MTA

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

HomeGroup

the file and printer sharing solution built into Windows 7. Once you set up a homegroup on one computer, other networked computers running Windows 7 can join the homegroup and automatically see the shared libraries and printers. You also have some control over the level of access other users have to your shared items. You can choose to let other users simply view and use your items, or configure settings for modifying, deleting, and adding items to your shared libraries.

file system

the overall structure your computer uses to name, store, and organize files and folders on a hard disk or partition

Activation

the process of verifying that your copy of Windows is genuine and that it is not in use on other computers than the number for which you own a license.

Remote Desktop Services

the technology that allows a computer (the client) to connect to a remote server (also called a host computer) and run applications from the server.

Standard user account

type has fewer permissions than an administrative-level account but enough permissions to be productive.

Guest account

type is simply an account with few permissions and no password that allows a user to use a computer without requiring a unique user account. The Guest account is intended mainly for a user who needs temporary use of a computer, and is disabled by default.

Administrator account

type provides the broadest permissions and therefore the most control over the computer.

Windows Backup

uses the Backup and Restore utility that comes with many Windows versions and enables you to back up and recover files.

System Restore

uses the System Protection feature to create restore points

If you plan to configure your computer for multi-booting

where you choose at startup which operating system you want to load, you might need to format a partition with FAT32 if that partition will run Windows 95, Windows 98, or Windows Millenium Edition

cached credentials

which allow the user to access resources when a domain controller is unavailable

Group Policy objects (GPOs)

which are used by administrators to control users and computers on a network and to deploy applications, software updates, and security.

action

which is the action taken when the task runs

Volume Shadow Copy service

which is what allows you to create restore points and backups of your system

The following are the six main editions of Windows 7:

• Windows 7 Starter • Windows 7 Home Basic • Windows 7 Home Premium • Windows 7 Professional • Windows 7 Enterprise • Windows 7 Ultimate

a computer that will run Windows 7 must meet the following system requirements

1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor • 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) • 16 GB available hard disk space (32-bit) or 20 GB (64-bit) • DirectX 9 graphics device with Windows Display Driver Model (WDDM) 1.0 or higher driver

A GPT partition style allows for more partitions and larger volume sizes

A disk initialized as a GPT partition style may contain up to 128 primary partitions and each can be larger than 2 TB; in fact, they can be as large as 9.4 zetabytes (ZB)

Three types of user accounts in Windows 7:

Administrator • Standard user • Guest

UAC has four notification levels

Always notify me, Notify me only when programs try to make changes to my computer, Notify me only when programs try to make changes to my computer (do not dim my desktop), Never notify me of installations or changes

The General tab in the service's Properties dialog box provides options for setting a service's startup type:

Automatic (Delayed Start),Automatic, Manual, Disabled

Network

Boots into Safe Mode with network services enabled

Active Directory repair

Boots to the Windows GUI and runs critical system services and Active Directory.

Alternate shell

Boots to the command prompt without network support.

Action Center tracks four features

Check for solutions to problem reports: From here you can check for solutions, view the Windows 7 privacy policy, change settings to choose how often to check for solutions to problems reports, and view a graph of the system's reliability history. • Backup: This section provides information about the status of Windows Backup on your computer. You'll learn about Windows Backup in Lesson 8. • Check for updates: This section refers to Windows Update, which provides updates to the operating system and many installed programs. You'll learn about Windows Update later in this lesson. • Troubleshooting: System Maintenance: This section displays messages related to the automatic troubleshooting feature in Windows 7, which actively monitors your system for any maintenance issues.

Boot log

Creates a boot log of startup activity in a file named ntbtlog.txt

No GUI boot

Disables the Windows Welcome screen

OS boot information

Displays driver names as drivers are installed during the startup process.

