To create a capture image, you use the Deployment Workbench console. | T | F | 3. The Windows 7 AIK script files used to perform unattended installations are called task sequences. | T | F | 4. You can use the boot images created by Deployment Workbench to start
UNIX/Linux versus Mac versus Windows Preamble Although there are important differences in the Linux, Mac, and Windows operating systems (OS), it is important to note many of the similarities. By understanding what these operating systems have in common, the significance of the differences is clear. According to Andrews (2007), OS’s share the common four main functions: 1. Provides a User Interface (UI) – performs user requests concerning storage devices, including formatting disks, deleting, and copying files, and changing the computer system’s date. The OS UI provides a way for users to manage applications, data, software, and hardware.
University of Phoenix Material Unix® and Linux® Comparison Matrix Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare. Insert the three chosen versions and fill out the requested information in the Components column. UNIX® or Linux® operating system version: Red Hat Enterprise Linux |Components |Your response | |Role of shell |Uses a Bash command shell. The Shell provides the ability to interact and access a computer | | |system. This is mostly used for administrative purpose to either update the server, or add a | | |role to server, or install a program.
Lesson 5 Connecting to a Network Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a __________________. firewall 2. The __________________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7.
The process of taking something apart and revealing the way in which it works is often an effective way to learn how to build a technology or make improvements to it. When reverse engineering software, researchers are able to examine the strength of systems and identify their weaknesses in terms of performance, security, and interoperability. The reverse engineering process allows researchers to understand both how a program works and also what aspects of the program contribute to its not working. • What are the advantages and disadvantages of using reverse engineering to discover the logics of a software program? Reverse engineering in software is reversing a program's machine code back into it's original source code.
Lesson 2 knowledge Assessment Fill in the Blank 1. The primary tool used to configure the Windows environment and hardware is the control panel. 2. UAC is a feature that helps prevent a program making a change without you knowing about it. 3.
Resource sharing and device redirection Remote file access Remote printer access Inter-process communication Network management Directory services Electronic messaging (such as mail) Network virtual terminals 7.What functions resides under the transport layer? Message segmentation: accepts a message from the (session) layer above it, splits the message into smaller units (if not already small enough), and passes the smaller units down to the network layer. The transport layer at the destination station reassembles the message. Message acknowledgment: provides reliable end-to-end message delivery with acknowledgments. Message traffic control: tells the transmitting station to "back-off" when no message buffers are available.
User Profile D. SHIM 7. What replaced the MS-DOS boot disks for fixing and troubleshooting a wide range of boot problems on a Windows Vista or 7 system? A. WinMin C. Boot.ini B. Windows PE D. Ntldr 8. In windows 7, what is designed to replace VB Script for scripting and performing actions?
How is Windows Server 2008 different from Windows Server 2003? The new changes in Windows Server 2008 are virtualization, a Server Core installation, IIS 7, role-based installation, Read Only Domain Controllers, enhanced terminal services, Network Access Protection, Windows PowerShell and better security. Windows Server 2008 is different from Windows Server 2003 because it has Server Core and Hyper-V. 3. Why is 64-bit architecture an advantage? The advantage of 64-bit architecture is that it is backward compatible with a 32-bit architecture.
a. autounattend.xml b. auto.xml c. auto.txt d. automatic.xml 3. What is the program you should use to create or validate an answer file used to install Windows? a. IAS b. Server Core c. SIM d. WDS 4. What is the maximum amount of memory that