• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/35

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

35 Cards in this Set

  • Front
  • Back

typically used to read data from or write data to the registry from inside a scripted batch or command file

REG.EXE

a tool that monitors what happens when an application is run as a user without elevated permissions.

Standard User Analyzer

restricts access to memory and hardware

User mode

runs in its own virtual memory space and is executed by the processor in user mode

Win32 application

provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters

Registry

a unique identifier that no two users share on the computer

SID

allows services full access to memory and hardware devices

Kernel mode

originally designed to run with Windows 3.x

Win16 applications

provides the core operating system functionality that supports executing applications

Executive Services

An application's view of the operating system is restricted to those methods and services exposed by the different ____.

environment subsystems

Applications designed to interact with the ____ subsystem are the most common type of application in use with earlier operating systems, such as Windows XP.

Win32

____ are made up of multiple modules, such as the core kernel, object manager, memory manager, and several others.

Executive Services

Each Win32 application runs in its own virtual memory space and is executed by the processor in ____ mode.

user

In Windows 7, a new instance of ____ is created for each DOS application that is executed to ensure that the DOS applications do not interfere with each other.

ntvdm.exe

____ is a system whereby applications modify the core functionality of the Windows operating system to obtain low level access to the operating system and its resources.

Kernel patching

____ support applications and provide indirect access to Executive Services in the Windows 7 operating system kernel.

Environment subsystems

The application ____ can identify the application as UAC aware, which disables UAC file and registry virtualization automatically for that application.

manifest

The environment subsystems and the applications run in ____ mode.

user

The Executive Services operate in ____ mode.

kernel

The ____ hive contains details about the current hardware profile in use.

HKEY_CURRENT_CONFIG

The ____ hive contains global settings for the entire computer and the applications installed on it.

HKEY_LOCAL_MACHINE

The ____ is a free download from Microsoft, a lifecycle management tool for the applications required by a company, and can help deploy Windows 7 as fast as possible.

Microsoft Application Compatibility Toolkit V5.5

The ____ is designed to make it easy for home users to adjust their legacy applications to work with Windows 7 without having to know a lot about compatibility settings.

Program Compatibility Assistant

The owner of the registry keys is usually listed as ____.

SYSTEM

The ____ provides a layer of abstraction that is useful for developers to perform complex tasks more simply because it manages the details of accessing required services.

.NET Framework

The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called ____.

hives

The Run As feature has been modified in Windows 7 to now be known as the ____ option.

Run As Administrator

The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately.

REGEDIT.EXE

UAC-aware applications can include a(n) ____ file called the application manifest.

XML

Windows 7 Enterprise, Ultimate, and Professional Editions include support for ____, which installs a second virtual operating system that runs at the same time as Windows 7.

XP Mode

Because the Executive Services are critical to the operation of the computer, applications are allowed to communicate directly with it.

False

DOS was designed as a multitasking operating system.

False

Registry keys can contain sensitive information that can crash the computer or damage expected functionality if they are improperly configured.

True

Requests for system actions that must be performed by the Executive Services are moderated by the environment subsystems.

True

The Windows 7 operating system is designed to operate in a layered approach, where different layers provide targeted functionality.

True