TestOut Introduction to Computers (A+) Chapter 7.3-7.9 Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

You recently installed several applications on a Windows system. After doing so, you notice that the system takes much longer to boot up. You suspect that the new applications include one or more helper applications that are automatically loaded when the system boots. To improve performance, you want to identify any such helper applications and disable them. Click on the tab in Task Manager that you would use to do this. • [Processes] • [Performance] • [App History] • [Startup] • [Users] • [Details] • [Services]

Startup In this scenario, you would access the Startup tab and then disable any undesired startup applications. The Processes tab displays a list of running applications on the system. The Performance tab displays graphs for CPU, memory, disk, and network utilization. The App history tab displays performance statistics for apps from the Microsoft Store that are running on the system. The Users tab displays utilization statistics for each user logged into the system. The Details tab displays extended information about each process running on the system. The Services tab is used to view information about the services configured on the system.

Your job functions have recently changed. As a result, you find that you need to work with more programs running on your Windows computer at the same time. As a result, you're now starting to receive error messages warning you of low virtual memory, but there's no additional RAM that can be added to your computer. Which of the following Control Panel utilities would BEST allow you to eliminate or reduce the number of error messages? • Troubleshooting • Programs • Device Manager • System

System Starting at the Control Panel's System Settings, you can select Advanced System Settings and then navigate to Virtual Memory Performance Options. From there, you can change the way your computer handles virtual memory (page files). If needed, an initial and maximum size is an option. Since no additional RAM can be added to the computer, increasing these sizes should reduce or eliminate the low virtual memory error messages. Programs lets you view the programs installed and uninstall, change, or repair an application. These options will not increase the amount of virtual memory used. Although the Troubleshooting option can locate and fix many issues (such as fixing problems with Windows Update, running maintenance tasks, and more) it doesn't let you increase the virtual memory settings. Device Manager allows you to view and control the hardware attached to your computer. It doesn't let you increase the virtual memory settings.

Which of the following troubleshooting utilities scans the operating system files and replaces corrupt files? • System File Checker • System Image Recovery • Services • System Restore

System File Checker System File Checker scans the operating system files and replaces corrupt files when possible. System Restore is a utility that lets you revert the system back to a previously created restore point. The Services app lets you control the services that run on your operating system. System Image Recovery is a utility that installs a complete image of the Windows system, including the operating system, settings, personal files, hardware drivers, and software.

You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you use to configure the application to run automatically? • Task Manager msconfig msinfo32 • Task Scheduler • Services

Task Scheduler Task Scheduler is a tool that you can use to automatically start an application or run a script when certain events occur. Triggers identify conditions that start the task. Triggers include day and time, logon, and responses to other system events. Use the Services MMC to view and manage services on your computer. Use the msconfig utility to configure how the Windows operating system will boot. Use msinfo32 to view system information. Use Task Manager to configure startup applications. It cannot automatically run an application at a specific time.

Tyler has a computer with a Windows 32-bit operating system. He wants to install an application that requires a 64-bit operating system. Which of the following is likely to happen if he tries to install it anyway? • The program will install a 64-bit driver and will run normally. • The installation will fail. • Windows will use WOW64 to run the application, but the program will run slowly. • Windows will isolate the 64-bit binaries by redirecting registry calls to allow the program to run.

The installation will fail. A Windows 32-bit operating system will most likely fail to install a 64-bit application. Windows can use WOW64 to run a 32-bit program on a 64-bit operating system, but Windows does not use WOW64 to run a 64-bit program on a 32-bit operating system. A 32-bit operating system cannot simply install a 64-bit driver and run a 64-bit program. The installation will fail. Windows WOW64 subsystems can isolate 32-bit binaries from 64-bit binaries by redirecting Registry calls to allow 32-bit programs to run on 64-bit operating systems.

What happens in Windows when physical RAM is being used to its full capacity and a user runs a new application? • The kernel moves the data from an app not currently being accessed from RAM to a paging file. • Windows crashes. • The VMM divides the data from each app to different hard drives. • The CPU sends an error code to the user.

The kernel moves the data from an app not currently being accessed from RAM to a paging file. In Windows, when the physical RAM is being used to its full capacity and a user opens a new application, the kernel moves the data from an app not currently being accessed from RAM to a paging file to create room on the physical RAM. Windows should not crash in this scenario. Windows will simply create virtual RAM on the HHD through swapping. The CPU will not send an error code to the user if they open a new application and the physical RAM is being used to full capacity. The VMM does not divide the data from each app to different hard drives. You can manually configure paging files to be divided up between hard drives, by this is not done through the VMM.

Jesse, a professional graphic designer, has just installed a new application on his system, which needs a lot of memory for timely processing and high-quality images. Jesse's computer has an integrated graphics card. Which of the following is MOST likely to happen when Jesse runs the application on his computer? • The graphics card will generate a lot of heat. • The graphics card will produce high-quality images without delay. • The whole system will run slowly. • The battery life will diminish quickly when running the app.

The whole system will run slowly. An integrated graphics card shares memory with the system's RAM, so an application that needs a lot of memory will likely slow down the whole system by using up the RAM needed for other processes. A dedicated graphics card has its own RAM and will not impact the system memory. Integrated graphics cards have a much lower consumption use and will not diminish battery life. Using a dedicated graphics card has a much higher energy consumption rate. Integrated graphics cards generate very little heat compared to dedicated graphics cards. Dedicated graphics cards require fans or added water cooling blocks to manage the heat that they generate. These measures are not needed for integrated graphics cards. A dedicated graphics card can produce very high-quality images without delay. An application created for a professional graphics designer would like perform slowly and with lower-quality images on a computer with an integrated graphics card.

Which of the following is one way that developers and organizations who produce open-source software can generate revenue from the software? • One-time activation licenses • Enterprise licenses • Persistent activation licenses • Training contracts

Training contracts Open-source software must allow its source code to be freely available to anyone without licensing fees or agreements, but developers can offer training contracts to teach users how to use the software and generate revenue from the training contracts. Persistent and one-time activation license are for proprietary software. Enterprise licenses are also for proprietary software.

