Why Choose Us?
0% AI Guarantee
Human-written only.
24/7 Support
Anytime, anywhere.
Plagiarism Free
100% Original.
Expert Tutors
Masters & PhDs.
100% Confidential
Your privacy matters.
On-Time Delivery
Never miss a deadline.
1)Why is it a good idea to temporarily disable a program before removing it altogether? Why might antivirus and antispyware software not detect malicious software? Why would you expect fewer processes to be running in Safe Mode? Why is disabling the Lsass
1)Why is it a good idea to temporarily disable a program before removing it altogether?
- Why might antivirus and antispyware software not detect malicious software?
- Why would you expect fewer processes to be running in Safe Mode?
- Why is disabling the Lsass.exe process not a good idea?
- What key do you press during startup to launch Safe Mode?
- What Windows utility is used to create a Windows 7 repair disc?
- Is your system a 32-bit or 64-bit operating system?
8. Why do you think it is important to label the Windows repair disc as a 32-bit or
64-bit version?
9.Sometimes a computer boots directly to the hard drive even when a bootable CD is
inserted in the optical drive. Explain why this happens and how you can fi x the problem
so that the computer boots from the CD.
10. What key on your computer do you press to access BIOS setup to change the boot
Sequence
11. Which System Recovery Option should you use to solve a problem with a corrupted
device driver that was just installed and causes the system to not boot?
12. Which System Recovery Option should you use if Microsoft Word documents continue
to get corrupted?
13. Suppose you insert the repair disc in the drive and restart the system and the Windows
desktop loads. Why did the system not boot from the disc?
14. Which System Recovery Option should you use if the system hangs at odd times and is
generally unstable?
15. What can you conclude if you cannot load the Advanced Boot Options menu
by pressing F8 at startup, but you can load Windows RE by booting from the
repair disc?
16. Which System Recovery Option will make the least intrusive changes to the system,
System Restore or Startup Repair?
18. What Windows utility is used to create a system image? To restore the system using a
system image? To mount a VHD to the Windows system?
19. Why is it useful to know that you can mount into the Windows system the VHD that
holds the system image?
- Describe one situation in the field when you might want to recover the Windows
volume using the system image
21. Why might you want to recover lost data before attempting to resolve a boot
problem?
22. How could scheduled backups have saved you a lot of time?
23.What type of errors might cause a computer to not boot? List three possible causes:
24. If you suspect the first computer is not booting because it is infected with a virus, what
should you ensure before installing its hard drive in a second computer?
25 . List the four layers of the protocol stack used when an email client requests email over
the Internet:
26. What protocol does a web browser normally use?
27. At which TCP/IP layer does a web browser work?
28. When more than one application is running on a server, how does IP know which
service should be presented a data packet?
29. When configuring a network connection to the Internet, you might need to enter the IP
address of the computer, the DNS server, the subnet mask, and the default gateway. Of
these four items, which is used to determine whether a remote computer is on the same
network or a remote network?
- Of the four items in Question 5, which is used to relate a domain name to an IP address?
- How long, in bits, is a typical MAC address?
- Computers often express numbers in format, which is a base 16 numbering system.
- Most people are more comfortable working with a(n) , or base 10, numbering system.
34. In the hexadecimal system, what decimal value does the letter A represent?
- What dialog box do you use to configure TCP/IPv4 settings for the network adapter?
- What are the two types of addresses or names used in this lab that can uniquely identify a computer on the network?
- If there is no DHCP server to provide a computer a unique IP address, how is a computer still able to acquire an IP address?
- What is the exact path to the My Documents folder for a user named John Smith?
- What is the name of the window you can use to configure the network discovery and file sharing settings?
- List the steps to change the password to the homegroup
- What type of network location is required for a homegroup?
- What are the four resources that Windows includes by default in a homegroup?
- In previous versions of Windows, a two-person icon on a folder indicated it was shared. How does Windows 7 indicate a folder is shared in Windows Explorer?
- How many homegroups can you have on a local network?
- What are some of the additional features available on your router that you would like to implement when setting up a small wired and wireless network?
- Name two ways your router can limit Internet access:
- Name one advantage and one disadvantage of a wireless connection compared to a wired network:
- Most wireless routers have a reset switch. Give an example of when this might be useful:
- What client application on your computer is used to configure a home router?
- Why should you update your router’s firmware before making any other security changes?
- How could not changing your router’s password compromise all of your other security changes?
- Why wouldn’t “password” or “linksys” make a good password for your router?
- How can you configure your router once you’ve disabled remote configuration?
Expert Solution
PFA
Archived Solution
You have full access to this solution. To save a copy with all formatting and attachments, use the button below.
For ready-to-submit work, please order a fresh solution below.





