CMN Unit 3 Flashcards
What was the first storage method used by early computers?
Punch cards, paper tape, magnetic tape, audio cassettes
These were the initial methods before modern storage devices like hard drives and flash storage became available.
What is the purpose of the Disk Operating System (DOS)?
To enable data storage devices to read and write files
DOS provides a file system which organizes files on the disk.
Who developed MS-DOS?
Microsoft
Microsoft bought DOS and developed MS-DOS as a version of the Disk Operating System.
What type of interface does MS-DOS use?
Command line interface
Users interact with MS-DOS by typing commands at the prompt.
True or False: MS-DOS is a single-process, single-user operating system.
True
This contrasts with modern operating systems that support multiple user processes.
What does Windows NT stand for?
New Technologies
Windows NT is the architecture that modern versions of Windows are built upon.
What significant change occurred with the release of Windows XP?
Introduction of a 64-bit edition
This was a major architecture shift allowing for more memory addressing.
How much RAM can a 32-bit Windows OS address?
Less than 4 GB
In contrast, a 64-bit OS can theoretically address up to 16.8 million terabytes.
Fill in the blank: Windows 10 is considered the last version of Windows, as Microsoft states that Windows has become a _______.
Service
Users will update Windows 10 rather than purchasing new operating systems.
What is the main area of the Windows GUI called?
Desktop
The Desktop is where users can manage files, folders, and applications.
What functionality does the Task Bar provide?
Access to Start menu, quick launch icons, and notification area
These components help users manage applications and receive notifications.
What is a Context Menu in Windows?
A list of additional functions that appears upon right-clicking an icon
This menu provides commonly used functions like copy, delete, and share.
What is a vulnerability in the context of operating systems?
A flaw or weakness that can be exploited by an attacker
Vulnerabilities can lead to unauthorized control over the computer or theft of data.
What is the goal of an attacker exploiting a vulnerability?
To gain unauthorized control, change permissions, or manipulate/stole data
Attackers aim to bypass the intended design of the computer.
List some common recommendations for Windows OS security.
- Regular updates
- Use antivirus software
- Implement firewalls
- Back up data
- Practice safe browsing
These measures help protect against vulnerabilities and attacks.
What is the significance of the NT operating system in Windows versions?
More than 20 releases of Windows have been based on the NT operating system, primarily for public and business use due to enhanced file security.
What types of Windows operating systems were built specifically for businesses?
- Workstation
- Professional
- Server
- Advanced Server
- Datacenter Server
What major architectural change occurred with the introduction of Windows XP?
The introduction of a 64-bit edition, featuring a 64-bit address space instead of a 32-bit address space.
How much RAM can 32-bit and 64-bit Windows theoretically address?
32-bit Windows can address a little less than 4 GB, while 64-bit Windows can theoretically address 16.8 million terabytes.
What are some applications that benefit from 64-bit operating systems?
- Very large databases
- Scientific computing
- Manipulation of high definition digital video with special effects
True or False: 64-bit programs can be run on older, 32-bit hardware.
False
How many editions were offered with Windows 7?
Six different editions.
What did Microsoft announce regarding Windows 10?
Windows 10 is the last version of Windows, transitioning to a service model rather than standalone OS purchases.
What is the main area of the Windows graphical user interface (GUI) called?
The Desktop.
What features can be found on the Windows Task Bar?
- Start Menu
- Quick Launch Icons
- Notification Area
What is the function of the Recycle Bin in Windows?
Stores deleted files, which can be restored or permanently deleted.
What is a Context Menu in Windows?
A list of additional functions that can be accessed by right-clicking an icon.
What are some common functions found in a Context Menu for a file?
- Copy
- Delete
- Share
What is the role of Windows File Explorer?
Used to open folders and manipulate files.
What is a vulnerability in the context of operating systems?
A flaw or weakness that can be exploited by an attacker to compromise a computer’s information.
What is the general goal of exploiting an operating system vulnerability?
To gain unauthorized control of the computer, change permissions, or manipulate or steal data.
