Operating Systems Flashcards
This is a drive encryption utility designed to protect data on a PC by encrypting the entire hard drive.
BitLocker
Explanation:
BitLocker completely encrypts a hard drive protecting data from loss or theft.
The ability of newer network interface cards to concurrently transmitting and receiving data is referred to as ____.
Full Duplex
Explanation:
Full Duplex allows a network interface card to transmit and receive data concurrently.
What Windows utility that provides a command line interface would you use to troubleshoot a system that will not boot?
recovery console
Explanation:
Recovery console is accessed in one of three ways. Press F8 during system boot, with a system repair disk, or with the original distribution disk. Recovery console opens a command line prompt that allows you to repair many boot-up problems such as a corrupted MBR (Master Boot Record), or a corrupted boot sector.
In Windows 10, where can you view and/or delete processes that are launched at startup?
Task manager > Startup tab
Explanation:
To disable startup programs on Windows 7, go to Start, type Run, enter Msconfig, and then select the Startup tab.
To disable startup programs on Windows 8, press Ctrl + Alt + Del and then select Task Manager and the Startup tab.
What Windows utility is used to delete temporary files from a hard drive to free up disk space?
Disk Cleanup
Explanation:
For Windows 7, Disk Cleanup is located in System tools.
For Windows 8, from Start, type Disk Cleanup.
In Windows 10, from Start, type Disk Cleanup.
To disable FTP on a network, what port number would you block on the firewall?
Port 21
Explanation:
By blocking port 21 on a firewall, any FTP traffic would be denied.
What protocol converts domain names into IP addresses?
DNS
Explanation:
The Domain Name Server converts domain names to IP addresses.
What feature on a network allows for prioritizing certain traffic?
QoS (Quality of Service)
Explanation:
When enabled, QoS can be set to prioritize certain types of traffic. An example would be when voice or video traffic is being used on a network.
What Windows utility allows you to delete, create, or resize disk partitions?
Disk Management
Explanation:
To enter Disk Management on Windows 7, from the Control Panel, select System and Security > Create and format hard disk partitions.
On Windows 8, Disk Management is invoked by pressing the Windows.Logo key and typing diskmgmt.msc.
In Windows 10, Disk Management is invoked by pressing the Windows.Logo key and typing diskmgmt.msc. (same as in Windows 8)
What Apple feature allows the user to use small motions on a trackpad to complete simple tasks, such as turning a page?
Gestures
Explanation:
Apple Gestures can be configured through System Preferences under Trackpad and provides personalization for the type of movement needed to accomplish a task.
Looking at this will tell you your network ID, broadcast address, and number of host addresses available.
Subnet Mask
Explanation:
IP addresses are made up of 32 binary bits, which determine both the network address as well as the host address. To indicate which bits are network bits and which bits are host bits, IP addressing parameters include a subnet mask.
The subnet mask is also made up of 32 bits, each subnet mask bit corresponding to a single bit in the IP address. If the IP address bit is a network bit, the subnet mask bit is set to “1”. If the corresponding IP address bit is a host bit, the corresponding netmask bit is set to “0”.
From the command line prompt, what command is used to list the contents of a directory?
dir
Explanation:
The dir command will list the contents of a directory. It also has numerous options that allow the output to be displayed in numerous different configurations.
What is the command prompt called on the macOS?
Terminal
Explanation:
Apple products and the macOS use the term Terminal when referring to the command prompt window.
Linux tracks system events in log files. These entries are important when doing system maintenance. If left unattended, these log files can take up a large amount of disk space. Where are these log files saved and how can they be safely removed?
/var/log
Explanation:
Every system event is logged and available for system tuning and troubleshooting. These are located in the ‘/var/log’ directory. Log files can be deleted and will be replaced by new files as new events occur. You need to monitor the size of these files and understand that some files may need to be saved to help you spot trends. Log files are saved as text files, making them easy to view.
Occasionally, users may opt to run Windows and Linux on the same system. This can be accomplished by setting up a virtual machine on Windows loaded to run Linux. This has the advantage of allowing the user to simultaneously run both operating systems. Setting up a dual boot system is another option. What advantage does running a dual boot system have over running virtual machines?
Using a dual boot option allows 100% of the system resources to the operating system.
Explanation:
When setting up a dual boot system using Windows and Linux, you should always load Windows first then Linux. This allows Linux to manage the boot sequence. The Linux boot manager works better than Windows boot manager.
What command used in Debian-based Linux operating systems will update the operating system?
apt-get update
Explanation:
The command requires administrative permission to run, so from the command line, enter sudo apt-get update.