Deck 11: Application Support

ملء الشاشة (f)
exit full mode
سؤال
Each Win32 application runs in its own virtual memory space and is executed by the processor in ____ mode.

A) DOS
B) user
C) kernel
D) Win32
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The ____ hive contains global settings for the entire computer and the applications installed on it.

A) HKEY_LOCAL_MACHINE
B) HKEY_CURRENT_USER
C) HKEY_CLASSES_ROOT
D) HKEY_USERS
سؤال
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called ____.

A) keys
B) hives
C) branches
D) nests
سؤال
The ____ provides a layer of abstraction that is useful for developers to perform complex tasks more simply because it manages the details of accessing required services.

A) OS/2
B) Win32
C) .NET Framework
D) POSIX
سؤال
Applications designed to interact with the ____ subsystem are the most common type of application in use with earlier operating systems, such as Windows XP.

A) Win32
B) .NET Framework
C) DOS
D) Win16
سؤال
____ are made up of multiple modules, such as the core kernel, object manager, memory manager, and several others.

A) Environment subsystems
B) Executive Services
C) Kernel services
D) Hardware Services
سؤال
The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately.

A) EDITREG.EXE
B) REGEDIT.EXE
C) REGISTER.EXE
D) CHGREG.EXE
سؤال
Because the Executive Services are critical to the operation of the computer, applications are allowed to communicate directly with it.
سؤال
An application's view of the operating system is restricted to those methods and services exposed by the different ____.

A) environment subsystems
B) kernel services
C) executive services
D) environment services
سؤال
The environment subsystems and the applications run in ____ mode.

A) kernel
B) environment
C) user
D) service
سؤال
Requests for system actions that must be performed by the Executive Services are moderated by the environment subsystems.
سؤال
The Executive Services operate in ____ mode.

A) patch
B) user
C) service
D) kernel
سؤال
Registry keys can contain sensitive information that can crash the computer or damage expected functionality if they are improperly configured.
سؤال
The owner of the registry keys is usually listed as ____.

A) ADMIN
B) OWNER
C) CONTROLLER
D) SYSTEM
سؤال
The ____ hive contains details about the current hardware profile in use.

A) HKEY_CURRENT_USER
B) HKEY_CLASSES_ROOT
C) HKEY_LOCAL_MACHINE
D) HKEY_CURRENT_CONFIG
سؤال
____ support applications and provide indirect access to Executive Services in the Windows 7 operating system kernel.

A) Kernel Services
B) Environment Services
C) Kernel patching
D) Environment subsystems
سؤال
UAC-aware applications can include a(n) ____ file called the application manifest.

A) XML
B) HTML
C) XPS
D) PDF
سؤال
In Windows 7, a new instance of ____ is created for each DOS application that is executed to ensure that the DOS applications do not interfere with each other.

A) kernel32.exe
B) kernelDOS.exe
C) ntvdm.exe
D) dosvdm.exe
سؤال
The Windows 7 operating system is designed to operate in a layered approach, where different layers provide targeted functionality.
سؤال
DOS was designed as a multitasking operating system.
سؤال
What are the application environments supported by Windows 7?
سؤال
All requests for service from the Win16 environment are translated to 32-bit requests and vice-versa. This specific translation situation is referred to as ____________________.
سؤال
When a legacy DOS application runs, ntvdm.exe is started to create a(n) _________________________ environment for the DOS application.
سؤال
What precautions should be taken before modifying the registry?
سؤال
The Windows 7 operating system consists of two key components, the environment subsystems and the ____________________.
سؤال
Briefly describe the history of the Windows Registry.
سؤال
Briefly describe Windows registry security.
سؤال
What is the purpose of the HKEY_CURRENT_USER hive?
سؤال
The Run As feature has been modified in Windows 7 to now be known as the ____ option.

A) Run with Privilege
B) Privilege Mode
C) Run Elevated As
D) Run As Administrator
سؤال
How can you backup the entire Windows registry?
سؤال
Much of the hardware-specific knowledge in Windows 7 is contained in the ___________________________________ service, which is specifically installed during installation of the operating system.
سؤال
The application ____ can identify the application as UAC aware, which disables UAC file and registry virtualization automatically for that application.