Fill in the blank: Operating systems consist of millions of lines of _______.
code
What is the purpose of the Hardware Abstraction Layer (HAL) in Windows?
Manages communication between hardware and the kernel
What are the two operational modes in Windows?
User Mode and Kernel Mode
In User Mode, what is the impact of an application crash?
Affects only the app
What is the consequence of a crash in Kernel Mode?
Can crash the entire system
How do kernel-mode drivers affect system stability?
Share address space, causing potential instability
What is the primary Windows file system?
NTFS
List the key components of NTFS.
- Partition Boot Sector
- Master File Table (MFT)
- System Files
- File Area
What does the Master File Table (MFT) store?
File locations, attributes, and timestamps
What is recommended before reusing a drive to prevent data recovery?
Secure wiping
What are Alternate Data Streams (ADS) in NTFS?
Allows storage of additional hidden data as file attributes
True or False: ADS is visible in standard directory listings.
False
What is the sequence of steps from power-on to system login called?
Boot process
What are the two types of firmware used in the boot process?
- BIOS
- UEFI
What does Bootmgr.exe do during the boot process?
Switches to protected mode and reads Boot Configuration Database (BCD)
What is the role of Winload.exe in the boot process?
Loads kernel, drivers, and hardware configuration
What entries in the Registry manage Windows startup?
- HKEY_LOCAL_MACHINE
- HKEY_CURRENT_USER
What does the Msconfig.exe tool manage?
Startup options
Fill in the blank: A proper shutdown prevents _______.
data corruption and system instability
What is the first step in the Windows shutdown process?
Closes user-mode applications first
What can improper shutdowns cause?
- Leave files open
- Disrupt services
- Cause application errors
What are the security risks of using an Administrator account for daily tasks?
Programs executed with admin privileges inherit those privileges, making malware more dangerous.
It is recommended to avoid using an Administrator account for regular tasks to minimize security vulnerabilities.
How can you execute a program with elevated privileges in Windows?
‘Run as Administrator’ via the right-click context menu or an Administrator Command Prompt when needed.
This method allows temporary elevation of privileges for specific tasks.
What happens to the Administrator and Guest accounts by default in Windows?
They are disabled by default for security reasons.
This is to prevent unauthorized access and enhance system security.
What does Windows prompt for when a standard user attempts to perform an action requiring admin privileges?
An Administrator password.
This is a security measure to control access to elevated privileges.
What are the four main settings of Windows Management Instrumentation (WMI)?
- General
- Backup/Restore
- Security
- Advanced
These settings help manage and monitor system health and performance.
What is the purpose of the net command in Windows?
It is used for OS administration and maintenance.
This command includes various subcommands for user and group management.
Name two common subcommands of the net command.
- net user
- net localgroup
These commands are used for managing user accounts and local groups.
What does Task Manager provide in Windows?
Real-time monitoring of applications, services, and performance.
It is a key tool for diagnosing system issues.
What additional insights does Resource Monitor provide compared to Task Manager?
Detailed insights into CPU, memory, disk, and network usage.
It is useful for more in-depth analysis of system performance.
What is the function of the Network and Sharing Center in Windows?
Used to configure and manage network connections.
It allows users to set up and troubleshoot network settings.
What command is used to test DNS resolution in Windows?
nslookup.
This command helps verify if a domain name resolves to the correct IP address.
What does netstat display in Windows?
Active network connections, including open ports and their status.
This tool is essential for network diagnostics.
What does the Windows CLI allow users to do?
Command execution, file navigation, and batch scripting.
It provides a text-based interface for system management.
How does PowerShell extend the capabilities of the Windows CLI?
Allows automation via scripts, cmdlets, and functions.
PowerShell is a powerful tool for system administrators.
True or False: CLI commands in Windows are case-sensitive.
False.
Windows CLI commands are not case-sensitive.
What feature does PowerShell include to assist users?
Built-in help features.
This makes it easier for users to understand and use various commands.
What is a key risk associated with WMI?
Attackers may use WMI for malicious activities.
Access to WMI should be strictly controlled to prevent exploitation.