driver signing |
Microsoft uses this technique to indicate that a device driver has passed Microsoft’s test for compatibility |
Secure Boot |
This UEFI firmware features loads only trusted operating system bootloaders |
Roll Back Driver |
Use this feature of Device Manager when an updated device driver causes problems. |
value entry |
What is the term for an individual setting within a registry key? |
root key |
What type of Windows registry object is shown as a top level folder in Regedit, contains one or more settings, and is at the top of one of five hierarchies? |
msconfig |
What would you enter in the Windows Run box to launch System Configuration? |
Last Known Good Configuration |
Which Advanced Boot Options menu choice will start Windows 7 normally using the settings that existed at the last successful user logon? |
You will need to respond to a UAC Credentials prompt |
With UAC enabled, what will you need to do if you attempt to install a device driver in Windows 7 while logged on as a standard user? |
Device Stage |
With this feature, introduced in Windows 7, a printer or other device can have a "home page" within the Devices and Printers folder from which you can manage all the features of the device |
Subkey |
What is the term for a registry key within a key? |
Winload.exe |
What Windows Vista, Windows 7, and Windows 8 file is the OS loader boot program? |
UNIX |
What type of OS is Darwin, the core of Mac OS X? |
Dock |
You can quickly launch programs that have an icon sitting on this GUI object on the Mac OS X desktop |
Finder |
This is the main file management tool in the Mac OS X desktop |
Expose |
This feature of the Mac OS X desktop allows you to select an open application from an array of miniature graphical windows |
Macintosh |
What important Apple product (with a GUI) was introduced in 1984? |
Apple Menu |
Check the version of Mac OS X by opening this desktop object and selecting About This Mac |
Registration Information |
What is the name of the page of the Mac OS X Installer that requests your personal information; you can skip it, even though it prompts you to go back and complete it? |
Software Update |
If you have an Internet connection, what message box will appear soon after you complete a new installation? |
Mac OS X Setup Assistant |
The first time you power on a new Mac this program automatically runs. |
Apple menu| System Preferences| Hardware |
How can you quickly open an extensive list of installed hardware and software in Mac OS X |
Apple Menu |
From this menu you can shut down you computer, access configuration settings, update software, put your Mac to sleep, restart, log out, access recent items, and learn about your Mac. |
System Preferences |
This is the Mac OS X equivalent of the Windows Control Panel where you can make many configuration changes to your system. |
Spaces |
Using this feature of Mac OS X, you can have separate sets of open program windows for the desktop. It is a handy way to organize different projects or to keep your personal work separate from your professional work |
List |
Use this Finder view if you need to see a wealth of information about files and folders at a glance, including date modified, size, and kind of object (folder or type of file) |
Terminal |
Launch this from the Utilities folder and work at Max OS X’s BASH shell, complete with the $ prompt. |
Time Machine |
Use this preference pane to configure automatic system backups for your iMac. |
the user’s home folder |
When you start Finder from the Dock what folder does it open by default? |
Applications |
What folder contains the Utilities folder? |
show all button |
You have the appearance preference pane open; which of the following will quickly return you to the main System Preferences window? |
Command-space bar |
What key combination will quickly open the OS X search utility |
Command-X |
What key combination will cut a selected item? |
Security preferences pane |
Where can you configure the Max OS X Firewall settings? |
FileVault |
What OS X feature would you turn on to encrypt your home folder? |
Master Password |
If you have this set, you can use it to unlock any account on a computer and access any encrypted home folders when a user forgets a login password. |
Secure Virtual Memory |
If you work with data that you must protect from snooping, turn this feature on so that clever hackers cannot access the swap file in an effort to read confidential data. |
keychain |
This Mac OS X feature is a secure database of a user’s passwords |
administrator |
This type of Mac OS X user account can change all system preference settings and install software in the main application and library folders. It can also create, modify, and delete user accounts. What type of account is this? |
root |
This all-powerful account is disabled by default and Apple has tried to ensure that you should never, or rarely, need to use it. |
Automatic Login |
In most cases, this should not be turned on because it bypasses a very important security feature. |
OS X Installation DVD |
You have forgotten the password for your account on your MacBook Pro with Mac OS X. You are locked out of your computer. Which of the following will allow you to reset the password so that you can log on again? |
Windows creates this database of configuration settings during installation. |
registry |
What is an entry in the Windows registry that begins with S-1-5? |
Security ID |
What type of Windows registry object is shown as a top level folder in Regedit, contains one or more settings, and is at the top of one of five hierarchies? |
root key |
What tool can you use to back up just a portion of the registry? |
Regedit |
What is the term for an individual setting within a registry key? |
value entry |
When using Regedit to browse through the registry, the key that is highlighted is the ____________, and its value entries are visible in the contents pane on the right. |
active key |
What is the term for a registry key within a key? |
subkey |
This term applies to a file that contains a hierarchy of registry keys and is also a part of the permanent registry. |
hive |
During this phase of startup, the firmware bootstrap loader program uses hardware configuration settings stored in nonvolatile memory to determine what devices can start an OS and the order in which the system will search these devices. |
Initial startup |
