Filters
Question type

Study Flashcards

The owner of the registry keys is usually listed as ____.


A) ADMIN
B) OWNER
C) CONTROLLER
D) SYSTEM

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Windows 7 Enterprise, Ultimate, and Professional Editions include support for ____, which installs a second virtual operating system that runs at the same time as Windows 7.


A) XP Mode
B) User Mode
C) Kernel Mode
D) Vista Mode

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

DOS was designed as a multitasking operating system.

A) True
B) False

Correct Answer

verifed

verified

The ____ hive contains details about the current hardware profile in use.


A) HKEY_CURRENT_USER
B) HKEY_CLASSES_ROOT
C) HKEY_LOCAL_MACHINE
D) HKEY_CURRENT_CONFIG

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Registry keys can contain sensitive information that can crash the computer or damage expected functionality if they are improperly configured.

A) True
B) False

Correct Answer

verifed

verified

True

Applications designed to interact with the ____ subsystem are the most common type of application in use with earlier operating systems, such as Windows XP.


A) Win32
B) .NET Framework
C) DOS
D) Win16

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately.


A) EDITREG.EXE
B) REGEDIT.EXE
C) REGISTER.EXE
D) CHGREG.EXE

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

The Windows 7 operating system is designed to operate in a layered approach, where different layers provide targeted functionality.

A) True
B) False

Correct Answer

verifed

verified

When a legacy DOS application runs, ntvdm.exe is started to create a(n) _________________________ environment for the DOS application.

Correct Answer

verifed

verified

VDM,Virtual DOS Machine,VDM (Virtual DOS Machine),Virtual DOS Machine (VDM)

What are the main components of the Microsoft Application Compatibility Toolkit (ACT)?

Correct Answer

verifed

verified

The main components of ACT include these...

View Answer

____ is a system whereby applications modify the core functionality of the Windows operating system to obtain low level access to the operating system and its resources.


A) Program Compatibility Settings
B) Kernel patching
C) Program Compatibility Assistant
D) Program Compatibility Wizard

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

An application's view of the operating system is restricted to those methods and services exposed by the different ____.


A) environment subsystems
B) kernel services
C) executive services
D) environment services

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

In Windows 7, a new instance of ____ is created for each DOS application that is executed to ensure that the DOS applications do not interfere with each other.


A) kernel32.exe
B) kernelDOS.exe
C) ntvdm.exe
D) dosvdm.exe

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

How can you backup the entire Windows registry?

Correct Answer

verifed

verified

If you want to back up many parts of the...

View Answer

The application ____ can identify the application as UAC aware, which disables UAC file and registry virtualization automatically for that application.


A) mode
B) kernel
C) manifest
D) API

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

The ____________________ hive contains multiple subsections to define user-specific settings for new users and any user that has ever logged on to the computer.

Correct Answer

verifed

verified

Much of the hardware-specific knowledge in Windows 7 is contained in the ___________________________________ service, which is specifically installed during installation of the operating system.

Correct Answer

verifed

verified

HAL,Hardware Abstraction Layer,HAL (Hardware Abstraction Layer),Hardware Abstraction Layer (HAL)

The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called ____.


A) keys
B) hives
C) branches
D) nests

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What precautions should be taken before modifying the registry?

Correct Answer

verifed

verified

Before making any changes to the registr...

View Answer

The environment subsystems and the applications run in ____ mode.


A) kernel
B) environment
C) user
D) service

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 42

Related Exams

Show Answer