Deck 11: Application Support

Full screen (f)
exit full mode
Question
Each Win32 application runs in its own virtual memory space and is executed by the processor in ____ mode.

A) DOS
B) user
C) kernel
D) Win32
Use Space or
up arrow
down arrow
to flip the card.
Question
The ____ hive contains global settings for the entire computer and the applications installed on it.

A) HKEY_LOCAL_MACHINE
B) HKEY_CURRENT_USER
C) HKEY_CLASSES_ROOT
D) HKEY_USERS
Question
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called ____.

A) keys
B) hives
C) branches
D) nests
Question
The ____ provides a layer of abstraction that is useful for developers to perform complex tasks more simply because it manages the details of accessing required services.

A) OS/2
B) Win32
C) .NET Framework
D) POSIX
Question
Applications designed to interact with the ____ subsystem are the most common type of application in use with earlier operating systems, such as Windows XP.

A) Win32
B) .NET Framework
C) DOS
D) Win16
Question
____ are made up of multiple modules, such as the core kernel, object manager, memory manager, and several others.

A) Environment subsystems
B) Executive Services
C) Kernel services
D) Hardware Services
Question
The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately.

A) EDITREG.EXE
B) REGEDIT.EXE
C) REGISTER.EXE
D) CHGREG.EXE
Question
Because the Executive Services are critical to the operation of the computer, applications are allowed to communicate directly with it.
Question
An application's view of the operating system is restricted to those methods and services exposed by the different ____.

A) environment subsystems
B) kernel services
C) executive services
D) environment services
Question
The environment subsystems and the applications run in ____ mode.

A) kernel
B) environment
C) user
D) service
Question
Requests for system actions that must be performed by the Executive Services are moderated by the environment subsystems.
Question
The Executive Services operate in ____ mode.

A) patch
B) user
C) service
D) kernel
Question
Registry keys can contain sensitive information that can crash the computer or damage expected functionality if they are improperly configured.
Question
The owner of the registry keys is usually listed as ____.

A) ADMIN
B) OWNER
C) CONTROLLER
D) SYSTEM
Question
The ____ hive contains details about the current hardware profile in use.

A) HKEY_CURRENT_USER
B) HKEY_CLASSES_ROOT
C) HKEY_LOCAL_MACHINE
D) HKEY_CURRENT_CONFIG
Question
____ support applications and provide indirect access to Executive Services in the Windows 7 operating system kernel.

A) Kernel Services
B) Environment Services
C) Kernel patching
D) Environment subsystems
Question
UAC-aware applications can include a(n) ____ file called the application manifest.

A) XML
B) HTML
C) XPS
D) PDF
Question
In Windows 7, a new instance of ____ is created for each DOS application that is executed to ensure that the DOS applications do not interfere with each other.

A) kernel32.exe
B) kernelDOS.exe
C) ntvdm.exe
D) dosvdm.exe
Question
The Windows 7 operating system is designed to operate in a layered approach, where different layers provide targeted functionality.
Question
DOS was designed as a multitasking operating system.
Question
What are the application environments supported by Windows 7?
Question
All requests for service from the Win16 environment are translated to 32-bit requests and vice-versa. This specific translation situation is referred to as ____________________.
Question
When a legacy DOS application runs, ntvdm.exe is started to create a(n) _________________________ environment for the DOS application.
Question
What precautions should be taken before modifying the registry?
Question
The Windows 7 operating system consists of two key components, the environment subsystems and the ____________________.
Question
Briefly describe the history of the Windows Registry.
Question
Briefly describe Windows registry security.
Question
What is the purpose of the HKEY_CURRENT_USER hive?
Question
The Run As feature has been modified in Windows 7 to now be known as the ____ option.

A) Run with Privilege
B) Privilege Mode
C) Run Elevated As
D) Run As Administrator
Question
How can you backup the entire Windows registry?
Question
Much of the hardware-specific knowledge in Windows 7 is contained in the ___________________________________ service, which is specifically installed during installation of the operating system.
Question
The application ____ can identify the application as UAC aware, which disables UAC file and registry virtualization automatically for that application.

