Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
35 Cards in this Set
- Front
- Back
typically used to read data from or write data to the registry from inside a scripted batch or command file |
REG.EXE |
|
a tool that monitors what happens when an application is run as a user without elevated permissions. |
Standard User Analyzer |
|
restricts access to memory and hardware |
User mode |
|
runs in its own virtual memory space and is executed by the processor in user mode |
Win32 application |
|
provides the structure and security necessary to centrally manage Windows 7 and application configuration and operational parameters |
Registry |
|
a unique identifier that no two users share on the computer |
SID |
|
allows services full access to memory and hardware devices |
Kernel mode |
|
originally designed to run with Windows 3.x |
Win16 applications |
|
provides the core operating system functionality that supports executing applications |
Executive Services |
|
An application's view of the operating system is restricted to those methods and services exposed by the different ____. |
environment subsystems |
|
Applications designed to interact with the ____ subsystem are the most common type of application in use with earlier operating systems, such as Windows XP. |
Win32 |
|
____ are made up of multiple modules, such as the core kernel, object manager, memory manager, and several others. |
Executive Services |
|
Each Win32 application runs in its own virtual memory space and is executed by the processor in ____ mode. |
user |
|
In Windows 7, a new instance of ____ is created for each DOS application that is executed to ensure that the DOS applications do not interfere with each other. |
ntvdm.exe |
|
____ is a system whereby applications modify the core functionality of the Windows operating system to obtain low level access to the operating system and its resources. |
Kernel patching |
|
____ support applications and provide indirect access to Executive Services in the Windows 7 operating system kernel. |
Environment subsystems |
|
The application ____ can identify the application as UAC aware, which disables UAC file and registry virtualization automatically for that application. |
manifest |
|
The environment subsystems and the applications run in ____ mode. |
user |
|
The Executive Services operate in ____ mode. |
kernel |
|
The ____ hive contains details about the current hardware profile in use. |
HKEY_CURRENT_CONFIG |
|
The ____ hive contains global settings for the entire computer and the applications installed on it. |
HKEY_LOCAL_MACHINE |
|
The ____ is a free download from Microsoft, a lifecycle management tool for the applications required by a company, and can help deploy Windows 7 as fast as possible. |
Microsoft Application Compatibility Toolkit V5.5 |
|
The ____ is designed to make it easy for home users to adjust their legacy applications to work with Windows 7 without having to know a lot about compatibility settings. |
Program Compatibility Assistant |
|
The owner of the registry keys is usually listed as ____. |
SYSTEM |
|
The ____ provides a layer of abstraction that is useful for developers to perform complex tasks more simply because it manages the details of accessing required services. |
.NET Framework |
|
The registry is divided into sections and levels of data. Multiple sections exist to organize data by purpose. The individual sections are called ____. |
hives |
|
The Run As feature has been modified in Windows 7 to now be known as the ____ option. |
Run As Administrator |
|
The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately. |
REGEDIT.EXE |
|
UAC-aware applications can include a(n) ____ file called the application manifest. |
XML
|
|
Windows 7 Enterprise, Ultimate, and Professional Editions include support for ____, which installs a second virtual operating system that runs at the same time as Windows 7. |
XP Mode |
|
Because the Executive Services are critical to the operation of the computer, applications are allowed to communicate directly with it. |
False |
|
DOS was designed as a multitasking operating system. |
False |
|
Registry keys can contain sensitive information that can crash the computer or damage expected functionality if they are improperly configured.
|
True |
|
Requests for system actions that must be performed by the Executive Services are moderated by the environment subsystems. |
True |
|
The Windows 7 operating system is designed to operate in a layered approach, where different layers provide targeted functionality. |
True
|