Term
While working on your computer, you perform a variety of tasks. These tasks include (5) |
|
Definition
• modifying date and time settings • changing desktop settings • running applications • adding or removing printers • OS or software updates. |
|
|
Term
To ensure that your computer only performs tasks that you are aware of, Microsoft has introduced _____ _____ ______. |
|
Definition
User Account Control, or UAC |
|
|
Term
|
Definition
|
|
Term
UAC helps protect your computer by preventing ______ installation of _______ and _______. |
|
Definition
automatic applications programs |
|
|
Term
_____ prevents installation of malicious software and malware on your computer without your knowledge. |
|
Definition
|
|
Term
_____ prompts you for permission each time a program attempts to make a major change to your computer or its settings. |
|
Definition
|
|
Term
|
Definition
automatic installation defends against malicious software ongoing security for your computer |
|
|
Term
The UAC _______ _____ differs in appearance depending on whether you're logged on as a _______ user or as an ______. |
|
Definition
dialog boxes standard administrator |
|
|
Term
UAC also provides four different _______ to inform you about any changes a program is attempting to make to your computer. These ________ depend on the type of program you're trying to install |
|
Definition
|
|
Term
UAC has ____ different tabs based on type of user, ___ different notifications based on type of program and ____ different security levels. |
|
Definition
|
|
Term
What determines how UAC dialog boxes will appear on your computer? |
|
Definition
The way UAC dialog boxes appear on your computer depends on your permission level. The dialog box displayed for an administrator differs from the one displayed for a standard user. This helps to limit the tasks that can be performed by a standard user. |
|
|
Term
(T/F) You do not require administrative privileges for all tasks under UAC. |
|
Definition
|
|
Term
What types of tasks can a standard user typically perform under UAC? |
|
Definition
tasks that do not impact the security of your computer such as browsing through your e-mail messages, working on Word documents and Excel spreadsheets, or listening to music |
|
|
Term
(T/F) applications that have not been verified and digitally signed will be verified under UAC, but require administrator privileges. |
|
Definition
False UAC will ask for permission for any application that has not been verified and digitally signed regardless of your privileges. |
|
|
Term
Windows 7 increases computer security by making all three UAC dialog boxes ____ . |
|
Definition
|
|
Term
What does it mean if a dialog box is modal? |
|
Definition
This means that you must respond to these boxes before you can continue any task. This further helps to maintain the security of your computer. |
|
|
Term
What is the Windows 7 UAC strategy for accoun types to maintain security and flexibility? |
|
Definition
For security, Microsoft recommends that all users log on as standard users. As a standard user, you can send e-mails, browse the Internet, and use most applications. UAC prompts standard users to enter an administrative password whenever they are about to perform tasks requiring administrative rights, such as installing a new program. As a result, standard users do not need to switch to an administrator account each time they want to perform a task requiring administrative privileges. |
|
|
Term
What are the four types of notification screens you will see under UAC that request permission before certain tasks can be performed? |
|
Definition
A Windows program needs your permission to start A non-Windows program requires permission to start A program created by an unknown publisher requires permission to start You have been blocked by your system administrator from running a program |
|
|
Term
if you do not recognize the publisher of a program you're installing, you should check the name of the program before deciding to install it. |
|
Definition
|
|
Term
This UAC notification enables you to verify the publisher of the program you want to run |
|
Definition
A Windows program needs your permission to start |
|
|
Term
This UAC notification validates the publisher of the program so that you can be assured of its safety. |
|
Definition
A non-Windows program requires permission to start |
|
|
Term
When will you receive the UAC notification 'A non-Windows program requires permission to start'? |
|
Definition
If you're installing a program without a valid digital signature |
|
|
Term
Before you perform any installation tasks you should search the internet for the program name to validate safety 'A program created by an unknown publisher requires permission to start'. |
|
Definition
If you're trying to run a program without a valid digital signature, UAC notifies you that the program you're trying to run has an unknown publisher. Because such programs might not be safe to run, continue only if you're certain about the program's source. If you're not sure, you can search for the program or publisher on the Internet to ensure that the program is safe. |
|
|
Term
What do you need to do if you get this UAC notification: 'You have been blocked by your system administrator from running a program'? |
|
Definition
There may be certain programs that your administrator blocks because they may not be safe to run. This is mainly true for programs whose source or publisher is not known. If you still want to run the program, you need to ask for permission from your system administrator. |
|
|
Term
(T/F) UAC prompts appear less frequently in Windows Vista, so users tend to pay more attention to tasks that might pose a security threat. |
|
Definition
False Windows 7, not Vista |
|
|
Term
You can change the frequency of UAC prompts by changing your ______ _____. |
|
Definition
|
|
Term
Where can you change UAC settings? |
|
Definition
|
|
Term
How do you open the Action Center? |
|
Definition
To open the Action Center, type user account settings in the Start menu. Then, you click the Change User Account Control settings option. |
|
|
Term
Name the four security settings offered in the Action Center: |
|
Definition