A) mode
B) kernel
C) manifest
D) API
Question
The ____________________ hive contains multiple subsections to define user-specific settings for new users and any user that has ever logged on to the computer.
Question
What are the primary hives found in the Windows 7 registry?
Question
What are some of the key system areas that are virtualized in Windows 7?
Question
The ____ is a free download from Microsoft, a lifecycle management tool for the applications required by a company, and can help deploy Windows 7 as fast as possible.

A) Microsoft Standard User Analyzer
B) Microsoft Application Verifier
C) Application Compatibility Toolkit 4.1
D) Microsoft Application Compatibility Toolkit V5.5
Question
____ is a system whereby applications modify the core functionality of the Windows operating system to obtain low level access to the operating system and its resources.

A) Program Compatibility Settings
B) Kernel patching
C) Program Compatibility Assistant
D) Program Compatibility Wizard
Question
What is the purpose of the HKEY_CLASSES_ROOT hive?
Question
The ____ is designed to make it easy for home users to adjust their legacy applications to work with Windows 7 without having to know a lot about compatibility settings.

A) CompatAssist.exe
B) REGEDIT.EXE
C) Program Compatibility Assistant
D) REG.EXE
Question
Windows 7 Enterprise, Ultimate, and Professional Editions include support for ____, which installs a second virtual operating system that runs at the same time as Windows 7.

A) XP Mode
B) User Mode
C) Kernel Mode
D) Vista Mode
Question
Match between columns
a tool that monitors what happens when an application is run as a user without elevated permissions.
Standard User Analyzer
a tool that monitors what happens when an application is run as a user without elevated permissions.
Executive Services
a tool that monitors what happens when an application is run as a user without elevated permissions.
Kernel mode
a tool that monitors what happens when an application is run as a user without elevated permissions.
User mode
a tool that monitors what happens when an application is run as a user without elevated permissions.
Registry
a tool that monitors what happens when an application is run as a user without elevated permissions.
REG.EXE
a tool that monitors what happens when an application is run as a user without elevated permissions.
Win16 applications
a tool that monitors what happens when an application is run as a user without elevated permissions.
SID
a tool that monitors what happens when an application is run as a user without elevated permissions.
Win32 application
typically used to read data from or write data to the registry from inside a scripted batch or command file
Standard User Analyzer
typically used to read data from or write data to the registry from inside a scripted batch or command file
Executive Services
typically used to read data from or write data to the registry from inside a scripted batch or command file
Kernel mode
typically used to read data from or write data to the registry from inside a scripted batch or command file
User mode
typically used to read data from or write data to the registry from inside a scripted batch or command file
Registry
typically used to read data from or write data to the registry from inside a scripted batch or command file
REG.EXE
typically used to read data from or write data to the registry from inside a scripted batch or command file
Win16 applications
typically used to read data from or write data to the registry from inside a scripted batch or command file
SID
typically used to read data from or write data to the registry from inside a scripted batch or command file
Win32 application
allows services full access to memory and hardware devices
Standard User Analyzer
allows services full access to memory and hardware devices
Executive Services
allows services full access to memory and hardware devices
Kernel mode
allows services full access to memory and hardware devices
User mode
allows services full access to memory and hardware devices
Registry
allows services full access to memory and hardware devices
REG.EXE
allows services full access to memory and hardware devices
Win16 applications
allows services full access to memory and hardware devices
SID
allows services full access to memory and hardware devices
Win32 application
restricts access to memory and hardware
Standard User Analyzer
restricts access to memory and hardware
Executive Services
restricts access to memory and hardware
Kernel mode
restricts access to memory and hardware
User mode
restricts access to memory and hardware
Registry
restricts access to memory and hardware
REG.EXE
restricts access to memory and hardware
Win16 applications
restricts access to memory and hardware
SID
restricts access to memory and hardware
Win32 application
runs in its own virtual memory space and is executed by the processor in user mode
Standard User Analyzer
runs in its own virtual memory space and is executed by the processor in user mode
Executive Services
runs in its own virtual memory space and is executed by the processor in user mode
Kernel mode
runs in its own virtual memory space and is executed by the processor in user mode
User mode
runs in its own virtual memory space and is executed by the processor in user mode
Registry
runs in its own virtual memory space and is executed by the processor in user mode
REG.EXE
runs in its own virtual memory space and is executed by the processor in user mode
Win16 applications
runs in its own virtual memory space and is executed by the processor in user mode
SID
runs in its own virtual memory space and is executed by the processor in user mode
Win32 application
originally designed to run with Windows 3.x
Standard User Analyzer
originally designed to run with Windows 3.x
Executive Services
originally designed to run with Windows 3.x
Kernel mode
originally designed to run with Windows 3.x
User mode
originally designed to run with Windows 3.x
Registry
originally designed to run with Windows 3.x
REG.EXE
originally designed to run with Windows 3.x
Win16 applications
originally designed to run with Windows 3.x
SID
originally designed to run with Windows 3.x
Win32 application
a unique identifier that no two users share on the computer
Standard User Analyzer
a unique identifier that no two users share on the computer
Executive Services
a unique identifier that no two users share on the computer
Kernel mode
a unique identifier that no two users share on the computer
User mode
a unique identifier that no two users share on the computer
Registry
a unique identifier that no two users share on the computer
REG.EXE
a unique identifier that no two users share on the computer
Win16 applications
a unique identifier that no two users share on the computer
SID
a unique identifier that no two users share on the computer
Win32 application
provides the core operating system functionality that supports executing applications
Standard User Analyzer
provides the core operating system functionality that supports executing applications
Executive Services
provides the core operating system functionality that supports executing applications
Kernel mode
provides the core operating system functionality that supports executing applications
User mode
provides the core operating system functionality that supports executing applications
Registry
provides the core operating system functionality that supports executing applications
REG.EXE
provides the core operating system functionality that supports executing applications
Win16 applications
provides the core operating system functionality that supports executing applications
SID
provides the core operating system functionality that supports executing applications
Win32 application
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Standard User Analyzer
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Executive Services
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Kernel mode
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
User mode
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Registry
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
REG.EXE
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Win16 applications
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
SID
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Win32 application
Question
What are the main components of the Microsoft Application Compatibility Toolkit (ACT)?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Application Support
1
Each Win32 application runs in its own virtual memory space and is executed by the processor in ____ mode.