Windows 7 includes several default libraries

Documents library: Stores word-processing documents, spreadsheets, and similar files • Music library: Stores audio files, such as those you've downloaded from the Web, trans- ferred from a portable device (music player), or ripped from a CD • Pictures library: Stores digital image files • Videos library: Stores video files

There are four views to choose from in OneNote:

Editing View: Allows the notebook to be edited • Reading View: Removes extra information like author names and dates of changes • Show Authors: Displays the authors of sections, pages, and notebooks • Page Versions: Shows various versions of a page

Remote Desktop Web Access:

Enables a remote user to log on and run programs and virtual desktops. This feature lets users create a RemoteApp and Desktop Connection using the Start menu on a computer running Windows 7 or via a Web browser

RemoteApp

Enables a remote user to log on to a Remote Desktop Services server via a Web browser and run a single application.

Windows Live SkyDrive menu items are described as follows

Home: Takes you to the Windows Live home where you can perform tasks such as: check your Hotmail account or sync up your social media with Messenger social, which links your Facebook, MySpace, and LinkedIn to a central console. • Devices: Allows you to add computers and mobile phones that you want to link together. (Phones must use the AT&T cellular service.) • Mobile: Allows you to get Windows Live for your phone, set up SMS services, and set 5 GB of SkyDrive synced storage. • Downloads: Takes you to a page to download Windows Live Essentials. • All Services: Lists a wealth of services you can set up from calendaring options to Hotmail to setting up computer security for your family. Family Safety software creates activity reports to monitor your kids' computer activity; you can choose Web sites, games, and programs that are accessible and you can even specify time periods when they can use the computer.

Windows Update pushes three types of updates to your computer

Important updates: These include security and critical updates, hotfixes, service packs, and reliability improvements. A hotfix is a patch that typically fixes a bug in software. If the bug creates a security issue or results in a part of the software malfunctioning, he manufacturer usually distributes a hotfix soon after the bug is detected. A Windows service pack is a collection of updates and hotfixes since the product was released. The product might be the operating system or Microsoft software. Figure 7-28 shows an example of an important update. • Recommended updates: These include software updates and new or improved features to help keep your operating system and software running optimally. Optional updates: These include items such as optional device drivers for components on your computer, or new or trial Microsoft software. Figure 7-29 shows an example of optional updates (in this case, device drivers).

Although HomeGroup is easy to set up and use, there are a few caveats:

In Windows 7 Home Basic and Starter editions, you can only join a homegroup—you cannot create one. • You can join only one homegroup at a time. If your computer is already joined to a homegroup, you must leave that homegroup to join another. • You can't limit access to shared items to individual users. Anyone using a computer that's a member of the homegroup can access the shared content. • Non-Windows 7 computers (such as those running Windows Vista, Windows XP, Mac OS, or Linux) require additional setup steps in order to access shared items in the homegroup. • You must already have a network set up (either wired or wireless). • To create or join a homegroup, your computer's network location must be set to "Home network" (in the Network and Sharing Center). • Do you use your laptop computer at work? If the computer connects as part of a domain at work, you can still join it to a homegroup at home. You'll be able to use folders and printers shared by other computers in the homegroup, but you won't be able to share any of your computer's folders with the group for security purposes.

Microsoft lists the following items as required for using specific features or for optimal performance:

Internet access (be aware that you may need to pay for the service) • Additional memory and advanced graphics hardware for video playback, depending on the resolution required or desired • A graphics card compatible with DirectX 10 or higher for certain games and programs; DirectX enhances the multimedia capabilities of a computer by enabling the graphics card to process some multimedia functions rather than the CPU. • A TV tuner and additional hardware for some Windows Media Center functionality • Specific hardware for Windows Touch and Tablet PCs • A network and PCs running Windows 7 for HomeGroup utilization • A compatible optical drive to burn DVDs/CDs • Trusted Platform Module (TPM) 1.2 for BitLocker; TPM is a security chip on some motherboards that helps protect a computer from being used when the computer has been lost, stolen, or attacked by a hacker. • A universal serial bus (USB) flash drive for BitLocker To Go • An additional 1 GB of RAM and an additional 15 GB of available hard disk space for Windows XP Mode • Audio output for music and sound

MBR partitions have their limitations.

