Your browser does not support JavaScript!

Principles of Operating Systems and its Applications

Showing 76-150 of 189 answers

It is a method of sharing folders that allow multiple default public folders for each computer and files shared with same computer and with same network.
  • Public Sharing Correct
It is a method of sharing folders that allows you to share folders quickly.
  • Basic Sharing Correct
It is a method of turning a computer on or off wherein the system state is saved to memory.
  • Sleep or Standby Correct
It is a new authentication features that controls the ability of online IDs to authenticate to a computer.
  • Online Identity Integration Correct
It is a new Windows 7 security feature that enables IT professionals to specify exactly what is allowed to run on user desktops.
  • Applocker Correct
It is a scriptable command line utility that create scripts to automate disk related task.
  • Diskpart Correct
It is a security feature that simplifies the ability of users to run as standard users and perform all neccessary daily tasks
  • User Account Control Correct
It is a small software program that allows a hardware device to communicate with a computer
  • Drivers Correct
It is a software that is designed to deliberately harm a computer.
  • Malicious Software Correct
It is a strong authentication (with strong EAP method) and strong (TKIP) or very strong (AES) encryption used by medium and large organization.
  • WPA-Enterprise Correct
It is a tool used to remove system-specific data from the Windows operating system, configure windows to start in audit mode, configure the windows operating system to start the Windows Welcome phase and reset Windows Product activation.
  • Sysprep Correct
It is a type of IPv4 Address that is required by the devices and host that connect directly to the Internet. This address must be unique, routable on the internet and must be assigned by IANA.
  • Public IP Address Correct
It is a type of network that interconnect devices by means of radio waves instead of wires and cables
  • Wireless Network Correct
It is a type of printing wherein it is used by legacy application in pre-vista version of windows that uses enhanced metafile format (EMF) as the spool file format.
  • GDI based printing Correct
It is a way for you to limit use of disk space on a volume for each user to conserve disk space.
  • Disk Quotas Correct
It is a windows 7 feature that enables support staff to connect to a remote desktop computer.
  • Remote Assistance Correct
It is a windows 7 feature that enables user to connect to their desktop computer from another device.
  • Remote Desktop Correct
It is a Windows Authentication Method that is used by windows 7 clients and server running Microsoft Windows Server 2000 or later
  • Kerberos v5 Correct
It is a wireless network modes that allows a wireless network adapters connects directly to another wireless network adapter for the purpose of temporarily sharing of files, presentations or an internet connection among multiple computers and devices.
  • Ad hoc mode Correct
It is an administrative tool for managing user settings and computer settings across a network
  • Window Update Group Policy Correct
It is an enhanced privacy features of Internet Explorer 8 that inherently more secure that using delete browsing history to maintain privacy because there are no logs kept or tracks made during browsing
  • InPrivate Browsing Correct
It is an object that contains all of the information that defines a user in Windows Server 2008 R2.
  • User Account Correct
It is one of the Considerations on why using the option of Upgrade rather than Migrate.
  • Does not require the reinstallation of applications Correct
It is one of the feature of Windows 7 that encrypts the computer operating system and data stored on the operating system volume.
  • Bitlocker Correct
It is one of the features of Mobile Computers wherein it synchronizes various content including music, video, contacts, calendar events, web browser favorites and other files between Windows Mobile devices and Windows 7
  • Windows Mobile Device Center Correct
It is one of the Key Features of Windows 7 that simplify a user's ability to organize, search for, and view information.
  • Usability Correct
It is one of the Key Features of Windows 7 that takes advantage of modern computing hardware, running more reliably and providing more consistent performance than previous versions of Windows.
  • Reliability and Performance Correct
  • Usability
  • Security
  • Deployment
It is one of the Key Features of Windows 7 that takes advantage of modern computing hardware, running more reliably and providing more consistent performance thanprevious versions of Windows.
  • Reliability and Performance Correct
It is one of the Options for Installing Windows 7 where in you install Windows 7 on a new partition and replace an existing operating system on a partition.
  • Clean Installation Correct
It is one of the Options for Installing Windows 7 where in you replace an existing version of Windows with Windows 7 but all user applications, files and settings are retained.
  • Upgrade Installation Correct
It is the built-in encryption tool for Windows file systems
  • Encrypting File Systems Correct
It is the foundation of the Internet naming scheme and it supports accessing resources by using alphanumeric names.
