• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
Automatic Skip Driver
A utility for preventing "bad" drivers from running the next time you boot your computer. This utility examines startup log files and removes problematic drivers from the boot process.
Bootlog.txt
A text file where information concerning boot processes is logged. It can be useful when troubleshooting system boot errors and problems.
CAB Files
Short for "cabinet" files. These files are compressed and are most commonly used during the OS installation to store many smaller files, such as device drivers.
Clean Installation
The act of installing an operating system on a fresh drive, following the partitioning and formatting of that drive.
CMD.exe
The 32-bit version of a command line interface available in Windows NT and later
Command.exe
The 16-bit version of a command line interface available in all versions of Windows
Detlog.txt
A log file created during the initial operating system installation that tracks the detection, query, and installation of all devices.
Dr. Watson
An application error debugger. This diagnostic tool detects application failures and logs diagnostic details.
General Protection Fault
(GPF)
A Windows error that often causes a PC to lock up. Most commonly caused by two programs accessing the same resources.
Hardware Compatibility List
(HCL)
A list maintained by Microsoft that lists all the hardware that is supported by an operating system.
Illegal Operation
An error caused when an applications asks the operating system to perform a function that cannot be carried out. This could be due to an error in code, or when the application tries to access a corrupted system file.
INF File
The extension given to Windows driver files.
MSCONFIG
A utility found in Windows that allows a user to configure a system's boot files and critical system files.
Restore Point
A system snapshot created by the System Restore utility that is used to restore a malfunctioning system.
Run Dialog Box
The Windows utility for easily launching 32-bit applications. Reached by clicking the Start menu and selecting Run.
Setuplog.txt
A log file that tracks the complete installation process, logging the success or failure of file copying, Registry updates, and reboots.
Startup Disk
Any disk that contains just enough files to boot a computer and perform basic troubleshooting tasks.
System Monitor
A utility that can be usd to evaluate and monitor system resources like CPU usage and memory usage
System Restore
A utility in Windows ME that enables you to return your PC to recent working configurations when something goes wrong.
Trojan
A virus that is a free-standing program that is programmed to do something other than what the user thinks it will do. An example is a program the user thinks is a game, but in actuality, it will erase the CMOS settings.
Virtual Device Driver
(VxD)
A special type of driver file used to support older Windows programs. Windows Protections errors take place when these fail to load or unload.
Virtual Memory
A sections of a system's hard drive that is set aside to be used when physical memory is unavailable or completely in use.
Virus
A program that can make a copy of itself without you necessarily being aware of it; some viruses can destroy or damage files, and generally the best protection is always maintaining backups of your files.
Windows Protection Error
An error that occurs when a virtual device driver fails to load or unload. This error usually occurs when a device is listed in both CONFIG.SYS and SYSTEM.INI or the Registry.
Worm
A special form of a virus unlike other viruses. It does not infect other files on the computer, but replicates itself by making copies of itself on other systems on a network by taking advantage of security weaknesses in networking protocols.