Always notify Default - Notify me only when programs try to make changes to my computer Notify me only when programs try to make changes to my computer (do not dim my desktop) Never notify |
|
|
Term
This setting prompts or notifies users every time they configure or install software. At the same time, this setting dims your desktop, reminding you that you need to either accept or reject the UAC request before you can perform any other task. |
|
Definition
Action Center UAC security setting of Always notify |
|
|
Term
What is the 'secure desktop'? |
|
Definition
This dimming is known as the secure desktop. Secure desktop ensures that you cannot run any other program and have to respond to the notification before performing any other action. |
|
|
Term
This setting prompts or notifies you every time you change the configuration of your computer or install software and if a program outside Windows tries to change a Windows setting. |
|
Definition
Action Center UAC security setting of Default notify |
|
|
Term
What are the exceptions to the UAC Default notify security setting notificaiton? |
|
Definition
prompt doesn't appear if you • change basic Windows settings o date o time o update device drivers o format partitions. This is because these changes do not pose a security threat and are considered safe |
|
|
Term
This setting is similar to the default setting. However, the difference is that this UAC notification isn't modal |
|
Definition
Action Center UAC security setting of Notify me of changes without invoking secure desktop |
|
|
Term
Why might a user wish to block the use of secure desktop? |
|
Definition
This makes this setting less cumbersome than the default setting because you can finish your task before responding to a notification. If you've selected this setting, the frequency of notifications also reduces. |
|
|
Term
What is the disadvantage of not using secure desktop? |
|
Definition
The disadvantage of this setting is that you can easily lose track of the UAC prompts if you don’t respond to them immediately. |
|
|
Term
Selecting this setting exposes your computer to potential security risks, because UAC does not notify you if software is being installed or updated on your computer or with changes to Windows settings. |
|
Definition
Action Center UAC security setting of Never notify |
|
|
Term
What could happen if you use the least secure setting for UAC? |
|
Definition
data on your computer, including your personal data, saved files, and even protected system areas can be lost or damaged. |
|
|
Term
What will you be prompted for if you select the Default security setting in the UAC? |
|
Definition
If you select this setting, you're prompted if you install a program that changes your computer settings. However, it allows you to change Windows settings without being notified. |
|
|
Term
What should you know about disbling UAC? |
|
Definition
Windows 7 allows you to disable UAC by using the User Account Control settings application. Regardless of the UAC setting you select, Microsoft suggests that the UAC feature be enabled at all times. However, if you need to disable UAC, you can do so using the Action Center. In Windows 7, disabling UAC is simpler than in Windows Vista. |
|
|
Term
(T/F) UAC is disabled only if you restart your computer. |
|
Definition
|
|
Term
|
Definition
select the lowest UAC setting |
|
|
Term
What do you do if you want to re-enable UAC? |
|
Definition
if you want to enable UAC, you can do so by using the User Account Control settings application. Select any security setting other than Never notify. |
|
|
Term
(T/F) It is not necessary to restart your computer after re-enabling UAC. |
|
Definition
False This change will also require you to restart your computer. |
|
|
Term
(T/F) The default UAC setting displays a prompt for any software installation or windows setting |
|
Definition
False When you select the default UAC setting, you receive a prompt each time a configuration changes or software installation is detected. However, you aren't prompted if any Windows settings such as changes in date and time or device drivers are made. This is because these changes do not pose a security risk to your computer. |
|
|
Term
(T/F) UAC helps you protect your computer against hackers and malicious software |
|
Definition
True UAC protects your computer against installation of malicious code or programs on your computer. It does this by asking you for permission every time a program attempts to make a major change to your computer. So it allows you to install only those applications that you trust. |
|
|
Term
(T/F) UAC doesn't display any prompt if the program you're installing has a valid digital signature. |
|
Definition
False UAC prompts you with a dialog box even if you're installing a program with a valid digital signature. Because this dialog box helps you verify the identity of the publisher of the program, it is generally safe to continue if you see this notification. |
|
|
Term
(T/F) UAC provides different dialog boxes depending on the way you've logged in. |
|
Definition
True UAC provides different dialog boxes depending on whether you are logged on as a standard user or an administrator. If you've logged in as a standard user, you may be prompted for an administrative password to perform certain tasks. However, if you've logged in as an administrator, you can directly perform these tasks. |
|
|
Term
What are the major differences between the folder names for Vista and Windows 7? |
|
Definition
Documents /My Documents Pictures/My Pictures Music/My Music Videos/My Videos |
|
|
Term
What is the Windows 7 path equivalent to Vista’s: C:\Users\user name\Documents |
|
Definition
C:\Users\user name\Documents |
|
|
Term
What is the Vista equivalent to XP’s C:\Documents and Settings\user name\My Documents |
|
Definition
C:\Users\user name\Documents |
|
|
Term
What is the XP equivalent to C:\Users from Windows Vista/7? |
|
Definition
C:\Documents and Settings |
|
|
Term
Which OS uses this path for the local settings (2)? C:\Users\user name\AppData\Local |
|
Definition
|
|
Term
Which OS uses this path for the local settings (1)? C:\Documents and Settings\user name\Local Settings |
