Chapter 14 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
The_____________lets you view the applications and processes running on your computer as well as information about process and memory performance, network activity,and user activity. | Task Manager (Taskmgr.exe) |
Windows Vista Task Manager has six Tab: | Applications tab, Processes tab, Services tab(not on XP), Performance Tab, Networking Tab, and Users Tab. |
The Applications tab in Task Manager, each application can have one of two states: | Running or not responding |
The Processes tab in Task Manager | Lists system services and other processes, CPU time, and memory use, and help you determine which applications are slowing down your system. |
The Performance tab in Task Manager | Identifies applications, processes using most CPU time |
The Kernel Memory(MB) in the Performance tab in Task Manager | indicates how much RAM and virtual memory the core kernel components of Windows are using. |
System Configuration Utility (MSconfig.exe)temporary fix to disable program or service from loading. Use other tools, such as | Services console or Start up folders, to permanently remove it from the start up process. |
Windows Vista can also be used to monitor start up programs and to enable and disable a start up program is called | Software Explore is more convenient to use than MSconfig. |
The___________ is used to control the Windows and third-party services installed on a system. | Services Console(Services.msc) |
The Automatic (Delayed Start) in Services Console(Services.msc), | starts shortly after startup, after the user logs on |
The Automatic in Services Console(Services.msc), | starts when Windows loads |
The Manual in Services Console(Services.msc), | starts as needed |
The Disabled in Services Console(Services.msc), | cannot be started |
The Computer Management console (Compmgmt.msc) | contains a group of Windows administrative tools useful for managing a local PC or other computers on the network. |
Microsoft Management Console (MMC.exe) | Windows utility to build customized console windows. |
Console | is a single window containing one or more administrative tools,such as Device Manager, or Disk Management. |
Snap-ins | are individual tools in a console |
Tool for troubleshooting problems with Windows, applications, and hardware is called | Eventvwr.msc |
Three most important views of logs in Eventvwr.msc are | Application log, Security log, System log |
The___________ in Event Viewer is most important log other than security logs is records three error event types information, warning, and error events. | System log |
Reliability and Performance Monitor (Perfmon.msc) that | Collects, records, and displays events (i.e., Data Collector Sets) |
The Data Collector Sets in Reliability and Performance Monitor | utility can be used to collect your own data about the system |
The most important Windows component that holds information for Windows is the | Registry Editor(regedit.exe) Database designed with a treelike structure (i.e., hierarchical database) |
During start up, Windows built Registry in | memory |
After the registry is built in memory, it is organized into five treelike structures each segment called a | KEY Each key can have subkeys |
Data is organized in the Registry in | hive files |
A Windows registry key that stores information to determine which application is opened when the user double-clicks a file. | HKEY_CLASSES_ROOT (HKCR) |
A Windows registry key that contains Plug and Play information about the hardware configuration that is used by the computer at startup. | HKEY_CURRENT_CONFIG (HKCC) |
A Windows registry key that contains data about the current user. The key is built when a user logs on using data kept in the HKEY_USERS key and data kept in the Ntuser.dat file of the current user. | HKEY_CURRENT_USER (HKCU) |
An important Windows registry key that contains hardware, software, and security data. The key is built using data taken from the SAM hive, the Security hive, the Software hive, and the System hive and from data collected at startup about the hardware. | HKEY_LOCAL_MACHINE (HKLM) |
A Windows registry key that contains data about all users and is taken from the Default hive. | HKEY_USERS (HKU) |
The__________are caused by poorly written applications that request memory they don't need. | Memory Leaks |
Under Windows Vista, is a summary index designed to measure the overall performance of a system. You can use it to compare systems and identify performance bottlenecks in a particular system is called | Windows Experience Index |
As always, if valuable data is not backed up, back it up before you do anything else. that you can use the | Vista Backup and Restore Center or the Windows XP Ntbackup utility to back up data |
The Vista sidebar appears on the Windows desktop to hold miniapplications called | Gadgets |
Another way to seach memory leak is to use Task Manager click processs tab and click View, select Columns Verify that | Memory Private Working Set, Handles, and Threads Columns are checked |
There several ways you can access Task Manager: Press | Ctrl+Shift+Esc |
If an application is hung, try using the____________to end the task. | Application tab |
The__________graph indicates the percentage of time the CPU is currently being used. | CPU Usage |
The right_______________shows how much memory has recently been used. | Physical Memory Usage History |
The___________gives information about the overall system status. | System frame |
The____________frame list Total (amount of RAM), Cached (RAM that has recently been cached), and Free (RAM that recently has not been used). | Physical Memory (MB) |
The____________tab lets you monitor network activity and bandwidth used. | Networking |
____________in Windows Vista can also be used to monitor startup programs and to enable and disable a startup program. | Software Explorer |
The____________ records events about applications and Windows utilities such as when an application was unable to open a file | Applicationl |
The___________log records events based on audit policies, which an administrator sets to monitor user activity such as successful or unsuccessful attempts to access a file or log on to the system. | Security |
Five files stored in the C:\Windows\system32\config folder; these files are called | Hives, and they are named the SAM |
Back up a single registry key just before you edit the key. This method, called | exporting a key |
Windows Vista automatically makes a daily backup of the registry | hive files to the C:\Windows\System32\Config\RegBack |
Created by:
fofo509
Popular Computers sets