A) DOS
B) user
C) kernel
D) Win32
B
2
The ____ hive contains global settings for the entire computer and the applications installed on it.

A) HKEY_LOCAL_MACHINE
B) HKEY_CURRENT_USER
C) HKEY_CLASSES_ROOT
D) HKEY_USERS
A
3
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called ____.

A) keys
B) hives
C) branches
D) nests
B
4
The ____ provides a layer of abstraction that is useful for developers to perform complex tasks more simply because it manages the details of accessing required services.

A) OS/2
B) Win32
C) .NET Framework
D) POSIX
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Applications designed to interact with the ____ subsystem are the most common type of application in use with earlier operating systems, such as Windows XP.

A) Win32
B) .NET Framework
C) DOS
D) Win16
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ are made up of multiple modules, such as the core kernel, object manager, memory manager, and several others.

A) Environment subsystems
B) Executive Services
C) Kernel services
D) Hardware Services
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately.

A) EDITREG.EXE
B) REGEDIT.EXE
C) REGISTER.EXE
D) CHGREG.EXE
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Because the Executive Services are critical to the operation of the computer, applications are allowed to communicate directly with it.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
An application's view of the operating system is restricted to those methods and services exposed by the different ____.

A) environment subsystems
B) kernel services
C) executive services
D) environment services
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The environment subsystems and the applications run in ____ mode.

A) kernel
B) environment
C) user
D) service
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
Requests for system actions that must be performed by the Executive Services are moderated by the environment subsystems.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
The Executive Services operate in ____ mode.

A) patch
B) user
C) service
D) kernel
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Registry keys can contain sensitive information that can crash the computer or damage expected functionality if they are improperly configured.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
The owner of the registry keys is usually listed as ____.

