Operating Systems, Users/Superusers, Windows/MacOS/Linux Flashcards

1
Q

Which feature of Windows ultimate will ensure sensitive data is secure and allow encryption on the entire drive?

A

Bitlocker

With Windows Ultimate and Enterprise editions, as well as Windows 8 and 8.1, BitLocker, allows users to encrypt the entire drive protecting the data from loss or theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the command line prompt to create a new directory in Windows?

A

There are two commands that do the same thing:
mkdir (make directory) and md

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When installing a new operating system onto a laptop using a USB flash drive, what must be done before loading from the flash drive?

A

The boot sequence in system BIOS must be adjusted, making the USB the first device in the boot order.

When the system boots, it boots in the order listed in BIOS, so the thumb drive must be shown as the first device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wake-on-LAN

A

feature of the Network Interface Card allows for a powered down or sleeping PC to power on when a print job is received

When a PC is configured to use Wake-on-LAN, it will power on when a print job is being sent. There is a similar feature available for modems that allows the PC to be powered up when the modem determines a call is being received. This is Wake-On-Ring, often used when PCs are configured to receive faxes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company with a very small local area network has grown to the point where statically assigning IP addresses and other NIC parameters have become impossible to manage. What steps can a network administrator take to simplify the process of configuring network interface cards?

A

Incorporate a DHCP Server into the network.

A DHCP (Dynamic Host Configuration Protocol) server is used to automatically configure the parameters needed by a network interface card when a PC is first booted up. It provides central management of IP address allocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A client complains that his laptop is taking way too long to boot up. You suspect that he has numerous processes that are initiating during startup. What utility would you use to see which processes are being launched on a Windows 10 laptop?

A

task manager

The Task Manager utility has a Startup tab that displays the processes launched at startup and allows you to disable any process. The previous versions of Windows used MSConfig to complete this, but will now display a note instructing the user to open Task Manager instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disk Cleanup

A

helps eliminate any temporary files from a hard drive

utility is used to delete temporary files from a hard drive. To perform Disk Cleanup, from Start, enter Disk Cleanup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Marc is tasked with installing a Windows edition that is capable of handling 6 TB of RAM and four CPUs. Which edition would best suit his needs?

A

Pro for Workstations

While both the Enterprise and Pro for Workstations editions of Windows 10 support 6 TB of RAM, only the Pro for Workstations edition is capable of running four CPUs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sue finds that she is unable to connect to the Internet. She opens a command line prompt and enters ipconfig and determines that her IP address is 169.254.17.200, which is not on her network. What is a likely cause of the problem?

A

She is unable to connect to the DHCP Server.
Explanation:

When she powered on her computer, it should connect to the DHCP server to acquire an IP address. If the DHCP server is down, her system will assign itself an APIPA address in the range of 169.254.0.1 through 169.254.255.254, then sends a broadcast to ensure no other PC is currently using that address. Unfortunately, the address 169.254.17.200 that her system randomly chose is not on her network so she will not be able to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user is constantly receiving error messages relating to the hard drive on his Windows workstation. What command-line utility would he use to verify the integrity of the drive?

A

The system tool used to verify disk integrity is chkdsk which is run from the system command prompt. When run with no parameters set, it will simply display the disk status, if the /r option is added to the command, chkdsk will locate bad sectors and attempt to recover lost data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Domain access is not available with which Windows 10 OS edition?

A

Home edition

The Windows 10 Home edition is a functionally reduced version of the Windows OS and is designed for home and personal use. It does not offer domain access.

Pro, Pro for Workstations, and Enterprise all offer domain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What would likely be the issue if a person can print to their network printer but can’t connect to the internet?

A

The default gateway is down.

If the default gateway goes down, it would not affect the local area network so he would be able to print. However, if the default gateway went down, users would not be able to access the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the command netstat do?

