Vous êtes sur la page 1sur 8

Page |1 WIN 7 Enterprise Mid Term Study Guide

1. Processor Pages#2-3 It is considered the brain of the computer because all of the instructions it performs are mathematical calculations and logical comparisons. a. Today, the clock speed of the processor is usually expressed in gigahertz (GHz). i. A gigahertz is 1 billion (1.000.000.000) cycles per second. b. 32-bit Processors can process up to 4gb or 64gb of memory c. Technically a 64-bit processor can access up to 16.3 billion gigabytes (16 exabytes) of memory. Memory - Page#3 a. RAM (Random Access Memory) is the computers short-term or temporary memory. i. It stores instructions and data that the processor accesses directly. ii. The more RAM, you can load more instructions and data from the disks. iii. Plays a big part in computer performance Types of Ports Page#6 a. Parallel Port i. 2-row, 25-pin female D port Considered a legacy port that used to connect printers. b. Serial Port i. 2-row, 9-pin male D port While considered a legacy port, it is often used to connect to switches and routers to configure them. It can also be used to connect legacy keyboards, mice, and printers. c. Universal Serial Bus (USB) i. A popular device that can be used to connect keyboards, mice, printers, modems, and external disk drives. d. PS/2 mouse or keyboard Port i. 6-pin Mouse Mini-DINPort used to connect a legacy mouse. e. RJ-45 Connector i. Used to connect a 10Base-T // 100Base-T // 1000Base-T network cable. f. Video Graphics Array (VGA) i. 3-row, 15-pin female D connectorAnalog-based standard used for CRT displays. g. Digital Visual Interface (DVI) i. Digital-Based standard designed for displays such as flat-panel displays (LCDs, plasma screens, wide highdefinition television displays), and video projectors. h. Video In Video Out (VIVO) for S-Video, Composite video, and Component video i. Used for television, DVD players, videos recorders, and video game consoles. They often come in two 9-pin Mini-DIN connector variations, and the VIVO splitter cable generally comes with either 4 connectors (S-Video in and out + composite video in and out), or 6 connectors (S-Video in and out + component PB out + component PR out + component Y out [also composite out] + composite in). i. High-Definition Multimedia Interface (HDMI) i. An advanced digital audio/video interconnect commonly used to connect game consoles and DVD players to a display. HDMI supports copy protection through HDCP. Different Versions of Windows 7 PAGE #7 a. Windows 7 Starter i. Only 32-bit ii. Only recognizes 2 GB of memory b. Window 7 (32-Bit versions) i. Can only use up to 4 GB of memory c. 64-Bit Windows 7, Windows 7 Ultimate, Enterprise, and Professional i. Can recognize up to 192 GB d. Windows 7 Home Premium 64-Bit i. Can recognize up to 16 GB e. Windows 7 Home Basic 64-Bit recognizes up to 8 GB of memory. What to know when upgrading different window versions. PAGE #8 a. You cannot perform an in place upgrade from 32-bit version to 64-bit version and from one language to another. b. You can perform an in-place upgrade from a lower edition of Windows 7 to a higher one using the Windows Anytime Upgrade tool. c. You cannot upgrade directly from Windows XP to Windows 7. i. Instead, you will first have to upgrade to Windows Vista, then upgrade Windows Vista to Windows 7. When you want to upgrade to Windows 7, you should follow these guidelines: PAGE #8 a. Verify that the current computer will support Windows 7 b. Update anti-virus, run it, and then disable it. After you install windows remember to re-enable the anti-virus program, or install new anti-virus software that works with windows 7.

2.

3.

4.

5.

6.

Page |2 WIN 7 Enterprise Mid Term Study Guide


c. d. Back up your files. You can back up files to an external hard disk, a DVD or CD, or a network folder. Connect to the internet. Make sure your internet connection is working so that you can get the latest installation updates. These updates include security updates and hardware driver updates that can help with installation. If you dont have an internet connections, you can still upgrade or install windows.

Windows 7 Minimum Requirements - PAGE #7-8 32-Bit Processor: 1 GHz 32 Memory (RAM): 1 GB Graphics Card: To support Aero, DirectX 9 graphics processor with WDDM driver model 1.0 HDD free space: 16 GB Optical Drive: DVD for installation

64-Bit 1 GHz 64-Bit 2 GB To support Aero, DirectX 9 graphics processors with WDDM driver model 1.0 20 GB DVD for installations

7.