|
Definition
Windows XP Local Settings |
|
|
Term
Which OS uses this path for the Desktop (1)? C:\Documents and Settings\user name\Desktop |
|
Definition
|
|
Term
Which OS uses this path for the Desktop (2)? C:\Users\user name\Desktop |
|
Definition
Windows Vista and Windows 7 |
|
|
Term
When you upgrade to Windows Vista, your files will be stored at the same location as they were before the upgrade. If you select the custom installation option and you haven't chosen to reformat your drive or partition, your files are stored in a folder named.__________. In older version of Windows, these files would have been deleted if you selected the custom installation option but did not reformat your drive or partition. |
|
Definition
|
|
Term
What factors determine whether or not lost files can be recovered after an OS upgrade? |
|
Definition
The method you used to upgrade the computer. It is extremely important to remember to back up files and applications when upgrading to a new Microsoft operating system. At times, it is possible to retrieve lost files. However, this depends on the method that you used to upgrade your computer. |
|
|
Term
(T/F) Vista enables you to manage offline files programmatically. |
|
Definition
|
|
Term
XP enables you to _______ an entire local cache using the Local System account, and Windows 2000 doesn't offer ________ for offline files. |
|
Definition
|
|
Term
In Vista, once a file is encrypted the file is available only to the user that encrypted it. How would other users access the file? |
|
Definition
Other users would need to access the file online. |
|
|
Term
Vista provides increased information privacy by enabling users to encrypt files using their ____ ______. |
|
Definition
|
|
Term
In vista, if a network error occurs while you are trying to connect to a file in a DFS namespace, only the DFS link that includes that file will change to offline mode. In comparison, offline modes in XP are applied to the entire network file server or.______-______ DFS namespace. |
|
Definition
|
|
Term
Vista enables offline file modes of operation that apply to both ____ shared folders and ____ scopes. |
|
Definition
|
|
Term
(T/F) Vista deletes automatically cached files when the file limit is reached. Files that are used most are deleted first. |
|
Definition
|
|
Term
Vista also enables you to limit the amount of disk space that your local cache can use, including both automatic and manually cached files, and it also lets you limit the total disk space that automatically cached files can use. In contrast, XP only allows you to limit your total disk space for ________ ________ ________. |
|
Definition
automatically cached files |
|
|
Term
BDT provides an improved ______-______ _____ of operation that satisfies any read and write requests from the local cache when throughput between the local computer and the remote server drops below a certain level. |
|
Definition
|
|
Term
(T/F) Any file can be made available offline using XP. |
|
Definition
False XP prohibits certain sorts of files from offline availability. |
|
|
Term
BDT also enables any sort of file type to be marked for _____ use in Vista. |
|
Definition
|
|
Term
XP’s _______ _______ sends the entire offline file to the server, even if only a small section has been modified. |
|
Definition
Synchronization algorithm |
|
|
Term
In Vista, ____ tracks the blocks of an offline file being monitored, and when synchronization occurs, only the modified blocks are sent to the server. |
|
Definition
|
|
Term
|
Definition
Bitmap Differential Transfer |
|
|
Term
Unavailable offline files are not listed at all in this OS |
|
Definition
XP only displays the files that are available – unavailable files are not listed at all. |
|
|
Term
Displays unavailable files using a ghosted icon, offline file service |
|
Definition
|
|
Term
Enables automatic synchronization, so that the transition between online and offline mode is less disruptive. |
|
Definition
Vista offline file service |
|
|
Term
In what ways does Vista improve offline file service (5)? |
|
Definition
• ease of access • manageability • Performance • Reliability flexibility |
|
|
Term
When were offline files first made available? |
|
Definition
Offline file services were first available in Windows 2000, although at that time, encryption wasn't offered when bringing files offline. |
|
|
Term
|
Definition
Offline files are files stored in shared folders on network file servers, which are accessible even when the server is offline or the network experiences problems. |
|
|
Term
(T/F) XP opens menus and submenus much faster than previous Windows operating systems did. |
|
Definition
False Vista opens menus faster |
|
|
Term
The Vista Start menu contains a _______ ______ ____, into which you can type an application name. |
|
Definition
|
|
Term
The _____ _____ in Windows 2000 and XP changed from the rectangular menu launcher with the word "_____" on it, to a circular button with the Microsoft Windows logo. |
|
Definition
|
|
Term
(T/F) The Vista Start menu uses the same All Programs menu option as XP. |
|
Definition
True In Vista, however, the Start menu has been optimized so that you can save time by searching for the applications and files you are looking for. |
|
|
Term
XP enables easy access to the submenus that are hidden in Windows 2000, including the (2) |
|
Definition
• Control Panel Printers and Faxes |
|
|
Term
This Start menu contains the All Programs menu option, which remains closed until you hover your mouse over it, and then expands to show the programs installed on the computer. |
|
Definition
|
|
Term
(T/F) The XP Start Menu is reorganized from the 2000 Start Menu. |
|
Definition
|
|
Term
What’s the best way to keep up with temporary file when using Vista? |
|
Definition
You can use the Task Scheduler to schedule temporary file maintenance using Disk Cleanup. |
|
|
Term
(T/F) None of the Windows OS since 2000 have a Disk Cleanup program. |
|
Definition
False All Windows operating systems since 2000 have an iteration of Disk Cleanup, a program that helps you to locate and delete temporary files. |
|
|
Term
The ____ or ____ folders indicate where temporary files are stored on your computer. |
|