A

used to display information about the current state of network connections. This is a helpful troubleshooting tool to aid any IT support team for a variety of issues, and certainly network issues in particular.

displays information about the IP address, port number, and connectivity state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What two commands will remove a directory in command line mode?

A

rd; rmdir

both mean (remove directory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the command line, you want to move back to the main directory after going down TWO directories. How would you do this?

A

Use “cd ../..”

The command CD (Change Directory) .. (two dots) means the directory above, so ../.. would move you up two directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What protocol would you use that would allow you to connect to remote user workstations to assist in the native OS interface?

A

RDP - Remote Desktop Protocol

RDP (Remote Desktop Protocol) provides the ability to remotely log in to computers to support remote users, among other uses. Once connected, this presents you with the same screen that a user would see on their end.

While you can connect to remote systems with Telnet and SSH, these options will only connect you to a command line or shell, not the default user interface of someone’s PC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In Linux, what command do you enter to view a listing of the directory she is working on, as well as attributes of the files and any subdirectories?

A

ls -l

The command ls gives a listing of a directory (folder); the option -l gives a long listing, which includes attributes of files and folders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the command that allows users to install new software packages on Debian-based Linux distributions?

A

The command apt-get allows a simple way to add new software packages to a Linux system.

Note: The latest research indicates that apt-get is not depreciated and is still used in operations like scripting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In Windows OS, the net use command is used for -

A

displaying how drive letters are mapped to network shares

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In Windows OS, the net user command is used to -

A

used for viewing user accounts on the OS. Lets you view all accounts on the host system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In Linux, what command lets you create a new directory?

A

mkdir or md

(make directory)

While Windows may utilize both commands, Linux distributions only make use of the mkdir command to create new directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

On Mac OS X, Time Machine does what?

A

When set, it will automatically perform backups hourly for a period of 24 hours.

Enabling Time Machine requires using an external storage media, such as an external hard drive or Time Capsule. When enabled, it will perform incremental or historical backups in this manner: hourly backups for the past 24 hours, daily backups for the past month, and weekly backups for all previous months. It’s also important to note that the oldest backups are deleted when your storage becomes full.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

On Mac OS X, Disk Utility lets you -

A

runs first aid, partitions, erases, and unmounts a disk, as well as obtains information relating to the drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How can you manage all your app updates on Mac OS X?

A

The App Store.

The App Store allows users to manage updates and set up automatic installation of updates for the apps installed on your Mac. For updates pertaining to the OS, these can be found by going to the Apple Menu ==> System Preferences ==> Software Updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What Mac OS X utility allows you to stop a running application?

A

force quit.

Occasionally, a running application can get hung. Force Quit will list running applications and allow you to halt one at a time. Command+Option+Esc will open the Force Quit window. Select the defective application and select force quit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How can you open a terminal session on a Mac OS X system?

A

Select Terminal in the Applications/Utilities folder.

To run a terminal session out of the options provided, you can use Finder, then open the Applications/Utilities folder to find the Terminal application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How can you find the IP address assigned to a Linux system in the command prompt?

A

ifconfig (interface configuration)

From the command prompt, the ifconfig command (Interface configuration) will display the IP information the user is looking for.

If you are not familiar with this command, you should know that this is the “go-to” command on Linux-type systems to find IP address information. It’s likely used in nearly all troubleshooting scenarios involving Linux networking. Also important to note is that ifconfig has become deprecated in some Linux distributions, in favor of the iproute2 toolset. The replacement command using iproute2 would be ip addr, although CompTIA A+ only asks you to be familiar with ifconfig on the current exam objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What 3 power plans offered by the Windows OS?

A
  1. Power Saver
  2. Balanced
  3. High Performance

Hibernate, Suspend, and Standby are states of power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What’s the purpose of DNS (Domain Naming Server)?

A

DNS (domain name server) takes domain names like www.abc.com and converts it into a public IP address like 199.181.132.250

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What’s the default filesystem on a Mac laptop?