A) mode
B) kernel
C) manifest
D) API
سؤال
The ____________________ hive contains multiple subsections to define user-specific settings for new users and any user that has ever logged on to the computer.
سؤال
What are the primary hives found in the Windows 7 registry?
سؤال
What are some of the key system areas that are virtualized in Windows 7?
سؤال
The ____ is a free download from Microsoft, a lifecycle management tool for the applications required by a company, and can help deploy Windows 7 as fast as possible.

A) Microsoft Standard User Analyzer
B) Microsoft Application Verifier
C) Application Compatibility Toolkit 4.1
D) Microsoft Application Compatibility Toolkit V5.5
سؤال
____ is a system whereby applications modify the core functionality of the Windows operating system to obtain low level access to the operating system and its resources.

A) Program Compatibility Settings
B) Kernel patching
C) Program Compatibility Assistant
D) Program Compatibility Wizard
سؤال
What is the purpose of the HKEY_CLASSES_ROOT hive?
سؤال
The ____ is designed to make it easy for home users to adjust their legacy applications to work with Windows 7 without having to know a lot about compatibility settings.

A) CompatAssist.exe
B) REGEDIT.EXE
C) Program Compatibility Assistant
D) REG.EXE
سؤال
Windows 7 Enterprise, Ultimate, and Professional Editions include support for ____, which installs a second virtual operating system that runs at the same time as Windows 7.

A) XP Mode
B) User Mode
C) Kernel Mode
D) Vista Mode
سؤال
Match between columns
a tool that monitors what happens when an application is run as a user without elevated permissions.
Standard User Analyzer
a tool that monitors what happens when an application is run as a user without elevated permissions.
Executive Services
a tool that monitors what happens when an application is run as a user without elevated permissions.
Kernel mode
a tool that monitors what happens when an application is run as a user without elevated permissions.
User mode
a tool that monitors what happens when an application is run as a user without elevated permissions.
Registry
a tool that monitors what happens when an application is run as a user without elevated permissions.
REG.EXE
a tool that monitors what happens when an application is run as a user without elevated permissions.
Win16 applications
a tool that monitors what happens when an application is run as a user without elevated permissions.
SID
a tool that monitors what happens when an application is run as a user without elevated permissions.
Win32 application
typically used to read data from or write data to the registry from inside a scripted batch or command file
Standard User Analyzer
typically used to read data from or write data to the registry from inside a scripted batch or command file
Executive Services
typically used to read data from or write data to the registry from inside a scripted batch or command file
Kernel mode
typically used to read data from or write data to the registry from inside a scripted batch or command file
User mode
typically used to read data from or write data to the registry from inside a scripted batch or command file
Registry
typically used to read data from or write data to the registry from inside a scripted batch or command file
REG.EXE
typically used to read data from or write data to the registry from inside a scripted batch or command file
Win16 applications
typically used to read data from or write data to the registry from inside a scripted batch or command file
SID
typically used to read data from or write data to the registry from inside a scripted batch or command file
Win32 application
allows services full access to memory and hardware devices
Standard User Analyzer
allows services full access to memory and hardware devices
Executive Services
allows services full access to memory and hardware devices
Kernel mode
allows services full access to memory and hardware devices
User mode
allows services full access to memory and hardware devices
Registry
allows services full access to memory and hardware devices
REG.EXE
allows services full access to memory and hardware devices
Win16 applications
allows services full access to memory and hardware devices
SID
allows services full access to memory and hardware devices
Win32 application
restricts access to memory and hardware
Standard User Analyzer
restricts access to memory and hardware
Executive Services
restricts access to memory and hardware
Kernel mode
restricts access to memory and hardware
User mode
restricts access to memory and hardware
Registry
restricts access to memory and hardware
REG.EXE
restricts access to memory and hardware
Win16 applications
restricts access to memory and hardware
SID
restricts access to memory and hardware
Win32 application
runs in its own virtual memory space and is executed by the processor in user mode
Standard User Analyzer
runs in its own virtual memory space and is executed by the processor in user mode
Executive Services
runs in its own virtual memory space and is executed by the processor in user mode
Kernel mode
runs in its own virtual memory space and is executed by the processor in user mode
User mode
runs in its own virtual memory space and is executed by the processor in user mode
Registry
runs in its own virtual memory space and is executed by the processor in user mode
REG.EXE
runs in its own virtual memory space and is executed by the processor in user mode
Win16 applications
runs in its own virtual memory space and is executed by the processor in user mode
SID
runs in its own virtual memory space and is executed by the processor in user mode
Win32 application
originally designed to run with Windows 3.x
Standard User Analyzer
originally designed to run with Windows 3.x
Executive Services
originally designed to run with Windows 3.x
Kernel mode
originally designed to run with Windows 3.x
User mode
originally designed to run with Windows 3.x
Registry
originally designed to run with Windows 3.x
REG.EXE
originally designed to run with Windows 3.x
Win16 applications
originally designed to run with Windows 3.x
SID
originally designed to run with Windows 3.x
Win32 application
a unique identifier that no two users share on the computer
Standard User Analyzer
a unique identifier that no two users share on the computer
Executive Services
a unique identifier that no two users share on the computer
Kernel mode
a unique identifier that no two users share on the computer
User mode
a unique identifier that no two users share on the computer
Registry
a unique identifier that no two users share on the computer
REG.EXE
a unique identifier that no two users share on the computer
Win16 applications
a unique identifier that no two users share on the computer
SID
a unique identifier that no two users share on the computer
Win32 application
provides the core operating system functionality that supports executing applications
Standard User Analyzer
provides the core operating system functionality that supports executing applications
Executive Services
provides the core operating system functionality that supports executing applications
Kernel mode
provides the core operating system functionality that supports executing applications
User mode
provides the core operating system functionality that supports executing applications
Registry
provides the core operating system functionality that supports executing applications
REG.EXE
provides the core operating system functionality that supports executing applications
Win16 applications
provides the core operating system functionality that supports executing applications
SID
provides the core operating system functionality that supports executing applications
Win32 application
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Standard User Analyzer
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Executive Services
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Kernel mode
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
User mode
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Registry
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
REG.EXE
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Win16 applications
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
SID
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Win32 application
سؤال
What are the main components of the Microsoft Application Compatibility Toolkit (ACT)?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Application Support
1
Each Win32 application runs in its own virtual memory space and is executed by the processor in ____ mode.

