Software
Windows 10 App
A Windows program that is installed and maintained through the Windows Store and uses the type of interface you would typically see on a touchscreen device.
Software Crash
A common issue in which software stops running properly, forcing you to exit and reopen the program.
System Slowness
A common issue where the software starts running more slowly than usual and every command the computer makes may be delayed by a few seconds or longer.
Operating System
A computer program that makes it so people, hardware, and software can interface with each other in a meaningful way.
Print Queue
A container that holds print jobs that are waiting to be sent to a printer that may be too busy to accept the print job.
Windows Registry
A database that stores settings for the operating system and other programs. These settings are stored as keys and values.
Print Server
A device or computer that connects client computers to printers. Client computers send print jobs to a print server that may hold them in a print queue before forwarding them to a printer.
Windows Update
A feature of the Windows operating system that keeps the system up to date.
Print Job
A file or set of files that have been submitted to a printer.
Malicious Software Infection
A kind of software that can harm a computer and compromise security.
Task Manager
A program used by Windows to provide information about how a computer is performing and which processes and services are running at any given time.
Application Management
A role of the operating system that manages applications or programs that are installed on a system. Applications are run, configured, and deleted through application management.
You recently purchased a new sound card and installed it in a free PCI slot in your computer. You plug in your old speakers, but you don't get any sound. You have checked all cable connections, and they are secure. You have also ensured that the speaker volume is appropriately adjusted and isn't muted. Which of the following BEST describes the next step you should perform?
Check the vendor's website for an updated driver.
System Crash
An issue in which software problems cause the system to crash completely, possibly forcing the entire system to restart. This can cause data loss.
Graphical User Interface
An operating system interface that allows a user to interact with the computer by displaying pictures, icons, and other images on a screen to represent files, folders, and system controls and by accepting input from a mouse or a touch screen.
Julie has 3 printers installed on her Windows 10 computer and wants to set one of them as the default printer. Where would she go to do this?
Settings > Devices > Printers & scanners
Match each collaboration tool on the left to its description on the right.
Software that keeps track of progress and assignments for large projects Resource management correct answer: Software that allows multiple users to work on a document at the same time Collaborative editing correct answer: Online forum where discussions consist of threads in response to an original post Discussion board correct answer: Software that keeps track of multiple people's schedules Calendaring correct answer: Broadcasting one user's screen to other users Screen sharing
What is the name of the menu in the bottom left corner of the Windows environment?
Start Menu
Which tab in Task Manager can be used to manage programs that load with Windows?
Startup
Disk cleaners, antivirus software, backup tools, and file compressors are which kind of system software?
Utility Software
Which of the following commands is used to navigate to different folders in Command Prompt?
cd
In most operating systems, what is a running application called?
Process
App Stores
Programs on tablets and phones are generally known as apps. The selection of apps available on any given device can be expanded by using an app store. These online stores provide all kinds of content including games, productivity tools, photo-editing software, and more. Apps are organized in categories and each one has an individualized icon that acts likes a book cover. You can also look for reviews of each app from other customers on the app store or elsewhere online. What Is an App Store? An app store is a platform that allows users to search for a variety of apps that can be delivered to many different devices. In most app stores, some apps can be downloaded for free while others much be purchased. One of the exciting things about app stores is that they're constantly updated. There's always more content for users to explore. The only limit is how quickly developers make new products. Most major content providers, like Apple and Google, have their own app stores that specialize in delivering content to their own devices. Apps that are made available are curated by the company who runs the store. This means that before an app is released, it must undergo a review process to make sure that it's compatible with the company's devices, is of high-enough quality, and doesn't include any malicious or inappropriate content. Most app stores also carry third-party content that can be delivered to non-compatible devices. App Distribution All a user needs to do to download an app is create an account that links their device to the app store. Once the content has been purchased, the app will be delivered to the device that he or she linked to that account. In most cases, once you've purchased an app, it's yours to keep, meaning you can delete the app from your device and then re-download it later without accruing any additional costs. This is useful because apps take up space on your device's storage. Another feature of app stores is that they provide updates as developers release them. These updates are often meant to fix bugs or remedy complaints that users have made about the app experience. Also, developers sometimes add additional content and features to incentivize people to keep using their product. Updating is done through the app store itself with most providing a separate section for content and a section where you can check which apps are currently available to update. These updates are almost always included in the original purchase price. Common App Stores Apple Store Apple Store is the primary content provider for Apple products like the iPad, iPhone, and MacBook computers. It links with a user's Apple ID to deliver and share content across all linked Apple devices. In addition to apps, it can also provide a variety of digital media through iTunes, including MP3s, videos, eBooks, and podcasts. Amazon.com Amazon.com not only provides physical retail products but also delivers a variety of apps to its specific devices. These include the Kindle line of products and other smart devices like Alexa. Some Amazon apps can be used on multiple platforms, like the Kindle Reader. Google Play Google Play (formerly Android Market) is the primary content provider for Android and Google devices. In 2012, it brought together several separate digital stores that included Google Play Books, Google Play Games, Google Play Movies & TV, and Google Play Music into a single store that offers all these apps together. It comes pre-installed on Android phones and in addition to apps it also provides access to a digital media store for music, books, movies, and more. Microsoft Store Microsoft Store (formerly Windows Store) provides apps to computers and devices running Windows or using Microsoft technology. This includes Windows tablets and phones but also Microsoft's gaming platform, the Xbox, with all its version. When Windows 10 arrived, Microsoft merged several different digital marketplaces into one store that included Windows Marketplace, Windows Phone Store, Xbox Music, Xbox Video, and Xbox Store. Media can be downloaded directly onto an Xbox system in the same manner as other Microsoft products.
Windows Printing Components
1. Computer The computer runs an application that sends print jobs to the printer. 2. Application The application creates print jobs and sends them to the printer. 3. Printer driver The printer driver is software running on the system that contains instructions to tell the computer how to communicate with the printer. 4. Connecting medium The printer can be connected to the computer in a number of ways, including a USB cable, a network cable, or a wireless connection. 5. Printer The printer creates the documents sent from the application.
How many years of prior experience in tech support do most MSP positions require?
2
3D Printing
3D Printing, sometimes known as additive manufacturing, is the process of creating a three-dimensional solid object from a digital file.
3D Printing
3D printing, or additive manufacturing, is the process of creating a three-dimensional solid object from a digital file. This is done by using an additive process, which is where successive layers of a material are laid down until the object is created. While being created, each layer appears as a thinly sliced horizontal cross section of the final object. 3D printing uses less material than traditional manufacturing, such as subtractive manufacturing, where sections are cut out of metal or plastic slates to create the desired object. 3D printing has paved the way for major advancements in many fields. Car manufacturers have begun using on-demand 3D printing to print parts and tools needed for cars. This has led to shortened design and production cycles. In October of 2018, GE Aviation hit a milestone when it made its 30,000th cobalt-chrome fuel nozzles for its LEAP aircraft engines using 3D printing. The technology changed their previous manufacturing process where twenty individual parts had to be welded together. GE now saves $3 million per aircraft by 3D printing the fuel nozzles which weigh 25% less and are five times stronger. When 3D printing is used for construction it's called contour crafting. Contour crafting is viewed as the future of construction because of the reduction in labor costs and raw materials. Contour crafting also allows for a quicker turnaround time between jobs. Since 2010, this method has been used to build bridges, sculptures, and homes in various countries around the world. Contour crafting can also be used for the construction of extraterrestrial structures where environmental conditions are not favorable, such as the moon. 3D printing is not a new concept when it comes to NASA. In 2014, astronauts on the International Space Station needed a new ratchet wrench. Engineers on Earth designed the wrench, then emailed the pattern to the space station, where it was printed using the onboard 3D printer. This is the first known instance of humans emailing a wrench to space. 3D printing has also revolutionized healthcare, bringing futuristic visions to life. Scientists have been experimenting with bioprinters, which are 3D printers that layer bio-ink with human cells to form three-dimensional tissues and organs. To create an ear, for example, the printer first creates a biodegradable, ear-shaped scaffold which is covered with the patient's skin and cartilage cells. The cells then grow to fill in the form. After about 6 months the form biodegrades, leaving only an ear composed of human cells. Since the patient's own cells are used, these organs don't run the risk of patient rejection. Bioprinters also allow scientists to create organs to test new drugs and therapies with no risks to humans. 3D printing can also be used to create implants and prosthetics by translating MRI, CT, and X-ray scans into STL files. Translating these scans into 3D print files have aided in creating prosthetic limbs as well as dental, spinal, and hip implants. Previously, surgeons had to modify the implants during the operation. 3D-printed implants now allow for an easily customized fit for each patient 3D printing will saturate almost every industry imaginable. It will give individuals the opportunity to create clothes that fit their personal style and allow for customization of medical tools and parts. It will create cheaper housing opportunities. All of these 3D-printed solutions allow for less time and effort to achieve a result. This technological revolution is already enabling people greater freedom and creativity in their own lives with less reliance on outside entities.