A

The Apple File System (APFS) is proprietary to Apple and is the default filesystem on the macOS. APFS replaced the HFS and the HFS+ file system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How do you search a Linux file system for a specific string? What command?

A

grep

The grep command is a Linux command that can search the file system for a specified string of characters and display all instances of the string found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the most efficient installation method for an upgrade on an entire network?

A

A network-based installation creates a read-only file share accessible by the installer to be used by all network-connected devices, eliminating the need for a separate installation media, such as a flash drive or an internet connection. It is the most efficient way to upgrade large networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

On the Mac OS, a .dmg file is -

A

a disk imaging file that functions like a ISO or a ZIP file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Cheryl has enabled Fast Startup on her Windows device. What power state does Fast Startup place the device in when shut down?

A

Hibernation
Explanation:

Hibernation saves the current state of the device when it is shut down, increasing startup speed in Fast Startup. The Suspend, Sleep, and Standby modes do not shut the device off but place it in a state of reduced power consumption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The system requirements for an application require a 32-bit OS. What OS configurations will be compatible with the application?

A

both 32-bit and 64-bit OSs

An application that runs a 64-bit OS is compatible with both 64-bit and 32-bit applications. A 32-bit OS, however, is not compatible with a 64-bit application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Clyde needs to change the permissions on a Linux file from r to rw. Which command line tool should he use?

A

chmod

The chmod command is used to change file permissions on a Linux OS.

The chown command is used to change the ownership of a Linux file or object.

The ‘sfc’ command is a Windows tool used to check file versions, while the winver command is used to display a Windows GUI dialog box.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Keychain in MacOS does what?

A

allows users to store passwords, private keys, certificates, and secure notes. It’s a tool for password management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which Linux command can be used to terminate a process?

A

kill

In Linux, the built-in command to terminate a process is the kill command. The kill command can be used to terminate a process using the name or PID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which command in Linux can be used to change passwords?

A

passwd

The command to change passwords in Linux is the passwd command. This command can be used by typing the command passwd followed by the username that needs its password reset. If no username is specified, it will change the password for the current user. The command pwd is also a Linux command, but it shows the present working directory rather than changing the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are the different editions of Windows and their features: Home, Pro, Pro for Workstations, and Enterprise?

A

Home

Windows 10 comes preinstalled on vendor hardware and is referred to as the original equipment manufacturer (OEM) OS. Windows 10 is also available as a retail product but lacks the ability to join a domain, which other Windows editions offer.

Pro

Windows Pro allows the user to join corporate domains, which makes it the most common OEM OS and the premier Windows retail edition offering.
Pro for Workstations

Windows Pro for Workstations supports up to four CPUs and 6 TB of memory as well as remote directory memory access (RDMA) and non-volatile dual inline memory modules (NVDIMM), which makes it ideal for high-end workstations that require more than two CPUs and over 2 TB of memory.
Enterprise

Windows 10 Enterprise offers all the same functionality as Windows Pro and can be volume licensed for larger enterprises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What’s Domain Access versus a Workgroup?

A

Domain access is the ability of the OS to connect to a domain-joined network of computers that provide centralized authentication, administration, and auditing. It is often found in large corporate networks. Domain access is supported in the Windows Pro, Pro for Workstations, and Enterprise editions.

A workgroup is the default mode for the Windows OS and is a decentralized collection of computers or workstations. Windows Home only has the workgroup capability and not domain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What’s the desktop and user interface like in Windows?

A

The Windows desktop and user interface are very similar to previous editions of Windows going back to Windows 95. Users are, however, able to easily customize and personalize the desktop and user interface through the Settings menu. Standard items found on the Windows desktop include the Start menu, the taskbar, and various icons or shortcuts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What’s the availability of Remote Desktop Protocol (RDP) for a Windows system?

A

Depends on which edition Windows is running.

