Chapter 05 Operating Systems

Ace your homework & exams now with Quizwiz!

How much RAM can theoretically be addressed by a 64-bit operating system? 4 GB maximum 16 GB maximum 32 GB maximum 64 GB maximum 128 GB or more

128 GB or more A 64-bit operating system can theoretically address more than 128 GB of RAM.

A user notices that a PC is running slowly and exhibits a delayed response to keyboard commands. What is a probable cause of this symptom? A recently installed device driver is incompatible with the boot controller. The video card does not support the resolution that is being used. A process is using most of the CPU resources. One or more program files have been deleted.

A process is using most of the CPU resources. A PC that shows signs of being slow and with delayed input responses is normally associated with a process or processes using up most of the CPU resources. An incompatible driver would result in an unresponsive device. A recently installed driver incompatible with a boot controller would probably cause the PC to display an "Inaccessible Boot Device" error after the POST.

Which command is used from the Windows command prompt to schedule a program to run at a specific time? AT CMD TASKLIST TASKKILL

AT The AT command is used to schedule commands, scripts, and programs to run at a specific date and time.

Which Windows 7 feature allows a user to view the contents of the desktop by moving the mouse to the right edge of the taskbar? Aero Peek Snap Shake Search jump lists thumbnail previews

Aero Peek The Aero theme in Windows 7 can be used to customize the desktop. However, in order to use it effectively, the following minimum hardware requirements have to be met: • 1 GHz 32-bit or 64-bit processor • 1 GB of RAM • 128 MB graphics card • DirectX 9 class graphics processor that supports a Windows Display Driver Model Driver, Pixel Shader 2.0 in hardware, and 32 bits per pixel

Which two Windows utilities can be used to help maintain hard disks on computers that have had long periods of normal use? (Choose two.) Disk Cleanup Disk Maintenance Disk Defragmenter Disk Partition Disk Format

Disk Defragmenter Disk Cleanup After long periods of use, the hard drive becomes fragmented (the files are not saved in consecutive clusters). This increases the time the computer takes to retrieve a file. Disk Cleanup deletes unnecessary temporary hard drive files. Including hard drive maintenance as part of a preventive maintenance plan is a good idea for all computers.

A Windows computer locks with a stop error during startup then automatically reboots. The rebooting is making it difficult to see any error messages. What can be done so that the error messages can be viewed? Use the Last Known Good Configuration option to restart the operating system. Use the Event Log and other diagnostic utilities to research the stop error messages. View the error messages and recover the system using the System Image Recovery tool. In Safe Mode use the Advanced Startup Options menu to disable the auto restart function.

In Safe Mode use the Advanced Startup Options menu to disable the auto restart function. The error messages are difficult to read so the best solution is to first try to disable the auto restart function. Then the error messages can be read and further action taken to resolve the rebooting problem.

After upgrading a computer to Windows 7, a user notices that the UAC (User Account Control) panel appears more frequently. How can the user reduce the frequency with which the UAC appears? Reinstall all user programs in Compatibility Mode. Replace the graphics card with one that meets the minimum hardware requirements for Windows 7. Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control panel. In the Performance Options dialog box of the Performance Information and Tools control panel, choose Adjust for Best Performance.

Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control panel. The UAC (User Account Control) setting allows for reducing or eliminating the number of prompts that are presented to the user.

What are two advantages of the NTFS file system compared with FAT32? (Choose two.) NTFS allows faster access to external peripherals such as a USB drive. NTFS supports larger files. NTFS provides more security features. NTFS allows faster formatting of drives. NTFS is easier to configure. NTFS allows the automatic detection of bad sectors.

NTFS supports larger files. NTFS provides more security features. The file system has no control over the speed of access or formatting of drives, and the ease of configuration is not file system-dependent.

Which Windows administrative tool displays the usage of a number of computer resources simultaneously and can help a technician decide if an upgrade is needed? Services Event Viewer Component Services Performance Monitor

Performance Monitor The Administrative Tools Services, Event Viewer and Component Services all display information about the operation of the computer, but only Performance Monitor displays the current workload of a number of system resources.

