period 2 chapter 11- Eric Zavala

123456789101112131415161718192021222324252627282930
Across
  1. 3. This is the use of an external flash device to enable Windows to treat an external flash device, such as a USB drive, as hard drive cache to enhance performance.
  2. 5. a dynamic disk that has been moved to a computer from another computer running Windows
  3. 10. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
  4. 13. monitors programs on the computer and warns users when an action might present a threat to the computer
  5. 14. a private network that connects remote sites or users together over a public network, like the internet
  6. 17. displays the Group Policy settings that are in effect for a currently logged in user
  7. 18. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network paththe command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
  8. 19. opens Microsoft Management Console
  9. 21. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
  10. 22. a dynamic disk that is corrupted, turned off, or disconnected
  11. 23. a basic disk that is being converted into a dynamic disk
  12. 25. These are identified with a dollar sign ($) at the end of the share name.
  13. 28. a command-line terminal emulation protocol and program that works over port 23
  14. 30. contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
Down
  1. 1. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
  2. 2. Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
  3. 4. This is used to create customized system image files that will be installed on computers in the enterprise.
  4. 6. This is used to update a local machine and verify that the machine is getting Group Policy updates.
  5. 7. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
  6. 8. provides very weak security and should not be relied upon for confidentiality
  7. 9. a disk that does not contain a valid signature
  8. 11. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
  9. 12. used by most application installation programs to install software. In 32-bit versions of Windows, all programs are 32-bit and are installed in the folder C:\Program Files. In 64-bit systems, 64-bit programs are installed in the folder C:\Program Files, while 32-bit programs are installed in the folder C:\Program Files (x86).
  10. 15. It displays details for all DirectX components and drivers that are installed in a computer.
  11. 16. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
  12. 20. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
  13. 24. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
  14. 26. opens the Remote Desktop utility
  15. 27. a volume that is functioning properly
  16. 29. the command that is used to query the DNS server to discover IP addresses or host names