Remote Desktop Protocol (RDP) is not supported on Windows Home, but it is supported on Windows Pro, Pro for Workstations, and Enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are the hardware limits for RAM and CPU on the 4 Windows editions?

A

Windows Home supports 128 GB of RAM and two CPUs.

Windows Pro supports 2 TB of RAM and two CPUs.

Windows Pro for Workstations supports 6 TB of RAM and four CPUs.

Windows Enterprise supports 6 TB of RAM and two CPUs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

gpedit.msc

(Group Policy Edit)

A

The group policy feature is available on all of the covered editions except for Windows Home.

Group policy allows for all domain-connected computers to have group policies and permissions applied through the domain.

Group policies may also be applied locally by using the gpedit.msc command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

When upgrading in Windows, what does Microsoft recommend you do upgrade with, depending on the path?

A

Microsoft wants you to use like-to-like editions.

Upgrading to an elevated edition requires the use of an activation key. Also, be aware of the recommendations to upgrade to newer versions of the current version before upgrading to Windows 10. For example, before upgrading to Windows 10 from Windows 8, it is recommended that the OS is first upgraded to Windows 8.1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What’s an in place upgrade?

A

straight upgrade from the current edition to the latest edition as long as system requirements are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

cd
(command)

A

cd = change directory.

Shorthand for the chdir command.

Allows the user to change directories.

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

dir
(command)

A

dir = directory

Allows the user to view a listing of files and folders/subdirectories in a directory.

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

md
(command)

A

md = make directory
mkdir is the same thing

allows the user to make a directory.

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

rmdir
(command)

A

allows the user to remove a directory.
rd is the same thing

rd / rmdir = remove directory

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

ipconfig

A

command that is used to display connectivity information, such as IP address, subnet mask, and default gateway.

This is highly useful in diagnosing network issues.

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

ping

A

used to verify network connectivity by sending an ICMP (Internet Control Message Protocol) packet to a specified address, such as the default gateway.

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

hostname

A

command used to pull up the identity of the computer the Command Prompt is open on.

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

netstat

A

command used to display all the listening and established connections on the host network.

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

nslookup

A

command that is used to verify DNS addresses. Can be used for inline query or interactively.

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

chkdsk

A

command used to view information about the hard disk, including the creation and viewing of reports, as well as to correct file system problems and disk errors.

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

net user

A

command is a subcommand used to list all local accounts on the host system.

Windows

59
Q

net use

A

command is used to map drive letters to network shares.

Windows

60
Q

tracert

A

command used to show the path a packet takes on a network to arrive at a specified destination

Windows

61
Q

format

A

command is used to remove data from disks and prepare disks for new use.

Windows

62
Q

xcopy

A

command used to copy folders and files

Windows

63
Q

copy

A

used to copy folders and files - command

Windows

64
Q

robocopy

A

used to copy files while keeping permissions intact.

Windows

65
Q

gpupdate

A

gpupdate = group policy update

command in windows that is used to update group policies.

66
Q

gpresult

A

command in Windows that is used to view the report or values of the Resultant Set of Policy (RSOP) for a remote user and the users’ computer.

67
Q

shutdown

A

command in Windows used for scheduling a complete shutdown or a restart remotely or locally.

68
Q

sfc (command)

A

System File Checker

utility command that verifies and checks the version of the file system on the computer.

Windows

69
Q

/? (command with slash and a question mark)

A

used to provide help for a specified command.

Windows

70
Q

diskpart

A

tool for managing disks, partitions, and volumes.

Windows

71
Q

pathping

A

mixture of the tracert and ping commands in Windows. (below)

tracert—The tracert command is used to show the path a packet takes on a network to arrive at a specified destination.

ping—The ping command is used to verify network connectivity by sending an Internet Control Message Protocol (ICMP) packet to a specified address, such as the default gateway.

72
Q

winver (command)

A

used to display a GUI dialog box in Windows.