A Windows XP system is unable to boot properly. What is the procedure to use to boot this system into Safe Mode? From the command prompt run the shutdown -r -s command. Run the MSCONFIG utility and choose the option Selective Startup. Reboot the system and press Del or F2 depending on the system. Reboot the system, press and hold F8 until a menu is displayed, and then choose Safe Mode.

Reboot the system, press and hold F8 until a menu is displayed, and then choose Safe Mode. Safe Mode can be used to bypass failed drivers and other startup issues. To access Safe Mode, reboot the system and press the F8 key just before the operating system begins to load. Several advanced startup options will be displayed, including safe mode

A technician notices that a program that is listed in the registry of a Windows computer is not found on that computer. What is a possible solution to the problem? Run fdisk /mbr from the command prompt. Reinstall the application. Then, run the uninstall program. Restore the boot.ini file from the installation media. Restore the ntdetect.com file from the installation media.

Reinstall the application. Then, run the uninstall program. By installing the application again, the link in the registry should work. When you uninstall the application, the uninstall process should remove the registry entries.

A technician needs to upgrade the file system on a Windows XP computer from FAT32 to NTFS without losing user data. Which course of action should be taken to upgrade the file system to NTFS? Reformat all of the existing partitions and use the NTFS file system. Reinstall Windows XP and to format the drive choose NTFS when prompted . Run the CONVERT.EXE utility to convert the file system to NTFS. Use the Disk Management utility to convert the drive from Basic to Dynamic, which changes the file system to NTFS automatically.

Run the CONVERT.EXE utility to convert the file system to NTFS. Formatting a partition or hard drive will erase the data on the drive. Windows XP, Vista, and 7 have a utility called CONVERT.EXE that will convert a FAT32 partition into an NTFS partition without removing the data. To be safe, always back up the data before doing any conversion. The only way to revert back to the FAT32 file system is the reformat the partition or drive.

A user notices that some of the programs that are installed before upgrading to Windows 7 no longer function properly after the upgrade. What can the user do to fix this problem? Use the System Restore utility. Update the driver for the graphics card. Run the programs in Compatibility Mode. Lower the UAC setting in the Change User Account Control settings dialog box of the User Accounts control.

Run the programs in Compatibility Mode.

A technician has installed a new video driver on a Windows XP computer and now the monitor shows distorted images. The technician needs to install a different video driver that is available on a network server. What startup mode should the technician use to access the driver on the network? Safe Mode Safe Mode with Networking Debugging Mode Safe mode with Command Prompt

Safe Mode with Networking There are several different types of advanced startup options, including three options for starting in Safe Mode. Safe Mode starts Windows with a very limited set of drivers and bypasses many startup options. Safe Mode with Networking is similar to Safe Mode, but includes the drivers necessary for the system to connect to the network. Safe Mode with Command Prompt starts the system and launches a command line interface that can be used to enter commands manually.

A technician has loaded an incorrect video driver on a Windows 7 computer. How can the technician revert to a previous driver? Select Create a Restore Point from System Tools. Use regedit to remove the information about the graphics driver from the registry. Select the video adapter card Properties in Device Manager, select the Driver tab, and click Roll Back Driver. Use the Devices and Printers control panel to right-click on the monitor, and select Properties.Select Roll Back Driver.

Select the video adapter card Properties in Device Manager, select the Driver tab, and click Roll Back Driver. The video card driver is not the same driver as the monitor. You could also press F8 during Startup to access the Advanced Options menu in order to use the Last Known Good Configuration option.

What are two features of the active partition of a hard drive? (Choose two.) The active partition must be a primary partition. Up to four primary partitions can be marked as active. An active partition must be assigned C: as the drive letter. The operating system uses the active partition to boot the system. The active partition may include the manufacturer recovery partition.