MBR partitions are limited to four basic partitions and each partition is limited to 2 terabytes (TB) in size. The four basic partitions can be either four primary partitions or three primary partitions with one extended partition, which can be further divided into multiple logical partitions.

Action Center tracks seven security features

Network firewall: This feature monitors your computer's firewall, through which network and Internet traffic flows. Windows 7 comes with Windows Firewall, which should be turned on if no other firewalls are present.Windows Update: This feature indicates whether Windows Update is enabled. • Virus protection: Virus protection software installed on your computer is monitored with this feature. If no software is present or if it's out of date, you'll be notified here. • Spyware and unwanted software protection: Action Center monitors Windows Defender (which comes bundled with Windows 7, and which you'll learn about shortly) and other third-party antispyware solutions. • Internet security settings: These settings are configured through the Security tab in Internet Explorer 9's Internet Options dialog box. You learned about Internet Explorer security zones in Lesson 3. If any zone is configured so that it poses a threat to your computer, you'll be notified here. • User Account Control: In this section, you can see whether User Account Control (UAC) is enabled and you can click the Change settings link to configure it. • Network Access Protection (NAP): This feature applies mainly to enterprise environments. With NAP enabled, the network can detect whether the computer meets baseline security standards for the organization. If not, the computer is not allowed access to the full network and must be updated or reconfigured before access is granted.

Windows Live SkyDrive

Originally named Windows Online Folder, Window's SkyDrive is a reliable password-protected online service offering file storage that enables people to share files and photos. Each person receives 25 GB of free online storage. All you need to get started is a Windows Live login ID—no installation is necessary.

Diagnostic startup

Runs basic devices and services only; equivalent to starting the computer in Safe Mode.

Advanced sharing offers the greatest amount of control; you can

Share files, folders, or an entire drive • Choose users or groups with which to share files and folders • Limit the number of users who may use a file or folder at the same time, mainly for secu- rity purposes • Set permissions on shared files and folders, such as allowing users Read, Change, or Full Control • Choose which files are available to users offline

You can configure dynamic disk volumes as

Simple volume: This type of volume uses free space available on a single disk. • Spanned volume: This type of volume extends a simple volume across multiple disks, up to a maximum of 32. • Mirrored volume: This type of volume duplicates data from one disk to a second disk for redundancy and fault tolerance; if one disk fails, data can be accessed from the second disk. You cannot span a mirrored volume; a mirrored volume must reside on a single disk. Mirroring is also referred to as RAID-1. • Striped volume: This type of volume stores data across two or more physical disks. Data on a striped volume is written evenly to each of the physical disks in the vol- ume. You cannot mirror or span a striped volume. Striping is often referred to as RAID-0. • RAID-5 volume: This type of volume is a type of striped volume that also provides fault tolerance. Data is written to three or more disks; if one disk fails, the remaining drives re-create the data.

Base video

Starts the Windows graphical user interface using standard VGA drivers

Selective startup

Starts the system with some or all system services and startup items disabled

Disk Cleanup

This utility removes many different kinds of unnecessary files from your computer

Microsoft Windows Malicious Software Removal Tool.

This utility scans your computer for dangerous malware and attempts to remove it immediately. You can download the Malicious Software Removal Tool from the Microsoft Safety & Security Center or the Microsoft Download Center. The tools work with computers running Windows 7, Windows Vista, Windows XP, Windows 2000, and Windows Server 2003.

High Touch Installation (HTI)

Using this method, you use an installation DVD or USB drive and manually install the operating system on every computer. You must then also manually configure each system.

most commonly used themes

Windows 7, Windows Classic, Windows 7 Basic

Windows Defender, which comes bundled with Windows 7

You can set Windows Defender to run in the background, constantly monitoring your computer for spyware. When it detects spyware, the program quarantines it (so the spyware can't run on your computer) or deletes it. Quarantining is handy in case Windows Defender mistakenly deems a "good" program as spyware; by only quarantining it, you're provided with an opportunity to restore the program.

virtualized client

a VM that's set up specifically to run some kind of application that typically runs in an older version of Windows

system repair disc

a bootable disc you create in Windows 7 that contains Windows system recovery tools

user account

a collection of information that defines the actions that can be taken on a computer and which files and folders can be accessed

network location

a collection of security settings that's appropriate for the type of network you want to connect to

Group Policy

a collection of settings (policies) stored in Active Directory on a Windows network

Microsoft Forefront Endpoint Protection

a combination of antivirus/anti-malware and management software for desktops, laptops, and other client endpoints in a business environment. If you have more than 10 client computers to protect in your organization, Microsoft recommends that you use Forefront Endpoint Protection rather than Microsoft Security Essentials

Windows PowerShell

a command-line interface used mainly by IT professionals to run cmdlets (pronounced command-lets), complete background jobs (processes or programs that run in the background without a user interface), and run scripts to perform administrative tasks.

Windows Mobility Center

a control panel of sorts that gives you access to several laptop settings, from volume to screen brightness to power options to WiFi and Bluetooth settings— all in one place.

Windows registry

a database in Windows that stores user preferences, file locations, program configuration settings, startup information, hardware settings, and more.

User Account Control (UAC)

a feature in Windows Vista and Windows 7 that requires administrative-level permission to make changes to your computer that affect security or affect settings for other user accounts.

Zero Touch Installation (ZTI)

a fully automated, "touchless" method of installing Windows.

Windows 7 Upgrade Advisor

a good preparation tool that checks your computer's hardware, attached devices, and installed programs for compatibility issues with Windows 7

encryption key.

a large, random number. The key is used to scramble the contents of the file. This encryption key is also encrypted with a personal file encryption certificate, which is stored in the Windows Certificate database. The file's encryption key is stored along with the file.

workgroup

a logical grouping of networked computers that can "see" each other on a network

Windows Live Mesh

a part of the Windows Live Essentials suite. Windows Live Mesh enables you to keep data synchronized between computers (and some devices such as mobile phones) as well as some program settings. Data is synced using the online service, and there are some limitations to the amount of storage space you get: You can sync up to 200 fold- ers, which can each grow as large as 50 GB in size and can contain up to 100,000 files. Like SkyDrive, Windows Live Mesh is a free service.

Computer Management

a popular snap-in that includes several tools such as Disk Management for configuring hard disks and their partitions and Event Viewer, which allows you to view computer event information such as program starting and stopping (including program crashes) and security problems.

backup

a properly secured copy of files and folders—and sometimes settings—usually saved in a compressed format

signature

a sequence of text or code that's programmed into a virus and uniquely identifies it

Windows Deployment Services

a server role for Windows Server 2008 or Windows Server 2008 R2. It allows a user to press the F12 key, log on, and select an image for installation. After that, the installation can be automated.

Administrative Tools

a set of utilities for managing advanced Windows features and diagnosing system problems

mapped drive

a shortcut to a shared folder or drive on another computer across a network.

firewall

a software program or device that monitors traffic entering and leaving a computer.

Universal serial bus (USB)

a standard developed in the mid-1990s that defines cable connectors and protocols used to connect external devices to a computer.

Virtualization

a technology that creates an abstract version of a complete operating environment

Control Panel

a utility that allows you to configure operating system features, set up hardware, install and uninstall software, create and modify users, and perform system maintenance.