A) ADMIN
B) OWNER
C) CONTROLLER
D) SYSTEM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The ____ hive contains details about the current hardware profile in use.

A) HKEY_CURRENT_USER
B) HKEY_CLASSES_ROOT
C) HKEY_LOCAL_MACHINE
D) HKEY_CURRENT_CONFIG
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
____ support applications and provide indirect access to Executive Services in the Windows 7 operating system kernel.

A) Kernel Services
B) Environment Services
C) Kernel patching
D) Environment subsystems
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
UAC-aware applications can include a(n) ____ file called the application manifest.

A) XML
B) HTML
C) XPS
D) PDF
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
In Windows 7, a new instance of ____ is created for each DOS application that is executed to ensure that the DOS applications do not interfere with each other.

A) kernel32.exe
B) kernelDOS.exe
C) ntvdm.exe
D) dosvdm.exe
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
The Windows 7 operating system is designed to operate in a layered approach, where different layers provide targeted functionality.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
DOS was designed as a multitasking operating system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
What are the application environments supported by Windows 7?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
All requests for service from the Win16 environment are translated to 32-bit requests and vice-versa. This specific translation situation is referred to as ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
When a legacy DOS application runs, ntvdm.exe is started to create a(n) _________________________ environment for the DOS application.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
What precautions should be taken before modifying the registry?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The Windows 7 operating system consists of two key components, the environment subsystems and the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Briefly describe the history of the Windows Registry.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Briefly describe Windows registry security.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What is the purpose of the HKEY_CURRENT_USER hive?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
The Run As feature has been modified in Windows 7 to now be known as the ____ option.

A) Run with Privilege
B) Privilege Mode
C) Run Elevated As
D) Run As Administrator
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
How can you backup the entire Windows registry?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Much of the hardware-specific knowledge in Windows 7 is contained in the ___________________________________ service, which is specifically installed during installation of the operating system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
The application ____ can identify the application as UAC aware, which disables UAC file and registry virtualization automatically for that application.

A) mode
B) kernel
C) manifest
D) API
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
The ____________________ hive contains multiple subsections to define user-specific settings for new users and any user that has ever logged on to the computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
What are the primary hives found in the Windows 7 registry?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are some of the key system areas that are virtualized in Windows 7?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
The ____ is a free download from Microsoft, a lifecycle management tool for the applications required by a company, and can help deploy Windows 7 as fast as possible.

A) Microsoft Standard User Analyzer
B) Microsoft Application Verifier
C) Application Compatibility Toolkit 4.1
D) Microsoft Application Compatibility Toolkit V5.5
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
____ is a system whereby applications modify the core functionality of the Windows operating system to obtain low level access to the operating system and its resources.

A) Program Compatibility Settings
B) Kernel patching
C) Program Compatibility Assistant
D) Program Compatibility Wizard
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What is the purpose of the HKEY_CLASSES_ROOT hive?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The ____ is designed to make it easy for home users to adjust their legacy applications to work with Windows 7 without having to know a lot about compatibility settings.

A) CompatAssist.exe
B) REGEDIT.EXE
C) Program Compatibility Assistant
D) REG.EXE
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Windows 7 Enterprise, Ultimate, and Professional Editions include support for ____, which installs a second virtual operating system that runs at the same time as Windows 7.