Technical Support Specialist
A specialist that serves as the main contact for a company's help desk or support organization, often performing tasks such as recording help desk tickets, simple troubleshooting, researching a knowledge base, and providing basic support. Technical support specialists serve as the main contact for a company's help desk or support organization. When it comes to fixing problems, these specialists are the first person an employee or client speaks with. While these can often be entry-level positions, technical support specialists who gain extensive knowledge of software applications and computer systems are extremely valuable to an organization. A level one support technician is responsible for basic tasks such as recording problem descriptions in help desk tickets, simple troubleshooting, researching a knowledge base, and then providing basic support such as resetting passwords and installing printers. When a problem can't be resolved at this level, the ticket is escalated to a higher level of support. These employees require more advanced knowledge and skills, including database administration, software installation, and complex troubleshooting. Issues can frequently be resolved through remote desktop connections, which allow users to give control of their system to a support specialist at another location. The best support specialists are gifted at teaching others, have an abundance of patience, and have acquired good listening and communication skills. If you have a passion for computer technology and you enjoy fixing things and helping others, consider earning an industry certification or an associate degree to qualify for a job as a technical support specialist.
Managed Service Provider (Technician)
A third party technical support organization employed by a company in order to cut costs and focus on business operations. A managed service provider technician works for a third-party company. Many businesses prefer outsourcing their support needs to MSPs because it allows them to cut costs and focus on their business operations without having to worry about IT administration and data security. Most MSP tech positions require at least two years of prior experience in technical support. Since these support technicians are the face of their company, they need to be knowledgeable with excellent customer service skills. MSP technicians often work with many different organizations with a variety of computer systems. This gives them more opportunities to expand their knowledge and skills. Good technical support specialists have an opportunity to be promoted as service managers or support directors.
Which of the following processes does 3D printing use?
Additive
Which of the following key combinations lets you open Task Manager?
CTRL, ALT, DELETE
Windows Print Management Tasks
Connect to a printer To connect a printer to a computer, do the following: If necessary, load the latest printer drivers on the computer so that it can communicate with the printer.You must use the correct driver for the make and model of the printer. Windows 10 includes a large number of preinstalled print drivers. If Windows does not have the driver for your printer, visit the print manufacturer's website, download the correct printer driver, and then install it. Plug the printer into a power outlet. Connect one end of the USB cable to the printer. Connect the other end to an open USB port on the computer. Power on the printer. For USB printers, Windows should automatically detect the printer and make it available for use. Open the Settings App and select Devices > Printers & scanners. Verify that the new printer has been added. Specify the default printer If you have more than one printer configured on your system, specify a default printer. The default printer is the one that print jobs will be automatically sent to unless you manually specify a different printer. To set the default printer, open the Settings App and navigate to Devices > Printers & scanners. Select the appropriate printer and select Set as default. Share a printer You can share a locally-connected printer on the network. Sharing allows other users to send print jobs to the printer through your computer. Your computer must remain powered on for network users to be able to send print jobs to the shared printer. To share a printer, complete the following steps: Open the Settings App and navigate to Devices > Printers & scanners. Scroll to the bottom of the screen and click Devices and printers. Right-click the printer you want to share and then click Printer properties. Click the Sharing tab. Select the Share this printer check box. In the Share name field, type a name for the printer. This is the printer name users will see on the network. Click OK. Connect to a shared printer To connect to a shared printer over the network, complete the following steps: Open the Settings App and select Devices > Printers & scanners. Click Add a printer or scanner. Select the printer you want to connect to and then click Add device.If the printer you want to connect to wasn't detected, you can click The printer that I want isn't listed. Then specify the path to the shared printer on the network by typing: \\ computer_name\ printer_name. If you want to make the shared printer your default printer, select the printer in the Printers list and then click Set as default. Manage print jobs in the print queue You may have to manage print jobs as they are queued up waiting for the printer. To do this, complete the following: In the notification area of the taskbar, click the printer icon.You can also double-click the printer in Devices and Printers in Control Panel.Each print job in the queue is shown on a separate line. The jobs are shown in the order they will be printed. You can do the following with the jobs in the queue:To temporarily pause all printing without removing any of the print jobs, click Printer > Pause Printing.To cancel printing all documents, click Printer > Cancel All Documents.To pause printing on a single print job, select the job and then click Document > Pause. When you're ready to print again, you can click Document > Resume.To cancel printing a single print job, select the job and then click Document > Cancel.To restart a single print job, select the job and then click Document > Restart. View Printer Status To view the printer's status: In Windows 10 version 1803 and newer: Open the Settings App and navigate to Devices > Printers & scanners. Select your printer. In Windows 7, 8, and version of 10 pre-1803: Open Control panel > Devices and Printers. Select your printer,
Which of the following is a benefit of 3D printing over traditional manufacturing?
Consumes less material
Which of the following applications can be used for storing, modifying, extracting, and searching data?
Database software
Which of the following terms describes the process of rearranging files on the hard drive so that the computer runs more efficiently?
Defragmentation
What should a level 1 technician do when they are unable to solve an issue?
Escalate to a higher level of support.
Which of the following keys is used to enter Safe Mode on a Windows computer?
F8
Designations at the end of file names such as .docx and .html are called
File extensions
Which of the following is the BEST way to handle a program that is unresponsive?
Force-close the program
OS Functions and Descriptions
Graphical user interfaces One of the main functions of an operating system is to provide an interface between the computer and the user. Most modern operating systems use a graphical user interface (GUI), where pictures, icons, and other images are used to represent files, folders, and system controls. The GUI makes it easy for humans to understand and use. People interact with these graphics using a mouse, touchscreen, or keyboard. Typically, GUIs are better for consumers. They're easier to learn and have safeguards against accidentally ruining the system by deleting or modifying important files .Command line interface Another way users interact with the operating system is using the command line interface. The command line is used primarily by IT and other tech professionals. The command line accepts input from the keyboard, instead of a mouse or touchscreen. The command line has a steeper learning curve, and it's possible to accidentally break the system if you don't know what you're doing. However, it also gives the user greater control over the file and operating systems. It is faster than using a GUI Interface between applications and hardware Operating systems provide an interface between the computer's hardware and application software. Hardware communicates in raw physical signals, like pulses of electricity or light. Software interprets ones and zeroes as digital information. The OS takes data from the hardware and passes it to the software in a way the software can understand. The operating system takes instructions from the software and passes it to the hardware be executed. Applications are computing software that are designed to perform a specific function such as word processing, web browsing, or media playing. When choosing application software, check the computer's CPU processing capability. Older computers use a 32-bit processing capacity. Newer computers typically have a 64-bit processing capacity. Some newer computers are designed to operate either 32-bit or 64-bit modes .If you have software designed for a 32-bit mode operating system and your computer's CPU runs only in 64-bit mode, the OS will not be able to run the software. Another thing to check when installing applications is the operating system the computer is using. The three most common ones are Microsoft Windows, MacOS, and Linux. Applications are designed to run on a specific operating system. An application calls functions from the OS that are needed to run the application. Disk Management It's important for storage hardware to be well organized. If information is scattered around a disk in a haphazard way, it takes a long time for the computer to get the information it needs and the system slows down. Operating systems have disk management software that helps keep storage devices well organized and maintained. File Management The file management interface for Microsoft Windows is called File Explorer. Within this interface, you can create, delete, open, or rename files and folders. The files can be stored on a local disk or on other devices connected through a network server. When you select This PC within File Explorer, you have access to files and folders stored on the local hard drive; any removable devices or drives; and any connected network drives. To configure setting, right-click This PC and select either Properties or Manage. Properties gives you access to configuration within the System properties. Manage accesses the Computer management console. When you select the Network option within File Explorer, you have access to any connected network servers. The Network container will show devices that are available to you within the network. These can be other computers, media devices, printers, or multifunction devices. Process/memory management Computers work by executing lists of instructions. Sometimes, computers need to run multiple lists of instructions, or processes, at the same time. The OS makes sure that each process is sent to the CPU in an orderly way. Sometimes, a process will malfunction. For example, there may be a memory leak caused by a poorly-written program not releasing space in RAM when it's done with it. If this happens, the operating system can kill the process so it doesn't clog up computer resources. If your computer is unable to process all the programs you would like to run at the same time, you can either: Add more memory by physically installing memory banks to your motherboard. Open Task Manager (or a memory monitoring program on non-Windows operating systems) and stop any programs from running that you don't need or want. This will allow the memory to be used for the programs you do want to run. Application management Operating systems manage applications installed on a system. The OS has tools to view, configure, and delete applications.Service managementThe OS also runs services, which are processes that run automatically in the background. Services do things like indexing files for better searches, verifying that software is up to date, and backing up files. Device management Another of the operating system's jobs is to know the hardware that is connected to the system, interpret instructions from the hardware, and send instructions to it. You may install a piece of hardware (such as a printer) that your operating system doesn't know how to talk to. To make the printer work, you need to install a driver. Drivers are like interpreters that help the hardware and the OS to speak the same language. Access control/protection An important operating system role is security. Operating systems require users to log in with credentials before accessing sensitive information on the computer. One of these most important principles in network security is the principle of least privilege. This means that a user is given access and permissions at the level that is required to do a job or tasks and nothing more. If the account is compromised, the hacker is limited to whatever that user's permissions and access are. Operating systems help you follow this privilege by providing two types of user accounts: administrative and standard. The account that is created when initially installing an OS is an administrative account by default and cannot be changed. This is to give the person installing the OS all the rights and privileges to set up the computer. Best practices specify that an administrator create a standard user account to use for day-to-day tasks. The administrator account should be used only for the tasks that require that level of privilege. This limits risk if the system is hacked. All other users should be given only standard user accounts. If someone does need an administrator account, be sure to provide a standard user account for use for anything non-administrative. In addition to limiting privileges, operating systems also use antivirus and anti-malware software to prevent malicious files from accessing the computer. The Windows Enterprise editions allow administrators to configure privilege levels and rights through groups in the Local Users and Groups tab in the Computer Management console. This saves administrators time by:Grouping users that need the same privileges and rights to do their jobs.Controlling access by assigning the rights and privileges to the group and then adding the appropriate users to each group.
