Across
- 6. The invisible intercessor that lets hardware and kernel exchange instructions seamlessly.
- 7. Command-line modifier, typically preceded by a slash, that alters how the command executes.
- 8. Logical division of physical storage that defines boundaries for file system deployment.
- 10. Advanced Windows utility designed for high-volume, resilient file transfers and directory synchronization.
- 12. Digitally signed document used to verify the authenticity and identity of an entity online.
- 14. Network mode enabling discovery and sharing features within secure, trusted environments like home or work.
- 17. Add-on module integrated into MMC to extend its functionality for specific administrative tasks.
- 18. A controlled reversal restoring a prior configuration after instability or fault detection.
Down
- 1. Rearranges scattered data on HDDs to restore contiguous storage order and boost read efficiency.
- 2. Operation that structures a partition with a specific file system, enabling data organization.
- 3. Network profile that conceals a device and restricts sharing to protect against untrusted connections.
- 4. Centralized database in Windows that records hardware settings, user configurations, and system preferences.
- 5. A temporary deactivation employed for diagnostic isolation or conflict testing.
- 9. The actual input value provided to fulfill a parameter within a command.
- 11. Command used for duplicating files or directories, including subdirectories, from one location to another.
- 13. Process that prepares raw storage media for system recognition before partition tables exist.
- 15. Technology that establishes an encrypted tunnel over public networks to connect users securely to private systems.
- 16. Command that reveals the installed Windows edition, version, and build through a system dialog.