The active partition must be a primary partition. The operating system uses the active partition to boot the system. Up to four partitions can be primary partitions, but only one of them can be marked as active. Even though the C: is normally the active partition, a computer could have another drive letter (partition) marked as active. The recovery partition is never used in normal operations as an active partition, but is used when no other means is possible to recover the operating system to the original configuration.

What would be the result of having a corrupt Master Boot Record? A new application will fail to install. The operating system will fail to start. The printer will function incorrectly. The keyboard will be unresponsive to the user.

The operating system will fail to start. The Master Boot Record (MBR) locates the operating system boot loader. If the MBR is missing or corrupt, then the operating system cannot start.

Which two statements are true about restore points? (Choose two.) A technician should always create them after updating the operating system. They are useful to restore the computer to an earlier time when the system worked properly. They back up personal data files. They contain information about the system and registry settings that are used by the Windows operating system. They recover personal files that have been corrupted or deleted.

They are useful to restore the computer to an earlier time when the system worked properly. They contain information about the system and registry settings that are used by the Windows operating system. Restore points contain information about the system and registry settings that can be used to restore a Windows system back to a previous configuration. Restore points should be created whenever software is installed or updated. Because restore points do not back up user data, a dedicated backup system should also be implemented to back up data.

To which category of hypervisor does the Microsoft Virtual PC belong? Type 1 Type 2 Type 3 Type 4

Type 2 The Microsoft Virtual PC is an example of a Type 2 hypervisor. Type 2 is hosted by an operating system.

A computer with the Windows 7 operating system fails to boot when the system is powered on. The technician suspects that the operating system has been attacked by a virus that rendered the system inoperable. What measure could be taken to restore system functionality? Use a differential backup to restore the system. Use an incremental backup to restore the system. Use a system image that was created prior to the failure to restore the system. Run chkdsk on the affected drive to restore system files to their post-installation state.

Use a system image that was created prior to the failure to restore the system. The best way to restore an operating system that has been corrupted by a virus is to use a prior system image to conduct the restore. CHKDSK is a Disk Error-Checking tool in Windows 7. It is useful in troubleshooting errors caused by corruption of the physical disk surface and can also be used to check the integrity of various files and folders within the operating system. In order to use differential and incremental backups to restore the system you would also require the last full backup as well.

What two terms can be used to describe the Windows Virtual PC? (Choose two.) server consolidation Virtual Machine Manager hypervisor system resource management operating system sharing

Virtual Machine Manager hypervisor The Virtual Machine Manager (VMM), which is also called a hypervisor, is used to create and manage virtual machines. Windows Virtual PC is an implementation of VMM.

A college uses virtualization technology to deploy information security courses. Some of the lab exercises involve studying the characteristics of computer viruses and worms. What is an advantage of conducting the lab exercises inside the virtualized environment as opposed to using actual PCs? The lab exercises are performed faster inside of the virtualized environment. The virtualization environment has better tools to develop mitigation solutions. Virus and worm attacks are more easily controlled in a virtualized environment, thus helping to protect the college network and its devices from attack. The viruses and worms will have limited functionality inside the virtualized environment.

Virus and worm attacks are more easily controlled in a virtualized environment, thus helping to protect the college network and its devices from attack. Virtualization can create a controlled environment that is isolated from external networks. Because of shared system resources, the performance inside a virtual environment will not be faster. However, the benefit is that a virtual environment provides a safe platform for information security analysis.

What are two functions of an operating system? (Choose two.) controlling hardware access managing applications text processing flow chart editing program compilation web browsing controlling the BIOS

controlling hardware access managing applications Controlling hardware access and managing applications are functions of an operating system. Text processing, flow chart editing, program compilation, and web browsing are functions of applications.

What is the term for the ability of a computer to run multiple applications at the same time? multiuser multitasking multimedia multiprocessing

multitasking


Related study sets

Elementary Physics 1310 Exam 3 Xiao

View Set

Chapter 3 (Part 1) | Mid-Term 1301

View Set

E! ATI RN Maternal Newborn Online Practice 2019 B with NGN

View Set

5.2-5.4 (amsco) apush quiz - Westward Expansion

View Set