A) DOS
B) user
C) kernel
D) Win32
B
2
The ____ hive contains global settings for the entire computer and the applications installed on it.

A) HKEY_LOCAL_MACHINE
B) HKEY_CURRENT_USER
C) HKEY_CLASSES_ROOT
D) HKEY_USERS
A
3
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called ____.

A) keys
B) hives
C) branches
D) nests
B
4
The ____ provides a layer of abstraction that is useful for developers to perform complex tasks more simply because it manages the details of accessing required services.

A) OS/2
B) Win32
C) .NET Framework
D) POSIX
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
Applications designed to interact with the ____ subsystem are the most common type of application in use with earlier operating systems, such as Windows XP.

A) Win32
B) .NET Framework
C) DOS
D) Win16
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
____ are made up of multiple modules, such as the core kernel, object manager, memory manager, and several others.

A) Environment subsystems
B) Executive Services
C) Kernel services
D) Hardware Services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately.

A) EDITREG.EXE
B) REGEDIT.EXE
C) REGISTER.EXE
D) CHGREG.EXE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
Because the Executive Services are critical to the operation of the computer, applications are allowed to communicate directly with it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
An application's view of the operating system is restricted to those methods and services exposed by the different ____.

A) environment subsystems
B) kernel services
C) executive services
D) environment services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
The environment subsystems and the applications run in ____ mode.

A) kernel
B) environment
C) user
D) service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
Requests for system actions that must be performed by the Executive Services are moderated by the environment subsystems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
The Executive Services operate in ____ mode.

A) patch
B) user
C) service
D) kernel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
Registry keys can contain sensitive information that can crash the computer or damage expected functionality if they are improperly configured.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
The owner of the registry keys is usually listed as ____.

