Sunteți pe pagina 1din 3

Final Exam Study Guide IT109

Study online at quizlet.com/_2puli


1.

A Dynamic Disk is able to contain an unlimited amount of volumes that function like primary partitions on a basic disk. A Fragmentation is when files are written and re-written to a disk which takes up space. Drive is forced to split files into clusters in different locations.

A Dynamic Disk is able to contain an unlimited amount of volumes that function like primary partitions on a basic disk. A Fragmentation is when files are written and re-written to a disk which takes up space. Drive is forced to split files into clusters in different locations. A System Restore Point is a copy of various OS configurations and regedit settings from a point in time A user interface that provides only a textbased view of the OS is called the Command Line Interface. Running the Network Diagnostics tool.

10.

Difference between: Peer-to-peer system Client Server system

In peer-to-peer networks all computers have same rights and roles. In client-server networks servers define rights and roles for client computers. Encrypts files as user works. A feature of NTFS that encodes the files so only those permitted can read it. Public key Private key Remote into the damn pc!!! Master Boot Record Network Address Translation Built into many routers; takes internet packets, substitutes the registered address for the computer's private address, and forwards the packets to its internet destination Software program that protects a computer by allowing certain types of network data traffic in n out of the system while blocking others. Allows another non-local user to view, control, chat, etc with the local user. Secure Sockets Layer Protocol most Web sites use when establishing secure connections with clients over the internet. Via Digital Certificates and such... The Event Viewer is the primary Win7 operational log that provides general info about system problems. The User Accounts Control Panel can create local users only. T / F ? The Win7 AIK tool that you use to distribute and create answer files is called The Windows System Image Manager (SIM).

11.

EFS stands for?

2.

12. 13. 14. 15.

Function of RDP? MBR stands for? NAT stands for? NAT?

3.

A System Restore Point is a copy of various OS configurations and regedit settings from a point in time A user interface that provides only a text-based view of the OS is called the Command Line Interface. A user is unable to connect to any network resource; you cannot ping the user's IP and cant determine if the problem is localized to just this user. What is the best option to troubleshoot the problem? ACPI

4.

16.

Purpose of a firewall?

5.

17.

Purpose of Remote Assistance? SSL stands for? SSL?

6.

Ability to configure all power settings using either the GUI, Group Policy, or CMD Advanced Config. and Power Interface Really?!?... When you move a file within NTFS volume and the file is compressed, what happens to the permissions of the file? Their existing permissions move with the file. When copied however, the file inherits the permissions of the destination folder.

18. 19.

7.

ACPI stands for.. Define Desktop. Difference between FAT16 and NTFS?

8. 9.

20.

The Event Viewer is the primary Win7 operational log that provides general info about system problems. The User Accounts Control Panel can create local users only. T / F ? The Win7 AIK tool that you use to distribute and create answer files is called The Windows System Image Manager (SIM).

21.

22.

23.

To accommodate older web pages, IE8 includes a feature called Compatibility View which enables the browser to display older pages. USMT? UTP Cable?

To accommodate older web pages, IE8 includes a feature called Compatibility View which enables the browser to display older pages. Same as Win Easy Transfer just without GUI Used for cabled networks. Four pairs of wires with each pair twisted individually. Publisher Path File Hash User State Migration Tool Unshielded Twisted Pair byte is a unit of digital information in computing and telecommunications, that most commonly consists of eight bits Language that all computers understand. Rules and guidelines. is a software implementation of a machine (i.e. a computer) that executes programs like a physical machine. The process of encoding files in a way so that when someone has them, they will not be able to read it; basically. Displays all the information regarding the host device and network MBR - Default partition style for x86 and x64- based PCs Process of deleting unnecessary files that take up disk space.

36.

What is the function of the virtualization layer?

24.

25.

Data virtualization, the presentation of data as an abstract layer, independent of underlying database systems, structures and storage Database virtualization, the decoupling of the database layer, which lies between the storage and application layers within the application stack 2 GB for starter; 4GB for all other 32-bit

37.

26.

What criteria are used either to allow or block access to resources? What does USMT stand for? What does UTP stand for? What is a BYTE?

What is the Maximum amount of ram supported by Win7 in a 32-bit mode regardless of the edition? What is the purpose of a processor? What is the purpose of exFAT?

27. 28. 29.

38.

to receive data and instructions and output data after those instructions have been carried out. The Extended File Allocation Table. Also known as FAT64. 64-bit FAT implementation intended for large usb flash drives. Does not support encryption like NTFS does. Backs up only the files that have changed since the last backup wa preformed. A form of fault tolerance that individual users can employ to maintain access to their server files, even in the event of a network service failure. Parent elements pass their permissions down to their subordinate elements. Used to manage disks. Can perform all Disk Management can. Create partitions. Etc. Allows or denies permissions to navigate in a folder. Quick access to config settings most commonly adjusted. A stripped down version of the Win7 kernel, that enables sysadmins to boot a pc that has no OS installed and start the setup process Ipconfig

39.

30.

What is a protocol?

40.

31.

What is a virtual machine?

What is the purpose of incremental backup? What is the purpose of offline files?

41.

32.

What is encryption?

42.

What is the purpose of permission inheritance? What is the purpose of the 'diskpart.exe' command? What is the purpose of Traverse Folder Options? What is the purpose of windows mobility center? What is Windows PE 3.0?

43.

33.

What is ipconfig?

44.

34.

What is the default partition style used in Win7? What is the function of a Disk Cleanup?

45.

35.

46.

47.

What protocol is supported by Linux, Windows, and Apple?

48.

When you copy a file within NTFS volume and the file is compressed, what happens to the permissions of the file? Which wireless networking standard uses spatial multiplexing to increase bandwidth? Win7 is available in 6 editions.

The file inherits the permissions of the destination folder. IEEE 802.11 Win7 is available in 6 editions.

49.

50.

S-ar putea să vă placă și