Principles of Operating Systems and Its Applications
This document discusses various principles and concepts related to operating systems and their applications. It defines key terms like private IP addresses, APIPA, memory diagnostics tools, bits in IP addresses, remote access servers, software restriction policies, role services, GPT, MBR disks, NTFS permissions, group policy, local user accounts, VLANs, domain controllers, action center, forests, groups, application servers, network adapters, switches, Windows upgrade advisor, simple volumes, Windows XP mode, disk management, intranets, public sharing, basic sharing, online identity integration, AppLocker, diskpart, user account control, drivers, malicious software, WPA-Enterprise, Sysprep, public IP addresses,
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
84 views
Principles of Operating Systems and Its Applications
This document discusses various principles and concepts related to operating systems and their applications. It defines key terms like private IP addresses, APIPA, memory diagnostics tools, bits in IP addresses, remote access servers, software restriction policies, role services, GPT, MBR disks, NTFS permissions, group policy, local user accounts, VLANs, domain controllers, action center, forests, groups, application servers, network adapters, switches, Windows upgrade advisor, simple volumes, Windows XP mode, disk management, intranets, public sharing, basic sharing, online identity integration, AppLocker, diskpart, user account control, drivers, malicious software, WPA-Enterprise, Sysprep, public IP addresses,
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11
Principles of Operating Systems and its
Applications
172.16.0.0 /12 is what type of IPv4
Private IP Address Address. Automatic Private IP APIPA stands for: Addressing Checks for symptoms of defective Windows Memory computer memory and usually can be Diagnostics Tool started from administratve tools in the control panel How many bits are there in an IP version 4 32 bits address? How many bits are there in an IP version 6 128 bits address? It a server that is used to access the Remote Access Server corporate resources from outside the corporate network. It allows the administrators to identify Software Restriction which software is allowed to run and was Policies initially added to Windows XP and Windows Server 2003. It allows you to control which role Role Services functionality is installed and enabled. It contains an array of partition entries GUID Partition (GPT) describing the start and end LBA of each partition on disk. It contains the partition table for the disk Master Boot Record Disk and a small amount of executable code called as the master boot code. It defines the type of access granted to a NTFS Permission user, group, or computer for a file or folder. Group Policy It enables IT Administrator to automate one-to-many management of users and computers. It enables the IT Administrators to Group Policy automate one-to-several management of users and computers. It enables the user to log on and access Local User Accounts resources on a specific computer and usually reside in SAM. It enables you to manage network traffic, Virtual Local Area group physically dispersed nodes into Network logical area networks and isolate network traffic. It holds a copy of AD DS and responds to Domain Controller request for active directory information. It is a central location for viewing messages about your system and the starting point Action Center for diagnosing and solving issues with your system. Forest It is a collection of Domain Trees. It is a collection of user accounts, computer Groups accounts, contacts and other groups that you can manage as a single unit. It is a computer that is dedicated to Application Server running network-aware application software. It is a device that converts instructions Network Adapter from the network protocol stack into electric signals. It is a device that provides wiring concentrator functionality like a hub but it also enables network traffic management, Switch performs firewall functions and makes routing decisions based upon traffic priority. Windows Upgrade It is a downloadable application that helps windows user identify which edition of Advisor Windows 7 meets their needs. It is a dynamic volume that encompasses Simple Volume available free-space from single, dynamic, hard disk drive. It is a feature of Windows 7 that allows Windows XP mode windows 7 to be backward compatible It is a graphical user interface that is used to manage disks and volumes both basic Disk Management and dynamic, locally or on remote computers. It is a group of services hosted on a Intranet network which is a private structure and has the internet-like service provision. It is a method of sharing folders that allow multiple default public folders for each Public Sharing computer and files shared with same computer and with same network. It is a method of sharing folders that allows Basic Sharing you to share folders quickly. It is a new authentication features that Online Identity controls the ability of online IDs to Integration authenticate