Windows Settings App
In Windows 10, an application that organizes the settings and customizes how the computer looks and functions.
Software Troubleshooting Steps
In addition to hardware problems that can cause your computer to malfunction, there are a variety of software issues that cause your computer to behave in unexpected ways. By following some basic troubleshooting steps, you can narrow down possible problems and decide what to do next. With a little experience, you can resolve most software problems yourself. Common Software Problems The following are issues you may encounter with your computer's software: Software Crashes One of the most common software problems you may encounter is a program that runs very slowly or that constantly crashes, forcing you to open the program over and over. System Slowness Another issue is a computer that starts running more slowly than usual. Every command your computer makes may be delayed by a few seconds or longer, making it frustrating to do almost anything. System Crashes Sometimes software problems cause your system to crash completely and may force your entire system to restart, which can cause data loss. You may encounter the blue screen of death (BSOD) Malicious Software Infection Malicious software is a kind of software that can harm your computer and compromise your security. Examples include computer viruses, adware, and malware. Different types of malicious software do different things, but problems can include: erasing or corrupting data, causing system crashes, and stealing personal information from the computer. Troubleshooting Software Problems If your computer software is acting strangely, the following troubleshooting steps may be helpful in fixing the problem: Save your work and reboot your computer. Try to determine which software is having the problem. Does the problem happen with just one program or with all programs? If it is with one program, it's more likely a specific software problem. Free up computer memory (RAM) by closing other programs you're not using. If programs are not responding, force close the programs to help free up computing power. Close and reopen the software. Undo any recent hardware or software changes. Uninstall any recently installed programs or devices and see if that solves the problem. If it does, the problem may be caused by a conflict with one of these new programs or devices. Uninstall the software having trouble and reinstall it. Sometimes programs aren't installed properly or have had something essential go missing since they were first installed. Reinstalling can fix both of these problems. Look at the software manufacturer's website to see if they have any patches for your software. These patches are updates to the program that fix known bugs and make your software run more smoothly. Run a scan for viruses or malware on your computer. These kinds of malicious software can cause major problems to your system. There are many kinds of antivirus and anti-malware programs that automatically scan your computer and help you delete malicious intrusions. Some of these programs cost money and some are free. Defragment your hard drive. If you've tried everything else, you can try defragmenting your hard drive. This rearranges the files on your hard drive so that your computer runs more efficiently. Be aware that this is only available for spinning disk drives. This process can take a long time, so allocate a few hours to let the process run. If none of these steps have solved your problems, it may be time to look up the technical support available for that software. Make sure that you document everything you've already tried so that you don't have to duplicate your efforts with technical support. How to Force Close a Program To force close a program, you need to go through a different process depending on whether you're using a Windows computer or a Mac computer. On a Windows computer, press the control key, the alt key, and the delete key at the same time. This brings up a window called Task Manager. In this window, you'll see all the processes that are currently running, categorized by the amount of RAM they're using. If a process is frozen, you'll see the words "Not Responding" in parentheses next to the name of the process. Click on the process that you want to force quit to highlight it. Once it's highlighted, click the "End Process" button. This shuts down the process right away. To do this on an Apple computer, you need to press the Option, Command, and Escape keys at the same time. You can also choose the option "Force Quit" from the Apple menu. This opens up the Force Quit menu. This will list all the apps that are currently running. Highlight the app you want and press the "Force Quit" button. Verifying Your Fixes In order to verify that your troubleshooting steps have been effective, you can take the following steps: Reboot the computer and makes sure it boots up normally. Open the software that was experiencing the issue and attempt to use it normally. Try to replicate what you were doing when you were having the problem. Use the computer for an extended period to make sure it doesn't slow down over time.
Jessica has connected her new printer to her Windows 10 computer, but Windows is not recognizing it. What should she do?
Install the latest driver
Janice installed a printer on her computer and shared it with Steve. Steve configured the printer on his computer and was able to print a test page. Later on that day, Steve attempts to print but gets an error that the printer is not responding. Which of the following would be the MOST LIKELY reason for this?
Janice has turned off her computer
What type of file system is NTFS?
Journaling
Which of the following would be responsible for resetting a user's password?
Level 1 support technician
Sarah turned on her computer and noticed that some important documents that were stored in her User folder are now missing. Which of the following would be the MOST LIKELY cause?
Malware infection
What is the main difference between a regular technical support specialist and a managed service provider technician?
Managed service provider's services are outsourced as a third party.
Where is the BEST place to obtain the latest printer driver?
Manufacturer's website
NTFS Permissions
New Technology File System (NTFS) is a journaling file system initially developed by Microsoft in 1993 with the release of Windows NT 3.1. This system allows you to choose the users or groups that can access files and folders. It also controls what the user or group can do with the content. Since NTFS is a journaling file system, it provides a way for system changes to be written to a log before the changes are made. This allows the file system to revert to previous versions of permissions if needed. NTFS is the principal file system used with Microsoft's operating systems. Folder Permissions NTFS allows permissions such as Read, Write, and Execute to be set for specific folders and files. Folder and file permissions allow different actions to be performed on the content. They are set separately. When assigning permissions, always use the principle of least privilege. This principle states that a user should be given only the permissions needed to do the job and no more. Administrators can set folder permissions for user accounts or groups by choosing from the following standard NTFS folder permissions: Read Allows you to see files and subfolders within the folder. You can also view folder ownership, permissions, and attributes. Write Allows you to create new files and subfolders within the current folder; change folder attributes; and view details of folder ownership and permissions. List folder contents permissions Allow you to see the names of files and subfolders in the current folder. Read & Execute folder permissions Allow you to navigate through folders to reach other content, even if you don't have permissions for that content. You can also perform all actions permitted by the Read and List Folder Contents permissions. Modify Folder permissions Allow you to delete the folder and perform actions permitted by the Write and Read & Execute permissions. Full control Folder permissions Allow you to change permissions, take ownership, and delete subfolders and files as well as perform actions permitted by all other NTFS folder permissions. File Permissions NTFS permissions also control the access that users or groups have to files. Like folder permissions, these settings delegate how the user or group can interact with each file. The following are the standard NTFS file permissions that can be assigned by an administrator and the type of access that each permission allows. Read file permissions Allow you to read the file attributes, ownership, and permissions. Write file permissions Allow you to overwrite the file, change file attributes, and view file ownership and permissions. Read & Execute file permissions Allow you to run the application and perform actions permitted by the Read permission. Modify file permissions Allow you to modify and delete the file; and to perform actions permitted by Write and the Read & Execute permissions. Full Control file permissions Allow you to change permissions, take ownership of the file, and perform all actions permitted by all the other NTFS file permissions. Cumulative and Inherited Permissions In all cases, a user's permissions are the sum of the NTFS permissions that are assigned to the individual's user account and groups. For example, if you have Read permissions for a folder but have Write permissions for the same folder because of a group permission, you have both Read and Write permissions. Also, NTFS file permissions always take precedence over NTFS folder permissions. This means that you can access files you have permissions for by using the local path, even though the folder in which it resides may be invisible to you. A permission can also be overridden for a specific user or group by specifically denying the permission. This is not recommended as it overrides all instances where permissions are allowed. By default, all permissions assigned to a parent folder are inherited by its subfolders and files. Any new files and subfolders that are created in the folder receive this inheritance as well. File Attributes Besides permissions, which are security controls, files and folders have attributes which: Describe the files. Affect how the file and folders behave in a file system. Apply regardless of the security permissions assigned to the file or folder. Some attribute descriptors are its size; and when it was created, accessed, or changed. These attributes cannot be altered, but there are attributes that can be enabled as follows: Archive - Enable to display that the file has been altered since the previous backup. Hidden - Enable to make the file invisible when browsing folders. System - Enable to indicate a critical system file and keep the file hidden, unless specifically asked to be shown. Read-only: Enable to limit modification of the file unless it has explicit permission. There are extended attributes which include: Compressed - Enable to compress the file when stored. Encrypted - Enable to encrypt the file when stored. Not Content-Indexed - Enable to not include the file in the indexing operation.