  • DNS Server Correct
It is the measurement of how a system conforms to expected behavior
  • Reliability Correct
It is the measurement on how quickly the computer completes a task.
  • Performance Correct
It is the most common form of computer network.
  • Local Area Network Correct
It is the non-contiguous storage of data on a volume
  • Disk Fragmentation Correct
It is the process of determining whether something or someone has permission to access the resources
  • Authorization Correct
It is the process of verifying the identity of something or someone.
  • Authentication Correct
It is used to display IP Configuration information and to release and renew addresses
  • ipconfig Correct
  • ping
  • netsh
  • getmac
It provides assistance in resolving network-related issues
  • Windows Network Diagnostics Tool Correct
It provides authenticaltion, host operations of master roles, hosting the global catalog and support group policies and sysvol.
  • Domain Controller Correct
It provides storage for the users' files and share folders that contain users' files.
  • File Server Correct
It provides transparent access to internal network resources whenever they are connected to the Internet. It also enables the IT Professionals to manage remote computers outside of the office and does not require a VPN connection.
  • DirectAccess Correct
It reduces the complexity and amount of administrative work by using automatic TCP/IP configuration.
  • DHCP Server Correct
It specifies which part of an IPv4 address is the network ID and which part of the IPv4 address is the Host ID.
  • Subnet Mask Correct
It specifies which part of the IPv4 address is the host ID
  • Subnet Mask Correct
  • DNS
  • Default Gateway
  • IPv4
Kayla is dissatisfied with the configuration of her keyboard and mouse. She wants to reset the keyboard speed and the mouse pointer rate. Which utility should she use to configure the keyboard and mouse properties?
  • Control Panel Correct
LAN stands for Localized Area Networks
  • True
  • False Correct
MBR (Master Boot Record) is on the first sector of the hard disk.
  • True Correct
  • False
MBR Stands for?
  • Master Boot Record Correct
  • Main Boot Record
  • Master Boot Recorder
  • None of the above
Migrating is a recommended solution for home or small office scenario.
  • True
  • False Correct
NSLOOKUP enables testing of name resolution
  • True Correct
  • False
Provide services to view, configure, and troubleshoot your network access and sharing capabilities
  • Microsoft Management Console
  • Network Folder
  • Network and Sharing Center Correct
  • Troubleshooting
Provides a timeline of system changes and reliability. It also provides a system stability chart and reports on software installations and software or hardware failures.
  • Reliability Monitor Correct
Routers divides packets equally then send it to all end devices in the network
  • True
  • False Correct
Simple Volume can be extended across disks creating a spanned volume.
  • True Correct
  • False
Software Programs that provide functionality of a role
  • Server Role
  • Role Services Correct
  • Service Role
  • Role Server
Strong EAP methods provide strong authentication
  • IEEE 802.1X Correct
Subnet Mask are used to determine the best route for packet forwarding
  • True
  • False Correct
The default shared folder's permission can be modified by anyone who has access to it.
  • True
  • False Correct
The most common form of computer network
  • LAN Correct
  • PAN
  • WAN
  • CAN
This are equivalents to door locks, employee badges and security systems. It protects the computer and networks from intrusions.
  • Firewall Correct
This are point-to-point connection across a private or public network. It uses special protocols, called tunneling protocol to make a virtual call to a virtual port.
  • Virtual Private Network Correct
This Power plan saves power on a mobile computer by reducing system performance. Its primary purpose is to maximize the battery life.
  • Power Saver Correct
Tracert verifies a routing path
  • True Correct
  • False
Type of folder that contains multiple files and folders that are compressed to reduce storage size.
  • Shared Folder
  • Windows Folder
  • Network Folder
  • Compress Folder Correct
Use a secure dynamic updates for DNS zones when configuring DNS for AD DS
  • True Correct
  • False
WAN stands for:
  • Wider Area Networking
  • Wider Area Network
  • Wide Area Networking
  • Wide Area Network Correct
Web Servers are computer that deliver Web Pages.
  • True Correct
  • False
WET is the recommended tool for scenarios in which you have a small number of computers to migrate.
  • True Correct
  • False
What does DHCP stands for?
  • Dynamic Host Configuration Protocol Correct
  • Dynamically Hosting Configuration Protocol
  • Data Host Configuration Protocol
  • Domain Host Configuration Protocol
What does GPO stands for?
  • Group Policy Operations
  • Group Policy Output
  • Group Policy Object Correct
  • Group Policy Option
What does WET stands for?
  • Windows Easy Transfer Correct
  • Windows Enterprise Technology
  • Windows Elastic Technology
  • Windows Electronic Transfer
What is the binary notation for the 255.255.255.0 subnet mask?
  • 11111111.11111111.11111111.00000000 Correct
What is the IEEE 802 Standards for Local Wireless Networks?
  • IEEE 802.11 Correct
All courses