Definition
|
|
Term
To locate temporary files, you need to determine the _______ variables that the temporary files are set to. You can use a ______ ______ statement to list variables. |
|
Definition
environment command prompt |
|
|
Term
What do you have to do before you can delete temporary files? |
|
Definition
|
|
Term
Where are two common places temporary files are stored? |
|
Definition
|
|
Term
(T/F) Backing up temporary files helps to improve your system performance. |
|
Definition
False Deleting temporary files helps to improve your system performance |
|
|
Term
(T/F) When temporary files are deleted, they can take up considerable disk space. |
|
Definition
False When temporary files buildup they can take up considerable disk space. |
|
|
Term
(T/F) Although temporary files are designed to be deleted, they often aren't. |
|
Definition
|
|
Term
(T/F) Most programs today use temporary files to store information for a short period of time. |
|
Definition
|
|
Term
Name the five new fonts offered in Vista: |
|
Definition
Vista also comes with five new fonts that have been designed for ClearType: • Calibri • Cambria • Candara • Consolas • Constantia |
|
|
Term
What is the advantage of using ClearType fonts? |
|
Definition
LCDs are the most common type of display used today, and ClearType is optimized for these monitors. |
|
|
Term
How does ClearType create a better image than TrueType? |
|
Definition
It uses a rendering method that makes text appear smoother and cleaner on screen by manipulating pixel subcomponents. |
|
|
Term
(T/F) Windows Vista uses TrueType fonts. |
|
Definition
False Vista uses ClearType fonts |
|
|
Term
Match the name system folder to the operating system: a. C:\WINDOWS b. C:\WINNT Windows XP |
|
Definition
|
|
Term
Match the name system folder to the operating system: a. C:\WINDOWS b. C:\WINNT Windows 2000 |
|
Definition
|
|
Term
Match the name system folder to the operating system: a. C:\WINDOWS b. C:\WINNT Vista |
|
Definition
|
|
Term
Match the name system folder to the operating system: a. C:\WINDOWS b. C:\WINNT Windows XP upgraded from 2000 |
|
Definition
|
|
Term
(T/F) In Vista, inexperienced users cannot share files easily within their My Documents folder. |
|
Definition
False In XP, inexperienced users cannot share files easily within their My Documents folder. |
|
|
Term
(T/F) Vista enables users to easily and securely share files from within their user profile folders |
|
Definition
|
|
Term
Why was the XP All Users profile folder changed to Public in Vista? |
|
Definition
The name change better describes the folder's purpose, which is to store the resources available to all users. |
|
|
Term
The ____ _____ profile in XP is now called _____ in Vista. All Users |
|
Definition
|
|
Term
What are the three subfolders included in the hidden folder AppData which separate state application and to support roaming applications? |
|
Definition
|
|
Term
|
Definition
A new hidden folder stored under the root profile. It stores all the per-user application settings and binaries in a central location. |
|
|
Term
Vista has several new subfolders under the root profile folder to help organize user-managed data and settings and to prevent profile pollution. These new folders include (5): |
|
Definition
• Contacts • Downloads • Links • Searched Saved Games |
|
|
Term
Describe the Documents folder in Vista and the advantage of this architecture: C:\Users\sharonmadison23\Documents |
|
Definition
It is an independent folder stored in the root profile folder. This helps to simplify folder redirection and separates application and user data. |
|
|
Term
(T/F) The "My" prefix is no longer used for user-managed data files such as My Documents or My Pictures in Windows Vista. |
|
Definition
|
|
Term
In Windows XP My Pictures was a subcomponent of ____ ________. |
|
Definition
|
|
Term
In Vista, the _____ of the user profile _________ is located in the C:\Users folder. For example: C:\Users\sharonmadison23 |
|
Definition
|
|
Term
(T/F) The Vista operating system creates file-location issues that the XP user profile namespace solved. |
|
Definition
False The Vista operating system solved file-location issues that the XP user profile namespace encountered. |
|
|
Term
The user profile folder namespace also contains several different subfolders, some of which are hidden. The folders contain both application settings and user data. They include (7): |
|
Definition
• Application Data • Cookies • Desktop • My Documents • Recent • Start Menu Local Settings |
|
|
Term
C:\Documents and Settings contain folders with both ______ and ____ data – there is no clear distinction between the two. |
|
Definition
|
|
Term
Other folders stored in the C:\Documents and Settings folder include (4): • |
|
Definition
• All Users • Default User • LocalService NetworkService |
|
|
Term
(T/F) Every user that has ever logged onto the computer running 2000 has a user profile stored in C:\Documents and Settings\[username] |
|
Definition
|
|
Term
(T/F) Every user that has ever logged onto the computer running XP has a user profile stored in C:\Documents and Settings\[username] |
|
Definition
|
|
Term
(T/F) On computers running Windows 7 operating systems, a local user's profile is stored in the C:\Documents and Settings folder |
|
Definition
|
|
Term
(T/F) On computers running Vista operating systems, a local user's profile is stored in the C:\Documents and Settings folder |
|
Definition
|
|
Term
(T/F) On computers running 2000 operating systems, a local user's profile is stored in the C:\Documents and Settings folder |
|
Definition
|
|
Term
(T/F) On computers running XP operating systems, a local user's profile is stored in the C:\Documents and Settings folder |
|
Definition
|
|
Term
(T/F) On a Windows computer, each user has a profile folder called the user profile namespace |
|
Definition
|
|
Term
Name 6 differences between Windows 7 and previous Windows operating systems. |
|
Definition
• user file locations • system file locations • fonts • temporary files • program files, and offline files and folders |
|
|
Term
Match each power plan to the appropriate situation:
You want to watch a movie while you are traveling in an airplane.
