Per 2 Chapter 11 - Rios, D

123456789101112131415161718192021222324252627282930
Across
  1. 1. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another.
  2. 5. provides very weak security and should not be relied upon for confidentiality
  3. 7. It displays details for all DirectX components and drivers that are installed in a computer.
  4. 9. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
  5. 11. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
  6. 15. which version of windows has a similar start button and task bar to windows 7
  7. 16. This is a secure alternative to Telnet and other file copy programs such as FTP, and which communicates over TCP port 22 using encryption to protect the session.
  8. 17. Frist version of windows in which anti-virus was integrated into the OS
  9. 18. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
  10. 21. a Microsoft word document
  11. 22. the command that is used to query the DNS server to discover IP addresses or host names
  12. 24. a command-line terminal emulation protocol and program that works over port 23
  13. 27. This command opens its own command prompt under which many of the functions of the Windows Disk Management utility can be performed.
  14. 28. the number of pixels displayed expressed as a number of horizontal and vertical pixels.
  15. 30. these users can only make configuration changes that affect their own profile.
Down
  1. 2. where does windows store most of the files created by the users.
  2. 3. This is used to update a local machine and verify that the machine is getting Group Policy updates.
  3. 4. a private network that connects remote sites or users together over a public network like the internet
  4. 5. this version of windows supports gadgets on desktop.
  5. 6. these users can access files from other users.
  6. 8. displays the Group Policy settings that are in effect for a currently logged in user
  7. 10. forces a DHCP client to renew its DHCP address lease from the DHCP server
  8. 12. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
  9. 13. Networks which use this authentication protocol, such as Windows Active Directory, allow for Single Sign-On (SSO).
  10. 14. Number of times the screen is redrawn per second.
  11. 19. Microsoft assistant in version 10
  12. 20. provides access to many common functions of windows.
  13. 23. monitors programs on the computer and warns users when an action might present a threat to the computer
  14. 25. This is a virtual folder that presents content from different locations within the same view.
  15. 26. This is used to create customized system image files that will be installed on computers in the enterprise.
  16. 29. opens the Remote Desktop utility