Your Windows OS starts to act strangely. You find out that there was a Windows automatic update three days ago. Which of the following would be BEST to try first to resolve the issue? • System Restore • System Image Recovery • Uninstall the update • Startup Repair

Uninstall the update Windows allows you to roll back to the time before a new update (within a short window of time). Simply uninstalling the update is the best choice. System Restore is a utility that allows you to revert the system back to a previously created restore point that does not change files like documents, photos, or email. System Restore is too extreme of a solution to try first. System Image Recovery is a utility that installs a complete image of the Windows system, including the settings, personal files, hardware drivers, and software from an external drive. System Image Recovery is too extreme of a solution to try first. Startup Repair is a utility that fixes damaged or missing system files, which can stop the boot process. Startup Repair is too extreme of a solution to try first.

Adding more RAM does not necessarily improve system performance. Which of the following must you also do to make sure that system performance does improve? • Reboot the system. • Rebuild the Windows profile. • Upgrade the CPU to one with multiple cores. • Uninstall the most current update.

Upgrade the CPU to one with multiple cores. Adding more RAM by itself may not increase the speed of a sluggish system because increased RAM requires more processing power. Upgrading the CPU when you add RAM can improve system performance. Rebuilding the Windows profile does not affect the added RAM's performance. Rebooting the system can help with leaky RAM, but this won't have a lasting impact on added RAM performance. Uninstalling the most current update is not related to added RAM's increased performance.

Your computer has a quad-core processor installed that supports multithreading. Given that the system is running Windows, how can you BEST use Task Manager to verify whether multithreading has been enabled? • Use Task Manager to show a single process running on multiple processors simultaneously. • Use Task Manager to display CPU utilization graphs for eight processors. • Use Task Manager to report CPU utilization values up to 800%. • Use Task Manager to show each application running with two processes.

Use Task Manager to display CPU utilization graphs for eight processors. For a processor that supports multithreading, Task Manager can be configured to display two CPU utilization graphs per core. Multithreading creates an additional virtual CPU for each core and allows the CPU to execute two threads at the same time. Because the system in this scenario has four cores, you can configure Task Manager to display eight utilization charts on the Performance tab. Many applications launch multiple processes that are associated with the same application. The number of processes for an application depends on how the application is designed, as well as the number of running instances of that application.

As a network administrator for several hundred machines, you have been given the task of listing all workstations and servers in your company network that have less than 16 GB of RAM. What is the BEST method for accurately collecting this data? • Remotely connect to each machine. • Check each machine's IT record. • Use a script to run a query of all machines. • Send out an email requesting the information.

Use a script to run a query of all machines. With a good script, you could run a query of all machines that have less than 16 GB of RAM, compile a list of the query results, and then return the list when it finishes. That way, instead of connecting to each machine remotely and checking manually, you can perform the task in much less time. Sending an email request or checking the IT records for each machine can take days or weeks, and this might not accurately represent the machines' current RAM states.

Which of the following is another name for the paging file? • Upper memory • Virtual memory • Random access memory • Extended memory

Virtual memory A paging (swap) file on a storage device is sometimes called virtual memory because it mimics real memory (though at a much slower speed). The process of moving data from RAM to disk (and back) is known as swapping or paging. The terms extended and upper memory refer to memory above the first megabyte of address space in PC systems with older processors. Random access memory (RAM) is used as a temporary data storage location and is called physical memory.

Which of the following is simulated memory that is created through a paging file on the hard drive? • Disk thrashing • Virtual memory • VMM • RAM

Virtual memory Virtual memory is simulated memory that is created through a paging file on the hard drive. Disk thrashing is when the amount of physical memory is so low that data must constantly be moved from physical RAM to disk and back again. RAM stands for random access memory, which is a system's physical memory. VMM is the Virtual Memory Manager, which is the utility in charge of swapping data between physical memory and the hard disk.

You need to use Task Manager to analyze memory utilization on a Windows system. For example, you need to see how much system RAM is currently in use and how much is available. Click on the tab in Task Manager that you would use to do this. • [Processes] • [Performance] • [App History] • [Startup] • [Users] • [Details] • [Services]

[Performance] In this scenario, you would access the Performance tab and then select the Memory graph. When you do, various memory utilization statistics are displayed. The Processes tab displays a list of running applications on the system. The App history tab displays performance statistics for apps from the Microsoft Store that are running on the system. The Startup tab displays a list of applications that are automatically launched at system boot. The Users tab displays utilization statistics for each user logged into the system. The Details tab displays extended information about each process running on the system. The Services tab is used to view information about the services configured on the system.

Which of the following commands can you use to install updated packages (found in configured repositories) that are currently installed on a Debian Package Manager-based system? (Select two.) yum update apt dist-upgrade apt-get dist-upgrade apt update yum upgrade

apt dist-upgrade apt-get dist-upgrade The correct answers are the apt dist-upgrade and apt-get dist-upgrade commands. Both perform a distribution upgrade of all packages available in the repositories. Both the yum update and yum upgrade commands apply to RPM-based systems. The apt update command refreshes repositories to look for new, updatable packages. However, the command itself does not upgrade them.

On a Linux system using the Debian Package Manager, which of the following commands would you use to search online repositories for an installable Firefox package? apt-get search firefox rpm -s firefox yum search firefox apt search firefox

apt search firefox Since you are working with a Debian Package Manager system, the correct answer is the apt search firefox command. The rpm command only searches against installed packages. The yum search firefox command would work for an RPM Linux system. The apt-get search firefox command is incorrect in this scenario.

You use a Linux distribution that employs Debian Package Manager (dpkg) for package management. Which command would you use to install httpd (the Apache HTTP Server package) and all its dependencies? apt-get install httpd -dep yum install httpd ps -e yum install httpd -dep dpkg install httpd apt-get install httpd ps -ef

apt-get install httpd On a Linux distribution that uses Debian Package Manager (dpkg) for package management, enter apt-get install httpd on the command line to install the Apache HTTP Server package and all its dependencies. The apt-get command can automatically locate and download Debian packages for you by searching one or more repositories on the internet. This command installs the package and all of its dependencies at the same time.

Which command would you use to display a simple list of all processes running on a Linux distribution that use either RPM or dpkg for package management? yum process info apt-get -ef yum -ef yum info apt-get -e ps -e yum -e ps -ef

ps -e The ps utility displays running processes on a Linux system. Enter ps -e to display a simple list (without extended information) of all processes running on the system. ps -ef displays a list (with extended information) of all the processes running on the system. yum and apt-get are package management tools. They are not used for process management.