a. Balanced b. High performance c. Power saver |
|
Definition
|
|
Term
Match each power plan to the appropriate situation:
You want to play multimedia-heavy games.
a. Balanced b. High performance c. Power saver |
|
Definition
|
|
Term
Match each power plan to the appropriate situation:
You want to play games and also check your e-mail.
a. Balanced b. High performance c. Power saver |
|
Definition
|
|
Term
A computer gives an error at startup that says the device referenced in Registry cannot be found. How would you resolve this issue?
a. Using msconfig to review the items loaded during startup b. Starting the system in Safe Mode and reinstalling any recently configured devices or device drivers c. Reconnecting the device or restarting the service d. Removing the media from the drive and then rebooting |
|
Definition
|
|
Term
Identify how you would optimize a computer’s system performance in relation to running background processes.
a. Configuring the indexing settings b. Disabling transparency c. Ending any unnecessary running processes using the Task Manager d. Disabling programs in the Startup tab that are causing slow performance |
|
Definition
|
|
Term
A program can’t load and you think it might be because of a corrupt installation. Identify how you would resolve this operational problem.
a. Use Event Viewer b. Disable firewalls and antivirus applications c. Isolate any changes made to the system d. Uninstall and reinstall the software to run it |
|
Definition
|
|
Term
Match each Windows 7 performance tool to the scenario in which it will be used:
You want to track the history of an application to check any issues caused by the application
a. Resource Monitor b. Reliability Monitor c. Windows Performance Monitor |
|
Definition
|
|
Term
Match each Windows 7 performance tool to the scenario in which it will be used:
You want to check the amount of network activity and its transactional details
a. Resource Monitor b. Reliability Monitor c. Windows Performance Monitor |
|
Definition
|
|
Term
Match each Windows 7 performance tool to the scenario in which it will be used:
You want to check the overall performance of your system by adding counters for specific instances, such as the performance evaluation of the processor execution time.
a. Resource Monitor b. Reliability Monitor c. Windows Performance Monitor |
|
Definition
|
|
Term
Provides offline file services without encryption a. Windows Vista b. Windows XP c. Windows 2000 |
|
Definition
|
|
Term
Provides Disk Cleanup services to delete temporary files a. Windows Vista b. Windows XP c. Windows 2000 |
|
Definition
|
|
Term
Provides offline file services enabling users to encrypt files using their EFS certificates a. Windows Vista b. Windows XP c. Windows 2000 |
|
Definition
|
|
Term
Provides offline file services with encryption using the Local System account a. Windows Vista b. Windows XP c. Windows 2000 |
|
Definition
|
|
Term
(T/F) While booting one of the network computers, an Inaccessible Boot Device error occurs. How would you resolve this problem? Edit the WIN.INI files with the sysedit utility |
|
Definition
False If an error stating that the device referenced in WIN.INI is not found occurs, you need to edit the WIN.INI files with the sysedit utility. |
|
|
Term
(T/F) While booting one of the network computers, an Inaccessible Boot Device error occurs. How would you resolve this problem? Remove any media in the bootable drives and reboot the computer |
|
Definition
True The Inaccessible Boot Device error is caused by the computer trying to boot from a non-bootable media. The solution is to remove any media from the media drives. |
|
|
Term
(T/F) While booting one of the network computers, an Inaccessible Boot Device error occurs. How would you resolve this problem? Remove all media from drives and verify the boot sequence in the BIOS |
|
Definition
False This solution is more appropriate for when an NTLDR file is missing or corrupt, not when you have an Inaccessible Boot Device error. |
|
|
Term
(T/F) While booting one of the network computers, an Inaccessible Boot Device error occurs. How would you resolve this problem? Start the system in Safe Mode and reinstall any recently configured devices or device drivers |
|
Definition
False Starting in Safe Mode and reinstalling devices or drivers is more appropriate to a problem with booting into the GUI. |
|
|
Term
Where do you configure error reporting? |
|
Definition
You configure Windows reporting in the Problem Reports and Maintenance window, where you can turn problem reporting for programs on or off. To do this you first access the Control Panel, access the system and maintenance options, Problem Reports and Solutions, now you can begin changing the settings under advanced options. |
|
|
Term
|
Definition
You can use Windows Error Reporting to notify Microsoft of system and application errors. If an application crashes, Windows displays a Windows Error Reporting dialog box informing the user that the system or an application needs to close. The dialog box then enables you to notify Microsoft of the problem. If you decide that you want to notify Microsoft of the problem, technical information about it is collected and then sent to Microsoft. |
|
|
Term
Tips for using Event Viewer: |
|
Definition
Event Viewer logs are useful for troubleshooting new issues, but you should manage these logs carefully. If you set a maximum size for logs, they can fill up quickly and stop recording new events until the log is cleared. |
|
|
Term
System hangs just before GUI loads |
|
Definition