Which of the following is used to force-close a program on an Apple computer?
Option, Command, Escape
Which component is responsible for reformatting print jobs so that the printer can understand and process them?
Print driver
Where would you go to cancel a print job?
Print queue
Windows stores print jobs in a temporary file on the hard drive. What is this file called?
Print queue
Which of the following is the first step in verifying that a problem has been fixed?
Rebooting the system
Martin's computer suddenly displayed a blue screen and then restarted. Which of the following BEST describes what happened?
System crash
Which Windows tool shows currently running programs and can be used to end a process?
Task Manager
Task Manager
Task Manager All Microsoft Windows systems include a Task Manager that helps provide information about how the computer is performing and the software (or tasks) that are running at any given time. You can find out a variety of interesting things from Windows Task Manager, such as how much computing power each task is using and the users who are logged onto a computer. You can also use Task Manager to deal with programs that aren't responding. Purpose and Uses of Task Manager Windows Task Manager is especially helpful in ending processes that you don't want to be running. A process is program that can be composed of multiple threads being executed simultaneously and is allocated a portion of the system's memory. Sometimes a program freezes or there may be too many programs running for the system to handle. Either can negatively affect your computer's performance. By closing programs, you can free up RAM so that other programs run more smoothly. When you open Task Manager, it defaults to a list of programs or tasks that are currently in operation. Applications that are minimized in the System tray, such as any active antivirus software, won't show up on this list. You can go to the Processes tab to see instances of specific programs that are running. Highlight a program and click End Process to stop the operation of that program. Carefully select processes to close. Some processes are vital to the functioning of your computer. Ending them can cause your system to malfunction or crash. The Services tab shows programs that are running in the background (such as antivirus software). These are programs that automatically start when the computer boots up. If a service has stopped, you can right-click it and select Start Service. Conversely, you can stop a service by right-clicking it and selecting Stop Service. Another feature of Task Manager is the ability to see the system's network and performance statistics. These can be found under the Performance tab. There you can locate a CPU usage meter that shows current and past information in relation to the amount of CPU capacity and usage. If too much of the CPU is being used, it might be a good idea to close some programs. You can go to the Networking tab to see similar stats on how the network is being utilized. The Users tab shows all users who have an active session on the system. You can force a user to log off by highlighting the user's name and clicking Logoff. If you want to preserve a user's session in memory so at a later time they can continue working from where they left off, select Disconnect. You can also use Task Manager to switch to a new program. To do this, highlight a program and select the Switch To button. You can also open programs from Task Manager by selecting New Task. You then have the option to type a new command or to click Browse to locate the command on the computer. This is the same as the Run command on the Start menu. Launching Task Manager There are several ways to access Windows Task Manager. The first is to press Control + Alt + Delete at the same time. This brings up a menu where you can access Task Manager. Keep in mind that if your computer is already running slowly, it may take a little while for this menu to appear. Another way is to type Task Manager into the Windows search bar and click the Task Manager icon when it appears. You can also right-click any empty area of the taskbar and select Task Manager from the pop-up that appears. Task Scheduler As you work with tasks and Task Manager, you may also find a need configure when specific tasks should run. Task Scheduler is a Windows service app that is triggered by events to automatically start an application or run a script. Some tasks that are commonly scheduled to run at regular intervals include backups, malware scans, and system updates. Triggers identify conditions that start the task. Triggers include day, time, login, and responses to other system events. You can configure the Task Scheduler to run a program, send an email, or show a message when the trigger occurs. Tasks are stored in folders in the Task Scheduler Library. To view or perform an operation on any individual task, select the task in the Task Scheduler Library and click a command in the Action menu. Using Task Scheduler, you can view the tasks that are scheduled to run and the current status of that task. You can end tasks if needed or edit them to function in a different way. Task Scheduler can be opened by typing "Task Scheduler" (or "taskschd.msc") in the taskbar's search box and selecting Run as administrator.
File permissions
The use of user and file attributes to control the actions a user can perform (read, write, delete, etc.) on each file. Also known as usage restrictions.
File format
The way in which the content of a file is organized. Often, a file type is indicated by the file extension such as .jpg, .gif, .png., .mp3, .wav, .wma, .mp4, .avi, and .wmv.
Which of the following would be a reason a company would outsource their IT support?
To cut costs
You need to test a version of macOS but only have a Windows computer. What technology could you use?
Virtualization
Virtualization
Virtualization is the process of running a virtual instance of a computer system on its own partition. It creates a software-based version of something such as an application, server, network, or storage. For example, this is often used to run multiple operating systems on a single computer at the same time, such as running a version of Windows and a version of macOS on the same system. Using virtualization can help reduce technology expenses and create smoother operating processes. Virtual Machines To understand what a virtual machine is, you have to consider the traditional alternative—the physical machine. Usually, a single computer physically occupies space on a desk and runs a single operating system. In contrast, a virtual machine is just a file (also known as an image) that acts like a computer but in reality only exists virtually. In this way, it's like having one computer inside of another. A single computer can run a variety of virtual machines to greatly enhance what it's typically able to do. These virtual machines give the user the same experience as if they were running the program on a dedicated computer. Hardware and Virtual Machines Virtual machines don't require any special hardware, but each machine you install does create a drain on your system's available resources. You're limited only by how much the host computer can handle. Multiple virtual machines can run on the same computer, but it's important to make sure you have enough resources on the host computer to support them. All the virtual machines on your computer will access the same physical hardware in order to run. Some things to consider when creating virtual machines are the amount of storage space on the computer, the amount of RAM available, the quality of the video card, and the quality of the processor. If you're running a server, multiple operating systems can run side by side and be controlled by a program called a hypervisor. If you're simply using a regular desktop computer, the additional operating systems will open up in a program window just like any other program. Common Uses for Virtual Machines Virtual machines have a variety of uses, including the following: Compatibility One common use for virtual machines is to run non-compatible software. For example, if you're using a Mac computer and you want to run a program that's only intended for Windows, you can run a virtual copy of Windows on your Mac and use the software through the virtual machine. You can also use a virtual machine to run old apps that won't run on a newer operating system. Backup and Preservation Creating a virtual machine can help you retain access to critical files even if a specific physical machine breaks down. In the event of a hard drive crash, you can simply move to another physical machine and access the virtual machine to retrieve the data. You can also use virtual machines to preserve what are known as legacy systems, which are outdated pieces of hardware or software that are no longer in use. People like to retain access to legacy systems because the data stored on them might still be useful. Testing If you want to test out how a new operating system or piece of software is going to run on a physical machine, you start by using a virtual machine. If everything appears to be in order, you can go ahead and install the software or operating system on your physical machine. This process is called using a "sandbox," which means you're testing something in a safe environment to see how it reacts before pushing it onto an actual environment.
Which of the following is a proper path name to a shared network printer?
\\computer_name\printer_name
NTFS
A journaling file system that allows you to choose the users or groups that can access files and folders.
App Store
A platform that allows users to search for a variety of apps that can be delivered to many different devices. Most apps in app stores can be downloaded for free while others must be purchased.
Access Control/Protection
A role of the operating system that requires users to log in with their credentials before accessing sensitive information on the computer. It also manages antivirus and antimalware software to prevent malicious files from accessing the computer.
Service Management
A role of the operating system that runs processes or programs automatically in the background. These programs are services that perform functions like indexing files for better searches, verifying that software is up to date, and backing up files.
Power-on Self Test (POST)
A test that ensures that all the system's hardware is in working order before loading the operating system. During this test, an error message may display on the screen notifying you of the faulty component.
Which operating system function has a steeper learning curve and can potentially break the system without careful use of its operations?