If you have a computer using windows XP or Windows Vista, you can test your machine for any hardware or software compatibility issues with V V V 8. The Windows 7 Upgrade Advisor scans your PC for potential compatibility issues and lets you know about your upgrade options. 9. Clean Installation is installing the software from scratch on a new drive or on a newly reformatted drive. a. Advantage i. It offers a fresh start. ii. Sure way to clear out virus or w/e is affecting performance. b. Disadvantage i. Is that the system and all of its software needs to be reinstalled, patched and configured, and data copied over, something that may take hours or even days. 10. Tools and Utilities a. Control Panel PAGE #8 i. The main graphical utility used to configure the Windows environment and hardware devices. b. UAC (User Account Control) PAGE #10 i. Is a feature that started with Windows Vista and is included with Windows 7 that helps prevent unauthorized changes to your computer. c. One of the most important configuration settings for a windows administrator is the system settings within the control panel. i. This includes gathering generation information about your system, changing the computer name, adding the computer to a domain, accessing the device manager, configuring remote settings, configuring startup and recovery options, and configuring overall performance settings. d. Each computer should have a unique computer name assigned to a network. e. Action Center PAGE #14 i. Is a central place to view alerts and take actions that can help keep windows running smoothly ii. Messages about security and maintenance settings 1. Red items are labeled important and indicate significant issues to address soon 2. Yellow Items are tasks that you should consider addressing, like recommended maintenance tasks. f. Microsoft Management Console (MMC) PAGE #16 i. Is one of the primary administrative tools used to manage windows and many of the network services provided by windows. g. Administrative Tools PAGE #17 i. Component Services, Computer Management, Data Sources (ODBC), Event Viewer, iSCSI Initiator, Local Security Policy, Performance Monitor, Print Management, Services, System Configuration, Task Scheduler, Windows Memory Diagnostics, Windows Power Shell Modules <<< Details PAGE 17 h. Computer Management Console is available in WIN Server 2003, Windows Server 2008, Windows XP, Windows Vista, and Windows 7. i. Is one of the primary tools to manage a computer running windows 7 and includes the most commonly used MMC snap-ins. ii. Contains Task scheduler, event viewer, shared folders, local users and groups, performance, device management, routing and remote access, services, and WMI control.

Page |3 WIN 7 Enterprise Mid Term Study Guide


11. Service PAGE #19-20 a. Is a program, routine, or process that performs a specific system function to support other programs or to provide a network service. b. It runs in the sytem background without a user interface. 12. BIOS (Basic input / output system) PAGE #4 a. Instructions that control much of the computers input/output function, such as communicating with disks, RAM, and the monitor kept in the system ROM chips. 13. Registry PAGE #20-22 a. Is a central, secure database in which windows stores all hardware configuration information, software configuration information, and system security policies. i. Components that use the registry include the windows kernel, device drivers, setup programs, hardware profiles, and user profiles. b. To view and manually change the registry, you use the registry editor ( regedit.exe ) which can be executed from the command prompt, start search box or run box. c. The registry is split into several logical sections, referred to as Hives i. Windows 7 has 5 Root Keys/HKEYs: 1. HKEY_CLASSES_ROOT Stores information about registered applications, such as a file association that tells which default program opens a file with a certain extension. 2. HKEY_CURRENT_USER Stores settings specific to the currently logged in user. a. When a user logs off, the HKEY_CURRENT_USER is saved to HKEY_USERS. 3. HKEY_LOCAL_MACHINE Stores settings specific to the local computer. 4. HKEY_USERS Contains subkeys corresponding to the HKEY_CURRENT_USER keys for each USER PROFILE ACTIVELY LOADED ON THE MACHINE. 5. HKEY_CURRENT_CONFIG Contains information gathered at runtime. Information stored in this key is not permanently stored on disk, but rather regenerated at boot time. 14. Troubleshooting Methodology a. Discover the problem: i. Identify and document problem symptoms, and search technical information resources including searching Microsoft knowledge base articles to determine whether the problem is a known condition. b. Evaluate system configuration: i. Ask the client or customer and check the systems documentation to determine if any hardware, software, or network changes have been made including any new additions. Also check any available logs including looking in the Event Viewer. c. List or track possible solutions, and try to isolate the problem by removing or disabling hardware or software components: i. You may also consider turning on additional logging or running diagnostics programs to gather more information and test certain components. d. Execute a plan: i. Test potential solutions and have a contingency plan if these solutions do not work or have a negative impact on the computer. Of course, you dont want to make the problem worse, so if possible, bacvk up any critical system or application files. e. Check results: i. If the problem is not fixed, go back to track possible solutions. f. Take a proactive approach: i. Document changes that you made along the way while troubleshooting the problem. Also notify the customer or client and document internal systems of the problem in case it happens in the future or if those changes that fixed the problem affect other areas. 15. Event Viewer Is a Microsoft management console (MMC) snap-in that enables you to browse and manage event logs. a. Application Log contains events logged by applications or programs. b. Security Log Contains events such as valid and invalid log on attempts and access to designated objects such as files and folders, printers, and active directory objects. By default, the security log is empty until you enable auditing. c. Setup Log Contains events related to application setup. d. System Log Contains events logged by Windows system components including errors displayed by Windows during boot and errors with services. e. Forwarded Events Log Used to store events collected from remote computers. To collect events from remote computers, you must create an event subscription.

