Chapter 1

12345678910111213141516
Across
  1. 3. A networking technology included in Windows Vista and later operating systems that allows clients to use IPv6 to communicate with each other over LANs or the Internet.
  2. 7. An encryption technology for individual files and folders that can be enabled by users. Files encrypted with EFS are not readable without the correct digital identification.
  3. 10. A standard for organizing files and folders on a hard disk partition. This standard is more complex than FAT but adds more management features. This is the preferred standard for storing files on a hard disk.
  4. 13. A directory of network information about users, computers, and applications that links multiple domains together.
  5. 14. A server that holds a copy of Active Directory information.
  6. 15. A file that holds application code modules. These modules are shared among applications, so the file is also called a library. DLL files can be replaced to update an application without having to replace the entire application
  7. 16. A method for applications to share a CPU and appear that they are all running at the same time. This method adds time limits and priority levels to determine how long an application can use the processor and which application gets to go next. An application can also be preempted by another application if it has a higher priority level.
Down
  1. 1. A standard service in the TCP/IP protocol used to define how computer names are translated into IP addresses.
  2. 2. An update process for Windows 10 in which new features are continuously published and installed to existing Windows 10 installations.
  3. 4. A common application platform available on every device that runs Windows 10. The UWP provides a guaranteed core programming interface across devices. The developer can create a single application package that can be installed onto a wide range of devices and unlock the unique capabilities of each device.
  4. 5. A general term used to describe hardware that can be plugged in to the computer system and removed at any time. The computer will recognize the hardware dynamically, load a device driver for it, and make it available to the user in a short period of time.
  5. 6. A security system that requires more than one method of proving someone or something is who or what it is declared to be. Different methods are used to independently verify the user’s identity for a transaction or sign-in attempt, such as a password plus a fingerprint. Each layer increases the difficulty an attacker faces trying to breach the security of a target.
  6. 8. Software written by the developer of a hardware component that tells the operating system how to talk to and control the hardware.
  7. 9. A technique used in certain Intel processors to improve their overall performance by working on more than one thread at a time.
  8. 11. A chip on the motherboard of a computer that is designed to securely store encryption keys and certificates.
  9. 12. A new feature in Windows 10 that allows users to create multiple desktops with different applications and switch between them on a single monitor.