Microcomputer HW 5 CH13,14,16

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which character in a password is most helpful in defeating common word hacks? A) @ B) 3 C) X D) w

A) @

How is the Registry organized? A) As a tree structure B) As a flat structure C) As a relational structure D) As a peer structure

A) As a tree structure

Which file contains information about the various operating systems installed on the system? A) Boot Configuration Data (BCD) file B) Ntoskrnl.exe C) Task Manager D) Winload.exe

A) Boot Configuration Data (BCD) file

What is another name for a folder? A) Directory B) Program C) System D) Tree

A) Directory

_______________ ratings such as E, T, and M can be used to allow or block computer game use. A) ESRB B) ETM C) UAC D) TPM

A) ESRB

The part of a file name following the period (.) is called the _______________. A) Extension B) Designation C) Folder D) Command

A) Extension

Which Registry root key root key defines which option is being used currently, assuming that more than one is specified in HKEY_LOCAL_MACHINE? A) HKEY_CURRENT_CONFIG B) HKEY_USERS C) HKEY_CLASSES_ROOT D) HKEY_CURRENT_USER

A) HKEY_CURRENT_CONFIG

What are Registry files called? A) Hives B) Nodes C) DSNs D) Leafs

A) Hives

What is the primary tool Windows uses for providing authorization? A) NTFS B) Shared folders C) Local Security Policy D) Parental Controls

A) NTFS

Which key value data type is limited to exactly 64 bits? A) QWORD B) DWORD C) Binary D) String

A) QWORD

In Windows, the _______________ command displays or alters the encryption of directories on NTFS partitions. A) cipher B) color C) compact D) convert

A) cipher

A text-based user interface, in which users type in instructions at a prompt, is also known as a _______________ interface. A) command-line B) graphical user C) mouse-enabled D) Windows-based

A) command-line

What Windows command displays or alters the compression of files on NTFS partitions? A) compact B) cipher C) doskey D) xpntfs

A) compact

What is one major risk of editing the Registry? A) Malware infecting the computer B) Applications not starting up C) Applications being uninstalled D) E-mails being sent unintentionally

B) Applications not starting up

What process determines what a legitimate user can and cannot do on a system? A) Accessibility B) Authorization C) Permission propagation D) Inheritance

B) Authorization

Which key value data type is limited to exactly 32 bits? A) QWORD B) DWORD C) Binary D) String

B) DWORD

What feature allows you to import a new or backup subkey? A) Add B) Merge C) Create D) Redo

B) Merge

What is stored in the \%SystemRoot%\System32\config folder? A) Boot files B) The Registry C) Group policies D) System files

B) The Registry

What Windows Vista feature provides a dialog box when standard users and administrators perform certain tasks that could potentially harm the computer? A) Parental Controls B) User Account Control C) Primary Controls D) Mandatory Control

B) User Account Control

If your Vista computer is on a workgroup, what applet is used to manage user accounts? A) User Accounts B) User Accounts and Family Safety C) Users and Passwords D) Users and Groups

B) User Accounts and Family Safety

Windows uses a(n) _______________ to organize the contents in drives. A) folder system B) hierarchical directory tree C) stacked sequential structure D) linear table

B) hierarchical directory tree

Windows runs many processes simultaneously, a feature known as ______________. A) multiprocessing B) multitasking C) parallel processing D) serial processing

B) multitasking

Selecting _______________while adding a new user in Windows 7 makes that user a member of the local Users group. A) restricted user B) standard user C) new user D) default user

B) standard user

Which term refers to a unique combination of a user name and an associated password? A) user authorization B) user account C) user authentication D) user identity

B) user account

What process identifies and grants access to a user who is trying to access a system? A) Credibility B) Authorization C) Authentication D) Honesty

C) Authentication

Which file is the Windows Boot Manager? A) Ntldr B) Ntoskrnl.exe C) Bootmgr D) Bootload.exe

C) Bootmgr

Which Registry root key defines the standard class objects used by Windows? A) HKEY_CURRENT_CONFIG B) HKEY_USERS C) HKEY_CLASSES_ROOT D) HKEY_LOCAL_MACHINE

C) HKEY_CLASSES_ROOT

Authorization for Windows? files and folders is controlled by the _______________ file system, which assigns permissions to users and groups. A) command line B) encrypting C) NTFS D) administrative

C) NTFS

Which of these is not a valid Microsoft Office file extension? A) .docx B) .pptx C) Picture D) .doc

C) Picture

Which command is a full-featured command-line Registry editor? A) Regedt32 B) Regsrv32 C) Reg D) Regedit

C) Reg

Which command can modify the Registry by adding (or registering) dynamic link library (DLL) files as command components? A) Regedit B) Reg C) Regsvr32 D) Regedt32

C) Regsvr32

A named group of functions that defines what you can do with an object is called a ________________. A) hive B) counter C) class object D) performance object

C) class object

In older Windows versions, the filename was restricted to _______________ characters. A) two B) six C) eight D) ten

C) eight

A password _______________ policy forces users to select a new password periodically. A) permissions B) disabling C) expiration D) anti-hack

C) expiration

Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather than just a single user account. A) network B) directory C) group D) owner

C) group

The command-line interface tells a user that it?s ready to receive commands by displaying a specific set of characters called a(n) _______________. A) command B) key C) prompt D) signal

C) prompt

The go-to command to open up the Registry editor is ________________. A) taskmgr B) registryedit.exe C) regedit D) winload.exe

C) regedit

Which Windowscommand will power down a local or remote computer? A) restart B) poweroff C) shutdown D) reboot

C) shutdown

What character represents the root of a Linux file system? A) \ B) > C) & D) /

D) /

How many root keys are in the Registry? A) Seven B) Four C) Six D) Five

D) Five

Which Registry root key contains all the data for a system?s non-user-specific configurations? A) HKEY_CURRENT_CONFIG B) HKEY_USERS C) HKEY_CLASSES_ROOT D) HKEY_LOCAL_MACHINE

D) HKEY_LOCAL_MACHINE

On every Windows system, each record in an encrypted database of user names and passwords is called a(n) _______________. A) Group account B) Single account C) Specialized account D) Local user account

D) Local user account

What separates a filename and its extension? A) Colon B) Comma C) Hyphen D) Period

D) Period

A common way to access the command-line interface in Windows Vista/7 is through the _______________. A) Registry B) Library C) Terminal Box D) Start Menu

D) Start Menu

Which key value data type can be used for any form of data? A) QWORD B) DWORD C) Binary D) String

D) String

What is a common reason to edit this Registry key: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run? A) To change the Windows boot options B) To reset a password C) To change the Windows Product Key D) To delete autostarting programs

D) To delete autostarting programs

What is the Windows Vista tool for managing users and groups? A) Users and Passwords applet B) User accounts and Groups applet C) Users and Groups applet D) User Accounts applet

D) User Accounts applet

The file?s ____ indicates what type of program uses the data by looking at the _______________. A) partition; extension B) extension; location C) privileges; association D) association; extension

D) association; extension

What unique key is known only by the system and the person with whom the key is associated? A) token B) user name C) user ID D) password

D) password

System Restore in Windows uses _______________ to save information on restore points. A) an optical disk B) a special internal drive C) an external USB drive D) some of your hard drive

D) some of your hard drive


Ensembles d'études connexes

Lesson 2.2: Persuasive Strategies

View Set

Short Run and Long Run Decisions to Enter and Exit

View Set

Herbivores, Carnivores, Omnivores

View Set

Health and Life Insurance Test Questions for LA

View Set

AP Psychology Unit 4: Sensation and Perception Practice AP Questions and FRQs

View Set

Chapter 10 - Buying, Using, Disposing

View Set

Chapter 3: Policy Provisions, Options, and Other Features

View Set

C# Ch 1, C# Ch2, Chapter 3, Chapter 7, Chapter 8, Chapter 9

View Set