Page |4 WIN 7 Enterprise Mid Term Study Guide


16. PAGE#31 The most common cabling system used for wired computers is Ethernet. a. Most computers connect with unshielded twisted-pair (UTP) cabling. b. Each end of the UTP cable has RF-45 connectors. c. Todays workstations usually come with 100 Mb/s or 1 Gb/s connections for Ethernet. d. Older machines only support 10 Mb/s. 17. Host PAGE #31 - is any device that connects directly to a network. 18. Internet Protocol (IP) Address PAGE #32 - is a logical address and numerical label that is assigned to a device that is connected to a computer network. 19. IPv4 Addresses PAGE #32-33 a. Are based on 32-bit b. Ranges from 0 to 255 a total of 256 possible numbers. c. Is expressed in a dot-decimal notation consisting of four numbers (w.x.y.z). d. Each number is called an octet because it is based on 8 bits. e. Were based on a classful network design where the first three bits of the first would define the class class A,B and C. Class A B C Range 1st Octet 0-127 128-191 192-223 Default Subnet Mask 255.0.0.0 255.255.0.0 255.255.255.0 Network ID w w.x w.x.y Host ID x.y.z y.z z # of Networks 128 16,384 2,097,151 # of Address Per Network 16,777,214 65,534 254

20. Subnet Mask specify which bits are network bits and which bits are host bits. a. When you have a subnet mask of 255.0.0.0 it means the first 8 bits are used to describe the network bits, while the last 24 bits are used for the host bits. b. 255.0.0.0 = 11111111.00000000.00000000.00000000 i. vNetworkv ii. 11111111.00000000.00000000.0000000 iii. ^ Host ^ c. Class A, B and C addresses are known as unicast addresses that specify a single network device. d. Class D and E are reserved IPv4 e. Class D are defined from 244.0.0.0 to 239.255.255.255 used for multicast address. i. A multicast address is a single address that refers to multiple network devices. 1. You can think of a multicast addressthat can be used to cut down traffic by sending one set of data packets meant for multiple hosts. f. Class A through C are called classful addresses g. With classful networks many addresses were wasted. Therefore, classless inter-domain routing (CIDR) was developed to utilize the networks more efficiently. 21. NAT (network address translation) PAGE #33-34 a. NAT is used with masquerading to hide an entire address space behind a single IP address. In other words it allows multiple computers on a network to connect to the internet through a single IP address. b. Enables a local area network (LAN) to use one set of IP addresses for internal traffic and a second set of address for external traffic. c. NAT box is usually a routers (including routers made for home and small office internet connections) or a proxy server. i. NAT serves two purposes 1. Provides a type of firewall by hiding internal IP Addresses 2. Enable a company to use more internal IP Addresses. 22. Private Address a. Are reserved addresses not allocated to any specific organizations b. Cannot be assigned to global addresses used on the internet c. Are not routable on the internet d. You must use a NAT gateway or proxy server to convert between private and public addresses e. Private Address Range i. 10.0.0.0 10.255.255.255 ii. 172.16.0.0 172.31.255.255 iii. 192.168.0.0 192.168.255.255 23. IPv6 Address PAGE #34 a. Are 128-Bit addresses b. More efficient routing than IPv4