73
Q

What are the different sections in Task Manager in Windows?

A

utility that displays and manages running applications and services, logged-in users, and system performance

Services
This tab shows you the name of running services along with identification information, such as its description, group, and status.

Startup
This tab shows what services have been set to begin upon startup and their associated identifying information.

Performance
This tab shows how the CPU, Memory, Disk I/O, and network resources are utilized. It can be very helpful in identifying a bottleneck in a slow-running computer.

Processes
This tab lists the currently running processes and resource consumption.

Users
This tab shows currently logged-in users, their status, and applications run by these users.

74
Q

What is MMC (Microsoft Management Console) inWindows?

A

GUI for running administrative and configuration tools.

75
Q

What are the different parts of the MMC snap in? (Microsoft Management Console)

A
  1. Event Viewer - eventvwr.msc
  2. Disk Management - diskmgmt.msc
  3. Task Scheduler - taskschd.msc
  4. Device Manager - devmgmt.msc
  5. Certificate Manager - certmgr.msc
  6. Local Users and Groups - lusrmgr.msc
  7. Performance Monitor - perfmon.msc
  8. Group Policy Editor - gpedit.msc
  9. System Information - msinfo32.exe
  10. Resource Monitor - resmon.exe
  11. Disk Cleanup - cleanmgr.exe
  12. System Configuration - msconfig.exe
  13. Registry Editor - regedit.exe
  14. Disk Defragment - dfrgui.exe
76
Q

Event Viewer - eventvwr.msc

A

used to view application error logs, system errors, and security audit records.

part of the Microsoft Management Console MMC snap in

77
Q

Disk Management - diskmgmt.msc

A

used to view disk information on the physical disk and the formatted file systems it contains

78
Q

Task Scheduler - taskschd.msc

A

part of the Microsoft Management Console MMC snap in

allows you to configure automated tasks that will run on a schedule at specified times.

79
Q

Device Manager - devmgmt.msc

A

used to view status of devices, view properties, and modify configuration parameters

part of the Microsoft Management MMC - snap in

80
Q

Certificate Manager - certmgr.msc

A

used to manage and view the certificates used by the OS and web browser.

81
Q

Local Groups and Users
(lusrmgr.msc)

A

As a system administrator, you need to know how to create and delete users and maintain their accounts, as well as how to establish secure passwords.

part of the Management Microsoft Console (mmc) snap in

82
Q

Performance Monitor - perfmon.msc

A

displays in real time how the computer uses memory, disk, CPU, and the network, to help diagnose performance issues.

in the Microsoft Management Console (MMC) snap in

83
Q

Group Policy Editor (gpedit.msc)

A

Group Policy Editor is used to edit the local group policy for the OS.

84
Q

System Information (msinfo32.exe)

A

displays advanced hardware and driver information.

85
Q

Resource Monitor (resmon.exe)

A

Resource Monitor shows how resources are being utilized by the CPU, memory, disk, and network.

86
Q

System Configuration (msconfig.exe

A

System Configuration can be run by the msconfig command. It allows you to change how Windows boots and what programs start with Windows.

87
Q

Disk Cleanup (cleanmgr.exe)

A

Disk Cleanup frees up space while not affecting the integrity of the files.

88
Q

Disk Defragment (dfrgui.exe

A

Disk Defragment relocates pieces of large files to continuous space on a disk for optimized performance.

89
Q

Registry Editor (regedit.exe

A

allows the user to view and change the Windows registry. The registry contains some operating system and application settings that may need to be changed in advanced troubleshooting.

90
Q

What is Internet Options in Control Panel in Windows 10

A

Internet Options is a utility to manage network settings beyond basic IP connectivity. The settings are separated into multiple tabs.

91
Q

Devices and Scanners (Windows 10)

A

lists printers, scanners, cameras, monitors, and other connected peripheral devices; the settings of these devices can also be accessed.