Command line interface (CLI)
Joe, a bookkeeper, works in a cubicle environment and is often called away from his desk. Joe doesn't want to sign out of his computer each time he leaves. Which of the following are the BEST solutions for securing Joe's workstation? (Select two).
Configure the screen lock to be applied after a short period of non-use. Configure the screen saver to require a password.
What is the name of the large background area of the Windows environment that holds icons for files, folders, and applications?
Desktop
While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops responding. Which Task Manager tab would you use to end Internet Explorer? (Select two.)
Details Processes
As a member of the help desk administration team, you've been assigned to update the driver for the network adapter that is installed on most of the machines in your department. You have a copy of the latest driver on a USB flash drive. Which Windows utility will allow you to manually update this new driver?
Device Manager
Enterprise Software
Databases A database is an electronic repository of information. With a database management system, businesses can store huge amounts of data about their employees, customers, product inventory, etc. Database administrators can create queries that pull specific information out of the database. Databases are one of the best ways for businesses to store, analyze, and interpret large amounts of data. Microsoft Access is a database management system that ships with Microsoft Office. More robust business database solutions include Oracle or Microsoft SQL Server. When integrating different systems with a business database, it can be helpful to store the data in an eXtensible Markup Language (XML) format. XML is: A computer language made to store and transport data in a format that can be read by humans and machines. XML defines rules for encoding documents similar to HTML. XML allows users to determine their own markup symbols to describe and store the content. Project management Resource management software allows businesses to manage projects through technology. Applications like Trello, Jira, and Workfront allow teams to divide big projects into smaller, manageable tasks.These tasks can be assigned to individuals within an organization along with due dates, detailed instructions, uploaded files, and other pertinent information to get the task done. This is a great way to facilitate communication and collaboration. Customer relationship management With customer relationship management (CRM) software, organizations can store and analyze relevant customer data. This includes tracking phone calls and other interactions; identifying and retaining top customers; responding to customer complaints; and making the sales process more efficient. Accounting A spreadsheet program such as Microsoft Excel can perform basic accounting functions. For a more complete accounting solution, a small business might purchase a tool like Intuit QuickBooks. Business accounting software makes it easier to process payroll, reconcile accounts, send invoices, and track expenses. These tools streamline financial management by automating time-consuming tasks. Desktop publishing To create high-quality reports, magazines, and books, businesses use desktop publishing software such as Adobe InDesign or Microsoft Publisher. While word processors can perform simple document layout functions, they can't handle more complex editorial projects. Desktop publishing software can be used to create printed documents as well as digital publications, such as e-books and interactive web content. Graphic Design Graphic designers use software such as Adobe Photoshop and Illustrator to create visually appealing content. These products allow designers to combine fonts, color, photos, and illustrations to communicate a message to customers. Computer-aided design Engineering and architecture firms make use of computer-aided design (CAD) tools, designed for 3D modeling and simulation. CAD software allows design engineers to test prototypes before they're manufactured.Computer-aided manufacturing (CAM) refers to the process of loading CAD drawings into a machine that automates the manufacturing process. Commercial Commercial software is a program that is either an off-the-shelf program or a customized program designed to help a company conduct business. It can include accounting, financial, and marketing software. The off-the-shelf options typically are accessed through licensing and not a one-time purchase. Any custom-made software that is design to solve a specific issue for a business is called line of business (LOB) software
Which of the following describes the firmware in gaming consoles, TVs, and smart cars?
Embedded OS
Standard NTFS Permissions on Windows
Full Control Users can view or change file attributes, create files, delete files, execute files, compress files, and write data to files. In addition, the Full Control permission lets users set NTFS security permissions for other users. By default, users who belong to the Administrators or System group have Full Control permissions on all files. Read and Execute Users can view file attributes and execute files, but they cannot create, delete, or modify files. Write Users can change file attributes, write data to files, view file permissions, and ownership, but they cannot add, delete, or execute files. Modify Users have all Read, Execute, and Write permissions, plus the ability to add or delete files. Read Users can view files and file attributes, but cannot execute or modify files.
Carrol purchased a new printer and attached it to her workstation with a USB cable. The printer is powered on, but the computer does not recognize the printer. Which of the following should Carrol do next to be able to send print jobs to the printer?
Install the latest printer driver
If you select a file on your desktop and delete it, what happens to the file?
It is moved to the Recycle bin.
Computer Settings in BIOS
Many basic functions are controlled through the BIOS, including how the computer is booted up and how the keyboard, mouse, and other input devices work. You can also use BIOS to configure other pieces of hardware such as the hard drive; CD and DVD drives; the CPU; and the computer's memory. Knowing how to adjust BIOS settings can help you solve common computer-related problems and give you greater control over your device. To access the BIOS, you typically need to restart your computer. You press a certain key as soon as the computer boots up. The key you need to press varies depending on the type of motherboard in the computer. You can look this up in advance, but usually the name of the key will flash briefly on the screen when you first boot up the system. Some commonly used keys are the F1, F2, and Del. Once you're in the BIOS settings, you can adjust the following. The CPU clock, although it's not likely you will have a reason to. You can overclock your computer to run faster than its official speed grade. However, this can make your computer unstable and cause it to needlessly use more power. The memory timings but they are usually automatically detected by modern computers. In other words, your computer is probably already using the optimal setting. The boot order refers to the order in which the computer looks for a device from which to launch an operating system (Windows, macOS, etc.) or an operating system installer. The first thing on the list is tried first, followed by the next, and so on. From within the BIOS settings (see below), you can adjust your computer to initially look at the hard drive, a disc drive, a USB device, or even a network. Typically, you will boot from the hard disk first. However, if you want to install an operating system from a DVD, you can set the BIOS to boot to the optical disk first, allowing the installation to take place. It is also possible to boot from the network adapter to perform a process known as a Preboot Execution Environment (PXE) boot. A PXE boot lets you obtain information and sometimes even operating system from the network instead the hard disk or an optical disk. The default for most systems is to boot from the optical disk first and if not present, to boot from the USB ports, and finally the hard drive. UEFI Unified Extensible Firmware Interface (UEFI) is a graphical boot tool that's utilized in many newer computers. It doesn't replace the BIOS on the computer, but it does the work of configuring the BIOS for the end user. UEFI offers several advantages over BIOS including faster booting, support for larger hard drives, and more security features (such as checking for malware at startup). It stores everything it needs to start the computer in a special type of file known and an EFI file. This streamlines the booting process and allows UEFI to boot a computer more efficiently. UEFI also offers an easier graphical user interface (GUI) that makes it simpler to navigate. BIOS and Complementary Metal Oxide Semiconductor (CMOS) CMOS is a computer chip that works closely with the BIOS program. Sometimes users think of BIOS and CMOS as being the same thing, but they are distinct. The BIOS is software; the CMOS is hardware. When BIOS starts the computer, it stores essential information (including the system date, time, hardware settings, and other computer configurations) in the CMOS . The CMOS is a small RAM chip attached to the computer's motherboard. While other RAM chips don't keep information stored when the power is disconnected, the CMOS is powered by a small battery that stays on so that it doesn't lose information. Clearing CMOS and Resetting BIOS Settings Sometimes if your computer is experiencing major problems, you may want to restore your BIOS settings to their factory defaults. This is done by resetting the CMOS. There are three different ways to accomplish this.
Which of the following commands makes an application shortcut appear on the taskbar?
Pin to taskbar
Firmware
Preinstalled, read-only software on a device that tells it how to work.
Productivity Software
Software that is used to perform common tasks in a business or home office such as word processing, spreadsheets, presentations, web browsing, and visual diagramming.
File
The smallest container within a computer's storage system that is used to store information such as data, settings, and commands used in a computer program. A file is the smallest container that can be copied, deleted, or moved within a file system.
A user was working on a spreadsheet when the application became unresponsive. After waiting several minutes, the application is still unresponsive. Which of the following is the BEST action for the user to take?
