0% found this document useful (0 votes)
84 views

Principles of Operating Systems and Its Applications

This document discusses various principles and concepts related to operating systems and their applications. It defines key terms like private IP addresses, APIPA, memory diagnostics tools, bits in IP addresses, remote access servers, software restriction policies, role services, GPT, MBR disks, NTFS permissions, group policy, local user accounts, VLANs, domain controllers, action center, forests, groups, application servers, network adapters, switches, Windows upgrade advisor, simple volumes, Windows XP mode, disk management, intranets, public sharing, basic sharing, online identity integration, AppLocker, diskpart, user account control, drivers, malicious software, WPA-Enterprise, Sysprep, public IP addresses,
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views

Principles of Operating Systems and Its Applications

This document discusses various principles and concepts related to operating systems and their applications. It defines key terms like private IP addresses, APIPA, memory diagnostics tools, bits in IP addresses, remote access servers, software restriction policies, role services, GPT, MBR disks, NTFS permissions, group policy, local user accounts, VLANs, domain controllers, action center, forests, groups, application servers, network adapters, switches, Windows upgrade advisor, simple volumes, Windows XP mode, disk management, intranets, public sharing, basic sharing, online identity integration, AppLocker, diskpart, user account control, drivers, malicious software, WPA-Enterprise, Sysprep, public IP addresses,
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Principles of Operating Systems and its

