Podcast
Questions and Answers
A USB device containing software licenses that must be plugged into the system for software to run is known as a(n) _______________.
A USB device containing software licenses that must be plugged into the system for software to run is known as a(n) _______________.
- extender
- bridge
- firewall
- dongle (correct)
A combination of using a mouse, touchpad, or finger movements and mouse clicks to perform a function is known as a(n) _______________.
A combination of using a mouse, touchpad, or finger movements and mouse clicks to perform a function is known as a(n) _______________.
- operating system call
- kernel process
- gesture (correct)
- macro
A complete copy of a hard drive volume on which an operating system and any desired application software programs have been pre-installed is known as a(n) _______________.
A complete copy of a hard drive volume on which an operating system and any desired application software programs have been pre-installed is known as a(n) _______________.
- disk image (correct)
- executable file
- snapshot
- system restore point
A corrective program meant to fix a problem is called a(n) _______________.
A corrective program meant to fix a problem is called a(n) _______________.
A counter tracks specific information about a(n) ________________.
A counter tracks specific information about a(n) ________________.
A list of things you need before you can run software are known as the software's _______________.
A list of things you need before you can run software are known as the software's _______________.
A named group of functions that defines what you can do with an object is called a ________________.
A named group of functions that defines what you can do with an object is called a ________________.
A password _______________ policy forces users to select a new password periodically.
A password _______________ policy forces users to select a new password periodically.
A small, hidden partition to the primary hard drive containing an image of the factory-fresh version of Windows is known as a _______________.
A small, hidden partition to the primary hard drive containing an image of the factory-fresh version of Windows is known as a _______________.
A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols.
A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols.
A type of installation that is very popular for re-creating standard configurations is a(n) _______________.
A type of installation that is very popular for re-creating standard configurations is a(n) _______________.
A(n) _______________ enables you to use your existing folders to store more data that can fit on a single drive or partition/volume.
A(n) _______________ enables you to use your existing folders to store more data that can fit on a single drive or partition/volume.
A(n) _______________ volume is similar to a primary partition, but in fact, is not a primary partition.
A(n) _______________ volume is similar to a primary partition, but in fact, is not a primary partition.
Actions or schedules that start a program are called _______________ in Task Scheduler.
Actions or schedules that start a program are called _______________ in Task Scheduler.
All basic hard drive partition tables support up to _______________ partitions.
All basic hard drive partition tables support up to _______________ partitions.
An 8×4×32× CD-RW drive reads at a speed of _______________.
An 8×4×32× CD-RW drive reads at a speed of _______________.
An MBR has four different operating systems installed. What is this setup called?
An MBR has four different operating systems installed. What is this setup called?
An entire physical drive can be added to another drive as a folder by creating a _______________.
An entire physical drive can be added to another drive as a folder by creating a _______________.
An unpopular, but necessary, security feature introduced in Windows Vista was _______________.
An unpopular, but necessary, security feature introduced in Windows Vista was _______________.
Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups.
Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups.
Because both CD-R and CD-RW drives require a powerful _______________, making a drive that could burn CD-Rs and CD-RWs became a simple process, and plain CD-R drives disappeared almost overnight.
Because both CD-R and CD-RW drives require a powerful _______________, making a drive that could burn CD-Rs and CD-RWs became a simple process, and plain CD-R drives disappeared almost overnight.
By default, Windows creates a ___________ every time new software is installed.
By default, Windows creates a ___________ every time new software is installed.
By default, all new user accounts are automatically added to the _______________ group.
By default, all new user accounts are automatically added to the _______________ group.
By default, what is the maximum partition size NTFS supports on a dynamic disk?
By default, what is the maximum partition size NTFS supports on a dynamic disk?
By default, who has complete control over a folder or file?
By default, who has complete control over a folder or file?
CDs store data by using _______________ pits burned into a glass master CD with a powerful laser.
CDs store data by using _______________ pits burned into a glass master CD with a powerful laser.
Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely.
Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely.
DVD-ROM is the DVD-equivalent of the standard _______________ data format.
DVD-ROM is the DVD-equivalent of the standard _______________ data format.
Destroying data on a hard drive while still allowing the hard drive to function is known as _______________.
Destroying data on a hard drive while still allowing the hard drive to function is known as _______________.
Digital cameras plug directly into a(n) _______________ port.
Digital cameras plug directly into a(n) _______________ port.
During installation, one may decide to go with the default drivers because they _______________.
During installation, one may decide to go with the default drivers because they _______________.
Each released version of an OS will pass through a few phases that we call its ________________.
Each released version of an OS will pass through a few phases that we call its ________________.
External optical drives often use USB or _______________ connections.
