Deck 11: Application Support
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 11: Application Support
1
Each Win32 application runs in its own virtual memory space and is executed by the processor in ____ mode.
A) DOS
B) user
C) kernel
D) Win32
A) DOS
B) user
C) kernel
D) Win32
B
2
The ____ hive contains global settings for the entire computer and the applications installed on it.
A) HKEY_LOCAL_MACHINE
B) HKEY_CURRENT_USER
C) HKEY_CLASSES_ROOT
D) HKEY_USERS
A) HKEY_LOCAL_MACHINE
B) HKEY_CURRENT_USER
C) HKEY_CLASSES_ROOT
D) HKEY_USERS
A
3
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called ____.
A) keys
B) hives
C) branches
D) nests
A) keys
B) hives
C) branches
D) nests
B
4
The ____ provides a layer of abstraction that is useful for developers to perform complex tasks more simply because it manages the details of accessing required services.
A) OS/2
B) Win32
C) .NET Framework
D) POSIX
A) OS/2
B) Win32
C) .NET Framework
D) POSIX
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Applications designed to interact with the ____ subsystem are the most common type of application in use with earlier operating systems, such as Windows XP.
A) Win32
B) .NET Framework
C) DOS
D) Win16
A) Win32
B) .NET Framework
C) DOS
D) Win16
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
____ are made up of multiple modules, such as the core kernel, object manager, memory manager, and several others.
A) Environment subsystems
B) Executive Services
C) Kernel services
D) Hardware Services
A) Environment subsystems
B) Executive Services
C) Kernel services
D) Hardware Services
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately.
A) EDITREG.EXE
B) REGEDIT.EXE
C) REGISTER.EXE
D) CHGREG.EXE
A) EDITREG.EXE
B) REGEDIT.EXE
C) REGISTER.EXE
D) CHGREG.EXE
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Because the Executive Services are critical to the operation of the computer, applications are allowed to communicate directly with it.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
An application's view of the operating system is restricted to those methods and services exposed by the different ____.
A) environment subsystems
B) kernel services
C) executive services
D) environment services
A) environment subsystems
B) kernel services
C) executive services
D) environment services
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The environment subsystems and the applications run in ____ mode.
A) kernel
B) environment
C) user
D) service
A) kernel
B) environment
C) user
D) service
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
Requests for system actions that must be performed by the Executive Services are moderated by the environment subsystems.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
The Executive Services operate in ____ mode.
A) patch
B) user
C) service
D) kernel
A) patch
B) user
C) service
D) kernel
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Registry keys can contain sensitive information that can crash the computer or damage expected functionality if they are improperly configured.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
The owner of the registry keys is usually listed as ____.
A) ADMIN
B) OWNER
C) CONTROLLER
D) SYSTEM
A) ADMIN
B) OWNER
C) CONTROLLER
D) SYSTEM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The ____ hive contains details about the current hardware profile in use.
A) HKEY_CURRENT_USER
B) HKEY_CLASSES_ROOT
C) HKEY_LOCAL_MACHINE
D) HKEY_CURRENT_CONFIG
A) HKEY_CURRENT_USER
B) HKEY_CLASSES_ROOT
C) HKEY_LOCAL_MACHINE
D) HKEY_CURRENT_CONFIG
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
____ support applications and provide indirect access to Executive Services in the Windows 7 operating system kernel.
A) Kernel Services
B) Environment Services
C) Kernel patching
D) Environment subsystems
A) Kernel Services
B) Environment Services
C) Kernel patching
D) Environment subsystems
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
UAC-aware applications can include a(n) ____ file called the application manifest.
A) XML
B) HTML
C) XPS
D) PDF
A) XML
B) HTML
C) XPS
D) PDF
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
In Windows 7, a new instance of ____ is created for each DOS application that is executed to ensure that the DOS applications do not interfere with each other.
A) kernel32.exe
B) kernelDOS.exe
C) ntvdm.exe
D) dosvdm.exe
A) kernel32.exe
B) kernelDOS.exe
C) ntvdm.exe
D) dosvdm.exe
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
The Windows 7 operating system is designed to operate in a layered approach, where different layers provide targeted functionality.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
DOS was designed as a multitasking operating system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
What are the application environments supported by Windows 7?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
All requests for service from the Win16 environment are translated to 32-bit requests and vice-versa. This specific translation situation is referred to as ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
When a legacy DOS application runs, ntvdm.exe is started to create a(n) _________________________ environment for the DOS application.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
What precautions should be taken before modifying the registry?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The Windows 7 operating system consists of two key components, the environment subsystems and the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Briefly describe the history of the Windows Registry.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Briefly describe Windows registry security.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What is the purpose of the HKEY_CURRENT_USER hive?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
The Run As feature has been modified in Windows 7 to now be known as the ____ option.
A) Run with Privilege
B) Privilege Mode
C) Run Elevated As
D) Run As Administrator
A) Run with Privilege
B) Privilege Mode
C) Run Elevated As
D) Run As Administrator
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
How can you backup the entire Windows registry?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Much of the hardware-specific knowledge in Windows 7 is contained in the ___________________________________ service, which is specifically installed during installation of the operating system.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
The application ____ can identify the application as UAC aware, which disables UAC file and registry virtualization automatically for that application.
A) mode
B) kernel
C) manifest
D) API
A) mode
B) kernel
C) manifest
D) API
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
The ____________________ hive contains multiple subsections to define user-specific settings for new users and any user that has ever logged on to the computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
What are the primary hives found in the Windows 7 registry?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are some of the key system areas that are virtualized in Windows 7?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
The ____ is a free download from Microsoft, a lifecycle management tool for the applications required by a company, and can help deploy Windows 7 as fast as possible.
A) Microsoft Standard User Analyzer
B) Microsoft Application Verifier
C) Application Compatibility Toolkit 4.1
D) Microsoft Application Compatibility Toolkit V5.5
A) Microsoft Standard User Analyzer
B) Microsoft Application Verifier
C) Application Compatibility Toolkit 4.1
D) Microsoft Application Compatibility Toolkit V5.5
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
____ is a system whereby applications modify the core functionality of the Windows operating system to obtain low level access to the operating system and its resources.
A) Program Compatibility Settings
B) Kernel patching
C) Program Compatibility Assistant
D) Program Compatibility Wizard
A) Program Compatibility Settings
B) Kernel patching
C) Program Compatibility Assistant
D) Program Compatibility Wizard
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What is the purpose of the HKEY_CLASSES_ROOT hive?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The ____ is designed to make it easy for home users to adjust their legacy applications to work with Windows 7 without having to know a lot about compatibility settings.
A) CompatAssist.exe
B) REGEDIT.EXE
C) Program Compatibility Assistant
D) REG.EXE
A) CompatAssist.exe
B) REGEDIT.EXE
C) Program Compatibility Assistant
D) REG.EXE
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Windows 7 Enterprise, Ultimate, and Professional Editions include support for ____, which installs a second virtual operating system that runs at the same time as Windows 7.
A) XP Mode
B) User Mode
C) Kernel Mode
D) Vista Mode
A) XP Mode
B) User Mode
C) Kernel Mode
D) Vista Mode
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
What are the main components of the Microsoft Application Compatibility Toolkit (ACT)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck