Across
- 5. This is a service provided with Windows that will encrypt an entire volume of disk data so that it cannot be read by unauthorized parties
- 12. This tab shows all running applications
- 13. This tab shows the usage of all network adapters.
- 16. This tab shows the available services, including their operational status
- 17. This is used to create customized system image files that will be installed on computers in the enterprise.
- 19. created for every account that has been configured on a computer
- 20. This tab shows all users that are logged on the computer.
- 21. the command that tests basic connectivity between devices by using ICMP echo request and reply messages
- 22. This tab shows all running processes.
- 24. provides access to the various storage devices available on the computer
- 26. To display a list of tasks that are unique to the application,
- 27. created for every user by default, provide storage locations for common files and media
- 30. a private network that connects remote sites or users together over a public network, like the internet
- 31. a command-line terminal emulation protocol and program that works over port 23
Down
- 1. These are identified with a dollar sign ($) at the end of the share name.
- 2. This tab shows the CPU and page file usage.
- 3. To view a thumbnail image of a running program
- 4. This tab shows all users that are logged on the computer.
- 6. used by most application installation programs to install software
- 7. a collection of LAN workstations and servers that are designed to communicate and exchange data with one another
- 8. the command that traces the route that packets take from your computer to a destination host and that displays where packets are lost in the network path
- 9. in this category you can view and configure security settings such as Window Defender Firewall
- 10. This is used to open or execute a file using elevated permission.
- 11. View the desktop icons that are behind open windows
- 14. the command that is used to query the DNS server to discover IP addresses or host names
- 15. To add an application to the taskbar for easy access
- 18. provides very weak security and should not be relied upon for confidentiality
- 23. contains the files that are necessary for the operation of the windows
- 25. Minimize all windows that are not being used
- 28. a group of computers and electronic devices with a common set of rules and procedures administered as a unit
- 29. Resize a window by dragging it to one of the edges of the screen.
