Exam 11: Application Support
Exam 1: Introduction to Windows 742 Questions
Exam 2: Installing Windows 742 Questions
Exam 3: Using the System Utilities42 Questions
Exam 4: Managing Disks42 Questions
Exam 5: Managing File Systems42 Questions
Exam 6: User Management42 Questions
Exam 7: Windows 7 Security Features42 Questions
Exam 8: Networking42 Questions
Exam 9: User Productivity Tools42 Questions
Exam 10: Performance Tuning42 Questions
Exam 11: Application Support42 Questions
Exam 12: Disaster Recovery and Troubleshooting42 Questions
Exam 13: Enterprise Computing42 Questions
Exam 14: Remote Access42 Questions
Select questions type
Much of the hardware-specific knowledge in Windows 7 is contained in the ___________________________________ service, which is specifically installed during installation of the operating system.
Free
(Short Answer)
4.9/5
(37)
Correct Answer:
HAL,Hardware Abstraction Layer,HAL (Hardware Abstraction Layer),Hardware Abstraction Layer (HAL)
When a legacy DOS application runs, ntvdm.exe is started to create a(n) _________________________ environment for the DOS application.
Free
(Short Answer)
4.8/5
(34)
Correct Answer:
VDM,Virtual DOS Machine,VDM (Virtual DOS Machine),Virtual DOS Machine (VDM)
Registry keys can contain sensitive information that can crash the computer or damage expected functionality if they are improperly configured.
Free
(True/False)
4.9/5
(36)
Correct Answer:
True
____ is a system whereby applications modify the core functionality of the Windows operating system to obtain low level access to the operating system and its resources.
(Multiple Choice)
4.9/5
(38)
The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately.
(Multiple Choice)
4.9/5
(35)
The ____________________ hive contains multiple subsections to define user-specific settings for new users and any user that has ever logged on to the computer.
(Short Answer)
4.8/5
(22)
The Windows 7 operating system is designed to operate in a layered approach, where different layers provide targeted functionality.
(True/False)
4.7/5
(26)
What are the main components of the Microsoft Application Compatibility Toolkit (ACT)?
(Essay)
4.8/5
(32)
The environment subsystems and the applications run in ____ mode.
(Multiple Choice)
4.8/5
(40)
Applications designed to interact with the ____ subsystem are the most common type of application in use with earlier operating systems, such as Windows XP.
(Multiple Choice)
4.7/5
(29)
The application ____ can identify the application as UAC aware, which disables UAC file and registry virtualization automatically for that application.
(Multiple Choice)
4.9/5
(33)
In Windows 7, a new instance of ____ is created for each DOS application that is executed to ensure that the DOS applications do not interfere with each other.
(Multiple Choice)
4.9/5
(35)
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called ____.
(Multiple Choice)
4.8/5
(30)
An application's view of the operating system is restricted to those methods and services exposed by the different ____.
(Multiple Choice)
4.9/5
(33)
Windows 7 Enterprise, Ultimate, and Professional Editions include support for ____, which installs a second virtual operating system that runs at the same time as Windows 7.
(Multiple Choice)
4.9/5
(36)
The ____ hive contains details about the current hardware profile in use.
(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)