Use Task Manager to end task
System Software
Utility Software Utility software analyzes, configures, and optimizes the computer. Unlike application software, which benefits the end user directly, utility software is used to support and maintain the computer system. Some common types of utility software include: Backup software creates backup copies of data and restores them if the original data is lost or corrupted Compression software compresses and decompresses files, making storage more efficient Disk cleaners delete temporary or unnecessary information from disk drives Antivirus software prevents viruses and other malware from harming the computer system Device Drivers A device driver is software that helps an operating system communicate with hardware devices, such as printers, video cards, scanners, and cameras. Instead of an operating system, such as Windows, having instructions for every hardware device that can be attached, users install the driver for the specific hardware. The driver translates signals from the operating system into instructions the hardware can understand.In many cases, some device drivers can be installed by Windows using plug-and-play technology. This means that when you plug in a device, such as a USB disk, Windows automatically locates and installs the correct device driver for you.In other cases, the driver must be manually installed. In Windows, this is most often accomplished using the Device Manager. In Windows 10 (version 1803 and newer), Device Manager can be accessed by right-clicking Start and selecting Device Manager from the list shown.When you have to uninstall a driver, Device Manager is useful to verify that a driver was fully removed. In Windows 10 (version 1803 and newer), you can also manage device drivers by right-clicking Start and going to Settings > Devices.With Linux-based systems, you may find some GUI interfaces for installing device drivers, but many times you must download, compile, and install drivers manually. Firmware Firmware is read-only software preinstalled on a device that tells the device how to work. In many ways, it's like a low-level operating system. Firmware can be found in televisions, remote controls, game consoles, printers, cameras, music players, and even automobiles. Sometimes, manufacturers release firmware updates that fix bugs and add new features.
Mary needs to rename her report.txt file to final_report.txt. Which command will allow her to do this?
ren report.txt final_report.txt
Common File Extensions
.txt A text file that opens with Notepad by default. .pdf An Adobe Acrobat Reader file. .jpg, .bmp, or .png An image file that opens with the Photos app by default. .zip A compressed file that contains other files. A compressed file opens with File Explorer by default. .wav, .mp3, .wma, or .m4a An audio file that opens with Microsoft's Groove Music app by default. .doc or docx A Microsoft Word document. .xls or .xlsx A Microsoft Excel spreadsheet file. .ppt or .pptx A Microsoft PowerPoint presentation file. .accdb A Microsoft Access database file.
On a Linux system which directory contains applications and files used by users?
/usr
Shared Printer
A printer that is attached to one computer but allows printing access to multiple computers and devices connected to the same network.
Device Management
A role of the operating system that determines the hardware that is connected to the system, interprets instructions from the hardware, and sends instructions to it. Device management includes managing device drivers.
Disk Management
A role of the operating system that helps keep storage devices well organized and maintained.
Basic Input/Output System (BIOS)
A simple program that's written directly into the motherboard's hardware used to initiate hardware in the booting process.
Registry Editor
A utility of the Windows operating system which lets you view and change all the keys in the registry, giving users greater control over their computers.
Command line interface
An interface that allows a user to interact with the computer through input from the keyboard. The input is entered as commands. The command line is used primarily by IT and other tech professionals.
Command Line Interface
An operating system interface that allows a user to interact with the computer by displaying text on a screen and accepting input from the keyboard. The input is entered as commands. The command line is used primarily by IT and other tech professionals.
Which component gets things running until the operating system takes over?
BIOS
Drag the system component on the left to the device or program that fits with the system component.
Backup software Utility software correct answer: Printer Device drivers correct answer: Camera Firmware correct answer: Television Firmware correct answer: Games console Firmware correct answer: Antivirus software Utility software correct answer: Disk cleaner Utility software correct answer: Video card Device drivers
Which of the following are web browsers? (Select two.)
Google Chrome Mozilla Firefox
You are using a program that can run multiple operating systems and manage hardware and storage. What are you most likely using?
Hypervisor Type 1
Which of the following is NOT an example of an operating system?
Microsoft
Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used?
Modify
Collaboration Software
Message boards Message boards or discussion forums are online sites where people can hold discussions on various topics by posting messages. Topics can vary greatly from how to fix a computer to the latest news on your favorite TV show. Conversations happen in threads, where one person posts a message or question, then other users respond to it. Since discussions on these boards are done asynchronously, they're also a great way to brainstorm ideas without having to set up a meeting. Screen sharing Screen sharing allows a user's screen to be viewed by one or more people. This feature can be used by a support person to view the screen of a user who needs help. Or, several users can view a trainer's screen while a technique is demonstrated. Applications that allow screen sharing include: Skype Chrome Remote Desktop HipChat Conferencing software Webinars and other conferencing software allow you to connect with people through video, voice, and chat. Also known as web casts or web conferencing, webinars may be used for meetings, lectures, presentations, or training events that need to reach large audiences at remote locations. Email Although there has been a rise in various forms of digital communication, email remains the most popular. Short for electronic mail, email is much like sending a letter or note through the post, except that it's delivered electronically. Email software allows you to write a message, add the recipient's email address, and click send. In addition to its speed, email has other benefits over traditional mail such as the ability to attach files and send a single message to many recipients. There are two types of email systems: webmail and desktop clients. Webmail, such as Gmail and Yahoo! mail, are accessed through a web browser. Email clients, such as Microsoft Outlook, run as separate applications on a computer. Microsoft Outlook is an example of a personal information manager (PIM). It can help clients manage contacts, calendar items, and reminders, as well as email. Calendaring Online calendars are an excellent way to coordinate the schedules of each member on a team. Usually, everyone on the team has an individual calendar to mark when they are busy or available. It's an easy to see when everyone is available to have a meeting or when a team member should be left alone. Instant messaging (IM) Instant messaging is exactly what its names implies: a way to send messages that are instantly presented to the recipient. Most conversations on instant messaging happen in real time and can include two or more people. The communication is instant because both recipients are logged onto the same IM server using the same client software. Instant messaging is a popular form of social interaction, as well as a useful tool in the business world. Examples of instant messaging services are: WhatsApp Google Hangouts Facebook Messenger Slack Skype Instant messaging software can also include the ability to have voice calls or video calls. In case of voice calls, the audio sounds are sent as data packets over the network eliminating the need for standard telephone lines. This ability to make voice calls over the internet is called Voice over IP, or VoIP.Video communication through IM apps works in the same way. To have real-time conversations without latency issues (delays in delivery of sound or video), it is important to have reliable internet service with enough bandwidth for the application to function without delays. Text messaging Text messaging, sometimes called Short Messaging Service (SMS) or texting, is similar to instant messaging because communication is done through short messages. The main difference is that text messaging is handled through a phone service; instant messaging uses the internet. Generally, texting is done on cell phones. A similar service, Multimedia Message Service (MMS) allows pictures and videos to be sent in text messages. Online workspace & document sharing Cloud-based solutions provide an online workspace for people to collaborate more effectively. Online workspaces are a great way to share documents, spreadsheets, presentations, or other files. Online workspaces allow you to track revisions and provide feedback.Because documents are stored and accessed online, they can support collaborative editing, where multiple users work simultaneously on a document. Examples of cloud-based solutions services include: Microsoft Office 365 G-Suite by Google Video teleconferencing As technology has developed, it has become more and more common to have meetings, conferences, interviews, and one-on-one communications through video conferencing. There are three basic categories of video teleconferencing: room-based video conferencing, telepresence, and desktop videoconferencing. All of these include the interaction of at least two users through high-quality video and audio over an IP network.Room-based video conferencing is generally based on hardware that is placed and configured in a room designed for meetings. It requires compatibility with the video conferencing system on the other end of the connection. Telepresence is transmitting your presence to a remote location such as a boardroom. Telepresence generally involves several people from remote locations virtually attending a meeting using HD or 4K resolution technologies (even virtual reality headsets) to give the feeling of meeting together in person. Desktop video conferencing is video teleconferencing in which the software and hardware needed for the communication are in a desktop computer. This technology allows for last minute meetings and communications. Remote Desktop There are times when you would like to access a computer remotely, maybe you are working from home and need to access your desktop at the office, or maybe you need to help someone at another location with their IT issue. Remote Desktop is software that allows you to use a remote computer as if it were sitting in front of you. Remote desktop software also allows for screen sharing. It allows you to display your screen for others to view remotely without the ability for them to interact with it or control any part of it.
Collaboration Software
Software that facilitates the sharing, processing, and management of files, documents and other data between members of a team. This software includes message boards, screen sharing, conferencing software, email, calendaring, instant messaging, text messaging, and online workspace and document sharing.
In Windows PowerShell, which key can be used to autocomplete a command?
Tab
CMOS
The CMOS, an acronym for complementary metal-oxide-semiconductor, is a chip where the BIOS settings are stored.
Which of the following operating systems require a file extension to execute a program?
Windows
UEFI
UEFI, which stands for Unified Extensible Firmware Interface, is a graphical boot tool that is utilized to configure the BIOS for the end user, offering several advantages including faster booting, supporting larger hard drives, and providing more security features.
Windows Application
A traditional desktop application or program.
Virtual Machine
A file that acts like a computer but in reality only exists virtually as opposed to physically.