92
Q

Programs and Features (Windows 10)

A

used to view and uninstall desktop applications installed on the OS.

93
Q

Network and Sharing Center (Windows 10)

A

In the Network and Sharing Center you can configure network adapters, create new network and dial-up connections, and configure network file and printer sharing.

94
Q

What is Windows Defender Firewal?

A

The Windows Defender Firewall protects the computer by controlling what applications can access the network from this computer and also how this computer can be accessed over the network.

95
Q

In Windows 10, where can you look at the system hardware overview?

A

System

It’s the control panel utility that shows all the hardware.

96
Q

What are the File Explorer options?

A

Show Hidden Files

Hidden is a file flag that signifies that users don’t usually need to see certain files, like system and configuration files. Windows settings can be changed to show these files if they need to be accessed.
Hide Extensions

In Windows files have extensions at the end of the file name, after a period (e.g., .txt, .docx, .exe). To make the file names cleaner and prevent users from making accidental changes to the extensions, these are usually hidden. This can be changed with this setting.
General Options

The General tab of the File Options utility allows you to change the general behavior of the file browsing interface.
View Options

The View tab allows you to change appearance options, including showing hidden files and file extensions.

97
Q
A

Hibernate
Hibernation is a mode that saves the current state of the computer and shuts it down. When started again, it restores to the same state, but without consuming power in the meantime.

Power Plans
There are three power plans that can be configured and selected depending on the current need: Power Saver, Balanced, and High Performance.

Sleep/Suspend
The Sleep or Suspend mode doesn’t shut down the computer like Hibernation does, but instead significantly reduces the power to the components for a quick restart where you left it.

Standby
The term Standby is sometimes used interchangeably with Sleep but is not used in the current Windows versions.

Choose What Closing the Lid Does
This option is only available on devices that contain a lid closure sensor.

Turn on Fast Startup
The Fast Startup function places the system into hibernation during shutdown so that the system can boot more quickly.

Universal Serial Bus (USB) Selective Suspend
This function allows the administrator to choose to suspend power to a device connected to a specified USB port.

98
Q

What’s the difference between an integrated and dedicated graphics card?

A

A dedicated graphics card is a separate hardware device for graphics and display,

while an integrated graphics card is pre-built into the motherboard of the computer.

When installing applications, the graphics card, both integrated and dedicated, must be compatible with the requirements of the application and OS.

99
Q

ISO Mountable

A

An ISO mountable application installation is one in which the application ISO is downloaded from the vendor and installed directly onto the host machine and acts as a virtual optical drive.

100
Q

Before you install an application, how could the app impact your system or network?

A

Impact on Device - access to files, research before install, malicious files avoided

Impact on Network - can get access to files on the network, compromize security

Impact on Operation - can compromise the efficiency of the computer

Impact on Business - potentially harmful effects

101
Q

What are the 4 operating systems on the A+

A
  • Windows - most used in various settings
  • Linux - a kernel, has many distributions with different settings like Ubuntu (with a GUI) or for high performance servers like Red Hat
  • macOS - designed for Apple workstations, Mac computers, second most used.
  • ChromeOS - cloud-based, designed on the Chrome web browser, all of data on Google Drive.
102
Q

EOL (End of Life) for an OS

A

When an operating system reaches the end-of-life phase of its developer, there will be no more updates, patches, or technical support. There will probably be no more applications developed or supported for this OS version.

103
Q

When the OS developer stops supporting a specific version, there will be no more patches released for that OS version and leaves the computer with -

A

outdated operating system and security risks

104
Q

What are the two biggest compatibility concerns with different OSes?

A
  1. Some app developers only intend on the app being for one OS, so an app doesn’t run well with the other OSes.
  2. New OS versions can cause issues with previously installed hardware and other apps.
105
Q

What’s the first step in the OS installation process?

A

The computer needs to be booted with the installation media.

106
Q

What are the different boot methods?