While working on a Linux system that has been underperforming, you notice that there is one process that is utilizing a significant amount of CPU time. The name of the process is "hidden.sh". Which of the following ps commands would you use to ensure that you can see who owns that process? ps ax ps aux ps -ef ps -el

ps aux The correct answer is ps aux. The u option lists the user/owner field in the output. All of the other commands list the processes, but these commands do not include the user/owner.

During a routine audit of a web server running on an RPM-based Linux system, you notice a package that is not installed from the standard server template. This is an error. Before you do anything, however, you need to find the package's dependencies. The package's name is orleans. Which of the following commands lists dependencies? yum list orleans apt search orleans apt info orleans yum info orleans

yum info orleans The correct answer is the yum info orleans command. This is the only command listed that provides a list of dependencies for an RPM system. The apt commands are specific to Debian Package Management systems. The yum list orleans command only gives information on the orleans package. This command does not provide dependencies.

You use a Linux distribution that uses RPM for package management. Which command would you use to install httpd (the Apache HTTP Server package) and all its dependencies? yum update httpd apt-get install httpd yum install httpd yum install httpd -dep apt-get update httpd

yum install httpd On a Linux distribution that uses RPM for package management, enter yum install httpd on the command line to install the Apache HTTP Server package and all its dependencies. yum automatically locates and downloads RPM packages for you by searching one or more repositories on the internet. This command can install a software package and all of its dependencies at the same time.

You use a Linux distribution that uses RPM for package management. Which command would you use to display a list of all packages available for installation within the internet repositories configured on the system? ps -ef yum show all yum show available yum list available yum list all apt-get list available ps -e apt-get list

yum list available On a Linux distribution that uses RPM for package management, enter yum list available in the command line to display a list of all packages available for installation within the internet repositories configured on the system.

You use a Linux distribution that utilizes RPM for package management. Which command would you use to verify that the httpd package (the Apache HTTP Server package) is installed? yum list installed yum search httpd yum list installed httpd yum info httpd

yum list installed httpd On a Linux distribution that uses RPM for package management, enter yum list installed httpd in the command line to verify that the Apache HTTP Server package is installed.

On a Linux system using RPM for package management, which of the following commands would you use to search online repositories for an available Firefox package? apt search firefox rpm -s firefox apt-get search firefox yum search firefox

yum search firefox The correct answer in this scenario is yum search firefox. The rpm command only searches the local system for previously installed files; the -s option is not used for this purpose. The apt-get search firefox and apt search firefox commands are both utilized on Debian Package Management systems. The apt-get command does not have a search function.

Which of the following are common uses for scripting? (Select three.) • File management • Automated backups • Network drive remapping • Bookmark list management • System updates • Email mass mailings • Script creation

• Automated backups • Network drive remapping • System updates Common uses for scripting include: • Network drive remapping • Automated backups • System updates While automating email mass mailings, creating scripts, managing files, and managing bookmark lists could all be impacted by scripting, there are other methods and utilities available that are more efficient and commonly used for these tasks.

Which of the following is true of online software activation? (Select three.) • Since the license account information is stored online, it is usually not affected by operating system upgrades or migrations. • The software vendor does not track how many times each license code is activated, but uses persistent activation to annually audit the number of licenses being used. • Before running a newly installed application, the user must activate their license online on the software vendor's website. • Persistent activation may require the license to be continuously re-activated online at a preconfigured interval. • With personal software licenses, the limit is usually one to three online activations. • With enterprise licenses, the software vendor tracks how many times each license code is activated and automatically charges the enterprise for activations above the license limit.

• Before running a newly installed application, the user must activate their license online on the software vendor's website. • Persistent activation may require the license to be continuously re-activated online at a preconfigured interval. • With personal software licenses, the limit is usually one to three online activations. Online software activation process features include: • Requires users to activate their software online with the vendor before they can run a newly installed application. For personal software licenses, the limit is usually one to three activations. • Allows the software vendor to track how many times each license code is activated and to block further activations after the license limit has been met. • Can be done as a one-time activation. With one-time activation, the license is activated once, usually right after the product is installed. Once activated, the product remains activated. • Can require persistent activation. With persistent activation, the license is continuously re-activated online at a preconfigured interval. This allows the software vendor to deactivate installations if the conditions of the license agreement have been violated. • Can be affected by operating system upgrades or migrations, which can deactivate the software. Online activation technology does not keep track of the number of times the license code is activated, even when persistent activation is implemented.

You want to improve the performance of your virtual memory in Windows. Which of the following is a step you can take to do this? • Install a larger CPU. • Configure the paging file to be divided between two drives. • Reboot your system. • Configure the paging file to have an initial size of one half the physical RAM.

• Configure the paging file to be divided between two drives. By dividing the paging file between two drives, you can improve your virtual memory performance. Configuring the paging file to have an initial size of one half the physical RAM would not improve the performance. In fact, this would likely decrease the overall performance. Rebooting your system would not change your virtual memory performance. Installing a larger CPU would not affect your virtual memory performance. The CPU processes the program code.

You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run on Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application? (Select two.) • Create a virtual computer that runs Windows 7. Then run the virtual computer each time the application runs. • Run the application in its own memory space. • Purchase a new application that runs on Windows 10. • Run the application in Compatibility Mode. • Make all users who need to run the application members of the local Administrators group.

• Create a virtual computer that runs Windows 7. Then run the virtual computer each time the application runs. • Run the application in Compatibility Mode. Use Compatibility Mode in Windows to run older applications as if they were running under a different operating system version. Older applications are often written to require full system access, which is not allowed on newer versions of Windows because of UAC. Compatibility Mode creates a shim, or layer, that makes the application think it has access to the system that is typically denied in Windows 10. On Windows 10, you can also run a virtual machine of Windows 7 for applications that cannot run with Compatibility Mode or other solutions. Granting users administrative privileges gives them rights to the entire system, not just to the single application. On Windows 7 and later, most applications already run in a separate memory space. Purchasing a new application could be costly. You should explore other options before investing in new software.

Which of the following are characteristics specific to the Python programming language? (Select two.) • Focuses on code readability. • Executes multiple Windows commands in sequence. • Most popular method of scripting in the Linux world. • Used for website and web page design. • Popular with the scientific community.

• Focuses on code readability. • Popular with the scientific community. Python is a high-level, general-purpose programming language with a focus on code readability. Python is used extensively with large data sets and is very popular with the scientific community. In the Linux and Unix world, the most popular method of scripting is shell scripting. Although not technically a scripting language, batch files (.bat) can collect multiple Windows commands and execute them in sequence. JavaScript is used widely for website and web page design.

You are an IT technician for your company. Rachel, who works at the receptionist desk, thinks her Windows 10 machine is running slowly today and calls you to see if you can speed it up. None of the other employees have called regarding any related issues, so you suspect it is an issue with Rachel's computer, perhaps a malfunctioning application. To help troubleshoot Rachel's computer, you run Task Manager. Which of the following tabs would be the MOST helpful in determining any issues with how the computer is running? (Select two.) • Details • Processes • Performance • Users • Services • App history

• Processes • Performance The Processes and Performance tabs both show overall computer performance, including CPU, memory, disk, network, and GPU. App history only displays performance and statistics for Microsoft applications. Details only shows individual CPU utilization for each program running. Users show the same statistic as Processes and Performance, but they are divided out by each individual user instead of for the entire computer. Services only shows whether services are running or stopped. It does not display statistics.

You have just completed installing an application from the Microsoft Store on your Windows 11 workstation. Which of the following can you use to access or manage your newly-installed application? (Select two.) • Right-click Start, select Task Manager, and then select the application. • Right-click Start, select the application, and select Settings. • Right-click Start, select All apps, and then click the application. • Right-click Start, select Apps and Features, and then select the application. • Click Start and select the application tile.

• Right-click Start, select Apps and Features, and then select the application. • Click Start and select the application tile. There are two basic ways of accessing and managing an installed Microsoft Store application from your Windows 11 computer: Right-click Start and select Apps and Features. Click Start and select the application tile. All other listed answers do not lead to accessing or performing management tasks with your application.

Which aspects of virtual memory can you configure on a Windows workstation? (Select two.) • The paging file's location • The paging file's maximum size • The maximum time between memory swap operations • The paging file's recommended size • The minimum time between memory swap operations

• The paging file's location • The paging file's maximum size While the default behavior of Windows is to allow the operating system to manage virtual memory settings, the system administrator can control both the maximum size of the paging file's virtual memory and the disk volume that the paging file is stored on. There are no recommended sizes or maximum and minimum time settings for virtual memory.

Which of the following is true of the way many large digital media vendors use Digital Rights Management technology today? (Select two.) • They are moving to strengthen the encryption used to protect their digital files. • They are adopting alternatives to DRM, such as encouraging customers not to illegally share digital files. • They are cooperating with other vendors to make their digital files more portable in relation to those vendors' hardware and software. • They are offering free backup copies of protected digital files. • They are moving away from DRM because of several key shortcomings in the technology.

• They are adopting alternatives to DRM, such as encouraging customers not to illegally share digital files. • They are moving away from DRM because of several key shortcomings in the technology. Many large digital media vendors are moving away from DRM because it has several key shortcomings, including: • A lack of portability. For example, DRM-protected digital files from a given vendor only play using software or hardware from that same vendor. • A lack of backup support. DRM protection frequently made it such that protected digital files could not be backed up. • Weak encryption. Many applications are available on the internet that can strip DRM protection from digital files. • Risk of obsolescence. Some older digital files are no longer playable on newer hardware. To address these shortcomings, many vendors have adopted DRM alternatives, such as: • Encouraging customers not to illegally share digital files. • Making digital files so inexpensive and easy to access that it does not make sense to make illegal copies.

As with other programming languages, improper structure, syntax, or systems testing can cause scripts to negatively impact a machine. Which of the following are common problems that can be introduced into a system or network with a script? (Select two.) • Strange characters on a printed page • Beeps upon startup • Black (or Blue) Screen of Death • Unintentional introduction of malware • Accidentally changed system settings

• Unintentional introduction of malware • Accidentally changed system settings As with other programming languages, improper structure, syntax, or systems testing can cause scripts to negatively impact a machine. These problems include: • Unintentional introduction of malware to a system. • System settings accidentally changed by the script. • Browser, application, or system crashes caused by poor resource management in a script. A Black (or Blue) Screen of Death is associated with Windows systems and indicates a fatal system error. However, it is not normally caused by running a script. Strange or jumbled characters on a printed page is normally a sign of an outdated or corrupted printer driver. If you hear a series of beeps when starting your computer, these sounds are normally produced by the BIOS/UEFI and are codes for specific issues or states.

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light stays lit constantly when running multiple applications and switching between open windows, even though you aren't saving large files. What could you do to troubleshoot the problem? (Select two.) • Use Task Manager to monitor disk activity. • Use Reliability Monitor to monitor system reliability. • Use Reliability Monitor to monitor memory utilization. • Use Resource Monitor to monitor memory utilization. • Use Resource Monitor to monitor disk activity. • Use Task Manager to monitor memory utilization.

• Use Resource Monitor to monitor memory utilization. • Use Task Manager to monitor memory utilization. In this scenario, you should use either Task Manager or Resource Monitor to monitor memory utilization. Most likely, you will see that the physical RAM is being over-utilized. When physical memory is low, the computer must swap data from memory to hard disk (to the paging file) to make physical memory available for other applications. If you hear the hard drive constantly operating as you work, or if the hard drive light on the front of the system case stays illuminated for long periods of time, it means that the computer is constantly working moving data into and out of memory. The only long-term solution is to add more physical RAM. Monitoring disk activity with Resource Monitor or Task Manager doesn't reveal the true source of the problem in this scenario (which is a shortage of physical RAM). Reliability Monitor monitors system errors and is not the appropriate tool to use in this scenario.

Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser only paid to update 10 licenses. The software company issued a paper license and a single key for updating 10 users. Since this is an enterprise paper license, there is no mechanism that enforces a limit to the number of times the key can be used, so you decide to go ahead and update all 20 users. What are the possible consequences of this decision? (Select two.) • The software will eventually stop working properly for the 10 extra updates you installed. • Because you should be allowed one to three activations per user, this decision does not put you at risk for negative consequences. • You risk losing your job. • The software company will never detect the violation, so negative consequences are unlikely. • You expose your company to litigation by violating the software license agree

• You risk losing your job. • You expose your company to litigation by violating the software license agreement. Circumventing license agreements exposes your company to litigation and puts your job at risk. Even without a mechanism for tracking the number of users that are using the software, the enterprise agreement limits the number of licenses that you are legally entitled to use. Using more licenses than you are entitled to is an act of theft. Your best course of action is to pay for 10 more licenses. The software company is likely to learn of the violation. One way they can learn of violations like this is when your users have to register their copies of the software to receive support, patches, and bug fixes. Since there is no mechanism that enforces a limit to the number of times the key can be used, the software will probably continue to function. The one to three activations per user usually pertains to the personal software licensing model or is meant to be used when users have more than one computer on which they need to install the software. These activations are not meant to be shared with other users.

What is the most commonly used file extension for a shell script? • .bash • .zsh • .ksh • .sh

.sh The most commonly used file extension for a shell script is .sh. In terms of shell scripts, bash, ksh, and zsh all refer to forms of shell scripting (Bourne Again shell, Korn shell, and Z shell).

Which of the following BEST describes the Blue Screen of Death (BSoD)? • A time drift error. • A No operating system found error. • A Windows stop error. • A Not enough USB controller resources warning

A Windows stop error. The Blue Screen of Death (or Black Screen of Death in Windows 11) is a Windows stop error that displays when Windows cannot continue to function. The No operating system found error is not associated with the Blue Screen of Death. The Not enough USB controller resources warning is not associated with the Blue Screen of Death. Time drift does not generate an error page by itself.

Review the virtual memory configuration for the Windows 11 system shown below. Which configuration change could you make to the paging file to BEST increase system performance given that this Windows 11 system has 16 GB of system RAM and three hard disks installed? • Add paging files to the E: and F: volumes. • Remove the paging file from the C: volume. • Set the paging file's maximum size to 32 GB. • Set the paging file's initial size to 8 GB.

Add paging files to the E: and F: volumes. You can sometimes achieve a modest increase in system performance by adding paging files to other storage devices in your system. This offloads some of the paging file work to a disk other than to the system volume.

Which tool would you use to configure the paging file location and size on a Windows system? • Advanced System Settings in Control Panel • Clock, Language, and Region in Control Panel • Hardware and Sound in Control Panel • Administrative Tools in Control Panel

Advanced System Settings in Control Panel You manage virtual memory on a Windows system using Advanced System Settings in Control Panel. You can control the size and the location of the paging file. Use Hardware and Sound in Control Panel to manage hardware devices, such as printers. Use Administrative Tools to load the MMC consoles, such as Services or Computer Management. Configure regional and language preferences with Clock, Language, and Region in Control Panel.

Which of the following BEST describes a scripting language? • The process of organizing commands and structures into a script. • A text file with commands and structures. • An interpreted programming language used to write scripts. • A popular method of scripting based on the Bourne shell.

An interpreted programming language used to write scripts. Scripting languages are interpreted programming languages used to write scripts, generally in a human-readable format. Scripting is the process of organizing commands and structures into a script. Scripts are text files with commands and structures specific to a scripting language. Shell scripting (in the Linux and Unix world) is a popular method of scripting based on the Bourne shell.

Which of the following scripting languages includes multiple Windows commands that are run in sequence? • Shells • Python • JavaScript • Batch

Batch Although not technically a scripting language, batch files (.bat) include multiple Windows commands, which are executed in sequence. JavaScript is used widely for website and web page design, but is not based on Windows commands. In the Linux and Unix world, the most popular method of scripting is shell scripting. Shell scripts are not based on Windows commands. Python is a high-level, general-purpose programming language with a focus on code readability. Python is used extensively with large data sets and is very popular with the scientific community. However, this language is not based on Windows commands.

Which of the following forms of shell scripting is most commonly used? • Korn shell • Bourne Again shell • Bourne shell • Z shell

Bourne shell Although there are several languages that fall under the term "shell scripting", the most commonly used form of shell scripting is the Bourne shell. While Bourne Again shell (Bash), Korn shell (ksh), and Z shell (Zsh) each have their own syntax variations, all are directly related to the Bourne shell.

Which of the following is a troubleshooting step to try when troubleshooting application conflicts? • Rename files in Registry Editor. • Restart services. • Check for application driver updates. • Run System File Checker.

Check for application driver updates Checking for application driver updates is the best solution. Also, checking for updates to the application itself and Windows are good troubleshooting steps during application conflicts. Restarting services is a troubleshooting step for boot problems. Running System File Checker is a troubleshooting step best suited for boot problems, the inability to open a file, unexpected shutdowns, and slow performance. Renaming files in the Registry Editor is a troubleshooting step for a corrupted Windows user profile.

Match the definition to its corresponding Task Manager performance counter. (Each definition may be used once, more than once, or not at all.) The amount of memory that has been assigned to running processes. • Disk queue length • Processor utilization • Commit charge • Disk time • Memory pages per second

Commit charge The following are the system performance utilization statistics and their purpose: • Processor utilization is the amount (percentage) of time the processor spends doing non-idle tasks. • Disk time identifies the percentage of time that the disk subsystem is busy reading from and writing to disk. • The average disk queue length tells you the number of read and write requests that are typically waiting to be processed. • The commit charge identifies how much memory has been assigned to running processes. • The memory pages per second statistic identifies the number of hard faults that occur each second.

Match the definition to its corresponding Task Manager performance counter. (Each definition may be used once, more than once, or not at all.) The amount of time that the disk subsystem is busy reading from and writing to disk. • Disk queue length • Processor utilization • Commit charge • Disk time • Memory pages per second

Disk Time The following are the system performance utilization statistics and their purpose: • Processor utilization is the amount (percentage) of time the processor spends doing non-idle tasks. • Disk time identifies the percentage of time that the disk subsystem is busy reading from and writing to disk. • The average disk queue length tells you the number of read and write requests that are typically waiting to be processed. • The commit charge identifies how much memory has been assigned to running processes. • The memory pages per second statistic identifies the number of hard faults that occur each second.

Match the definition to its corresponding Task Manager performance counter. (Each definition may be used once, more than once, or not at all.) The number of read and write requests that are waiting to be processed. • Disk queue length • Processor utilization • Commit charge • Disk time • Memory pages per second

Disk queue length The following are the system performance utilization statistics and their purpose: • Processor utilization is the amount (percentage) of time the processor spends doing non-idle tasks. • Disk time identifies the percentage of time that the disk subsystem is busy reading from and writing to disk. • The average disk queue length tells you the number of read and write requests that are typically waiting to be processed. • The commit charge identifies how much memory has been assigned to running processes. • The memory pages per second statistic identifies the number of hard faults that occur each second.

Which type of contract are you typically required to accept when obtaining a proprietary software license? • GPL • EULA • DMCA • PRD

EULA (End User License Agreement) When obtaining a proprietary software license, you are typically required to agree to an End User License Agreement (EULA), which is a legal contract detailing the terms of use between a software application author or publisher and the end user of that application. GPL stands for the General Public License, which requires the source code of open-source software programs to be available to anyone for free. The PRD is the Product Requirements Document, which is basically a blueprint for designing a new software program that specifies exactly what the product will do. DMCA is the Digital Millennium Copyright Act, which is a copyright law that made it illegal to create or distribute technologies that can circumvent DRM programs or systems.

After upgrading to the newest version of Windows, an important application is no longer running. Which of the following is the BEST option for troubleshooting the problem? • Stop Windows Defender from checking apps. • Enable Hyper-V to run the program on the previous version. • In Control Panel, uncheck the box next to Block all incoming connections, including those in the list of allowed apps. • Install an antivirus program to prevent malware interference.

Enable Hyper-V to run the program on the previous version. If an application stops running after upgrading to a newer version of Windows, the issue most likely is a compatibility one. So enabling Hyper-V to create a virtual machine and then using the previous version of Windows to run the program would be the best option. Unchecking the box to Block all incoming connections, including those in the list of allowed apps is a firewall issue, not a compatibility issue. Doing so will not likely solve the problem. Installing an antivirus program will not solve a compatibility issue. Stopping Windows Defender from checking apps will not solve a compatibility issue.

Which of the following is a software license that allows 100 or more activations? • Public domain license • Personal license • Enterprise license • General Public License

Enterprise license An enterprise license (also known as a volume license or a corporate use license) is designed to allow a large volume of activations for a lower cost per activation than purchasing personal use licenses. Personal licenses typically only allow one to three activations per license. The General Public License protects open-source software program from proprietary actions, meaning that open-source software programs are required to allow anyone access to the source code and the program for free. A public domain license is also designed to keep open-source software source code freely available to anyone. This code can be modified without restriction. There are no activations needed, as it is freely available.

You have been troubleshooting services on your system. Where is the best place to check to make sure that they are now running properly? • System File Checker • Event Viewer • Advanced Options Menu • File Explorer

Event Viewer The best place to check to make sure that services are running properly is Event Viewer. If services are not working properly, you can find error codes in Event Viewer that you can use to further troubleshoot the problem. You cannot view a service's performance in System File Checker, the Advanced Options Menu, or File Explorer.

Where in Windows can you allow an application to use the computer's location? • In Control Panel under Security and Maintenance (Windows 10 and 11). • In Control Panel under Programs and Features (Windows 10 and 11). • In Settings under Update and Security (Windows 10) or Apps and features (Windows 11). • In Settings under Privacy (Windows 10) or Privacy and security (Windows 11).

In Settings under Privacy (Windows 10) or Privacy and security (Windows 11). You can allow an application to use the computer's location by changing the setting in Settings under Privacy (Windows 10) or under Privacy and security (Windows 11). You cannot allow an application to use the computer's location through any of the other listed options.

Which of the following is the No operating system found error likely caused by? • Incorrect boot order • Time drift • Outdated drivers • Outdated applications

Incorrect boot order Incorrect boot order usually causes the No operating system found error. Outdated applications are not typically the cause of the No operating system found error. Outdated drivers are not typically the cause of the No operating system found error. Time drift is not a cause of the No operating system found error.

You notice that your applications are loading and running slowly when you switch between them. You also notice that your hard disk drive light is constantly lit. Which of the following is the BEST option to stop this problem from happening frequently on your system? • Configure a larger paging file on the HHD. • Install more physical RAM. • Reboot the system at the first indication of the problem. • Install a larger CPU.

Install more physical RAM The hard disk driver staying lit constantly, applications loading slowly, and applications running slowly are symptoms of disk thrashing. The recommended fix for disk thrashing is to install more physical RAM. Rebooting the system will not fix a disk thrashing problem. Installing a larger CPU will not fix a disk thrashing problem. Configuring a larger paging file on the HHD will improve the performance of the virtual memory, but will not prevent disk thrashing. If you have inadequate physical RAM for what you are continuously using your system for, the kernel will constantly swap, which will cause disk thrashing. So installing more physical RAM would be the best choice.

Don is an accountant in the finance department. For the last several months, he has been testing an online accounting program. After speaking with his manager, Don receives permission to download a streamlined version of the software, which requires a local installation. Don downloads the application and tries to install it, but the operating system will not allow him to. Out of frustration, he calls the help desk. The help desk sends a technician to Don's machine while Don is out to lunch. The technician installs the application without issue. Which of the following is the MOST likely reason Don could not install the application? • Insufficient disk space • Incorrect service pack level • Insufficient system RAM • Insufficient permissions • Failed device driver

Insufficient permissions Most likely, Don could not install the application because his user account has insufficient permissions. The help desk technician's user account probably had sufficient permissions to install applications. Insufficient space would keep an application from installing if it required more space than was available. But in this case, the help desk personnel was able to install it without issue. Device drivers are only needed for devices that connect to the computer. Service packs generally contain security-related hotfixes and do not affect the ability to install legitimate applications.

Which scripting language is widely used for website and web page design and is also the most popular programming language in the world? • Visual Basic • JavaScript • Python • Batch

JavaScript JavaScript is widely used for website and web page design and is also the most popular programming language in the world. Although not technically a scripting language, batch files (.bat) can collect multiple Windows commands and execute them in turn. Python is a high-level, general-purpose programming language with a focus on code readability. Python is used extensively with large data sets and is very popular with the scientific community. Visual Basic (VBScript) is a Windows-specific language used by systems administrators and web developers. Although VBScript was very popular in previous versions of Windows, it has been mostly replaced by PowerShell.

Match the definition to its corresponding Task Manager performance counter. (Each definition may be used once, more than once, or not at all.) The number of hard faults that occur each second. • Disk queue length • Processor utilization • Commit charge • Disk time • Memory pages per second

Memory pages per second The following are the system performance utilization statistics and their purpose: • Processor utilization is the amount (percentage) of time the processor spends doing non-idle tasks. • Disk time identifies the percentage of time that the disk subsystem is busy reading from and writing to disk. • The average disk queue length tells you the number of read and write requests that are typically waiting to be processed. • The commit charge identifies how much memory has been assigned to running processes. • The memory pages per second statistic identifies the number of hard faults that occur each second.

You have been having trouble with your laptop crashing. You would like your computer to create a memory dump file when it crashes. Where should you place the paging file? • Split between two storage devices • On a drive other than where the operating system files are stored • On the system volume • On a USB flash device

On the system volume You must place the paging file on the system volume if you want Windows to be able to create a memory dump file when it crashes.

Which of the following is the generally accepted rule for manually setting the initial and maximum paging file size? • One and a half times the size of the physical RAM for the initial size and three times for the maximum size. • Two and a half times the size of the physical RAM for the initial size and four and a half times for the maximum size. • Three times the size of physical RAM for the initial size and five times for the maximum size. • Double the size of the physical RAM for the initial size and quadruple for the maximum size.

One and a half times the size of the physical RAM for the initial size and three times for the maximum size. While there can be exceptions to the rule, the commonly accepted rule of thumb for the paging file size is one and a half times the physical RAM for the initial size and three times the RAM for the maximum size. None of the other options are commonly accepted initial and maximum paging file sizes.

One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee, but often requires a fee for support, training, or added functionality. What is the name of this model? • Personal • Persistent • Open source • Enterprise • Proprietary

Open-source Open-source software used to be exclusive to Linux and Unix operating systems. However, many open-source applications are now available for Windows and Mac. Open-source licensing is very different from proprietary licensing in that: • Open-source software is usually freely distributed. You can typically download, install, and use the software without paying a license fee. • Some open-source projects release a base version of their software for free, but then charge a fee for highly desirable add-ons. • Some open-source projects release their software for free, but then charge a fee for technical support. • As with support contracts, some open-source projects also provide training for a fee. Personal, enterprise, and proprietary are all associated with the proprietary software model, which is always associated with a license fee. Persistent is associated with a type of activation used with the proprietary software model.

Which tool can you use to gather data and display statistics (in counters) that help you monitor the operation of a Windows system? • MSinfo • Performance Monitor • Computer Management • Event Viewer

Performance Monitor Performance Monitor gathers data and displays statistics (using counters) that help you monitor the operation of a Windows system. Statistics gathered include items such as memory and CPU use, disk throughput, and network utilization. You use Event Viewer to view log messages generated by applications, system events, and security incidents. Computer Management is an MMC console that is used to manage the Windows system, such scheduling tasks, sharing folders, and managing device drivers. You use MSinfo to view system information, such as hardware status.

A software vendor has had recurring problems with customers misusing their proprietary software. Which of the following technologies can give them the MOST control in regulating who, how, and when their software is being used? • One-time license activation • Persistent license activation • Digital watermarking • Digital fingerprinting

Persistent license activation With a persistent license activation, the license is continuously re-activated online at specified intervals. This allows the software vendor to deactivate installations if the conditions of the license agreement have been violated. Digital fingerprinting identifies unique properties of a file and compares them to a database of fingerprinted files to track access to materials. This can help in identifying copied materials, but would not give the most control to stop continued misuse. Digital watermarks embed traceable information into files. This can help identify copied materials, but would not give the most control to stop continued misuse. One-time license activation activates a program one time and stays active. This would provide the least control.

Which of the following is the Not enough USB controller resources warning most often a result of? • An overheated hard drive. • Plugging into a 2.0 USB port. • Plugging into a USB hub. • Plugging into a 3.0 USB port.

Plugging into a 3.0 USB port. The Not enough USB controller resources warning typically happens when plugging into a 3.0 USB port because it is limited to 16 endpoint pairs. The Not enough USB controller resources warning rarely happens with a 2.0 USB port because it has double the capacity of a 3.0 USB port. Plugging into a USB hub should not trigger the Not enough USB controller resources warning because of a hub's large capacity. The Not enough USB controller resources warning would not come from an overheated hard drive.

Which of the following scripting languages is gradually replacing Windows batch files? • JavaScript • Python • Visual Basic • PowerShell

PowerShell PowerShell started as a Windows-specific tool used to leverage Windows APIs to perform tasks. It has grown to include many common scripting functions. With the introduction of PowerShell, batch files have become less common, but they are still used. JavaScript is used widely for website and web page design. However, JavaScript is not gradually replacing Windows batch files. Visual Basic Script (VBScript) is a Windows-specific language used by systems administrators and web developers. Although VBScript was very popular in previous versions of Windows, it has been mostly replaced by PowerShell and is not gradually replacing batch files. Python is a high-level, general-purpose programming language with a focus on code readability. Python is used extensively with large data sets and is very popular with the scientific community. However, this language is not gradually replacing batch files.

Your financial investment company has recently completed development of a custom application for maintaining customer portfolios. You want to install this application on each Windows laptop that was assigned to each investment advisor. Which of the following Windows 11 settings do you need to configure to sideload this custom app? • Privacy & security > For developers > Develop Mode: On • Update & Security > For developers > Sideload apps > Yes • Right-click the application's tile > Sideload app > Yes • Right-click Start > Apps & Features > Developer Mode: On

Privacy & security > For developers > Develop Mode: On To sideload an app in Windows 11, from Windows Settings, select Privacy & security > For developers > Develop Mode: On. The Update & Security > For developers > Sideload apps > Yes settings are used in Windows 10. Right-clicking Start and selecting Apps & Features is how you manage an application (not install it). If you are right-clicking the application's tile, the application is already installed.

Match the definition to its corresponding Task Manager performance counter. (Each definition may be used once, more than once, or not at all.) The amount of time the processor spends performing non-idle tasks. • Disk queue length • Processor utilization • Commit charge • Disk time • Memory pages per second

Processor utilization The following are the system performance utilization statistics and their purpose: • Processor utilization is the amount (percentage) of time the processor spends doing non-idle tasks. • Disk time identifies the percentage of time that the disk subsystem is busy reading from and writing to disk. • The average disk queue length tells you the number of read and write requests that are typically waiting to be processed. • The commit charge identifies how much memory has been assigned to running processes. • The memory pages per second statistic identifies the number of hard faults that occur each second.

Your organization has 75 workstations that each need a software program installed. Which of the following is the BEST choice to accomplish this? • Purchase one personal license for the software program and then search online for additional activation codes provided by third parties or activation code generators. • Purchase 75 personal licenses for the software program and use each unique activation code for each workstation. • Purchase an enterprise license for the software program and reuse the activation code for each workstation. • Purchase a personal license for the software program and reuse the activation code for each workstation.

Purchase an enterprise license for the software program and reuse the activation code for each workstation. The best choice is to purchase an enterprise license for the software program that allows 75 installations. Generally, this will give you one activation code that can be used 75 times. This would be the most cost-effective, legal choice. Purchasing 75 personal license would almost always be much more expensive than buying the enterprise alternative. A personal license usually only allows one to three installations for the activation code. Purchasing one personal license for the software and then searching online for additional activation codes provided by third parties or activation code generators is illegal. Choosing this route could expose your organization to litigation and could cost you your job.

Cindy wants to install a new application on her computer. This application requires the operating system to have 1 gigabyte in working memory to function properly. Which of the following system requirements does Cindy need to check for compatibility? • SSD storage capacity • RAM capacity • CPU capacity • VRAM capacity

RAM capacity Cindy should check the amount of RAM (random access memory) available on her system to see if she has the available memory to run 1 gigabyte with a new application. RAM is data storage that is lost when the system shuts down. Storage locations in RAM can be accessed in any order and simultaneously, and this allows programs to run more quickly than if they were dependent on accessing data stored on the hard drive or SSD. The CPU capacity refers to the central processing unit, which retrieves instructions, decodes them, and performs the program calculations. SSD is the solid-state drive, which is a storage device that stores data in semiconductor cells and retains the data when the system is shut down. VRAM (video random access memory) is the memory used to store image data that is displayed on a computer.

You are a network engineer for a large financial institution. While monitoring a server on your WAN network, you notice that it is experiencing a bottleneck, slow cursor movements, and lagging application function. You want to determine if a particular process is causing the problem. Which of the following tools would BEST help you troubleshoot an issue with a process by providing information such as process ID, status, and threads, as well as how much CPU is being used in real time and the 60-second average of how much CPU utilization is being consumed by each process? • Reliability Monitor • Task Manager • Performance Monitor • Resource Monitor

Resource Monitor Resource Monitor shows each process with its ID, status, and threads, as well as how much CPU is being used in real time and the 60-second average of how much CPU utilization is being consumed by each process. Task Manager shows each process but only provides an overall percentage of CPU usage, memory usage, disk usage, and network usage. It also shows the performance of the CPU over time and how much the CPU is being utilized in real time. Performance Monitor collects data by choosing specific counters, which gives you an overall picture of how the system is functioning. Reliability Monitor checks your system for errors and problems and then rates the system based on a reliability scale.

Jodie's computer is acting unusually sluggish today. She calls you, an IT technician, to see if you can find out what's going on and how to improve her computer's performance. You run Task Manager on Jodie's computer and find that a suspicious application has nearly 90% CPU utilization. Which of the following actions can you take from Task Manager to immediately stop the application from running? • Right-click > Disable • Right-click > End task • Right-click > Disconnect • Right-click > Stop • Right-click > Switch to

Right-click > End task From the Processes page, you can right-click on the offending application and select End task. This stops the program from running immediately, and the computer's CPU should return to a more normal utilization. Right-click > Switch to from the App history tab opens a Microsoft application. Right-click > Disable from the Startup tab stops a program from running on the next boot. Right-click > Disconnect from the Users tab disconnects a user from a computer. Right-click > Stop from the Services page stops a service from running.

You are working on your Windows 10 computer during a fierce thunder storm. Lightning strikes the nearby transformer, and your office loses all power. Since your laptop's battery is dead, your computer instantly turns off. Once power to the building has been restored, you turn your computer on and notice that you are now getting a missing DLL error message. Which of the following tools is MOST likely to rectify this issue? • chkdsk • SFC • defrag • bootrec

SFC System File Checker (SFC) is integrated with Windows Resource Protection, which protects Registry keys and folders as well as critical system files. If any changes are detected to a protected system file, the modified file is restored from a cached copy located in the Windows folder itself. The chkdsk (check disk) command checks the hard drive for errors, such as read errors and other storage-related errors. If errors are found, chkdsk has the ability to try to fix these errors. The defrag command lets you defragment your hard disk, but this command does not fix missing DLL files. The bootrec command (or the bootrec.exe utility) is a tool provided by Microsoft in Windows Recovery Environment, or Windows RE. This command is typically used to troubleshoot boot issues and is capable of fixing such things as the mater boot record, the boot sector, and the Boot Configuration Data (BCD) store.

You are troubleshooting a computer that runs Windows 11. The operating system has halted, and a black screen is displayed on the monitor with an error message. What is the first step you should take to troubleshoot the issue? • Search for the error in Microsoft's knowledge base or by using an internet search engine. • Update the BIOS. • Remove all memory modules and replace them one at a time until the error reappears. • Uninstall the last application or system update that was installed. • Check the voltage levels on the DC side of the power supply.

Search for the error in Microsoft's knowledge base or by using an internet search engine. The first thing you should do when a Black Screen of Death appears is identify the error's source by searching for the error text message in Microsoft's knowledge base or across the internet in general with a search engine such as Google. This will help you identify what is causing the problem so that you can troubleshoot it. All the other options require significant effort and may or may not solve the issue. They should not be the first steps you take to resolve a Black Screen of Death.

Which of the following does the GPL prevent you from doing with an open-source software program? • Sell a contract for technical support • Modify its source code • Sell a license to use the program • Access its source code

Sell a license to use the program The GPL (General Public License) prevents you from selling a license to use the program, as the GPL allows free access to anyone. The GPL allows anyone to access the source code, to modify the source code, and even sell a contract for technical support.


Kaugnay na mga set ng pag-aaral

Human Anatomy & Physiology Chapter: 15 Digestive System

View Set

Chapter 16: Documenting, Reporting, Conferring, and Using Informatics

View Set

15.1 - Regulatory Transcription Factors

View Set

Barron's 1100 Words with a Few Extras

View Set