A) ADMIN
B) OWNER
C) CONTROLLER
D) SYSTEM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The ____ hive contains details about the current hardware profile in use.

A) HKEY_CURRENT_USER
B) HKEY_CLASSES_ROOT
C) HKEY_LOCAL_MACHINE
D) HKEY_CURRENT_CONFIG
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
____ support applications and provide indirect access to Executive Services in the Windows 7 operating system kernel.

A) Kernel Services
B) Environment Services
C) Kernel patching
D) Environment subsystems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
UAC-aware applications can include a(n) ____ file called the application manifest.

A) XML
B) HTML
C) XPS
D) PDF
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
In Windows 7, a new instance of ____ is created for each DOS application that is executed to ensure that the DOS applications do not interfere with each other.

A) kernel32.exe
B) kernelDOS.exe
C) ntvdm.exe
D) dosvdm.exe
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
The Windows 7 operating system is designed to operate in a layered approach, where different layers provide targeted functionality.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
DOS was designed as a multitasking operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
What are the application environments supported by Windows 7?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
All requests for service from the Win16 environment are translated to 32-bit requests and vice-versa. This specific translation situation is referred to as ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
When a legacy DOS application runs, ntvdm.exe is started to create a(n) _________________________ environment for the DOS application.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
What precautions should be taken before modifying the registry?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
The Windows 7 operating system consists of two key components, the environment subsystems and the ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
Briefly describe the history of the Windows Registry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Briefly describe Windows registry security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
What is the purpose of the HKEY_CURRENT_USER hive?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
The Run As feature has been modified in Windows 7 to now be known as the ____ option.

A) Run with Privilege
B) Privilege Mode
C) Run Elevated As
D) Run As Administrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
How can you backup the entire Windows registry?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
Much of the hardware-specific knowledge in Windows 7 is contained in the ___________________________________ service, which is specifically installed during installation of the operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
The application ____ can identify the application as UAC aware, which disables UAC file and registry virtualization automatically for that application.

A) mode
B) kernel
C) manifest
D) API
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
The ____________________ hive contains multiple subsections to define user-specific settings for new users and any user that has ever logged on to the computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
What are the primary hives found in the Windows 7 registry?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are some of the key system areas that are virtualized in Windows 7?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
The ____ is a free download from Microsoft, a lifecycle management tool for the applications required by a company, and can help deploy Windows 7 as fast as possible.

A) Microsoft Standard User Analyzer
B) Microsoft Application Verifier
C) Application Compatibility Toolkit 4.1
D) Microsoft Application Compatibility Toolkit V5.5
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
____ is a system whereby applications modify the core functionality of the Windows operating system to obtain low level access to the operating system and its resources.

A) Program Compatibility Settings
B) Kernel patching
C) Program Compatibility Assistant
D) Program Compatibility Wizard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
What is the purpose of the HKEY_CLASSES_ROOT hive?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
The ____ is designed to make it easy for home users to adjust their legacy applications to work with Windows 7 without having to know a lot about compatibility settings.

A) CompatAssist.exe
B) REGEDIT.EXE
C) Program Compatibility Assistant
D) REG.EXE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Windows 7 Enterprise, Ultimate, and Professional Editions include support for ____, which installs a second virtual operating system that runs at the same time as Windows 7.