A
  1. USB - flash drive or eSATA
  2. Optical media - built-in drive in computer to read optical disks, booted from installation disk
  3. network - most effective with large networks, installation media is uploaded onto a file share with read-only access
  4. solid state/flash drives - internally connected hard disk with OS installed or OS installation image
  5. internet-based - via internet connection
  6. external/hot-swappable drive - connected to a computer for boot functions, stored on an external drive, not locally stored
  7. internal hard drive (partition) - one logical partition can span multiple physical hard disks
107
Q

OS upgrade

A

upgrading to the newest or newer version of the OS. This may preserve the settings, files, and applications.

108
Q

OS recovery partition

A

Some operating systems provide an option to create a recovery partition during the installation. It will be a bootable partition that can be used later and contains diagnostic and repair tools, or it may be used for a repair installation.

109
Q

What’s a clean install?

A

This installation disregards previous data in the destination. It can be used if the computer doesn’t have any operating system installed or if the intent is to completely delete the previous operating system, files, applications, and settings.

110
Q

What are the steps to image deployment?

A
  • Select one computer.
  • Perform a clean installation of the desired operating system, configure, and install applications.
  • Create the image from this computer.
  • Make this image available on the network or portable media.
  • Copy the image to other computers.
111
Q

Preboot eXecution Environment (PXE) network boot

A

can use a remote server with the operating system’s installation files to install the OS on the computer.

Depending on the configuration of the server, the installation process may require selecting installation options, just like booting from a CD, or it can be an unattended installation.

112
Q

What’s a repair installation?

A

Some operating systems provide this option.

It is usually initiated by booting with the installation media of the same version of operating system that was previously installed, then selecting the repair option from the menu. It rewrites system files and settings while keeping the user files.

This mode may be useful for repair purposes if the installed operating system is not bootable or shows serious issues that can’t be fixed otherwise.

113
Q

What are unintended consequences of an OS installation?

A

data loss, application corruption, hardware incompatibility, crashing

114
Q

What are the file types for MAC OS?

A

There are multiple common types of files for the macOS, including ZIP, ISO, DMG, PKG, and APP.

.dmg—A .dmg file is a disk imaging file and acts just like an ISO or ZIP file.

.pkg—A .pkg file is an automated package installer file and can be found in a DMG, ZIP, and physical media.

.app—An .app file contains applications and includes files and resources the application needs as well as the executable.

115
Q

How do you install and uninstall an app in Mac OS?

A

Install - find app in App Store, purchase with Apple ID
Uninstall - locate using Finder menu, then moved in trash bin, or select the app and press “command” and “delete”

116
Q

What are the best practices for maintaining the MAC system?

A
  1. backups - schedule backups that create a copy of data and configuration at a remote location
  2. antivirus - security software needs configuration and updating after install
  3. updates/patches - System Preferences for App Store provide config. for updates (automatically or manually install updates), allow automatic updates and patching, install driver updates as quickly as possible.
117
Q

What is System Preferences in MAC?

A

helps you customize and adjust preferences and requirements

Includes:
- Display: resolution, brightness, AirPlay, color tone
- Networks: connectivity, wifi preferences, network preferences
- Printers/Scanners: printer preferences, print priority, scanners
- Privacy: lock screen, FileVault, firewall
- Accessibilty: visual, hearing, motor skills impaired.
- Time Machine: automated backup feature and set to make specified backups (incremental or full)

118
Q

What are the biggest features of the MAC computer?

A
  1. multiple desktops
  2. mission control - make multiple desktops, view all programs and switch between them
  3. keychain - tool for password management, certificates, and secure notes
  4. spotlight - search feature, indexes all items and files
  5. icloud - default, stores data in the cloud, backup method
  6. gestures - motions with trackpad to swipe, complete tasks
  7. finder - default file manager for Mac, search for/open/delete files from one place.
  8. remote disk - allows smaller mac devices to essentially “borrow” the disc drive of a nearby device and access files used on another device.
  9. dock - similar to Taskbar, launching pad for all apps on Mac.
119
Q

For MacOS, what is Disk Utility?

