Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (40)
A distribution share installation is always faster than a DVD boot installation.
False
Windows 10 Enterprise and Education editions do not include support for tablet computers as a standard feature.
False
A clean installation of Windows 10 performed on a computer that has existing data or applications.
False
The DVD boot installation method is the most suitable method for a large volume of computers.
False
The installation process of Windows 10 takes a snapshot of the computer's hardware and calculates a digital signature to identify that computer
True
If you do not specify an answer file, then which of the following will Sysprep search for to use as an answer file?
a. generalization.xml
b. prep.xml
c. unattend.xml
d. installation.xml
c. unattend.xml
Which of the following terms represents a collection of data, files, and instructions with a specific purpose while it is running?
a. command
b. process
c. thread
d. order
b. process
Which of th following installation methods is the least suitable method for a large volume of computers?
a. distribution share
b. image-based
c. local share
d. DVD boot
d. DVD boot
Which of the following is used to perform offline servicing of WIM images?
a. WDS
b. Package Manager
c. Deployment Image Servicing and Management (DISM)
d. Windows PE
c. Deployment Image Servicing and Management (DISM)
Which of the following are software packages containing drivers, service packs, or security updates that are applied to an image during the offline Servicing configuration pass of the installation.
a. Configuration sets
b. Distribution shares
c. Image sets
d. Offline updates
d. Offline updates
The path to the distribution share should always be referred to by which path to ensure that it can be accessed over the network during unattended installations?
a. Active Directory Convention (ADC)
b. Domain Controller Convention (DCC)
c. Configuration
Set Convention (CSC)
d. Universal Naming Convention (UNC)
d. Universal Naming Convention (UNC)
Which of the following systems have more than one physical CPU?
a. Multiprocessor
b. Multitasking
c. Hyper-Threading
d. Multi-Core
a. Multiprocessor
Which of the following is a limited and non-GUI version of Windows based on Windows 10 technologies that can be used for installing, troubleshooting, and repairing Windows 10?
a. Windows PE
b. WAIK
c. USMT
d. DISM
a. Windows PE
Which Windows feature uses audio and speech to interact with a user to search for information?
a. Cortana
b. Continuum
c. Edge
d. Start menu
a. Cortana
Which of the following types of CPUs have extra hardware built in to allow more than one thread to be processed at the same time on a single CPU?
a. Multi-Core
b. Multitasking
c. Hyperthreading
d. Preemptive
c. Hyperthreading
Which of the following is the subset of files in a distribution share that are required for a particular answer file?
a. distribution set
b.
configuration set
c. image set
d. offline update
b. configuration set
Which of the following installation methods requires computers to be booted into Windows PE from removable storage and then run the Windows 10 installation from a server?
a. local share
b. image-based
c. distribution share
d. DVD boot
c. distribution share
Which of the following assumes that hardware components can be connected or activated at any time while the operating system is running?
a. Multitasking technology
b. Plug and Play technology
c. Multiprocessing technology
d. Hyperthreading technology
...
Which Windows feature automatically adjusts the display and input methods depending on the form factor being used and whether a hardware keyboard is active?
a. Cortana
b. Continuum
c. Edge
d. Start menu
b. Continuum
What system-specific data does the workstation create when a generalized image is applied to a workstation?
a. computer SID
b. Windows version
c. installation path
d. Windows system path
a. computer SID
If a threat is not finished running, perhaps because it had to wait or it was preempted, it is typically restarted on the same processor that previously ran it. What is this known as?
a. multitasking
b. preemptive multitasking
c. processor affinity
d. cooperative multitasking
c. processor affinity
Which of the following configuration passes is applied during the portion of installation where users are asked for information after the second reboot?
a. oobeSystem
b. Windows PE
c. specialize
d. offlineServicing
a. oobeSystem
Which file system should you use if you want to use EFS?
a. virtual
b. NTFS
c. GPT
d. FAT32
b. NTFS
Which installation method is the fastest type of installation and provides the highest level of customization?
a. image-based
b. DVD boot
c. attended
d. distribution share
a. image-based
What new feature in Windows 10 allows the user to create multiple desktops that can host different open windows?
a. Open Desktop
b. Virtual Desktop
c. Window Manager
d. Windows CardSpace
b. Virtual Desktop
How much RAM is supported by the 32-bit version of Windows 10?
a. 4 GB
b. 2048 GB
c. 64 GB
d. 16 GB
a. 4 GB
After the customized image is created, it is placed on a distribution share by using Windows _______________
SIM
When you run ________________ to generalize an image, you must also select a system cleanup action.
