3. When you copy a file to a library, Windows Explorer writes the file to the folder designated as the Save Location. 4. To use federated search, you must download or create XML files for specific sites called Search Connector. 5.
Unit 4 Problem Set 1 - Unit 4 Problems Exercise 1 – User-Profile Scenario Matching a. Switches an account from the standard user token to the administrative token b. Displayed when a regular user requires administrative access c. Confirmation of a user’s identity d. Suppresses the operation of all controls except the UAC prompt e. Enables users to access their desktops from any workstation f. Grants a user a specific degree of access to a resource g. Hosts and AD DS domain h. Displayed when an administrator requires administrative access i. Placeholder for a collection of users with a similar characteristic j. A profile the multiple users can run simultaneously 1. A Credential prompt 2. E roaming user profile 3.
For stand-alone systems or small networks, Windows 7 includes backup tools that you can use to protect your data. Which of the following devices do the Windows 7 backup tools not permit for backup storage? An online backup service. READ FULL
Most networks use Dynamic Host Configuration Protocol to dynamically assign addresses and configure computers to use them. 9. The Windows 7 utility that displays a list of the routers currently forwarding packets to a particular destination is called Tracert.exe. 10. The top and bottom layers of the OSI model are called the Application and Physical
A local application is a program such as a word processor or a spread sheet that is stored on a local computer and runs only on that local computer. A network application is one that is designed to run over a network such as the internet, or a small or large network of connected computers, it has two components one that runs on the local computer and one that runs on a network computer such as email. 4. [pic] 5. List the six common types of computers available.
Group nesting 4. The Administrator and Guest user accounts are examples of C. Built-in user account 5. Which command-line tool can be used to create various object types within Active Directory? C. dsadd 6. Which input file format allows you to create, modify, and delete objects within Active Directory?
Clear the Automatically Manage Paging File Size for All Drives check box. Under Drive Volume Label, click the drive that contains the paging file you want to change. Click Custom Size, enter a new size in megabytes in the Initial Size (MB) or Maximum Size (MB) box, click Set, and then click OK. Windows ready boost can be used to enhance your computers disk caching capabilities as flash drives can be up to ten times faster than accessing regular harddrives. This enables windows vista machines to access cached data on the flash drives rather than the local harddrives. This type of caching is applied to all disk content, not just the page file but the computer's overall performance is boosted.
Answer sheet Question 1 a) Control panel provides you with access to a variety of tools that can be used for changing the hardware and software configuration of your system. Some examples of hardware control panels are Display, Keyboard, and Mouse settings. Software control panels include Date and Time, Power Options, Fonts, and Administrative Tools. By default, all tools of the panel are displayed under categories such as System and Security, User accounts and Family safety, Network and Internet and Appearance and Personalization. Many control panels are included as part of the Windows operating system, but others can be installed by third-party applications or utilities.
through sharing and collaboration of code and features through forums etc and it is distributed by various vendors such as Debian, Red Hat, SUSE, Ubuntu, GentuX etc. | Windows is developed and distributed by Microsoft. | Manufacturer: | Linux kernel is developed by the community. Linus Torvalds oversees things. | Microsoft created the Windows operating system, but allows other computer manufactures to distribute their computers with Windows pre-installed.
[a] P146 _______ 6. Use this option to configure GPO settings for a particular user based on the location in Active Directory of the user's computer. [h] P150 _______ 7. This option will allow you to configure separate local GPOs for administrators and non-administrators on a Windows Vista computer. [j] P141 _______ 8.