A

can be used to create and restore disk images. It can also be used to check for disk errors.

120
Q

What is File Vault in Mac?

A

FileVault allows you to configure disk-level encryption for files and set user authentication for access.

121
Q

What is the terminal?

A

Terminal is where the user can run command lines on the macOS.

122
Q

What is force quit in Mac?

A

If an application becomes unresponsive and needs to be closed, you may need to force quit. It will terminate the application and you will lose unsaved work.

It can be accomplished by selecting the application and pressing the quit button in the Activity Monitor.

123
Q

Linux command - ls

A

The ls command is known as the list command in Linux. This is because the command will list all the files or folders in a given directory. In order to use this command, navigate to the folder or directory you’re interested in and type “ls”. After hitting enter, a list of all the files and folders in that location will be displayed.

124
Q

Linux command - pwd (present working directory)

A

The pwd command stands for present working directory, and it displays the full path of the current working directory.

125
Q

Linux command - mv

A

mv = move.

This command allows a user to move a specified file to another location. Move is similar to a cut and paste command in Windows.

126
Q

Linux command - cp

A

cp = copy.

Its functionality is similar to that of the move file, except that it places a copy in the new location while leaving the file in the original location.

127
Q

Linux command - rm (remove)

A

This is similar to a delete functionality, as it removes the file, directory, or other objects from the location.

128
Q

Linux command - chmod (change modifications)

A

To modify Linux file permissions, you must use the chmod command.

Before changing Linux file permissions, it’s important to first understand how they are represented. Each permission is represented by a letter:
r–the read permission;
w–the write permission;
x–the execute permission.

129
Q

Linux command - chown (change ownership)

A

the chown command changes the ownership of a file, directory, or other objects.

130
Q

su/sudo - Linux command

A

switch user (or substitute user). The su command can be used by adding a username that you wish to switch to after the command (example: su linuxuser1) or it can be used by itself, which will by default switch it to the root user.

The sudo command switches the user for a single command, while su switches the user until it’s switched back.

131
Q

Linux command - apt-get
(Advanced Packaging Tool)

A

tool for handling packages in Linux. It is used to retrieve packages from authenticated sources for installation, upgrade, and removal of packages, along with their dependencies.

132
Q

Linux command - yum

A

used in file management to update and install packages for Red Hat-based distributions

133
Q

Linux command - ip

A

used to display and configure information related to a network interface card (NIC).

134
Q

Linux command - df

A

used in processing files and displays the total free disk space for a directory.

135
Q

Linux command - grep

A

stands for global regular expression print. The grep command is a search command. You can use it to search for a string of characters within a file or standard text output.

For example, if you are viewing a file in the terminal and type the command grep “unix”, the terminal will display all of the instances of the word “unix” in that file.

136
Q

Linux command - ps (process status)

A

displays all of the currently running processes and their process numbers.

137
Q

Linux command - man (manual)

A

displays system help for executable files.

138
Q

Linux command - top

A

displays a list of running processes.

139
Q

Linux command - find

A

can be used for searching for specific text within a file hierarchy.

140
Q

Linux command - dig

A

used in networking and is a DNS query utility

141
Q

Linux command - cat

A

displays the contents of a file.

142
Q

Linux command - nano

A

text-based editor for files.

143
Q

What are the best practices in Linux?

A
  • backups: regular backups stored in a separate location, like cloud
  • antivirus: available for distributions and should be kept up to date
  • updates/patches: install updates as quickly as possible after ensuring there’s no compatibility issues.
144
Q

Samba in Linux

A

free and open-source software (FOSS) package that can be installed on the Linux OS to make its underlying filesystem compatible with a Windows file server via the SMB Protocol.