System Information

a utility that displays details about your computer's hardware components, software, and drivers The left pane includes the following categories: • System Summary: This category displays general information about your computer. You can view the name of the operating system, the name of the computer (system), the type of processor, and much more. • Hardware Resources: This category displays details about your computer's hardware, such as whether any conflicts exist and the status of input/output (I/O) devices. • Components: This category displays information about hardware devices and their drivers, such as disk drives, network adapters, and computer ports. • Software Environment: This category displays details about system drivers, current print jobs and network connections, services, startup programs, and other system- related items.

Disk Defragmenter

a utility that helps improve your computer's performance by moving sectors of data on the hard disk, so that files are stored sequentially.

Application virtualization

adds the ability to install and manage legacy applications and virtual machines centrally.

Encrypting File System (EFS)

allow users to encrypt information on hard disks, external flash disks, CDs, DVDs, backup tapes, and other types of physical media. Files and folders are not encrypted in Windows 7 by default; however, users can enforce encryption on data files, folders, and entire drives. Encrypted (EFS) files and folders are displayed in green in Windows Explorer.

Remote Desktop Connection

allows you to access another computer on a network or over the Internet, and use the computer as if you were sitting in front of it.

Basic sharing

allows you to share a file or folder with a specific user and restrict the user to Read or Read/Write actions

32-bit computer

also designated as x86, can use up to 4 gigabytes (GB) of RAM

IEEE 1394,

also known as FireWire and i.link, has been around for many years and has undergone several revisions. One of the original reasons behind the creation of IEEE 1394 was to serve as an interface between the computer and a digital video camera so that video could be imported for editing. Today, IEEE 1394 is used for many different types of high- speed data transfers, including video, and serves the same purpose as USB

MSCONFIG,

also known as the System Configuration utility, lets you enable or disable startup services, set boot options such as booting into Safe Mode, access tools like Action Center and Event Viewer, and more

Recovery boot options

also referred to as advanced startup options, provide you with tools to help you repair a broken Windows 7 installation The following list explains each tool • Repair Your Computer: This tool is helpful when your computer will not boot due to corrupt or missing system files. In the event of missing or corrupt system files, this tool should begin working automatically. If you still suspect system files causing the problem, run this tool manually from the Advanced Boot Options menu. This option is not designed to repair hard drives or memory issues and it doesn't provide backups. Files used to repair your system files are stored on a Windows 7 Recovery partition. This partition is created by default and is a hidden partition, so you won't see it in Windows Explorer. However, if you open the disk management snap-in, you will see a partition with the label System Reserved and it will be 100 MB. Safe Mode: This tool starts Windows 7 in a limited state that loads only basic files and drivers. If you have recently installed an application and now your computer will not boot, you can start the machine in Safe Mode and then run the new application. If the application runs in Safe Mode, then it's likely that a .dll file or driver was installed by the application and it might be conflicting with OS drivers or .dll files. Tools that help you diagnose or resolve issues when in Safe Mode include System Recovery (to use a restore point), Control Panel, Device Manager, Event Viewer, System Information, and Registry Editor (to edit the registry). Safe Mode with Networking: This tool provides you with access to the standard Safe Mode options but also loads networking drivers so you can access resources on the network or the Internet. Avoid using this option if you are trying to repair the damage done by a virus because, in some cases, the infection can spread to network resources. Safe Mode with Command Prompt: Starts Windows Safe Mode, giving you everything from Safe Mode except the graphical interface so the only interface you will have is a command prompt. This is an advanced recovery mode, but it is useful for repairing systems on which the graphical user interface has corrupted. Enable Boot Logging: This tool boots Windows into a normal mode and creates a text file that lists all drivers loaded (or not loaded) during startup. The file will be named ntbtlog.txt and stored in the C:\Windows folder (or whichever drive you installed Windows on). The contents will look similar to Figure 8-32. • • Enable Low-resolution Video (640x480): This tool boots Windows normally but changes the resolution to 640x480 and lowers the refresh rate. If you suspect your video driver is misbehaving, choose this option to help lower the resolution and refresh rate to one that almost every driver out there can display properly. The drivers are tied to the actual monitor, so only install drivers for your specific type of video adapter. Last Known Good Configuration (Advanced): This tool boots from the last configuration that was known to work. When Windows shuts down successfully, system ettings are saved in the registry. If you cannot restart your computer, you can choose to load the last known good configuration, which will load the system settings from the registry for the last time the machine booted properly. If you added new drivers or made changes to the registry and the computer no longer boots, those changes won't be included when you use the Last Known Good Configuration (Advanced) option. • Directory Services Restore Mode: This tool is used only on domain controllers (DC), allowing administrators to repair Active Directory settings on a DC that is having issues. • Debugging Mode: This tool starts Windows in an advanced debugging mode. • Disable Automatic Restart on System Failure: If Windows encounters an error during the boot process, the automatic restart on system failure feature tells Windows to restart again. If your computer attempts to restart but cannot, and then it begins to restart again and again, this tool stops the loop behavior. • Disable Driver Signature Enforcement: This tool allows you to install drivers that are not signed properly. • Start Windows Normally: This tool simply starts Windows normally. Use this option if you have used a tool that returns you to the main Advanced Options Menu and you're ready to start Windows normally.