Default Windows Folders
C:\Windows Contains the Windows operating system files. C:\Program Files and C:\Program Files (x86) Contain the files for the applications installed on the system. C:\Users Contains the information associated with a Windows user account. This folder is referred to as the user's profile folder. Within the profile are several subfolders that are used to organize information such as: Contacts stores contact information. Desktop contains files and icons that display on the user's desktop. Downloads contains files downloaded from the internet. Favorites contains websites that you add to your Favorites in Internet Explorer. Links contains shortcuts to various places on the Windows system. Documents contains files you create with applications. Music contains music files. Pictures contains image files. Videos contains video files.
Windows File and Folder Management Tasks
Create a new folder To create a new folder: Right-click within the folder where you want the new folder to be created and click New > Folder. Type the new folder's name and press Enter. To further organize information, you can create subfolders within folders. Create a new file To create a new file: Right-click within the folder where you want the new file to be created and click New > file_type . Type the new file's name and press Enter. The file types that can be created using this method depend on the applications that have been installed on the system. For example, if Microsoft Office has been installed, then you can create the following file types: Contact Journal document Microsoft Word document Microsoft Access database Microsoft PowerPoint presentation Microsoft Publisher document Microsoft Excel worksheet Rich Text file Compressed (zipped) folder Copy a file between folders To copy a file from one folder to another: Right-click the file (or folder) to be copied and click Copy. Navigate to the destination folder. Right-click within the folder and click Paste. You can use this method to copy files from a folder on one storage device to a folder on another. For example, you can copy a file from your hard drive to an external flash storage device. Copying a file or folder creates a new copy in the destination location and the original is left intact. Move a file between folders To move a file (or folder) from one folder to another by using the Cut command: Right-click the file (or folder) to be moved and click Cut. Navigate to the destination folder. Right-click within the folder and click Paste. You can use this method to move files from a folder on one storage device to a folder on another. For example, you can move a file from your hard drive to an external flash storage device. Moving a file or folder deletes the original file and moves it to the destination location. Rename a file To assign a new name to a file (or folder): Right-click the file (or folder) to be renamed and click Rename. Type a new name and press Enter. Delete a file To remove a file or folder from the system: Right-click the file (or folder) to be deleted and click Delete. Click Yes when the delete confirmation dialog appears. A file or folder that is deleted within Windows isn't immediately removed from the storage device. Deleted files are moved to the Recycle Bin, where they can be restored if necessary.You have two options from within the Recycle Bin window. To restore the file, right-click it and click Restore. To permanently delete the file, right-click it and click Delete. If you delete a file from the Recycle Bin, you cannot get it back again.
Which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?
Device drivers
Which kind of system software is preinstalled on electronic products like blenders, automobiles, and televisions?
Firmware
CMOS and BIOS Settings
First method To reset the CMOS and return everything to factory defaults: Boot your computer. While the computer is booting, do step 2. Press the indicated key to enter the BIOS settings page. Choose BIOS Setup Utility. Navigate to Reset BIOS Settings (wording may vary by manufacturer). It's usually found near the bottom of the options. Save the settings. Restart the computer. Second method To reset the BIOS by resetting the CMOS battery: Unplug the computer. If using a laptop, remove the main battery. Open the computer case. If you're using a laptop find the CMOS battery panel and open it. Remove the CMOS battery. Let the CMOS battery sit out for a few minutes. Return the CMOS battery to its original place. Replace any main batteries if the computer is a laptop. Plug in the computer. Verify the settings are reset. Third Method If you're trying to reset a desktop computer, you may be able to use the CLEAR CMOS jumper if the motherboard one. Follow theses steps: Unplug the computer Open the computer case. The jumper is located on the motherboard and should have a label that says CLEAR CMOS or something similar. The jumper may be on a two-pin or three-pin setup. If it's on a two-pin setup, remove the jumper completely. If it's on a three-pin setup, move the jumper over from the two pins it's on and onto the other pins. The center pin will remain the same. Close the case and plug in your computer. Reboot to see if the settings have been reset. If you've been successful, repeat the process and return the jumper to its original position. If you don't, the CMOS will be cleared every time you boot the computer.
Common Windows Application Tasks
In Windows 10, you can install and run either desktop applications or apps from the Windows Store. Be aware that: The terms app and application are generally used synonymously. The main difference is that Windows 10 apps are installed and maintained through the Windows Store. Applications can be downloaded from other locations and installed on the system. Apps generally look different from traditional desktop applications. Apps use the type of interface you would typically see on a touchscreen device. Whether a desktop application from an internet site or an app from the Windows Store, the product must be in a digital form and distributed as binary data. This is known as a digital product. Digital products are a convenient way to obtain desktop applications or apps. When downloading digital products from the internet, you must use extra safeguards to ensure the digital product is legitimate and doesn't include malware. Before you install a software application, read and follow the documentation that comes with the application. The documentation may specify the following: Minimum hardware and software requirements for the application. Best practices or settings that you can use to maximize the application's performance. Hardware and operating system compatibility. Any known issues the application may have. It's important to ensure you have a valid license to install and use the application. When using a desktop application or app, the data generated by that program is typically stored in the user's folder (where the user has more rights and permissions), not the application's folder. This helps protect the files in the application folder from accidently being deleted or modified. Run applications To run a desktop application: Click Start. Click the application's icon in the Start menu. To view all of the applications that are available on the system, click All apps. Search for applications You can search for an application from the Start menu by typing all or part of its name in the Search box. A list of matching results will be displayed in the Start menu. Pin applications to the Start menu You can manually add an application to the Start menu using a process called pinning. To do this, complete the following: On the Start menu, click All apps. Locate the application to be pinned to the Start menu. Right-click the application and then click Pin to Start. The application is pinned to the Start menu. Because it is pinned, it will always be there, regardless of how frequently it is accessed. You can unpin items from the Start menu by right-clicking the item and clicking Unpin from Start. Pin applications to the taskbar You can pin an application to the taskbar as well as the Start menu. To do this, complete the following: On the Start menu, go to All apps. Locate the application to be pinned to the taskbar. Right click the application's icon. Select More Click Pin to taskbar. The application is pinned to the taskbar. You can unpin an item from the taskbar by right-clicking the item and selecting Unpin from taskbar. Add application shortcuts to the Desktop You can add icon shortcuts to the desktop. Icon shortcuts let you launch an application. To add an application icon to the Desktop, complete the following tasks: Locate the appropriate icon in the Start Menu. Click and drag the application's icon to the desktop. Double click the shortcut icon to launch the application. Exiting running applications There are several ways to exit a running program: In the application's menu bar, click File > Exit. In the top right corner of the application window, click the Close button. Right-click the running application icon on the taskbar and click Close window. With the application window selected, press Alt + F4.
Linux File Management
Linux based systems also have a file system. However, there are several differences from the Windows file system. Linux refers to its folders as directories. It does not use drive letters. When referencing a path to a specific directory, Linux uses the forward slash (/), such as /home/Zoey, instead of the backslash (\). Everything in Linux is located under the / directory, known as the root directory. It is similar to Windows C:\. / Is known as the root directory. All other directories are created under this directory. /home Contains sub-directories for each user added to the Linux system. /bin Contains the binaries (or programs) required to mount the system in single-user mode. /boot Contains the files needed to boot the system. /usr Contains applications and files used by users. /etc Contains configuration files. When needed, you can typically change configuration files using a text editor. /dev Contains a number of special files that represent devices. In Linux, everything is a file; this includes devices. As seen in the previous table, these devices are stored in the /dev directory. For example, many systems use a SATA hard drive. The files for this drive would normally be saved in the /dev/sda directory. It is also important to know that when working with files and directories in Linux, everything is case sensitive. For example, if you were currently in the /home directory and wanted to change to a directory named Pascal, you enter cd Pascal not cd pascal.
Productivity Software
Office Application Suites Microsoft Office, including Word, Excel, and PowerPoint, is the most widely-used office productivity software. Other popular suites include OpenOffice and LibreOffice, which are free open source solutions, and Google's G-Suite, which is a paid service. One of the reasons people like to use an integrated office application suite is that they have a common user interface and make it easy to share data between applications. Word Processing Word processors store, manipulate, and format text. Most of the things we read, like books, newspapers, and web articles, were first written in a word processor. Spreadsheets A spreadsheet is an application where data is organized into rows and columns. They can be used to store and organize information, as well as perform complex calculations. Spreadsheets can also create charts and graphs, which are useful for making sense of data. Presentations Slideshow presentations are most commonly used as a visual supplement for a verbal presentation. They help highlight the speaker's most important points and illustrate difficult concepts. They're also a great way to share visual media, such as pictures and videos, with a large audience. Web Browsers When web browsers are used for online research and for building relationships with business customers, they are also considered productivity software. The most popular browsers include Google Chrome, Mozilla Firefox, and Apple Safari. Most web browsers are free to download and install on a computer. Visual Diagramming Visual diagramming tools help create flowcharts and other graphical representations of ideas. Most word processing and presentation software includes built-in visual diagramming tools. For more shapes and diagram templates, you can use a dedicated visual diagramming tool such as Microsoft Visio or Google Drawings. Cloud-Based Options Cloud-based productivity software such as Google's G-Suite and Microsoft Office Online run inside a web browser. These web applications allow online collaborative editing. This means multiple users can work on the same document, presentation, or spreadsheet at the same time.
