Windows operating systems exam 3
You must be logged in as an ______________ to modify UAC settings.
Administrator
Which of the following cannot be done using Device Manager?
Assign user permission to devices
Your company has 30 computers running 32-bit versions of Windows 7. Your company wants to upgrade all of these computers to a 64-bit version of Windows 10. You discover the hardware can support 64-bit architecture. Which upgrade path should you choose?
Clean install
From the command-line interface, which command will upgrade an existing FAT32 file system to NTFS?
Convert
Which error message is the same as stop: 0x000000D1?
DRIVER_IRQL_NOT_LESS_OR_EQUAL
Which two activities are prevented by a standard user account? (Choose two)
Deleting files required for normal computer functionality Installing some types of software and hardware
The control pane ____________will enable you to install, update, rollback and disable device drivers. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed" if the underlined text makes the statement correct.
Device Manager
The new video cards recently installed on your company computers have stability issues. You contacted the manufacturer and were sent a new driver to correct the problem. How should you install the new driver?
Device Manager
Which two of the following are Windows maintenance tools for the file system?
Disk Defragmenter Disk Cleanup
You are setting up the hard disks on your new computer. You want the ability to create volumes that span across multiple disks and configure them for fault-tolerance. Which storage drive type should you use.
Dynamic Disk
How can you autohide the taskbar in windows 10?
Enable Auto-Hide in the Personalization section of the Settings menu
Match
Event Viewer: The central console for viewing system, security, application errors, and warnings written to event logs. Device Manager: Used to install, update, rollback and disable drivers. Performance Monitor: Lets you examine how programs affect your computer, both in real time and by collecting log data for later analysis.
You've removed a device from your computer, but it is still listed in Device Manager. What should you do?
From the action menu, click Scan for hardware changes
When SmartScreen is enabled in Windows 10, which two actions can occur if you attempt to run an unrecognized app? (Choose two).
Get administrator approval Warn before running
YES/NO regarding Windows Defender
Helps protect your computer against pop-ups, slow performance, and security threats. (YES) Comes bundled with Windows 8 and later. (YES) Does not detect spyware (NO)
Which Windows 10 edition will not allow you to join a domain?
Home
When is it appropriate to restore from a system image?
If your hard drive or computer stops working
Your small company was recently purchased by a global corporation with offices located around the world. They need the ability to send jobs to your printer. What feature makes it possible for computers running Windows to use printers that are located anywhere in the world?
Internet printing
Match
LTI- Interation occurs at the beginning of the installation, but the remainder of the process is automated ZTI- Requires no interaction during deployment. The process is fully automated HTI- Manually configured on each computer
Which built-in feature in Windows Explorer can point to files and folders located elsewhere on the computer?
Library
In Windows desktop computers, the file system that Microsoft recommends you use is _______
NTFS
You want to use your laptop computer to access your office when you travel. Which two actions should you perform to connect the computers? (Each correct answer presents part of the solution. Choose two.)
Obtain the IP address of the office computer Allow Remote Desktop on the office computer
Which are two ways to access the services running on a windows computer
Open the Control Panel (icons view), click/tap on the Administrative Tools icon, double click on Services shortcut Press the Windows+R keys to open the Run dialog, type services.msc
You are upgrading your organizations computers from windows 7 to windows 10. Which tool should you use to move the files and settings?
PCMover Express
Which is a command-based navigation tool of the operating system, which lets users navigate the registry and other data stores?
Powershell
Which are the two standard types of encryption?
Public (asymmetric) Key encryption Symmetric Key encryption
will backup the registry and help you edit it. Select the correct answer if the underlined text does not make the statement correct. Select No change is needed if the underlined text makes the statement correct.
REGEDIT
Which folder permission retricts users to only view files and launch applications?
Read and Execute
Which feature must be enabled so you can do voice activated searching on your windows 10 computer?
Respond to "Hey, Cortana!"
Match
Security Update - A broadly released fix for a specific product, addressing a security vulnerability. Update - A broadly released fix for a specific problem, addressing a non-critical, non-security related bug. Hotfix - A single package composed of one or more files used to address a problem in a product. Service pack - A cumulative set of hotfixes, security updates, critical updates, and updates since the release of the product, including many resolved problems that have not been made available through any other software updates
How can you determine if a Windows operating system has been activated?
System Information
Your computer has been infected by malware. You suspect it was infected when you downloaded some music from a website earlier this morning. What tool is your best option to eliminate the malware?
System Restore
Your computer has 8 GB of RAM and a 64-bit capable processor. You may install either the 32-bit version or 64-bit version of Windows 10. What is the advantage of installing the 64-bit version of Windows 10 onto this computer?
The 64-bit version of Windows 10 can handle large amounts of RAM more efficiently than a 32-bit processor
Match
Trojan Horse- an applications that appears legitimate but performs malicious activity on the affected computer. Malware - any malicious software, or simply unwanted software, installed without user consent. Spyware - a program that collects information about a user, or the user's activity, without the user's consent. Bot - allows unauthorized access and control of an affected computer.
How does a user access a printer using Internet Printing?
URL of the Print Device
Which two are benefits of offline files?
User efficiency is increased when working over a slow network Files can be worked with while away from the network
What command-line tool is provided in Windows to perform backup functions?
WBAdmin.exe
A colleague is trying to display her laptop screen on the projector in the conference room, but she is having difficulty. She has asked for your assistance. You access her Windows Mobility Center and see the following image:
What should you do to display the computer screen through the projector? (Check that the cable is connected and if necessary, click the connect display button) If you cannot access the Windows Mobility Center on a computer, what is the probable cause? (You are using a desktop computer
Which Windows tool allows you to manage additions to software that help prevent or fix problems, improve how your computer works, or enhance your computing experience?
Windows update
A(n) ______________ is a sequence of 25 letters and numbers that must be entered to activate Windows.
product identifcation key
Remote destop connection allows you to
sit at your home PC and connect to your work PC.