Boot Sector
  • Master File Table (MFT)
  • System Files
  • File Area
40
Q

What does the Master File Table (MFT) store?

A

File locations, attributes, and timestamps

41
Q

What is recommended before reusing a drive to prevent data recovery?

A

Secure wiping

42
Q

What are Alternate Data Streams (ADS) in NTFS?

A

Allows storage of additional hidden data as file attributes

43
Q

True or False: ADS is visible in standard directory listings.

44
Q

What is the sequence of steps from power-on to system login called?

A

Boot process

45
Q

What are the two types of firmware used in the boot process?

46
Q

What does Bootmgr.exe do during the boot process?

A

Switches to protected mode and reads Boot Configuration Database (BCD)

47
Q

What is the role of Winload.exe in the boot process?

A

Loads kernel, drivers, and hardware configuration

48
Q

What entries in the Registry manage Windows startup?

A
  • HKEY_LOCAL_MACHINE
  • HKEY_CURRENT_USER
49
Q

What does the Msconfig.exe tool manage?

A

Startup options

50
Q

Fill in the blank: A proper shutdown prevents _______.

A

data corruption and system instability

51
Q

What is the first step in the Windows shutdown process?

A

Closes user-mode applications first

52
Q

What can improper shutdowns cause?

A
  • Leave files open
  • Disrupt services
  • Cause application errors
53
Q

What are the security risks of using an Administrator account for daily tasks?

A

Programs executed with admin privileges inherit those privileges, making malware more dangerous.

It is recommended to avoid using an Administrator account for regular tasks to minimize security vulnerabilities.

54
Q

How can you execute a program with elevated privileges in Windows?

A

‘Run as Administrator’ via the right-click context menu or an Administrator Command Prompt when needed.

This method allows temporary elevation of privileges for specific tasks.

55
Q

What happens to the Administrator and Guest accounts by default in Windows?

A

They are disabled by default for security reasons.

This is to prevent unauthorized access and enhance system security.

56
Q

What does Windows prompt for when a standard user attempts to perform an action requiring admin privileges?

A

An Administrator password.

This is a security measure to control access to elevated privileges.

57
Q

What are the four main settings of Windows Management Instrumentation (WMI)?

A
  • General
  • Backup/Restore
  • Security
  • Advanced

These settings help manage and monitor system health and performance.

58
Q

What is the purpose of the net command in Windows?

A

It is used for OS administration and maintenance.

This command includes various subcommands for user and group management.

59
Q

Name two common subcommands of the net command.

A
  • net user
  • net localgroup

These commands are used for managing user accounts and local groups.

60
Q

What does Task Manager provide in Windows?

A

Real-time monitoring of applications, services, and performance.

It is a key tool for diagnosing system issues.

61
Q

What additional insights does Resource Monitor provide compared to Task Manager?

A

Detailed insights into CPU, memory, disk, and network usage.

It is useful for more in-depth analysis of system performance.

62
Q

What is the function of the Network and Sharing Center in Windows?

A

Used to configure and manage network connections.

It allows users to set up and troubleshoot network settings.

63
Q

What command is used to test DNS resolution in Windows?

A

nslookup.

This command helps verify if a domain name resolves to the correct IP address.

64
Q

What does netstat display in Windows?

A

Active network connections, including open ports and their status.

This tool is essential for network diagnostics.

65
Q

What does the Windows CLI allow users to do?

A

Command execution, file navigation, and batch scripting.

It provides a text-based interface for system management.

66
Q

How does PowerShell extend the capabilities of the Windows CLI?

A

Allows automation via scripts, cmdlets, and functions.

PowerShell is a powerful tool for system administrators.

67
Q

True or False: CLI commands in Windows are case-sensitive.

A

False.

Windows CLI commands are not case-sensitive.

68
Q

What feature does PowerShell include to assist users?

A

Built-in help features.

This makes it easier for users to understand and use various commands.

69
Q

What is a key risk associated with WMI?

A

Attackers may use WMI for malicious activities.

Access to WMI should be strictly controlled to prevent exploitation.