A) XP Mode
B) User Mode
C) Kernel Mode
D) Vista Mode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
a tool that monitors what happens when an application is run as a user without elevated permissions.
Standard User Analyzer
a tool that monitors what happens when an application is run as a user without elevated permissions.
Executive Services
a tool that monitors what happens when an application is run as a user without elevated permissions.
Kernel mode
a tool that monitors what happens when an application is run as a user without elevated permissions.
User mode
a tool that monitors what happens when an application is run as a user without elevated permissions.
Registry
a tool that monitors what happens when an application is run as a user without elevated permissions.
REG.EXE
a tool that monitors what happens when an application is run as a user without elevated permissions.
Win16 applications
a tool that monitors what happens when an application is run as a user without elevated permissions.
SID
a tool that monitors what happens when an application is run as a user without elevated permissions.
Win32 application
typically used to read data from or write data to the registry from inside a scripted batch or command file
Standard User Analyzer
typically used to read data from or write data to the registry from inside a scripted batch or command file
Executive Services
typically used to read data from or write data to the registry from inside a scripted batch or command file
Kernel mode
typically used to read data from or write data to the registry from inside a scripted batch or command file
User mode
typically used to read data from or write data to the registry from inside a scripted batch or command file
Registry
typically used to read data from or write data to the registry from inside a scripted batch or command file
REG.EXE
typically used to read data from or write data to the registry from inside a scripted batch or command file
Win16 applications
typically used to read data from or write data to the registry from inside a scripted batch or command file
SID
typically used to read data from or write data to the registry from inside a scripted batch or command file
Win32 application
allows services full access to memory and hardware devices
Standard User Analyzer
allows services full access to memory and hardware devices
Executive Services
allows services full access to memory and hardware devices
Kernel mode
allows services full access to memory and hardware devices
User mode
allows services full access to memory and hardware devices
Registry
allows services full access to memory and hardware devices
REG.EXE
allows services full access to memory and hardware devices
Win16 applications
allows services full access to memory and hardware devices
SID
allows services full access to memory and hardware devices
Win32 application
restricts access to memory and hardware
Standard User Analyzer
restricts access to memory and hardware
Executive Services
restricts access to memory and hardware
Kernel mode
restricts access to memory and hardware
User mode
restricts access to memory and hardware
Registry
restricts access to memory and hardware
REG.EXE
restricts access to memory and hardware
Win16 applications
restricts access to memory and hardware
SID
restricts access to memory and hardware
Win32 application
runs in its own virtual memory space and is executed by the processor in user mode
Standard User Analyzer
runs in its own virtual memory space and is executed by the processor in user mode
Executive Services
runs in its own virtual memory space and is executed by the processor in user mode
Kernel mode
runs in its own virtual memory space and is executed by the processor in user mode
User mode
runs in its own virtual memory space and is executed by the processor in user mode
Registry
runs in its own virtual memory space and is executed by the processor in user mode
REG.EXE
runs in its own virtual memory space and is executed by the processor in user mode
Win16 applications
runs in its own virtual memory space and is executed by the processor in user mode
SID
runs in its own virtual memory space and is executed by the processor in user mode
Win32 application
originally designed to run with Windows 3.x
Standard User Analyzer
originally designed to run with Windows 3.x
Executive Services
originally designed to run with Windows 3.x
Kernel mode
originally designed to run with Windows 3.x
User mode
originally designed to run with Windows 3.x
Registry
originally designed to run with Windows 3.x
REG.EXE
originally designed to run with Windows 3.x
Win16 applications
originally designed to run with Windows 3.x
SID
originally designed to run with Windows 3.x
Win32 application
a unique identifier that no two users share on the computer
Standard User Analyzer
a unique identifier that no two users share on the computer
Executive Services
a unique identifier that no two users share on the computer
Kernel mode
a unique identifier that no two users share on the computer
User mode
a unique identifier that no two users share on the computer
Registry
a unique identifier that no two users share on the computer
REG.EXE
a unique identifier that no two users share on the computer
Win16 applications
a unique identifier that no two users share on the computer
SID
a unique identifier that no two users share on the computer
Win32 application
provides the core operating system functionality that supports executing applications
Standard User Analyzer
provides the core operating system functionality that supports executing applications
Executive Services
provides the core operating system functionality that supports executing applications
Kernel mode
provides the core operating system functionality that supports executing applications
User mode
provides the core operating system functionality that supports executing applications
Registry
provides the core operating system functionality that supports executing applications
REG.EXE
provides the core operating system functionality that supports executing applications
Win16 applications
provides the core operating system functionality that supports executing applications
SID
provides the core operating system functionality that supports executing applications
Win32 application
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Standard User Analyzer
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Executive Services
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Kernel mode
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
User mode
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Registry
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
REG.EXE
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Win16 applications
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
SID
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters
Win32 application
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
What are the main components of the Microsoft Application Compatibility Toolkit (ACT)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.