period 2 chapter 11- Eric Zavala
Across
- 3. This is the use of an external flash device to enable Windows to treat an external flash device, such as a USB drive, as hard drive cache to enhance performance.
- 5. a dynamic disk that has been moved to a computer from another computer running Windows
- 10. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
- 13. monitors programs on the computer and warns users when an action might present a threat to the computer
- 14. a private network that connects remote sites or users together over a public network, like the internet
- 17. displays the Group Policy settings that are in effect for a currently logged in user
- 18. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network paththe command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
- 19. opens Microsoft Management Console
- 21. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
- 22. a dynamic disk that is corrupted, turned off, or disconnected
- 23. a basic disk that is being converted into a dynamic disk
- 25. These are identified with a dollar sign ($) at the end of the share name.
- 28. a command-line terminal emulation protocol and program that works over port 23
- 30. contains most of the files that are used to run the computer and is located in the folder C:\Windows\system32
Down
- 1. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
- 2. Windows stores most of the files created by users in the Users Folder, C:\Users\User_name\.
- 4. This is used to create customized system image files that will be installed on computers in the enterprise.
- 6. This is used to update a local machine and verify that the machine is getting Group Policy updates.
- 7. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
- 8. provides very weak security and should not be relied upon for confidentiality
- 9. a disk that does not contain a valid signature
- 11. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO). SSO allows users to sign in to multiple systems with only one username and password.
- 12. used by most application installation programs to install software. In 32-bit versions of Windows, all programs are 32-bit and are installed in the folder C:\Program Files. In 64-bit systems, 64-bit programs are installed in the folder C:\Program Files, while 32-bit programs are installed in the folder C:\Program Files (x86).
- 15. It displays details for all DirectX components and drivers that are installed in a computer.
- 16. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
- 20. This is a virtual folder that presents content from different locations within the same view. Windows 10 creates 6 default libraries on installation.
- 24. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
- 26. opens the Remote Desktop utility
- 27. a volume that is functioning properly
- 29. the command that is used to query the DNS server to discover IP addresses or host names