Applications

172.16.0.0 /12 is what type of IPv4


Private IP Address
Address.
Automatic Private IP
APIPA stands for:
Addressing
Checks for symptoms of defective
Windows Memory computer memory and usually can be
Diagnostics Tool started from administratve tools in the
control panel
How many bits are there in an IP version 4
32 bits
address?
How many bits are there in an IP version 6
128 bits
address?
It a server that is used to access the
Remote Access Server corporate resources from outside the
corporate network.
It allows the administrators to identify
Software Restriction which software is allowed to run and was
Policies initially added to Windows XP and
Windows Server 2003.
It allows you to control which role
Role Services
functionality is installed and enabled.
It contains an array of partition entries
GUID Partition (GPT) describing the start and end LBA of each
partition on disk.
It contains the partition table for the disk
Master Boot Record Disk and a small amount of executable code
called as the master boot code.
It defines the type of access granted to a
NTFS Permission
user, group, or computer for a file or folder.
Group Policy It enables IT Administrator to automate
one-to-many management of users and
computers.
It enables the IT Administrators to
Group Policy automate one-to-several management of
users and computers.
It enables the user to log on and access
Local User Accounts resources on a specific computer and
usually reside in SAM.
It enables you to manage network traffic,
Virtual Local Area group physically dispersed nodes into
Network logical area networks and isolate network
traffic.
It holds a copy of AD DS and responds to
Domain Controller
request for active directory information.
It is a central location for viewing messages
about your system and the starting point
Action Center
for diagnosing and solving issues with your
system.
Forest It is a collection of Domain Trees.
It is a collection of user accounts, computer
Groups accounts, contacts and other groups that
you can manage as a single unit.
It is a computer that is dedicated to
Application Server running network-aware application
software.
It is a device that converts instructions
Network Adapter from the network protocol stack into
electric signals.
It is a device that provides wiring
concentrator functionality like a hub but it
also enables network traffic management,
Switch
performs firewall functions and makes
routing decisions based upon traffic
priority.
Windows Upgrade It is a downloadable application that helps
windows user identify which edition of
Advisor
Windows 7 meets their needs.
It is a dynamic volume that encompasses
Simple Volume available free-space from single, dynamic,
hard disk drive.
It is a feature of Windows 7 that allows
Windows XP mode
windows 7 to be backward compatible
It is a graphical user interface that is used
to manage disks and volumes both basic
Disk Management
and dynamic, locally or on remote
computers.
It is a group of services hosted on a
Intranet network which is a private structure and
has the internet-like service provision.
It is a method of sharing folders that allow
multiple default public folders for each
Public Sharing
computer and files shared with same
computer and with same network.
It is a method of sharing folders that allows
Basic Sharing
you to share folders quickly.
It is a new authentication features that
Online Identity
controls the ability of online IDs to
Integration
authenticate to a computer.
It is a new Windows 7 security feature that
Applocker enables IT professionals to specify exactly
what is allowed to run on user desktops.
It is a scriptable command line utility that
Diskpart create scripts to automate disk related
task.
It is a security feature that simplifies the
User Account Control ability of users to run as standard users
and perform all neccessary daily tasks
It is a small software program that allows a
Drivers hardware device to communicate with a
computer
It is a software that is designed to
Malicious Software
deliberately harm a computer.
It is a strong authentication (with strong
EAP method) and strong (TKIP) or very
WPA-Enterprise
strong (AES) encryption used by medium
and large organization.
It is a tool used to remove system-specific
data from the Windows operating system,
configure windows to start in audit mode,
Sysprep
configure the windows operating system to
start the Windows Welcome phase and
reset Windows Product activation.
It is a type of IPv4 Address that is required
by the devices and host that connect
Public IP Address directly to the Internet. This address must
be unique, routable on the internet and
must be assigned by IANA.
It is a type of network that interconnect
Wireless Network devices by means of radio waves instead of
wires and cables.
It is a type of printing wherein it is used by
legacy application in pre-vista version of
GDI based printing
windows that uses enhanced metafile
format (EMF) as the spool file format.
It is a way for you to limit use of disk space
Disk Quotas on a volume for each user to conserve disk
space.
It is a Windows Authentication Method
that is used by windows 7 clients and
Kerberos v5
server running Microsoft Windows Server
2000 or later
Ad hoc mode It is a wireless network modes that allows
a wireless network adapters connects
directly to another wireless network
adapter for the purpose of temporarily
sharing of files, presentations or an
internet connection among multiple
computers and devices.
It is an administrative tool for managing
Window Update Group
user settings and computer settings across
Policy
a network.
It is an enhanced privacy features of
Internet Explorer 8 that inherently more
InPrivate Browsing secure that using delete browsing history
to maintain privacy because there are no
logs kept or tracks made during browsing
It is an object that contains all of the
User Account information that defines a user in Windows
Server 2008 R2.
Does not require the
It is one of the Considerations on why using
reinstallation of
the option of Upgrade rather than Migrate.
applications
It is one of the feature of Windows 7 that
encrypts the computer operating system
Bitlocker
and data stored on the operating system
volume.
It is one of the Key Features of Windows 7
Usability that simplify a user's ability to organize,
search for, and view information.
It is one of the Key Features of Windows 7
that takes advantage of modern
Reliability and computing hardware, running more reliably
Performance and providing more consistent
performance than previous versions of
Windows.
It is one of the Options for Installing
Windows 7 where in you install Windows 7
Clean Installation
on a new partition and replace an existing
operating system on a partition.
Upgrade Installation It is one of the Options for Installing
Windows 7 where in you replace an existing
version of Windows with Windows 7 but all
user applications, files and settings are
retained.
It is the built-in encryption tool for