Page |5 WIN 7 Enterprise Mid Term Study Guide


c. Support for automatic configuration d. Enhanced security to protect against address and port scanning attacks and utilize IPSec to protect IPv6 traffic. e. Address are divided into groups of 16 bits. Default Gateway PAGE #35 is a device, usually a router, which connects the local network to other networks. DNS (Domain Name System) PAGE #35-36 is a hierarchical client/server-based distributed database management system that translates domain/host names to an IP address. DHCP (Dynamic Host Configuration Protocol - Used to assign IP addresses aka DHCP Server APIPA Networking Command Line Utilities PAGES #44 - 49 a. Ipconfig It displays all current TCP/IP network configuration values and refreshes DHCP settings. i. /all it displays the full TCP/IP configuration for all adapters including host name, dns servers, and the physical/MAC address. ii. /renew will renew the DHCP configuration from the DHCP server. iii. /release to release the DHCP address from a network address. b. Ping verifies IP-level connectivity to another TCP/IP computer by sending internet control message protocol (ICMP) echo Request messages. c. Tracert traces the route that a packet takes to a destination and displays the series of IProuters that are used in delivering packets to the destination. d. Pathping traces a route through the network in a manner similar to tracert. However pathping also provides more detailed statistics on the individual hops. e. Nbtstat to remove or correct preloaded entries (NetBIOS name entry resolutions) f. Netstat- displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for IP,ICMP,TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6 and UDP over IPv6 protocols). g. telnet - is a text based communication program that allows you to connect to a remote server over a network to execute commands at a remote command prompt. h. nslookup - is a command-line administrative tool for testing and troubleshooting DNS name resolution. Tunneling Protocols PAGE#91 - is an encryption mechanism that places one set of packets into the encryption packet and is sent over a public network. a. Point to Point tunneling (PPTP) is based on the legacy point to point protocol used with modems. PPTP is easy to set up but is considered weak encryption. b. Internet Protocol Security (IPSec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. c. Layer 2 Tunneling Protocol (L2TP) is used with IPSec to provide security and is the industry standard when setting up secure tunnels. d. IKEv2 (Internet Key Exchange version 2) is new in Windows 7 and Windows Server 2008 R2. It uses IPSec for encryption while supporting VPN Reconnect (also called mobility), which enables VPN connections to be maintained when a VPN client moves between wireless cells or switches and to automatically reestablish broken VPN connectivity. e. Secure Socket Tunneling Protocol (SSTP) uses HTTPS protocol over TCP port 443 to pass traffic through firewalls and web proxies that might block PPTP and L2TP/IPSec without requiring a client computer certificate or preshared key. VPN (Virtual Private Network) --- numbers 30-34 are IN THE BOOK ON PAGES #90 - 97 a. Links two computers through a wide-area network such as the internet. RAS (Remote Access Server) a. Enables users to connect remotely using various protocols and connection types. RRAS (Routing and Remote Access Server) a. In windows 2008 is the network policy and access service server role. i. Allows servers configured with RRAS to receive requests from remote access users located on the internet, authenticate these users, authorize the connection requests, and finally either block the requests or route the connections to private internal network segments.. RADIUS (Remote Authentication Dial In User Service a. Is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for computers to connect and use a network service. Direct Access- Is a new feature introduced with windows 7 and windows server 2008 R2 that provides seamless intranet connectivity to Direct Access client computers when they are connected to the internet. a. Unlike VPN connections Direct Access connections are automatically established.

24. 25. 26. 27. 28.

29.

30. 31. 32.

33.

34.

