Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
130 Cards in this Set
- Front
- Back
What is the minimum RAM for Vista? |
Vista requires 512 MB of RAM. Recommends 1 GB of RAM.
|
|
What is the minimum RAM for Windows 7?
|
Windows 7 32–bit requires 1 GB of RAM.
Windows 7 Recommends 2 GB of RAM. |
|
What is the minimum RAM for XP?
|
Windows XP Home and Professional needs 64 MB
Windows XP Media Center requires 256 MB of ram |
|
Where can you can start, stop and restart services?
|
You can start, stop and restart services from Services. services.msc
|
|
What is the Windows 7 recovery environment known as?
|
Windows 7 recovery environment is also known as WinRE and system Recovery Options.
|
|
What is the XP recovery environment known as?
|
Recovery Console is WinRE in Windows XP.
|
|
What is ABOM?
|
ABOM – Advanced Boot Options Menu
|
|
What is the most amount of RAM that Vista can access?
|
The limit of RAM that Windows Vista can access is 128 GB. This is a software limitation.
|
|
What processors do tablets use?
|
Tablets will use Advanced RISC Machine CPU’s (ARM) they are simple and use less powerthan core i series, AMD Phenom II and FX Cpus’.
|
|
What is BSOD and what are causes?
|
BSOD is a Stop Errir whic may be caused by CPU or RAM not being compatible. Most common cause is driver failure, second is memory/propcessor
|
|
What is SFC?
|
SFC is System File Checker which checks protected system files and replaces incorrect versions.
|
|
What does it mean when the cursor blinks while booting?
|
During boot, a flashing cursor tells you that the system is not posting properlyt.
|
|
What does it mean when the numbers count up while booting?
|
The numbers counting up are the system checking the RAM. If the system beeps and freezes during this count–up then the RAM has an issue.
|
|
What does it mean when getting missing OS message while booting?
|
Corrupt MBR would give a missing OS or corrupt MBR message.
|
|
What attempts to fix issues automatically?
|
In Vista or 7 Startup repair attempts to fix issues automatically.
|
|
What are the boot loaders for Vista and Windows 7?
|
Vista & win 7
bootMGR Winload.exe |
|
What would you use to get help with a command?
|
Command then /? or HELP DIR
DIR help would attempt to find the file “Help” within the current DIR. |
|
In command prompt, what does MD mean?
|
make directory
|
|
In command prompt, what does CD mean?
|
change directory
|
|
In command prompt, what does RD mean?
|
remove directory
|
|
In command prompt, what does /E mean?
|
/E is needed to copy the files, directories, subdirectories, including empty subdirectories
|
|
In command prompt, what does /S mean?
|
/S will copy files, directories and sub directories, but not empty subdirectories.
|
|
In command prompt, what does xcopy mean?
|
XCOPY copies entire directories but not from one system to another.
|
|
What are the steps in troubleshooting?
|
Identify the problem
Establish a theory of probably cause Test your theory Establish a plan of action to resolve the problem and implement the solution Verify full functionality Document |
|
What is used to analyze a video card?
|
Dxdiag is used to analyze a video card and check if drivers are digitally signed.
|
|
What is USMT?
|
User State Migration Tool is a command line tool used to migrate user files and setting from one or more computers.
|
|
Where are registry hives stored?
|
Windows\system32\config
|
|
What are the 5 main registry hives?
|
SAM, SECURITY, SOFTWARE, SYSTEM, and Default
|
|
What the the automatic amount of Virtual Ram installed on a computer?
|
Virtual ram is 1.5x the amount of ram installed on the system. The maximum is 3x.
|
|
What would you type to convert FAT32 to NTFS without data loss?
|
/FS:NTFS
|
|
What does the defrag.exe –f do?
|
Force defrag a partition even if you don't have 15% free space.
|
|
What does the defrag.exe –v do?
|
Gives a verbose output
|
|
What does the defrag.exe –a do?