Which category of system software provides a platform for application software to run on?
Operating System
Which permission option lets a user view files but not change them?
Read
Which of the following digital communication media does NOT require a connection to the Internet?
SMS
On Windows, which application lets you add accounts, change passwords, manage power consumption, and personalize your computer's environment?
Settings
Business Software
Software designed for advanced or specialized business functions such as database management, project management, customer relationship management, accounting, desktop publishing, graphic design, and computer aided design.
Device Drivers
Software that allows an operating system to communicate with hardware devices, such as printers, video cards, scanners, and cameras.
Utility Software
Software that analyzes, configures, and optimizes the computer, including backup software, compression software, disk cleaners, and antivirus software.
The Boot Process
Step 1: Activate the BIOS Whenever you turn a computer turn on, electricity flows from a power source (such as a wall outlet or battery) into the motherboard. The power activates the basic input/output system (BIOS). A BIOS is a simple program that's written directly into the motherboard's hardware. Step 2: Check the CMOS The first thing the BIOS does is look at the complementary metal-oxide-semiconductor (CMOS) chip. The CMOS contains the BIOS settings (instructions) for exactly how each hardware device on the computer should be initialized. Step 3: Initialize Hardware The BIOS then initializes (wakes up) each piece of hardware according to the instructions it finds in the CMOS. This includes fans, memory, hard drives, and processors. Step 4: POST Once everything's been initialized, the BIOS runs a program called power-on self-test (POST). The BIOS checks each hardware device and verifies that it's working properly. On many computers, the BIOS reports the results of POST with a beep code. A single beep means everything's fine. If there's a problem, it plays a combination of beeps. The user can then refer to the motherboard's documentation to interpret the beep code and find out what the problem is. Step 5: Find an Operating System Once POST is done, the BIOS looks for a bootable device or a storage drive that contains an operating system. It does this according to a predetermined boot order, which is stored on the CMOS. On a typical desktop computer, the first drive in the boot order is the optical drive. If there isn't a disc with an operating system in the tray, the BIOS will check the next drive in the boot order. Step 6: Load the OS into RAM Once the BIOS finds an operating system, it loads it into the computer's RAM. From there, the processor starts executing the instructions and the OS takes over. At this point, the job of the BIOS is finished and it becomes dormant.
Settings App Options
System In System, you will find various tools that allow you to modify the screen display, view the computer's specifications, modify or uninstall applications, and configure other system preferences. Devices In Devices, you manage peripheral devices, such as printers, the mouse, and the keyboard. Network & Internet In Network and Internet, you manage your network settings when connecting the system to a network. This includes configuring the Windows Firewall and changing network adapter options. Personalization The Personalization option lets you change the way the display looks on the monitor. For example, you can customize the current theme by selecting which desktop background, window color, and screen saver you want to use. You can also set up a new theme to be used by the display here. Accounts In User Accounts and Family Safety, you create and manage user accounts and set up parental controls. Time & Language In Time & Language, you set the date, time, region, and language used by the system. Ease of Access In Ease of Access, you configure accessibility settings for the system. Privacy Privacy gives you control over how your camera, microphone, and personal data are used by different apps. Update & security Windows Update lets you configure how and when updates from Microsoft are downloaded and installed on the system. In Update & security, you can also set backup and recovery options and configure settings for Windows Defender, which is anti-malware software installed by default on Windows systems.
What is the name of the narrow strip along the bottom of the Windows environment?
Taskbar
Registry Editor
The Windows Registry is a database that stores settings for the operating system and other programs. These settings are stored as keys and values. You can think of it like a filing cabinet - each file in the cabinet is a key, and the information written in the file is a value. Whenever you change a setting on your computer, such as changing the home page of your web browser or your PC's power settings, that change is stored as a key in the registry. Windows comes with a utility called Registry Editor, which lets you view and change all the keys in the registry. This gives users a huge amount of control over their computers. By making small changes to the registry, you can customize just about any aspect of your machine. That said, it's a bad idea to change a registry key unless you understand exactly what it does and how it will affect the system. The registry contains many essential keys that are necessary for the computer to function correctly, and changing them could cause the computer to malfunction. If you want to see the registry in action, you can use the following steps to make your system clock show hours, minutes, and seconds. Open Registry editor by typing regedit into the search bar and pressing Enter. You may have to confirm you want to do this if a warning screen pops up. The Registry Editor shows all the keys on the computer, which are stored in a folder-like structure. Navigate to the following key: HKEY_CURRENT_USER, Software, Microsoft, Windows, CurrentVersion, Explorer, Advanced. Create a new key by right-clicking the Advanced folder, then selecting New > DWORD (32-bit) Value. Name the value ShowSecondsInSystemClock. Make sure to spell and capitalize the name correctly. By default, this key will have a value of zero, which means it's turned off. To turn it on, double-click it and set its value to 1. When you restart your computer, you'll see the seconds displayed on the system clock. You can reverse this change by navigating to the new key and changing its value back to zero, then restarting your computer.
File system
The methods and structures that an operating system uses to organize files on a storage device like a hard drive. File systems often use directory structures to keep track of files.
Virtualization
The process of running a virtual instance of a computer system on its own partition, creating a software-based version of something such as an application, server, network, or storage.
Journaling
The process of tracking changes to a file so that a file can be repaired or restored in case of file corruption or data loss.
Netiquette
The rules of etiquette that should be observed while using computer networks, such as the internet.
When composing an email message, why might you want to use the Bcc field?
To copy the email confidentially
What is junk email?
Unwanted, unsolicited email
Every Windows system has a database that stores setting changes such as switching the home page of your web browser. What is this called?
Windows Registry
Common Windows Utilities
Windows Settings The Windows Settings App customizes how the computer looks and functions. The Settings App lets you make most configuration changes that used to be done in the Control Panel (if you're familiar with older versions of Windows). To launch the Settings App, click the Start button and select Settings. Within the app are several options you can use to configure system settings such as security, power plans, network connections, installed applications, accessibility settings, and display settings. File Explorer File Explorer (formerly known as Windows Explorer) is a file management application that comes with Windows. File Explorer's main purpose is to let you view, open, copy, move, and otherwise manage your files and folders. Task Manager Task Manager is a process management administration utility that comes with Microsoft Windows. It lets users perform tasks such as shut down applications that are not responding; view processes and applications that are using system resources; view network usage; and disconnect users from the system.One of the most common things you'll do with Task Manager is to end an unresponsive app. To perform this task, take the following steps: Press Ctrl + Alt + Delete and select Task Manager Select the Processes tab. Select the unresponsive app or process from the list. Select End task Device Manager Device Manager is a Windows utility that lets you view and control peripheral devices and other hardware components. You can use Device Manager to troubleshoot hardware issues, update drivers, and view the technical properties of hardware devices.
Operating System Types
Workstation Operating systems (OS) that run on a laptop, desktop, or an all-in-one computer are typically referred to as workstation operating systems. Some examples include Microsoft Windows, Linux, and Apple OS X/macOS. In some cases, these workstation operating systems have various classifications, allowing them to be sold to a variety of customers. For example, Windows 10 offers Windows 10 Home, Windows 10 Pro, and Windows 10 Enterprise. Each provides a few more features and functions. Other operating systems provide similar offerings. In many cases a computer capable of running one workstation OS, such as Windows, can be changed to run a different OS, such as Linux/Unix. Others, however, like macOS run on only proprietary hardware. For example, you cannot install macOS on a workstation that runs Windows 10. Server A server computer is designed to interface with multiple computer systems providing services these other computers need. Servers usually have more resources allocated to them, such as disk storage, read-only memory (RAM), and processing capabilities. In many cases, a server OS is based off the same basic code (also known as a kernel) as its workstation counterpart. However, server operating systems typically include additional software packages (sometimes known as roles) that provide the extra services needed by a network of computers and are therefore used more often in the business environments. To increase processing power, some server operating systems have the option to be run from a simple command-line interface instead of the traditional GUI seen with Windows workstation operating systems. Eliminating the GUI also adds an additional layer of protection. Mobile device Mobile device operating systems are used for hand-held devices, such as smartwatches, mobile phones, tablets, and even smart speakers. These operating systems combine the features of a workstation operating system with other features useful for mobile or handheld use. While there are many different mobile device operating systems available, some of the most used include Android, Apple iOS, and KaiOS.