Errors related to the failure of the system to start the GUI typically manifest themselves in a system that hangs just before the GUI loads. Because device drivers are loaded at this stage, misconfigured drivers, corrupt drivers, or hardware are often the culprits. To resolve this error, you can try starting the system in Safe Mode. If Safe Mode bypasses the problem, the issue is likely with drivers. You should reinstall any devices or device drivers that have recently been configured. |
|
|
Term
What utility can you use to check the registry? |
|
Definition
You can use the Registry Editor, regedit, and search for any invalid entries or corrupt files that could be the cause of the startup error. |
|
|
Term
How would you resolve an error for Device referenced in Registry not found? |
|
Definition
You can try to resolve these errors by using the Windows System Configuration utility, msconfig, to review items loaded during startup, or by manually editing the Registry. Also, if you've added new hardware to the computer the hardware's driver, or the hardware itself might be responsible for the issue. You should troubleshoot them to determine if they're causing the issue. If you've installed a new program, the Registry could have been modified by the software's installation programs. |
|
|
Term
This error might occur if the devices referenced in the Registry aren't found by the system at startup. |
|
Definition
Device referenced in Registry not found |
|
|
Term
How do you resolve Device referenced in SYSTEM.INI or WIN.INI not found ? |
|
Definition
To resolve these errors, you can edit the SYSTEM.INI and WIN.INI files with the sysedit utility. |
|
|
Term
These errors don't affect the functioning of the system in a critical way. |
|
Definition
Device referenced in SYSTEM.INI or WIN.INI not found |
|
|
Term
These errors may occur if the devices referenced in SYSTEM.INI or WIN.INI aren't found by the system at startup. |
|
Definition
Device referenced in SYSTEM.INI or WIN.INI not found |
|
|
Term
How would you resolve the Device/Service has failed to start error? |
|
Definition
To resolve this, you can first try to reconnect the device or restart the service. If the error still persists, you should review the driver details in the Device Manager and try to reinstall or update the driver. |
|
|
Term
What are some reasons you might get the Device/Service has failed to start error? |
|
Definition
This may happen if the device is disconnected or its driver isn't installed properly. |
|
|
Term
This error message is displayed if a device is referenced in the Registry but isn't available at startup. |
|
Definition
Device/Service has failed to start |
|
|
Term
Some startup error messages and their possible causes are |
|
Definition
• Device/Service has failed to start • Device referenced in SYSTEM.INI or WIN.INI not found Device referenced in Registry not found |
|
|
Term
Startup errors may occur due to |
|
Definition
• the failure of a service or a device to start • inability of the system to locate a device or a program in the system registry, and the failure of the system to start the graphical user interface, better known as the GUI |
|
|
Term
How do you troubleshoot a missing NTLDR? |
|
Definition
To troubleshoot this error, you first remove all media from drives and verify the boot sequence in the BIOS to ensure that the system is set to boot from the hard drive. You can also try: • updating the BIOS • copying NTLDR from a backup or a working system • Recovery Console from the operating system installation CD to repair the problem. If these methods don't work, you might need to reinstall the operating system. |
|
|
Term
In Windows Vista and newer operating systems, the boot loader functionality isn't performed by NTLDR, but is provided by _______ and the ______ _____ _______. |
|
Definition
winload.exe Windows Boot Manager |
|
|
Term
In Windows Vista and newer operating systems, the boot loader functionality isn't performed by _____, but is provided by winload.exe and the Windows Boot Manager. |
|
Definition
|
|
Term
begins the process of loading the operating system |
|
Definition
|
|
Term
Incorrect boot sequence settings and a faulty or disconnected hard drive or cable may also result in these errors. |
|
Definition
Invalid Boot Disk or Inaccessible Boot Device errors |
|
|
Term
Why might you use Fixmbr? |
|
Definition
Invalid Boot Disk or Inaccessible Boot Device errors are generated, you could try using Fixmbr on Windows XP or recovery software to resolve the issue. Many computer manufacturers include a disc with useful programs, so you could check the disc for any diagnostic tools. |
|
|
Term
To check the partition table of the hard drive for errors, you use the Recovery Console's _____ utility. |
|
Definition
|
|
Term
If the _____ _____ can't be found on the active partition or the active partition can't be found on the ______ _____, the Invalid Boot Disk or Inaccessible Boot Device errors will display at startup. |
|
Definition
|
|
Term
What happens when Windows encounters a non-bootable disk on startup? |
|
Definition
The Invalid Boot Disk or Inaccessible Boot Device errors are generated. To resolve these errors, you remove the media from the drive and reboot. |
|
|
Term
What can you do to resolve ‘an Inaccessible Boot Device’ error? |
|
Definition
To resolve this problem you should ensure that the hardware in the system and the disk controller don't conflict. You should also check that Windows isn't trying to load the wrong driver. |
|
|
Term
If Windows can't load the _____, you will receive the STOP: 0x0000007B Inaccessible Boot Device error when you start the computer. |
|
Definition
|
|
Term