to a computer. It is a new Windows 7 security feature that Applocker enables IT professionals to specify exactly what is allowed to run on user desktops. It is a scriptable command line utility that Diskpart create scripts to automate disk related task. It is a security feature that simplifies the User Account Control ability of users to run as standard users and perform all neccessary daily tasks It is a small software program that allows a Drivers hardware device to communicate with a computer It is a software that is designed to Malicious Software deliberately harm a computer. It is a strong authentication (with strong EAP method) and strong (TKIP) or very WPA-Enterprise strong (AES) encryption used by medium and large organization. It is a tool used to remove system-specific data from the Windows operating system, configure windows to start in audit mode, Sysprep configure the windows operating system to start the Windows Welcome phase and reset Windows Product activation. It is a type of IPv4 Address that is required by the devices and host that connect Public IP Address directly to the Internet. This address must be unique, routable on the internet and must be assigned by IANA. It is a type of network that interconnect Wireless Network devices by means of radio waves instead of wires and cables. It is a type of printing wherein it is used by legacy application in pre-vista version of GDI based printing windows that uses enhanced metafile format (EMF) as the spool file format. It is a way for you to limit use of disk space Disk Quotas on a volume for each user to conserve disk space. It is a Windows Authentication Method that is used by windows 7 clients and Kerberos v5 server running Microsoft Windows Server 2000 or later Ad hoc mode It is a wireless network modes that allows a wireless network adapters connects directly to another wireless network adapter for the purpose of temporarily sharing of files, presentations or an internet connection among multiple computers and devices. It is an administrative tool for managing Window Update Group user settings and computer settings across Policy a network. It is an enhanced privacy features of Internet Explorer 8 that inherently more InPrivate Browsing secure that using delete browsing history to maintain privacy because there are no logs kept or tracks made during browsing It is an object that contains all of the User Account information that defines a user in Windows Server 2008 R2. Does not require the It is one of the Considerations on why using reinstallation of the option of Upgrade rather than Migrate. applications It is one of the feature of Windows 7 that encrypts the computer operating system Bitlocker and data stored on the operating system volume. It is one of the Key Features of Windows 7 Usability that simplify a user's ability to organize, search for, and view information. It is one of the Key Features of Windows 7 that takes advantage of modern Reliability and computing hardware, running more reliably Performance and providing more consistent performance than previous versions of Windows. It is one of the Options for Installing Windows 7 where in you install Windows 7 Clean Installation on a new partition and replace an existing operating system on a partition. Upgrade Installation It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained. It is the built-in encryption tool for Encrypting File Systems Windows file systems It is the foundation of the Internet naming DNS Server scheme and it supports accessing resources by using alphanumeric names. It is the most common form of computer Local Area Network network. It is the non-contiguous storage of data on Disk Fragmentation a volume It is the process of determining whether Authorization something or someone has permission to access the resources It is the process of verifying the identity of Authentication something or someone. Windows Network It provides assistance in resolving network- Diagnostics Tool related issues It provides storage for the users' files and File Server share folders that contain users' files. It reduces the complexity and amount of DHCP Server administrative work by using automatic TCP/IP configuration. Provides a timeline of system changes and reliability. It also provides a system stability Reliability Monitor chart and reports on software installations and software or hardware failures. Strong EAP methods provide strong IEEE 802.1X authentication Firewall This are equivalents to door locks, employee badges and security systems. It protects the computer and networks from intrusions. What is the IEEE 802 Standards for Local IEEE 802.11 Wireless Networks? Which of the following is a main type of Distribution group? Which of the following is not a Boot-option None of the choices for troubleshooting startup problems? Which of the following is not a LAN Crown Physical Topology? Windows Memory Which of the following is not a Diagnostics Tool Performance Monitor tool? Which of the following is not a Physical Network Adaptor WAN Components? Which of the following is not a Server Role Windows Power Shell of Windows Server 2008 R2? Which of the following is