|
Gives only analisys and does not do any defragmenting.
|
|
What does a Code 1 message in Device Manager mean?
|
This means that a device is not configured correctly.
|
|
What does a Code 10 message in Device Manager mean?
|
This means that a device cannot start.
|
|
What is Sysprep?
|
Sysprep is a utility built into the Windows for image deployment over the network.
|
|
What is WSUS?
|
Windows Server Update Services
|
|
What is ASR?
|
ASR is Automated System Recovery. This is an option in Windows XP NT Backup.
|
|
What is the backup utility in XP?
|
NT Backup
|
|
What is the backup utility in Vista?
|
Backup Status and Configuration
|
|
What is the backup utility in 7?
|
Backup and Restore
|
|
What is the minimum processor frequency of Vista?
|
800 MHz, recommends 1GHz
|
|
What is the minimum processor frequency of XP?
|
233MHz
|
|
What is the minimum processor frequency of 7?
|
1GHz
|
|
What would a ghosted image on a printer mean?
|
Meant the drum needs to be replaced.
|
|
What would lines or smearing on a printer mean?
|
A dirty primary corona wire
|
|
What would garbled character printouts on a printer mean?
|
An incorrect driver
|
|
What are two things you can use to test RAM?
|
CPU–Z or Task Manager
|
|
Where are restore points stored?
|
They are stored in the hitten System Folume Information folder.
|
|
Any Windows computer in a Windows workgroup can have __ maximum concurrent connections to it over the network.
|
10
|
|
What is the maximum for Microsoft's Small Business Servers concurrent connections?
|
25 concurrent connections and 75 connections. More than 75 and you require the full version of Windows Server.
|
|
Explain RAID 0, 1 and 5.
|
RAID 0 provides performance improvement
RAID 1 provides fault tolerance RAID 5 provides both |
|
What shows the network statistics of a computer?
|
Netstat shows the network statistics of a computer. It displays the network connections by name, IP address, and port of the local and remote computers.
|
|
What does Last Known Good Configuration do?
|
Last Known Good Configuation will revert tye system back to the last known good as long as someone has not logged in successfully to the computer
|
|
What is 568B?
|
The most common network cabling wiring standard.
|
|
What can you enter to change the time on a computer?
|
Time command
|
|
What can you use to synchronize local computer's time to another system?
|
Net time can be used to synchronize local computer's time to another system.
|
|
What is ARP?
|
ARP is Address Resolution Procol which allows you to see which computers your IP address and corresponding MAC address have connected to recently. Arp –a
|
|
What is the Sync Center?
|
The Sync Center allows you to set up synchronization partnerships with external devices and enabled you to manage offline files. It is located directly within the Control Panel.
|
|
What is RoboCopy?
|
Robocopy or robust file copy is a command prompt tool that is used to move large amounts of data. It is the successor to xcopy.
|
|
What is Unicode?
|
Unicode is used to represent characters among multiple computer’s language platforms.
|
|
What is the default folder location for Windows 7 system files?
|
c:/windows/system32
|
|
What is the EXE for the printer spooler service?
|
Spoolsv.exe
|
|
What is pathping?
|
PathPing sends packets to each router on the way to a final destination over a period of time, and then computes results based on the packets returned from each hop. Basically ping and tracert.
|
|
What does it mean if pages come out wrinkled?
|
Wrinkled pages are the number one indicator that the fuser on a printer needs to be replaced.
|
|
What does it mean if pages have lines or smears?
|
Defective toner cartridge would get blank printouets or there would be lines or smears.
Damaged primary corona wire would result in black lights or smearing. |
|
What is Ping –t and Ping –l?
|
Ping –t is a continuous ping. Press ctrl+C to stop. Ping–l allows you to modify size of packet.
|
|
What is NetBEUI?
|
NetBEUI is short for NetBios Extended User Interface. It is an enhanced version of the NetBIOS protocol
|
|
What are two other terms for virtual memory?
|
Swap file or paging file
|
|
What does a security log do?
|
Security log shows auditing events.
|
|
What does system log do?
|
System log shows evens concerning system files, drives and operating system functionality.
|
|
What can you use to determine the state of your network client?
|
Netdiag The Netdiag command–line diagnostic tool helps to isolate networking and connectivity problems by performing a series of tests to determine the state of your network client. These tests and the key network status information that they expose give network administrators and support personnel a more direct means of identifying and isolating network problems. Moreover, because this tool does not require parameters or switches to be specified, support personnel and network administrators can focus on analyzing the output rather than on training users how to use the tool.
|
|
What thing can you use in dir to display hidden files?
|
dir /a
|
|
What can you use with dir to display only hidden files?
|
dir /ah
|
|
What can you use with dir to display various sort orders of files?
|
dir /o
|
|
What can check to see if a previous system shutdown completed successfully?
|
Chkntfs
Generally you would check this on the system drive. If the drive is okay and the system did complete the shutdown successfully, you'll get a message such as "C: is not dirty" Otherwise, you will get a message telling of the error. |
|
What checks the integrity of the disk?
|
Chkdsk
|
|
What displays the configuration of your network adapters?
|
ipconfig
|
|
What does fixboot do?
|
If the NTLDR file has been damaged or is missing, it can be rewirtten to the hard drisk by issueing the fixboot command wihile in the recovery console.
|
|
What command will rewrite the master boot record of the hard drive?
|
fixmbr
|
|
What command will check the integrity of the disk?
|
chkdsk
|
|
What can be used to scan for the operating system installations and rebuild that information into the boot.ini file?
|
bootcfg /rebuild
|
|
What copy command suppresses prompting of overwrite confirmations?
|
Copy /y
|
|
What copy command copies networked files in restartable mode?
|
Copy /z
|
|
What copy command is used to easily copy entire directories of data to another location?
|
Xcopy
|
|
What copy command allows you to indicate an ASCII text file to copy?
|
Copy /a
|
|
What attrib command will unhide all of the files in the folder?
|
Attrib –H *.*
|
|
What feature creates and saves data about the computer's system files and settings?
|
System Protection. It does this by creating restore points and external storage is not necessary, they are automatically stored in the system volume.
|
|
What is the Windows XP backup program?
|
NT Backup
|
|
What command will open System Information?
|
msinfo32
|
|
For multiple memory sticks to be compatible, they need to run at the same ______ .
|
Speed. You may be able to get away with one stick being a step slower if the motherboard supports it and as long as it is not dual–channel memory.
|
|
If a drive 0 fails in RAID 1, you need to use Win RE to mark drive 1 as active. What command would you use for this?
|
diskpart
|
|
Xcopy can copy NTFS permissions. Both xcopy and copy can copy files off of a mapped network drive and can copy entire folder structures.
|
True
|
|
What is used to show IP addresses and port numbers instead of computer names and protocol names?
|
netstat –n
|
|
What should you do if a printer is printing lighter in some areas?
|
Replace the toner cartridge
|
|
How can you get to Microsoft Management Console?
|
Run then MMC
|
|
What is the name of the power cable for a computer?
|
IEC cable International Electrotechnical Commission
|
|
How can you verify that a new virus definition is authentic?
|
Check the hash key against the location that you downloaded from.
|
|
How do you get to System Restore in Windows 7?
|
Right click computer, properties, system protection link
Run systempropertiesprotextion.exe |
|
What is authentication?
|
Authentication can be carried out by utilizing something a user is, such as a fingerprint; something a user knows, such as a password or PIN, something a user has, such as a smart card or token; and something a user does, such as a signature or speaking words.
|
|
What is DoD 5220.22–M?
|
This standard specified that a hard drive be properly purged with bit–level erasure software that does 7 complete passes.
|
|
What does chkdsk /I do?