Sysprep
The _________ boot installation method is suitable for small organizations that only occasionally install Windows 10.
DVD
______________ installation requires the creation of a customized image that you apply to each computer.
...
Programmers compile a list of instructions to build their applications. These instructions are typically grouped into units of code called________________
Threads
The Windows 10 feature that automatically adjusts Windows 10 between desktop mode and tablet mode as the device state changes.
Continuum
A personalized virtual search assistant
Cortana
The traditional configuration for a Windows 10 computer that is optimized for use with a mouse and keyboard
Desktop mode
Software written by the developer of a hardware component that tells the operating system how to talk to and control the hardware.
Device driver
Server responsible for holding a domain security database
Domain controller
A file that holds application code modules
(DLL) Dynamic Link Library
A technique used in certain Intel processors to improve their overall performance by working on more than one independent piece of code at a time.
Hyperthreading
Term used to describe the appearance of more than one application sharing the CPU of the computer
Multitasking
The amount of time allocated to a program running in a preemptive multitasking environment.
Quantum
Recommended textbook solutions
Introduction to the Theory of Computation
3rd EditionMichael Sipser
389 solutions
Engineering Electromagnetics
8th EditionJohn Buck, William Hayt
483 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Computer Organization and Architecture
10th EditionWilliam Stallings
497 solutions
Sets with similar termsInstalling Windows
37 terms
Nixxer_
Cna 121 Chapter 2
53 terms
Hilde11
Mindtap Unit 2 Quiz
20 terms
MartinezM753
Microsoft Specialist Guide to Microsoft Windows 10…
41 terms
jimmboy48
Sets found in the same folderWindows Configuration: Windows 10 - Chapter 3-4
40 terms
gabrielem21
Windows Configuration: Windows 10 - Chapter 5-6
45 terms
gabrielem21
Windows Configuration: Windows 10 - Chapter 7 & 8
45 terms
gabrielem21
Windows Configuration: Windows 10 - Chapters 9/10
45 terms
gabrielem21
Other sets by this creatorCIS 124 Database Design - Chapter 2
20 terms
gabrielem21
CNG120 A+ Certification
214 terms
gabrielem21
Microhardware
228 terms
gabrielem21
Windows Configuration: Windows 10 - Chapters 11 -…
45 terms
gabrielem21
Verified questions
COMPUTER SCIENCE
Let X[1..n] and Y[1..n] be two arrays, each containing n numbers already in sorted order. Give an O(lg n)-time algorithm to find the median of all 2n elements in arrays X and Y.
Verified answer
COMPUTER SCIENCE
Pick an example of an interesting real-world object and describe it as a programming object by listing its data (attributes, what it "knows") and its methods (behaviors, what it can "do").
Verified answer
COMPUTER SCIENCE
Compare symmetric and asymmetric encryption schemes, and discuss the circumstances under which a distributed system would use one or the other.
Verified answer
COMPUTER SCIENCE
Write code that opens the file data.txt for both input and output, but first determines if the file exists. If the file does not exist, the code should create it, then open it for both input and output.
Verified answer
Other Quizlet setsKIN 366 Final Exam
14 terms
svahern62
HDFS 402 Midterm fall 21
20 terms
katidav
aws pro2
80 terms
minhpham052
KSHSAA 2022-23 Volleyball Exam
50 terms
breezy_38
Related questionsQUESTION
how are user level threads implemented?
2 answers
QUESTION
The process of comparing real computer configurations to known baselines is called:
10 answers
QUESTION
Directory that contains virtual files allowing direct access to system & kernel information
3 answers
QUESTION
What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password? (week 13 prac example Q. 17)
2 answers