MTA OS (PC) Lesson 4 Study Guide

¡Supera tus tareas y exámenes ahora con Quizwiz!

9. Which of the following was a standard developed in the mid

1990s that defines cable connectors and protocols used to connect external devices to a computer?-Universal serial bus (USB): Universal serial bus (USB) was a standard developed in the mid-1990s that defines cable connectors and protocols used to connect external devices to a computer.

6. What is the maximum disk size NTFS can handle?

256 TB: Most Windows 10 users use NTFS because it supports larger disks than FAT32 or FAT, and NTFS-formatted files and folders provide better security. An NTFS file system supports a maximum disk size of 256 terabytes.

10. Which of the following statements are true of volumes?

A mirrored volume duplicates data from one disk to a second disk for redundancy and fault tolerance.: A mirrored volume duplicates data from one disk to a second disk for redundancy and fault tolerance.

18. Which feature encrypts an entire drive rather than individual files and folders on a disk?

BitLocker Drive Encryption: BitLocker Drive Encryption is another method of protecting data stored on a fixed drive in a Windows computer. BitLocker encrypts the entire drive, rather than individual files and folders. The complementary BitLocker To Go protects data on removable data drives, such as an external flash drive.

17. _____ is the process of decreasing the size of files or folders without affecting the content of the files.

Compression: The purpose of compression is to decrease large files that would otherwise use a lot of storage space. Because files often include a lot of redundant, repeated data, compressing them replaces repeated data with pointers to the data. The pointers take up much less space than the repeated data, so the size of the file is reduced.

14. Which of the following is the best choice to protect specific folders on a DVD from unauthorized access?

Encrypting File System (EFS): Encryption protects the contents of files and folders from unauthorized access. Windows uses Encrypting File System (EFS) to allow users to encrypt information on hard disks, external flash disks, CDs, DVDs, backup tapes, and other types of physical media.

19. What is the difference between encryption and compression?

Encryption protects files; compression reduces file size: Encryption protects the contents of files and folders from unauthorized access. Compression is the process of decreasing the size of files or folders without affecting the files' content.

2. Which of the following is a collection of settings stored in Active Directory on a Windows network?

Group Policy: Group Policy is a collection of settings (policies) stored in Active Directory on a Windows network. Group Policy affects users and computers contained in sites, domains, and organizational units.

8. Which of the following default accounts can run services in the background but has limited access to resources and objects, which helps protect the system when individual services are compromised?

Network Service: The Local Service account is a built-in account (it's already created in the operating system). It can run services in the background but has limited access to resources and objects, which helps protect the system if individual services are compromised. The Network Service is similar to the Local Service account but is geared for networking services. The Administrator account has full access to resources and objects. Windows does not have a default Network Operator account.

20. You want to determine whether the COM+ Event System service has any dependent services. How do you find this information?

Open the service's Properties dialog box and click the Dependencies tab: Open the Services console and then double-click the COM+ Event System service to open the Properties dialog box. The Dependencies tab shows you which services depend on other services to run. A dependent service starts after the service upon which it depends starts. Stopping a service also stops any other service that depends on it. There are no options available on this tab—it's informational only. However, before you stop or disable a service on the General tab, you should view the information on the Dependencies tab to know which other services might be affected by your change.

3. Which of the following handles requests for print spooling, file indexing, task scheduling, and the Windows Firewall?

Services: Services run in the background, essentially helping the operating system work with other programs. Although services do not usually have user interfaces, you can manage services through the Microsoft Management Console (MMC) Services snap-in.

15. Where do you configure the setting to enter Safe Mode the next time the computer starts?

System Configuration, Boot tab: The options on the Boot tab in System Configuration enable you to adjust boot options, usually for diagnostic purposes. The Boot tab options match the options in the Advanced boot configuration menu that displays when you press F8 at startup. To boot the system into Safe Mode, select the Safe boot check box.

1. Which of the following gives you a quick glance at performance and provides information about programs and processes running on your computer?

Task Manager: Task Manager gives you a quick glance at performance and provides information about programs and processes running on your computer.

12. Which of the following statements are true of file systems?

The three primary types of file systems for Windows are FAT, FAT32, and NTFS., it's best to use NTFS-formatted disks for Windows Vista through Windows 10 because NTFS handles small to very large hard disks, provides better security, and is the most reliable, and a FAT32 partition is limited to a maximum size of 32 gigabytes (GB): All statements are true of file systems.

5. Which tab in System Configuration enables you to launch Performance Monitor?

Tools: The Tools tab in the System Configuration utility lists many programs you can start for reporting and diagnostic purposes. Some of the tools are Change UAC Settings, Event Viewer, Performance Monitor, and Task Manager.

13. Which chip can be used by BitLocker to protect BitLocker encryption keys?

Trusted Platform Module: Some computers have a Trusted Platform Module (TPM) chip on the motherboard. If the chip is present, BitLocker uses the TPM chip to protect the BitLocker keys. When a user starts a computer with a TPM chip and with BitLocker enabled, BitLocker requests the keys from the TPM and unlocks the system.

7. What is the primary use of Programs and Features in Control Panel?

Uninstall applications: A user or administrator might need to remove, or uninstall, a local application for a variety of reasons. Windows 7 provides Programs and Features in Control Panel for this purpose.

4. Which of the following can you perform using Group Policy?

Update an application, install applications from a network location, and restrict user access to an application: In a Windows network in a domain environment, administrators can use Group Policy to ease the burden of administering and managing many users and client computers. Group Policy enables you to control who may install software, and on which computers, and helps you push software updates and security configurations across the network. In addition, Group Policy enables you to restrict user access to an application. You do not use Group Policy to encrypt a user's files.

11. Where are EFS certificates stored?

Windows Certificate database: When you mark a file for encryption, Windows generates a large, random number—a unique encryption key. The key is used to scramble the contents of the file. This encryption key is also encrypted with a personal file encryption certificate, which is stored in the Windows Certificate database. The file's encryption key is stored along with the file.

16. A _____ is a sequence of instructions written to perform a specified task for a computer. Today, most of these programs are installed as desktop apps or Windows Store apps.

software application or "app": A software program (also known as an app) is a sequence of instructions written to perform a specified task for a computer. Today, most of these programs are installed as desktop apps or Windows Store apps.


Conjuntos de estudio relacionados

Income Tax Accounting Chapters 4-6

View Set

Ch 4 Taxes, Retirement, and Other Insurance Concepts

View Set

CHAPTER 31 ASSESSMENT OF THE CARDIOVASCULAR SYSTEM

View Set

Rita Mulcahy Chapter 11 - Risk Management

View Set

MindTap Assignment #2 (Chapter 2)

View Set

Section #2: American History: U.S. Citizenship Test- 2020 Version

View Set