An Inaccessible Boot Device’ error could be caused when the driver for the _____ _______ can’t be loaded onto the boot device. |
|
Definition
|
|
Term
What can be the reason for getting the ‘An Inaccessible Boot Device’ error? |
|
Definition
It can be caused by the inability of the driver for the disk controller to be loaded on the boot device. |
|
|
Term
Following the ‘Invalid Boot Disk’ error, once in _____ _____, you can return the system to a previously saved restore point using ______ ______. |
|
Definition
|
|
Term
If you receive the ‘Invalid Boot Disk’ error and you want to restore the system files, you need to boot into _______ ______. |
|
Definition
|
|
Term
What two things can be done if you receive the ‘Invalid Boot Disk’ error? |
|
Definition
1. reinstall the operating system 2. or restore the system files. |
|
|
Term
Why might you receive an error for ‘Invalid Boot Disk’? |
|
Definition
The Invalid Boot Disk error may be the result of missing system files. |
|
|
Term
What are the most commonly encountered booting error messages? |
|
Definition
• Invalid Boot Disk • Inaccessible Boot Device missing NTLDR |
|
|
Term
(T/F) Identify how you would optimize your computer's system performance in relation to startup file maintenance. Using the Task Manager to end processes |
|
Definition
False You use the Task Manager to end unnecessary processes running in the background. You wouldn't use it to optimize performance in relation to startup file maintenance |
|
|
Term
(T/F) Identify how you would optimize your computer's system performance in relation to startup file maintenance. Using the CPU Meter gadget |
|
Definition
False You use the CPU Meter gadget to determine a system's performance, not to locate programs causing slow performance. |
|
|
Term
(T/F) Identify how you would optimize your computer's system performance in relation to startup file maintenance. Using msconfig to locate the programs causing slow performance and disable them in the Startup tab |
|
Definition
True You use msconfig to optimize performance on startup by disabling programs that cause slow performance. |
|
|
Term
(T/F) Identify how you would optimize your computer's system performance in relation to startup file maintenance. Enabling UAC |
|
Definition
False You enable UAC to increase security and stop unauthorized changes to a computer, not to locate programs causing slow performance. |
|
|
Term
You can optimize system performance by using the System Configuration tool using what? |
|
Definition
msconfig. Using msconfig, you can locate which programs are causing the slow performance of the computer. You can also locate any unnecessary programs that load during startup. |
|
|
Term
If you want to view data about a system's performance to help speed up a system, you can use what? |
|
Definition
|
|
Term
(T/F) Identify how you would optimize a computer's system performance in relation to the Aero settings. Configuring the settings so that Vista only searches through specific files |
|
Definition
False You configure indexing settings so that Vista only searches through specific files, not Aero settings. |
|
|
Term
(T/F) Identify how you would optimize a computer's system performance in relation to the Aero settings. Disabling transparency |
|
Definition
True Transparency is a resource-intensive setting, and by disabling transparency you will increase system performance. |
|
|
Term
(T/F) Identify how you would optimize a computer's system performance in relation to the Aero settings. Enabling UAC |
|
Definition
False You enable UAC to increase security and stop unauthorized changes to a computer, not to change Aero settings. |
|
|
Term
If UAC is activated, any task that needs administrator privileges will trigger a UAC prompt. What are some tasks that would trigger a UAC prompt include |
|
Definition
• configuring Windows Update • installing device drivers • changing Windows Firewall settings • removing or adding user accounts • installing and uninstalling applications, and • viewing or changing another user's folders and files |
|
|
Term
You can optimize Windows Vista system performance in relation to |
|
Definition
• Aero settings • indexing settings • User Account Control, most commonly known as UAC • side bar settings • startup file maintenance, and background processes |
|
|
Term
List the steps to disable automatic rebooting. |
|
Definition
To complete the task 1. Select Start - Control Panel 2. Click System and Maintenance and click System 3. Click Advanced system settings 4. Click Settings under Startup and Recovery 5. Deselect Automatically restart and click OK twice Automatic rebooting has been disabled. • |
|
|
Term
Where can you go to change the recovery settings? |
|
Definition
You can change the recovery settings in the System Properties dialog box. You access it from the Control Panel. |
|
|
Term
One of the solutions to the auto-restart errors might be to change the ______ ______. If a system is behaving abnormally, it's a good idea to prevent it from entering a rebooting loop in the case of system failure. To do so, you clear the Automatically restart checkbox in the Startup and Recovery dialog box so that the computer doesn't restart or reboot each time the system experiences an error. |
|
Definition
|
|
Term
(T/F) By default, the recovery settings of Windows Vista are configured to reboot the system automatically if the system experiences a fatal error. |
|
Definition
|
|
Term
If new software or a new driver has been installed on the system and the system starts ______ _______, you should investigate known incompatibilities between the software and the operating system or research compatible drivers. |