Restore points

an be used to roll back your system to an earlier point in time; they are created automatically on a weekly basis and any time you make a change to your computer

Windows XP Mode

an add-on that Microsoft makes available as an extension to Windows Virtual PC. When you install this virtual machine environment on a Windows 7 computer, users can run applications inside the VM that won't work on Windows 7

OneNote

an application that allows multiple users access to a shared set of notes all at the same time.

trigger

an event that causes a task to run

image

an exact replica of a computer system

External Serial Advanced Technology Attachment (eSATA)

an external interface for SATA technologies. eSATA is very fast, with read access times of 12.7 milliseconds (ms), read throughput of 93.5 MB/s, and a write throughput of 94 MB/s. In a nutshell, eSATA has a maximum speed of 300 MB/s for 3 Gb/s SATA connections, which is three times faster than either USB 2.0 or FireWire 400. eSATA cables can be up to 6.56 feet or 2 meters in length and are narrow.

system image

an image of an entire hard drive that includes all files needed to restore your operating system

Active Directory

an infrastructure (directory) that stores information and objects.

BitLocker Drive Encryption

another method of protecting data stored on a fixed drive in a Windows computer. BitLocker encrypts the entire drive, rather than individual files and folders. The complementary BitLocker To Go protects data on removable data drives, such as an external flash drive.

Share permissions

apply to users who connect to a shared folder over a network

NTFS permissions

apply to users who log on locally or from across a network

When it comes to Windows storage,there are different types of disks

basic and dynamic

Dynamic disks

can contain simple, spanned, striped, and mirrored volumes

Internet Small Computer System Interface (iSCSI)

connects enterprise network storage devices such as a storage area network (SAN). iSCSI is used to transfer data over local area networks (LANs), wide area net- works (WANs), and even the Internet.

Basic disks

contain only simple volumes

Windows 7 Ultimate

contains all of the same features as Windows 7 Home Premium and Windows 7 Professional, but also includes the applications BitLocker and AppLocker (which are advanced security features). Home Premium and Professional users may upgrade to Ultimate for a fee using Windows Anytime Upgrade

Windows 7 Home Premium

contains features aimed at the home market segment, such as Windows Aero, Windows Media Center, Remote Media Streaming, Internet TV, Backup and Restore, and multi-touch support. This edition provides adequate networking and security features to be useful in small office environments.

SmartScreen Filter

detects threats on Web sites, such as phishing attacks and malware downloads, and prevents them from running.