A) XP Mode
B) User Mode
C) Kernel Mode
D) Vista Mode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
a tool that monitors what happens when an application is run as a user without elevated permissions.
Standard User Analyzer
a tool that monitors what happens when an application is run as a user without elevated permissions.
Executive Services
a tool that monitors what happens when an application is run as a user without elevated permissions.
Kernel mode
a tool that monitors what happens when an application is run as a user without elevated permissions.
User mode
a tool that monitors what happens when an application is run as a user without elevated permissions.
Registry
a tool that monitors what happens when an application is run as a user without elevated permissions.
REG.EXE
a tool that monitors what happens when an application is run as a user without elevated permissions.
Win16 applications
a tool that monitors what happens when an application is run as a user without elevated permissions.
SID
a tool that monitors what happens when an application is run as a user without elevated permissions.
Win32 application
typically used to read data from or write data to the registry from inside a scripted batch or command file
Standard User Analyzer
typically used to read data from or write data to the registry from inside a scripted batch or command file
Executive Services
typically used to read data from or write data to the registry from inside a scripted batch or command file
Kernel mode
typically used to read data from or write data to the registry from inside a scripted batch or command file
User mode
typically used to read data from or write data to the registry from inside a scripted batch or command file
Registry
typically used to read data from or write data to the registry from inside a scripted batch or command file
REG.EXE
typically used to read data from or write data to the registry from inside a scripted batch or command file
Win16 applications
typically used to read data from or write data to the registry from inside a scripted batch or command file
SID
typically used to read data from or write data to the registry from inside a scripted batch or command file
Win32 application
allows services full access to memory and hardware devices
Standard User Analyzer
allows services full access to memory and hardware devices
Executive Services
allows services full access to memory and hardware devices
Kernel mode
allows services full access to memory and hardware devices
User mode
allows services full access to memory and hardware devices
Registry
allows services full access to memory and hardware devices
REG.EXE
allows services full access to memory and hardware devices
Win16 applications
allows services full access to memory and hardware devices
SID
allows services full access to memory and hardware devices
Win32 application
restricts access to memory and hardware
Standard User Analyzer
restricts access to memory and hardware
Executive Services
restricts access to memory and hardware
Kernel mode
restricts access to memory and hardware
User mode
restricts access to memory and hardware
Registry
restricts access to memory and hardware
REG.EXE
restricts access to memory and hardware
Win16 applications
restricts access to memory and hardware
SID
restricts access to memory and hardware
Win32 application
runs in its own virtual memory space and is executed by the processor in user mode
Standard User Analyzer
runs in its own virtual memory space and is executed by the processor in user mode
Executive Services
runs in its own virtual memory space and is executed by the processor in user mode
Kernel mode
runs in its own virtual memory space and is executed by the processor in user mode
User mode
runs in its own virtual memory space and is executed by the processor in user mode
Registry
runs in its own virtual memory space and is executed by the processor in user mode
REG.EXE
runs in its own virtual memory space and is executed by the processor in user mode
Win16 applications
runs in its own virtual memory space and is executed by the processor in user mode
SID
runs in its own virtual memory space and is executed by the processor in user mode
Win32 application
originally designed to run with Windows 3.x
Standard User Analyzer
originally designed to run with Windows 3.x
Executive Services
originally designed to run with Windows 3.x
Kernel mode
originally designed to run with Windows 3.x
User mode
originally designed to run with Windows 3.x
Registry
originally designed to run with Windows 3.x
REG.EXE
originally designed to run with Windows 3.x
Win16 applications
originally designed to run with Windows 3.x
SID
originally designed to run with Windows 3.x
Win32 application
a unique identifier that no two users share on the computer
Standard User Analyzer
a unique identifier that no two users share on the computer
Executive Services
a unique identifier that no two users share on the computer
Kernel mode
a unique identifier that no two users share on the computer
User mode
a unique identifier that no two users share on the computer
Registry
a unique identifier that no two users share on the computer
REG.EXE
a unique identifier that no two users share on the computer
Win16 applications
a unique identifier that no two users share on the computer
SID
a unique identifier that no two users share on the computer
Win32 application
provides the core operating system functionality that supports executing applications
Standard User Analyzer
provides the core operating system functionality that supports executing applications
Executive Services
provides the core operating system functionality that supports executing applications
Kernel mode
provides the core operating system functionality that supports executing applications
User mode
provides the core operating system functionality that supports executing applications
Registry
provides the core operating system functionality that supports executing applications
REG.EXE
provides the core operating system functionality that supports executing applications
Win16 applications
provides the core operating system functionality that supports executing applications
SID
provides the core operating system functionality that supports executing applications
Win32 application
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Standard User Analyzer
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Executive Services
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Kernel mode
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
User mode
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Registry
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
REG.EXE
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Win16 applications
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
SID
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Win32 application
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
What are the main components of the Microsoft Application Compatibility Toolkit (ACT)?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.