|
Definition
|
|
Term
may result in system instability, causing the system to reboot. |
|
Definition
|
|
Term
A computer may repeatedly reboot for several reasons including |
|
Definition
• problems with the BIOS • software or driver incompatibilities • recovery settings configured to reboot |
|
|
Term
(T/F) A system has locked up during normal use, and you think this was caused by an unresponsive program. How would you resolve this problem? Relocating the program files |
|
Definition
False Relocated program files may prevent an application from running when launched via a shortcut. |
|
|
Term
A system has locked up during normal use, and you think this was caused by an unresponsive program. How would you resolve this problem? (T/F) Use the system’s log files to establish what the system was busy with |
|
Definition
True You can use the system’s log files to establish what the system was doing when it locked up. Often unresponsive programs cause a system to lock up during normal use. |
|
|
Term
A system has locked up during normal use, and you think this was caused by an unresponsive program. How would you resolve this problem? (T/F) Download the latest drivers |
|
Definition
False You would update the drivers if a particular device had failed, not a program. |
|
|
Term
A system has locked up during normal use, and you think this was caused by an unresponsive program. How would you resolve this problem? (T/F) Disable firewalls and antivirus applications |
|
Definition
False You should disable firewalls and antivirus applications if an installation halts or ends abruptly. Firewalls and antivirus applications are unlikely to cause a program to suddenly stop working. |
|
|
Term
If an installation halts or ends abruptly, you can try temporarily disabling _______ and antivirus applications. Sometimes these programs can prevent you from successfully installing software. |
|
Definition
|
|
Term
If a program has stopped responding or there is a change in its performance, you should scan the system, this is especially helpful if a program behaves erratically even after rebooting the computer. |
|
Definition
|
|
Term
What should you do if a program that used to work suddenly stops running? |
|
Definition
You should try relocating the program files or reinstalling the program. This problem is often evident when attempting to launch a program through a shortcut that points to the previous location of a moved program file. |
|
|
Term
If a program used to work but has suddenly stopped running, some or all of the program-related files may have been what? |
|
Definition
deletion or relocation of program-related files |
|
|
Term
This may prevent a program from running. If a computer is running several memory-intensive programs, you may need to close some to get other programs to run properly. |
|
Definition
unavailability of system resources |
|
|
Term
If the software installation becomes _____ the software won't start. You may need to uninstall and reinstall the software to run it. |
|
Definition
|
|
Term
A program may refuse to start or load because of: |
|
Definition
• corrupt installation • unavailability of system resources • deletion or relocation of program-related files • virus-infected files |
|
|
Term
Problems with the I/O devices manifest themselves in the devices not working or in error messages such as "Optional Device Will Not Function." You can troubleshoot these issues and update device drivers in the _______ ______. |
|
Definition
|
|
Term
Blue screen system lockups generate a ______ ______ _____ containing debugging information. You can examine this information to troubleshoot the problem. |
|
Definition
|
|
Term
(T/F) Event Viewer files can provide clues on what the system was doing when it locked up. |
|
Definition
|
|
Term
Another utility you can use to troubleshoot _______ ______ is Event Viewer. Event Viewer logs all events, such as user logins and program installations, so you can check the logs and isolate any changes that might have caused problems. |
|
Definition
|
|
Term
(T/F) Blue screen errors include codes you can research to find the solution to the error. |
|
Definition
|
|
Term
Blue screen errors often result from changes that have been made to the system. To troubleshoot a blue screen, you first need to: |
|
Definition
identify and isolate any such change. |
|
|
Term
(T/F) You can start, stop, pause, or resume the Print Spooler service based on your requirements. |
|
Definition
|
|
Term
You can view the Print Spooler service – spoolsv.exe – using the ______ _____-___ accessed from Administrative Tools in the Control Panel. |
|
Definition
|
|
Term
If the printer is configured to use ______ _______, the print jobs are sent to the spooler, which saves these jobs on the hard disk. |
|
Definition
|
|
Term
There are a number of common operational issues that you need to be able to resolve (6): |
|
Definition
• print spool and driver problems • blue screen • errors in the log files • system lock-up • device driver problems, and • application launch or load problems |
|
|
Term
(T/F) You can use UAC to protect your computer against malicious software. |
|
Definition
True But the way UAC works depends on whether you have administrative rights or standard rights. |
|
|
Term
(T/F) UAC eliminates the need to seek permissions for tasks such as launching an application, modifying power-management settings, or adding a printer. |
|
Definition
|
|
Term
(T/F) After you disable UAC on your computer, you need special permission to enable it. |
|
Definition
|
|
Term
|
Definition
|
|