External optical drives often use USB or _______________ connections.
Feature updates in Windows are controlled by what ________________ you are on.
Feature updates in Windows are controlled by what ________________ you are on.
How do you install a macOS application bundle (.app) file?
How do you install a macOS application bundle (.app) file?
How is the Registry organized?
How is the Registry organized?
How many GB of RAM does Windows 10 Home support?
How many GB of RAM does Windows 10 Home support?
How many devices can a single USB host controller theoretically support?
How many devices can a single USB host controller theoretically support?
How many extended partitions can be created in a hard drive?
How many extended partitions can be created in a hard drive?
How many master boot records can exist on an MBR disk?
How many master boot records can exist on an MBR disk?
How many notification levels of UAC did Microsoft include in modern Windows versions?
How many notification levels of UAC did Microsoft include in modern Windows versions?
How many partitions can be active at any given point in time?
How many partitions can be active at any given point in time?
How many root keys are in the Registry?
How many root keys are in the Registry?
How much data can a dual-layer Blu-ray disc store?
How much data can a dual-layer Blu-ray disc store?
If you are using an administrator account during a software installation and you get prompted by the UAC, you should _______________.
If you are using an administrator account during a software installation and you get prompted by the UAC, you should _______________.
If you move a dynamic disk from one computer to another, how will this drive be displayed in Disk Manager?
If you move a dynamic disk from one computer to another, how will this drive be displayed in Disk Manager?
In Windows, each _______________ is assigned a drive letter from C: to Z:.
In Windows, each _______________ is assigned a drive letter from C: to Z:.
Flashcards
Dongle
Dongle
A USB device that contains software licenses and must be plugged in for the software to run.
Gesture
Gesture
Using mouse, touchpad, or finger movements combined with clicks to perform a function.
Image
Image
A complete copy of a hard drive volume with the OS and desired applications pre-installed.
Patch
Patch
Signup and view all the flashcards
Counter
Counter
Signup and view all the flashcards
System requirements
System requirements
Signup and view all the flashcards
Class
Class
Signup and view all the flashcards
Password Expiration
Password Expiration
Signup and view all the flashcards
Recovery Partition
Recovery Partition
Signup and view all the flashcards
Strong Password
Strong Password
Signup and view all the flashcards
Image Deployment
Image Deployment
Signup and view all the flashcards
Mount Point
Mount Point
Signup and view all the flashcards
Logical Drive
Logical Drive
Signup and view all the flashcards
Triggers
Triggers
Signup and view all the flashcards
Four
Four
Signup and view all the flashcards
96x
96x
Signup and view all the flashcards
Multiboot
Multiboot
Signup and view all the flashcards
Mount Point
Mount Point
Signup and view all the flashcards
User Account Control (UAC)
User Account Control (UAC)
Signup and view all the flashcards
NTFS Permission
NTFS Permission
Signup and view all the flashcards
Powerful laser
Powerful laser
Signup and view all the flashcards
System Restore Point
System Restore Point
Signup and view all the flashcards
Users group
Users group
Signup and view all the flashcards
Unlimited
Unlimited
Signup and view all the flashcards
Creator
Creator
Signup and view all the flashcards
Tiny Pits
Tiny Pits
Signup and view all the flashcards
Built-in Local Groups
Built-in Local Groups
Signup and view all the flashcards
CD-ROM
CD-ROM
Signup and view all the flashcards
Wiping
Wiping
Signup and view all the flashcards
USB
USB
Signup and view all the flashcards
Work
Work
Signup and view all the flashcards
Life cycle
Life cycle
Signup and view all the flashcards
Firewire
Firewire
Signup and view all the flashcards
Channel
Channel
Signup and view all the flashcards
Study Notes
- A USB device containing software licenses is a dongle.
- Using a mouse, touchpad, or finger movements with mouse clicks is a gesture.
- A complete copy of a hard drive volume with a pre-installed OS and software is a system image.
- A corrective program for a problem is a patch.
- A counter tracks specific information about a system.
- A list of things required to run software are the software's minimum requirements.
- A named group of functions that defines object interactions is a class object.
- A password policy that enforces periodic changes is a password expiration.
- A hidden partition with a factory-fresh Windows image is a recovery partition.
- A strong password is at least 8 characters long and includes letters, numbers, and symbols.
- A popular installation type for re-creating standard configurations is image deployment.
- A mount point enables the use of existing folders to store more data than fits on a single drive or partition.
- An extended volume is similar to a primary partition but is not one.
- Actions or schedules that start a program are called triggers.
- Basic hard drive partition tables support up to four partitions.
- An 8×4×32× CD-RW drive reads at a speed of 32x.
- Installing four OSes on an MBR is called multibooting.