Task Scheduler

enables you to schedule and automate a variety of actions, such starting programs, displaying messages, and even sending e-mails.

cloud

generally refers to the Internet or to a server accessible over the Internet

admin tools

in the Search programs and files search box, and then select Administrative Tools from the resulting list

Windows 7 Starter

is available only as a pre-installed operating system on netbook-class PCs. This edition is designed to run well with relatively low memory and disk space. It does not include some Windows 7 features such as 64-bit system support, the Windows Aero theme, or Windows domain support for business users. Because it's essentially a stripped down version of Windows 7 Home Premium, Windows 7 Starter is built mainly for mobile users who only need to browse the Internet, check e-mail, and use a word processor or spreadsheet program.

Windows 7 Enterprise

is geared toward enterprise environments. This edition contains all of the same features as Windows 7 Ultimate, but unlike the Ultimate edition, it is not available to home users on an individual license basis. Enterprise is available only through special corporate licensing agreements. Companies must have a Software Assurance Agreement with Microsoft to purchase software licenses. As a result, it includes benefits that are unique to the Software Assurance program, such as allowing operation of diskless PCs (nodes) and running multiple virtual machines.

Windows 7 Professional

is targeted mainly toward small business users but appeals to power users as well. It includes all the features of Windows 7 Home Premium and adds the ability to join a Windows domain. Additional features include location-aware printing, acting as a Remote Desktop host (especially useful for tech support), Encrypting File System, and Windows XP Mode

FAT32

limited to a maximum size of 32 gigabytes (GB)

cross-site scripting attack

occurs when you visit a compromised Web site that runs a script that installs a keylogger program on your computer. The installation occurs without your knowledge. After that, the keylogger records your keystrokes, including when you enter user names and passwords into other sites. The information is usually sent to a third party, who may access your accounts. The cross-site scripting (XSS) filter prevents the keylogger script from running.

64-bit computer, often designated as x64, can handle much more RAM

often designated as x64, can handle much more RAM

Effective permissions

permissions granted to a user or group based on the permissions granted through group membership and any permissions inherited from the parent object

Encryption

protects the contents of files and folders from unauthorized access.

Microsoft Security Essentials

protects your computer from viruses and many other forms of malware

Action Center

provides a single interface in which you can view the status of security and maintenance features and it alerts you to problems you need to correct and usually provides a way to fix it

custom installation

replaces your current version of Windows with Windows 7 but overwrites your files, settings, and programs

upgrade installation

replaces your current version of Windows with Windows 7 while retaining your files, settings, and programs.

Lite Touch Installation (LTI)

requires some human intervention in the early phase of the installation, but is automated (or unattended) from that point on

Services

run in the background on a Windows system to help the operating system run other programs.

Microsoft Enterprise Desktop Virtualization

s the part of the Microsoft Desktop Optimization Pack (MDOP), which delivers legacy applications to Windows 7 users in the form of Windows-XP based virtual machines

Windows Easy Transfer

save your files and settings on an external hard drive, and then "transfer" them to the new installation of Windows 7.

upgrade path

set of options you have to upgrade from one Windows operating system to another

Domain highlighting

shows you the true Web address of any Web site you visit by highlighting the domain in the Address bar.

Windows Remote Assistance

similar to Remote Desktop Connection, but the purpose of Remote Assistance is to allow one person to connect to another user's computer to provide "hands-on" help

NTFS

supports larger disks (up to 256 terabytes [TB]!) than FAT32 or FAT, and NTFS-formatted files and folders provide better security. It's also more reliable, with built-in features for recovering from disk errors automatically.

Windows 7 Home Basic

supports the Windows Aero theme but does not include all Aero features. This edition is not available to North American users or those in other "developed technology markets" (such as Australia, Western and Central Europe, Hong Kong, or Saudi Arabia). Microsoft controls the geographical restrictions through the activation process (discussed later in this lesson). If you attempt to activate a computer running Home Basic in a country or region that's restricted from use, the activation process fails


Kaugnay na mga set ng pag-aaral

Organizational Behavior Exam 2: Chapters 4-8

View Set

Assignment: Exercise 4.1 (Practice)

View Set

Intro to Psychology Chapters 1-5

View Set