not a Specialized Windows 7 Professional version of Windows 7? Which of the following is not a way to None of the Choices improve the signal strength? Which of the following is not a Wireless 802.11 h LAN Standards? It supports 16-bit Which of the following is not an advantage Windows on Windows of installing a 64-bit edition of Windows 7? (WOW) environment Which of the following is not the common WiMax network architecture types? You can configure the client computer by going Which of the following statement is not to the accessories in the correct? start menu and clicking the network options. Which of the following version of Windows Windows Vista SP1 are allowed for Upgrade? Hexadecimal What type of notation does IP version 6 address uses? It specifies which part of an IPv4 address is Subnet Mask the network ID and which part of the IPv4 address is the Host ID. What is the maximum bit rate for the 600mbps 802.11n technologies? It is the measurement on how quickly the Performance computer completes a task. It provides authenticaltion, host operations Domain Controller of master roles, hosting the global catalog and support group policies and sysvol. Where will you see the Manage Wireless Control Panel Networks tool in your PC? It is a dynamic volume that joins areas of Spanned Volume unallocated space disks into a single logical disk It is a device, usually a router, on a TCP/IP Default Gateway internet that forwards IP packets to other subnets. You are the system administrator for a large organization that uses Windows Server R2 and Windows 7. You have a Run Disk Cleanup for Windows 7 machine and have enabled System Restore and then System Protection. You want the machine run Shadow Copies to retain only the last System Protection snapshot that was taken. What should you do? Create an executable rule You are the administrator for a large from the Application organization with multiple Windows Server Control Policy 2008 domain controllers and multiple domains. You have a Windows 7 machine that is set up for all users to access. You have an application called StellApp.exe that everyone on this Windows 7 computer can use except for the sales group. How do you stop the sales group from accessing this one application? Alexandria is the payroll manager and stores critical file on her local drive for added security on her Windows 7 computer. She wants to ensure that she is Mirrored volumes using the disk configuration with the most fault tolerance and the highest level of consistent availability. Which of the following provisions should she use? You are the system administrator for your company. You are configuring the services on a Windows 7 computer. You want to Recovery ensure that if a service fails to load, it will attempt to restart. Which tab of the service`s Properties dialog box should you use? Your company network includes desktop computers that have Windows 7 installed. Microsoft updates are applied From the Action Center, automatically at a scheduled time. A use1- open the Windows reports that a proprietary application has Update window. stopped working. You need to uninstall the most recent update from Microsoft. What should you do first? It provides transparent access to internal network resources whenever they are connected to the Internet. It also enables DirectAccess the IT Professionals to manage remote computers outside of the office and does not require a VPN connection. Which of the following is not an IPv6 Broadcast Address types? It is a windows 7 feature that enables user Remote Desktop to connect to their desktop computer from another device. You are a desktop administrator for an enterprise organization. A user applies a device update from the manufacturer, and Restore Windows by now the computer is displaying error using the most recent messages. The user has critical documents System Restore point on the computer that need to be preserved. You need to restore the computer to an operating state and preserve applications and data. What should you do? Kayla is dissatisfied with the configuration of her keyboard and mouse. She wants to reset the keyboard speed and the mouse Control Panel pointer rate. Which utility should she use to configure the keyboard and mouse properties? It is a windows 7 feature that enables Remote Assistance support staff to connect to a remote desktop computer. Your company has asked you to implement Network Access Protection(NAP) on the network. You already have Windows Server Windows XP with SP2 2008 installed on your servers but your organization wants to know which client operating systems will support NAP. What operating system does not support NAP? You use a portable computer that has Windows 7 Enterprise SP1 installed. A From Accessories, click conference room at your company has a Connect to a Network network projector installed on a server Projector within the company network. You need to connect to the projector from your computer. What should you do? This are point-to-point connection across a private or public network. It uses special Virtual Private Network protocols, called tunneling protocol to make a virtual call to a virtual port.