This Windows 8 feature examines each of the system files required for the boot process before it loads into memory. If one appears to be altered, an unmodified version of the file is used. |
Trusted Boot |
This UEFI firmware features loads only trusted operating system bootloaders. |
Secure Boot |
This Windows 8 feature brings the hibernated system session from a Windows 8 Hybrid Shutdown out of hibernation to speed up Windows 8 startup. |
Fast Boot |
What is the name of the boot loader file in Windows Vista, Windows 7, and Windows 8? |
Bootmgr |
What Windows Vista, Windows 7, and Windows 8 file is the OS loader boot program? |
Winload.exe |
What is the name of the file containing a database that is loaded by the Windows Vista, Windows 7, and Windows 8 boot loader program? |
BCD |
During the Windows kernel-loading phase, the kernel (Ntoskrnl.exe) is loaded into memory by the following file: |
Boot Manager (Bootmgr) |
Use this feature of Device Manager when an updated device driver causes problems. |
Roll Back Driver |
This term describes encrypted data placed in a file so that it can be verified later. |
digital signature |
This term describes the act of decrypting encrypted data placed in a file to determine if the file was modified. |
file signature verification |
Microsoft uses this technique to indicate that a device driver has passed Microsoft’s test for compatibility. |
driver signing |
With this feature, introduced in Windows 7, a printer or other device can have a "home page" within the Devices and Printers folder from which you can manage all the features of the device. |
Device Stage |
With UAC enabled, what will you need to do if you attempt to install a device driver in Windows 7 while logged on as a standard user? |
You will need to respond to a UAC Credentials prompt. |
While not the most drastic Windows 8 recovery option, _______________ removes apps you installed from disc as well as those not purchased from the Windows Store. |
Refresh your PC |
When creating a shortcut for Device Manager, enter this file name and extension. |
devmgmt.msc |
When troubleshooting Windows Vista, Windows 7, or Windows 8 startup problems use this utility to modify and test startup configuration settings. |
System Configuration Utility |
If you are having trouble starting Windows 7 in Safe Mode because you are unable to access the options menu, you can configure this utility to start Windows in Safe Mode the next time it restarts. |
MSCONFIG |
What is the full name of the MSCONFIG utility? |
System Configuration Utility |
What would you enter in the Windows Run box to launch System Configuration? |
msconfig |
Which Advanced Boot Options menu choice will start Windows 7 normally using the settings that existed at the last successful user logon? |
Last Known Good Configuration |
Which Windows 7 Advanced Boot Options menu choice is not meant for desktop versions of Windows but for Windows server OSs in the role of domain controllers? |
Directory Services Restore Mode |
$ |
At the Linux command shell, when an ordinary user is logged on, the prompt ends with which of the following characters |
Several Hundred Megabytes |
Considering the Ubuntu Linux example in the chapter, which of the following would you expect to be the size of the download of a Linux distribution for the desktop? |
File |
Everything in Linux is a ____________. |
Linus Torvalds |
In spite of his key role in the development of Linux, this person receives no direct financial gain |
sudo |
Precede a Linux shell command with this command when you are logged on as an administrator, and you can temporarily run the command, even if it normally requires root-level privileges. |
Kickoff application launcher |
The KDE GUI in Fedora discussed in this chapter has a screen object resembling the Windows desktop Start menu. What is the name of this object? |
Absolute path |
The command line cd/usr/sbin is an example of the use of a/an _______________. |
X window system |
This GUI shell standard was developed in 1984 at MIT. |
/bin |
This default Linux directory contains many of the Linux commands. |
X consortium |
This group formed in 1986 to continue the development of a standard for GUI interfaces. |
live image |
This is a bootable image of the operating system that will run from disc or other bootable media without requiring that the OS be installed on the local computer. |
shell |
This is the generic term for the user interface to an OS that accepts commands and displays error messages and other screen output. |
home dictionary |
This is the one place in Linux where an ordinary user has full control. |
cp |
Use this shell command to copy files. |
chomd |
Use this shell command to modify file permissions |
Relative Path |
Using a special symbol, such as the tilde (~) or two dots (..), as a parameter to certain shell commands, you can move around directories in Linux using _______________. |
more |
What command displays the entire contents of a file, pausing when the screen is full and waiting for a keystroke to continue? |
/etc |
What directory contains settings and configuration data and is one of the directories created by default in Linux? |
OSF |
What organization was created in 1988 to lobby for an open UNIX? |
Read and Write |
What permissions are assigned by the access mode number 6? |
cd~ |
Which command will change to the user’s home directory, regardless of the current directory? |
userdel |
Which command will delete a user? |
Dash |
Which of the following is a search tool in the Ubuntu Unity GUI? |
GNOME |
Which of the following is an implementation of the X Windows System? |
Apache |
Which of the following is the short name for a very popular Web server first developed for UNIX, but available for Linux and other operating systems. |
The user’s home dictionary is not deleted |
Which of the following is true when you delete a user in Linux? |
-a |
Which of the following options for the ls command will show a listing of all files, including hidden files? |
shutdown-h now |
Which of the following will result in an error message if you enter it at the Linux command prompt? |
sudo shutdown now |
Which of the following would you enter at the Linux command line to shut down Linux immediately and to halt (power off) the computer. |
pwd |
Which one of these commands will display the current directory? |
Combo with -Cita 120 Chapter 6- and 3 others
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price