Encrypting File Systems
Windows file systems
It is the foundation of the Internet naming
DNS Server scheme and it supports accessing
resources by using alphanumeric names.
It is the most common form of computer
Local Area Network
network.
It is the non-contiguous storage of data on
Disk Fragmentation
a volume
It is the process of determining whether
Authorization something or someone has permission to
access the resources
It is the process of verifying the identity of
Authentication
something or someone.
Windows Network It provides assistance in resolving network-
Diagnostics Tool related issues
It provides storage for the users' files and
File Server
share folders that contain users' files.
It reduces the complexity and amount of
DHCP Server administrative work by using automatic
TCP/IP configuration.
Provides a timeline of system changes and
reliability. It also provides a system stability
Reliability Monitor
chart and reports on software installations
and software or hardware failures.
Strong EAP methods provide strong
IEEE 802.1X
authentication
Firewall This are equivalents to door locks,
employee badges and security systems. It
protects the computer and networks from
intrusions.
What is the IEEE 802 Standards for Local
IEEE 802.11
Wireless Networks?
Which of the following is a main type of
Distribution
group?
Which of the following is not a Boot-option
None of the choices
for troubleshooting startup problems?
Which of the following is not a LAN
Crown
Physical Topology?
Windows Memory Which of the following is not a
Diagnostics Tool Performance Monitor tool?
Which of the following is not a Physical
Network Adaptor
WAN Components?
Which of the following is not a Server Role
Windows Power Shell
of Windows Server 2008 R2?
Which of the following is not a Specialized
Windows 7 Professional
version of Windows 7?
Which of the following is not a way to
None of the Choices
improve the signal strength?
Which of the following is not a Wireless
802.11 h
LAN Standards?
It supports 16-bit
Which of the following is not an advantage
Windows on Windows
of installing a 64-bit edition of Windows 7?
(WOW) environment
Which of the following is not the common
WiMax
network architecture types?
You can configure the
client computer by going
Which of the following statement is not
to the accessories in the
correct?
start menu and clicking
the network options.
Which of the following version of Windows
Windows Vista SP1
are allowed for Upgrade?
Hexadecimal What type of notation does IP version 6
address uses?
It specifies which part of an IPv4 address is
Subnet Mask the network ID and which part of the IPv4
address is the Host ID.
What is the maximum bit rate for the
600mbps
802.11n technologies?
It is the measurement on how quickly the
Performance
computer completes a task.
It provides authenticaltion, host operations
Domain Controller of master roles, hosting the global catalog
and support group policies and sysvol.
Where will you see the Manage Wireless
Control Panel
Networks tool in your PC?
It is a dynamic volume that joins areas of
Spanned Volume unallocated space disks into a single logical
disk
It is a device, usually a router, on a TCP/IP
Default Gateway internet that forwards IP packets to other
subnets.
You are the system administrator for a
large organization that uses Windows
Server R2 and Windows 7. You have a
Run Disk Cleanup for
Windows 7 machine and have enabled
System Restore and then
System Protection. You want the machine
run Shadow Copies
to retain only the last System Protection
snapshot that was taken. What should you
do?
Create an executable rule You are the administrator for a large
from the Application organization with multiple Windows Server
Control Policy 2008 domain controllers and multiple
domains. You have a Windows 7 machine
that is set up for all users to access. You
have an application called StellApp.exe that
everyone on this Windows 7 computer can
use except for the sales group. How do you
stop the sales group from accessing this
one application?
Alexandria is the payroll manager and
stores critical file on her local drive for
added security on her Windows 7
computer. She wants to ensure that she is
Mirrored volumes
using the disk configuration with the most
fault tolerance and the highest level of
consistent availability. Which of the
following provisions should she use?
You are the system administrator for your
company. You are configuring the services
on a Windows 7 computer. You want to
Recovery ensure that if a service fails to load, it will
attempt to restart. Which tab of the
service`s Properties dialog box should you
use?
Your company network includes desktop
computers that have Windows 7 installed.
Microsoft updates are applied
From the Action Center,
automatically at a scheduled time. A use1-
open the Windows
reports that a proprietary application has
Update window.
stopped working. You need to uninstall the
most recent update from Microsoft. What
should you do first?
It provides transparent access to internal
network resources whenever they are
connected to the Internet. It also enables
DirectAccess
the IT Professionals to manage remote
computers outside of the office and does
not require a VPN connection.
Which of the following is not an IPv6
Broadcast
Address types?
It is a windows 7 feature that enables user
Remote Desktop to connect to their desktop computer from
another device.
You are a desktop administrator for an
enterprise organization. A user applies a
device update from the manufacturer, and
Restore Windows by now the computer is displaying error
using the most recent messages. The user has critical documents
System Restore point on the computer that need to be preserved.
You need to restore the computer to an
operating state and preserve applications
and data. What should you do?
Kayla is dissatisfied with the configuration
of her keyboard and mouse. She wants to
reset the keyboard speed and the mouse
Control Panel
pointer rate. Which utility should she use to
configure the keyboard and mouse
properties?
It is a windows 7 feature that enables
Remote Assistance support staff to connect to a remote
desktop computer.
Your company has asked you to implement
Network Access Protection(NAP) on the
network. You already have Windows Server
Windows XP with SP2 2008 installed on your servers but your
organization wants to know which client
operating systems will support NAP. What
operating system does not support NAP?
You use a portable computer that has
Windows 7 Enterprise SP1 installed. A
From Accessories, click conference room at your company has a
Connect to a Network network projector installed on a server
Projector within the company network. You need to
connect to the projector from your
computer. What should you do?
This are point-to-point connection across a
private or public network. It uses special
Virtual Private Network
protocols, called tunneling protocol to
make a virtual call to a virtual port.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy