Microcomputer HW 5 CH13,14,16
Which character in a password is most helpful in defeating common word hacks? A) @ B) 3 C) X D) w
A) @
How is the Registry organized? A) As a tree structure B) As a flat structure C) As a relational structure D) As a peer structure
A) As a tree structure
Which file contains information about the various operating systems installed on the system? A) Boot Configuration Data (BCD) file B) Ntoskrnl.exe C) Task Manager D) Winload.exe
A) Boot Configuration Data (BCD) file
What is another name for a folder? A) Directory B) Program C) System D) Tree
A) Directory
_______________ ratings such as E, T, and M can be used to allow or block computer game use. A) ESRB B) ETM C) UAC D) TPM
A) ESRB
The part of a file name following the period (.) is called the _______________. A) Extension B) Designation C) Folder D) Command
A) Extension
Which Registry root key root key defines which option is being used currently, assuming that more than one is specified in HKEY_LOCAL_MACHINE? A) HKEY_CURRENT_CONFIG B) HKEY_USERS C) HKEY_CLASSES_ROOT D) HKEY_CURRENT_USER
A) HKEY_CURRENT_CONFIG
What are Registry files called? A) Hives B) Nodes C) DSNs D) Leafs
A) Hives
What is the primary tool Windows uses for providing authorization? A) NTFS B) Shared folders C) Local Security Policy D) Parental Controls
A) NTFS
Which key value data type is limited to exactly 64 bits? A) QWORD B) DWORD C) Binary D) String
A) QWORD
In Windows, the _______________ command displays or alters the encryption of directories on NTFS partitions. A) cipher B) color C) compact D) convert
A) cipher
A text-based user interface, in which users type in instructions at a prompt, is also known as a _______________ interface. A) command-line B) graphical user C) mouse-enabled D) Windows-based
A) command-line
What Windows command displays or alters the compression of files on NTFS partitions? A) compact B) cipher C) doskey D) xpntfs
A) compact
What is one major risk of editing the Registry? A) Malware infecting the computer B) Applications not starting up C) Applications being uninstalled D) E-mails being sent unintentionally
B) Applications not starting up
What process determines what a legitimate user can and cannot do on a system? A) Accessibility B) Authorization C) Permission propagation D) Inheritance
B) Authorization
Which key value data type is limited to exactly 32 bits? A) QWORD B) DWORD C) Binary D) String
B) DWORD
What feature allows you to import a new or backup subkey? A) Add B) Merge C) Create D) Redo
B) Merge
What is stored in the \%SystemRoot%\System32\config folder? A) Boot files B) The Registry C) Group policies D) System files
B) The Registry
What Windows Vista feature provides a dialog box when standard users and administrators perform certain tasks that could potentially harm the computer? A) Parental Controls B) User Account Control C) Primary Controls D) Mandatory Control
B) User Account Control
If your Vista computer is on a workgroup, what applet is used to manage user accounts? A) User Accounts B) User Accounts and Family Safety C) Users and Passwords D) Users and Groups
B) User Accounts and Family Safety
Windows uses a(n) _______________ to organize the contents in drives. A) folder system B) hierarchical directory tree C) stacked sequential structure D) linear table
B) hierarchical directory tree
Windows runs many processes simultaneously, a feature known as ______________. A) multiprocessing B) multitasking C) parallel processing D) serial processing
B) multitasking
Selecting _______________while adding a new user in Windows 7 makes that user a member of the local Users group. A) restricted user B) standard user C) new user D) default user
B) standard user
Which term refers to a unique combination of a user name and an associated password? A) user authorization B) user account C) user authentication D) user identity
B) user account
What process identifies and grants access to a user who is trying to access a system? A) Credibility B) Authorization C) Authentication D) Honesty
C) Authentication
Which file is the Windows Boot Manager? A) Ntldr B) Ntoskrnl.exe C) Bootmgr D) Bootload.exe
C) Bootmgr
Which Registry root key defines the standard class objects used by Windows? A) HKEY_CURRENT_CONFIG B) HKEY_USERS C) HKEY_CLASSES_ROOT D) HKEY_LOCAL_MACHINE
C) HKEY_CLASSES_ROOT
Authorization for Windows? files and folders is controlled by the _______________ file system, which assigns permissions to users and groups. A) command line B) encrypting C) NTFS D) administrative
C) NTFS
Which of these is not a valid Microsoft Office file extension? A) .docx B) .pptx C) Picture D) .doc
C) Picture
Which command is a full-featured command-line Registry editor? A) Regedt32 B) Regsrv32 C) Reg D) Regedit
C) Reg
Which command can modify the Registry by adding (or registering) dynamic link library (DLL) files as command components? A) Regedit B) Reg C) Regsvr32 D) Regedt32
C) Regsvr32
A named group of functions that defines what you can do with an object is called a ________________. A) hive B) counter C) class object D) performance object
C) class object
In older Windows versions, the filename was restricted to _______________ characters. A) two B) six C) eight D) ten
C) eight
A password _______________ policy forces users to select a new password periodically. A) permissions B) disabling C) expiration D) anti-hack
C) expiration
Windows administration allows a certain level of access for a file or folder to be assigned to a(n) ____________________ rather than just a single user account. A) network B) directory C) group D) owner
C) group
The command-line interface tells a user that it?s ready to receive commands by displaying a specific set of characters called a(n) _______________. A) command B) key C) prompt D) signal
C) prompt
The go-to command to open up the Registry editor is ________________. A) taskmgr B) registryedit.exe C) regedit D) winload.exe
C) regedit
Which Windowscommand will power down a local or remote computer? A) restart B) poweroff C) shutdown D) reboot
C) shutdown
What character represents the root of a Linux file system? A) \ B) > C) & D) /
D) /
How many root keys are in the Registry? A) Seven B) Four C) Six D) Five
D) Five
Which Registry root key contains all the data for a system?s non-user-specific configurations? A) HKEY_CURRENT_CONFIG B) HKEY_USERS C) HKEY_CLASSES_ROOT D) HKEY_LOCAL_MACHINE
D) HKEY_LOCAL_MACHINE
On every Windows system, each record in an encrypted database of user names and passwords is called a(n) _______________. A) Group account B) Single account C) Specialized account D) Local user account
D) Local user account
What separates a filename and its extension? A) Colon B) Comma C) Hyphen D) Period
D) Period
A common way to access the command-line interface in Windows Vista/7 is through the _______________. A) Registry B) Library C) Terminal Box D) Start Menu
D) Start Menu
Which key value data type can be used for any form of data? A) QWORD B) DWORD C) Binary D) String
D) String
What is a common reason to edit this Registry key: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run? A) To change the Windows boot options B) To reset a password C) To change the Windows Product Key D) To delete autostarting programs
D) To delete autostarting programs
What is the Windows Vista tool for managing users and groups? A) Users and Passwords applet B) User accounts and Groups applet C) Users and Groups applet D) User Accounts applet
D) User Accounts applet
The file?s ____ indicates what type of program uses the data by looking at the _______________. A) partition; extension B) extension; location C) privileges; association D) association; extension
D) association; extension
What unique key is known only by the system and the person with whom the key is associated? A) token B) user name C) user ID D) password
D) password
System Restore in Windows uses _______________ to save information on restore points. A) an optical disk B) a special internal drive C) an external USB drive D) some of your hard drive
D) some of your hard drive