|
Performs a less vigorous check of index entries. This can only be used on NTFS partitions.
|
|
What does chkdsk /V do?
|
Displays the full path and name of every file on the disk.
|
|
What does chkdsk /F do?
|
Fixes errors on the disk.
|
|
What does chkdsk /R do?
|
Locates bad sectors and recovers readable information.
|
|
What does Robocopy /s do?
|
Copy subdirectories but will skip any empty ones.
|
|
What does Robocopy /E do?
|
Copies all subdirectories, including empty ones.
|
|
What does Robocopy /B do?
|
Copies files in backup mode.
|
|
What does What does Robocopy /DCOPY:T do?
|
Also copies timestamps of files and folders.
|
|
What does net view do?
|
List all the shares on the computer
|
|
What does net use do?
|
Enables you to map network drives to remote shares
|
|
What does net share do?
|
Allows you to create shares within the Command Prompt?
|
|
What does net statistics do?
|
Displays information about the server or workstation services
|
|
What does Regsvr32 do?
|
Used to manipulate ActiveX controls and DLL's.
|
|
What is ODBC?
|
Open DataBase Connectivity, an interface used within the C programming language to access database management systems.
|
|
What is RASH?
|
The four different file attributes. Read only, Archive, System and Hidden.
|
|
What is the attribute archive do?
|
The archive attribute is used for backup. When a file is created, the archive bit is turned on, and when a program copies the file, the archive bit is turned off. For example, the /m parameter in the Xcopy command in Windows turns off the archive attribute. When the file is edited and saved again, the attribute bit is turned on.
|
|
What is AD DS?
|
Active Directory Domain Services (AD DS) is Microsoft’s implementation of a directory service that provides centralized authentication and authorization services.
Active Directory Domain Services provide secure, structured, hierarchical data storage for objects in a network such as users, computers, printers, and services. Active Directory Domain Services provide support for locating and working with these objects. |
|
What is PPTP?
|
PPTP Point–to–Point Tunneling Protocol is a network protocol used in the implementation of Virtual Private Networks
|
|
What is Dr. Watson?
|
Dr. Watson for Windows is a program error debugger that gathers information about your computer when an error (or user–mode fault) occurs with a program. It is in Windows XP.
|
|
What is PKI?
|
A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.
|
|
What is TPM?
|
A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.
|
|
What is Kerberos?
|
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret–key cryptography.
|
|
What is net use?
|
Connects a computer to or disconnects a computer from a shared resource, or displays information about computer connections. The command also controls persistent net connections.
|
|
What is IPP?
|
Internet Printing Protocol has two components : Web–based printer management & Internet printing
|
|
What is PCL?
|
The Portable Class Library project enables you to write and build managed assemblies that work on more than one .NET Framework platform.
|
|
What is a mounted volume?
|
A mounted folder is an association between a volume and a directory on another volume. When a mounted folder is created, users and applications can access the target volume either by using the path to the mounted folder or by using the volume's drive letter.
|
|
What is a domain?
|
One or more computers are servers. Network administrators use servers to control the security and permissions for all computers on the domain. This makes it easy to make changes because the changes are automatically made to all computers. Domain users must provide a password or other credentials each time they access the domain.
If you have a user account on the domain, you can log on to any computer on the domain without needing an account on that computer. You probably can make only limited changes to a computer's settings because network administrators often want to ensure consistency among computers. There can be thousands of computers in a domain. The computers can be on different local networks. |
|
What is a workgroup?
|
All computers are peers; no computer has control over another computer.
Each computer has a set of user accounts. To log on to any computer in the workgroup, you must have an account on that computer. There are typically no more than twenty computers. A workgroup is not protected by a password. All computers must be on the same local network or subnet. |
|
What is a homegroup?
|
Computers on a home network must belong to a workgroup, but they can also belong to a homegroup. A homegroup makes it easy to share pictures, music, videos, documents, and printers with other people on a home network. |