- Adding an entire physical drive to another as a folder creates a mount point.
- An unpopular, but necessary, security feature in Windows Vista was User Account Control (UAC).
- Authorization for Windows' files/folders is controlled by the NTFS file system.
- CD-R/RW drives require a powerful laser, leading to the quick disappearance of plain CD-R drives.
- Windows creates a restore point by default every time new software is installed.
- New user accounts are automatically added to the Users group by default.
- NTFS supports a maximum partition size of no limit on a dynamic disk by default.
- The owner has complete control over a folder or file by default.
- CDs store data using laser-etched pits.
- Windows automatically creates well-known SIDs that give local administrators access to resources locally or remotely.
- DVD-ROM is the DVD equivalent of the standard CD-ROM data format.
- Destroying data while allowing the hard drive to function is data sanitization.
- Digital cameras plug into a USB port.
- Default drivers may be chosen during installation because they work.
- An OS version goes through phases called its life cycle.
- External optical drives use USB or FireWire connections.
- Feature updates in Windows are controlled by the channel.
- A macOS application bundle (.app) file is installed by dragging it to the Applications folder.
- The Registry is organized hierarchically.
- Windows 10 Home supports 128 GB RAM.
- A single USB host controller can theoretically support 127 devices.
- Only one extended partition can be created on a hard drive.
- Only one MBR can exist on an MBR disk.
- Microsoft included four notification levels of UAC in modern Windows versions.
- Only one partition can be active at any given point in time.
- There are five root keys in the Registry.
- A dual-layer Blu-ray disc can store 50 GB of data.
- If prompted by UAC during software installation with an administrator account, you should allow it.
- A dynamic disk moved to another computer will be displayed in Disk Manager as foreign.
- In Windows, each volume is assigned a drive letter from C: to Z:.
- In macOS, login items are added to a user's account to set up auto-starting software.
- The default UAC notification level in modern Windows versions is notify only when apps try to make changes to my computer.
- A diagnostic startup with basic devices and services can be chosen in the General tab of the Windows System Configuration tool.
- Installing an OS on top of an earlier version, inheriting settings, is an upgrade installation.
- Installing an OS on a hard drive with no previous OS is a clean installation.
- A drive structure created with a dynamic disk is called a volume by Microsoft.
- Microsoft limits Windows to 128 partitions under a GPT scheme.
- Microsoft often uses the term in-place upgrade to define an upgrade installation.
- Most internal optical drives use SATA.
- USB 1.1 and 2.0 A and B connectors use 4 pins.
- Each record in an encrypted database of usernames and passwords is called a security identifier (SID).
- Common CPU requirements focus on speed.
- Once Windows is installed, you have 30 days to activate it.
- Using the same username/password to sign on to any computer in a domain is known as single sign-on.
- Opening a command line and running secpol.msc provides access to Local Security Policy.
- Processes are usually referred to by their process ID (PID).
- Since 2020, the names of feature updates have indicated the release year and month.
- System Restore can be turned off through the System Protection tab of System properties.
- The CD-RW format essentially creates the functional equivalent of a USB flash-media drive.
- The System Information Tool in Windows can be used to view hardware and software configuration.
- The System Restore tool creates a restore point, a snapshot of the computer's configuration.
- The system partition stores the location of the OS boot files.
- The Windows Boot Manager takes control of the boot process from the system BIOS.
- The go-to command to open up the Registry editor is regedit.
- The highest capacity DVD versions store roughly 17 GB of data.
- The name of a process usually ends with the .exe file extension.
- A special unique feature to Windows 10 Enterprise is called Direct Access.
- The options in the Advanced tab on the Performance Options dialog box in Windows are Processor scheduling and Virtual memory.
- The process of moving data and users to a new system is known as migration.
- The purpose of Virtual memory option is to compensate for low RAM.
- The tabs on the Performance Options dialog box are Visual Effects, Advanced, and Data Execution Prevention (DEP).
- Thunderbolt 3 offers throughput up to 40 Gbps.
- Thunderbolt 3 uses a USB Type-C connector.
- Time Machine in macOS creates full system backups that are known as snapshots.
- To boot from a network installation without PXE, you need to create bootable installation media.
- Registry files are called hives.
- Typing services.msc in the Start | Search bar opens the Services utility.
- Typing perfmon in the Start | Search bar opens the Windows Performance Monitor.
- The Trusted Platform Module (TPM) chip validates the integrity of the OS on boot.
- The Import feature allows you to import a new or backup subkey.
- A common reason to edit the specified Registry key is to manage startup programs.
- An end-user license agreement (EULA) is a legal contract between the software user and the software publisher.
- A major risk of editing the Registry is system instability.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.