Page |6 WIN 7 Enterprise Mid Term Study Guide


35. Authentication Protocols PAGES #92 a. Password Authentication Protocol (PAP) i. Uses polain text (unencrypted passwords). PAP is the least secure authentication and is not recommended. b. Challenge Handshake Authentication Protocol (CHAP) i. A challenge response authentication that uses the industry standard md5 hashing scheme to encrypt the response. c. MS-CHAP v2 (Microsoft CHAP version 2) i. Provides two way authentication (mutual authentication). Provides stronger security than CHAP. d. Extensible Authentication Protocol (EAP-MS-CHAPv2) i. A universal authentication framework that allows third party vendors to develop custom authentication schemes including retinal scans, voice recognition, fingerprint identifications, smart card, Kerberos and digital certificates. It also provides mutual authentication methods that support password based user or computer authentication. 36. Authentication is the process of identifying an individual, usually based on a username and password. PAGE #55 37. Authorization Is the process of giving individuals access to system objects based on their identity. PAGE #55 38. User Profiles PAGE #60 is a collection of folders and data that store the users current desktop environment and applications settings, is associated with each user account. 39. Domain PAGE#62 is a logical unit of computers and network resources that defines a security boundary. 40. Workgroup PAGE#55 is usually associated with a peer to peer network, where user accounts are decentralized and stored on each individual computer. 41. Homegroups PAGE #141- new to windows 7 and are used to make it easier to share files and printers on a home network. A homegroup allows you to share pictures, music, videos, documents, and printers with other people in your homegroup 42. Wireless Network Standards PAGE#82 802.11 FREQ (GHz) BANDWIDTH DATA RATE PER ALLOWED (MHz) STREAM (Mbits) STREAM A 2.4 20 1,2 1 5 20 6,9,12,18,24 1 3.7 36,48,54 1 (802.11a frequency 5 and 3.7 both have the same bandwidth and data rate per stream) B 2.4 20 1,2,5.5,11 1 G 2.4 20 1,2,6,9,12,18,24 1 36,48,54 N 2.4/5 20 7,2,14.4,21.7,28.9 4 40 15,30,45,60,90 4 INDOOR RANGE Meters Feet 20 66 35 115 -----38 38 70 70 125 125 230 230 OUT DOOR RANGE Meters Feet 100 330 120 390 5,000 16,000 140 140 250 250 460 460 820 820

43. Wireless Encryption Protocols PAGE #83 a. WEP (Wired Equivalent Privacy)- Is easily cracked, not recommended for use. b. WPA (Wi-Fi Protected Access)- Provides strong data encryption via Temporal Key integrity. c. WPA2 (Wi-Fi Protected Access 2) Provides enhanced data encryption via Advanced Encryption Standard (AES), which meets the federal information standard (FIPS) 140-2 requirement of some government agencies. 44. Group Policy PAGE #68 a. Is one of the most powerful features of Active Directory that controls the working environment for user accounts and computer accounts. i. Provides the centralized management and configuration of operating systems, applications, and users settings in an Active Directory environment. 1. Group Policy Objects (GPOs) a. System settings Application settings, desktop appearance, and behavior of system services. b. Security settings Local computer, domain, and network security settings. c. Software installation settings - Management of software installation, updates, and removal. d. Scripts settings Scripts for when a computer starts or shuts down and when a user logs on and off. e. Folder redirection settings Storage for users folders on the network. b. Group policies are applied in the following order: (1)Local, (2)Site, (3)Domain, (4)OU ---- PAGE #69

Page |7 WIN 7 Enterprise Mid Term Study Guide


45. Active Directory (AD) PAGE #61-63 Is a technology created by Microsoft that provides a variety of network services. a. Lightweight Directory Access Protocol (LDAP) i. LDAP is an application protocol for querying and modifying data using directory services running over TCP/IP. ii. LDAP uses TCP port 389 b. Kerberos-based and single sign-on (SSO) authentication i. Kerberos is a computer network authentication protocol; it can also provide mutual authentication between server and user. ii. Single Sign-on (SSO) allows you to log on once and access multiple, related, but independent software systems without having to log in again. c. DNS-Based naming and other network information d. Central location for network administration and delegation of authority e. Last AD allows you to organize all of your network resources including users, groups, printers, computers and other objects so that you can assign passwords, permissions, rights, and so on to the identity that needs it. 46. Permissions PAGE #72 - defines the type of access that is granted to an object (an object can be identified with a security identifier) or object attribute. 47. User Rights PAGE #70 authorizes a user to perform certain actions on a computer such as logging on to a system interactively or backing up files and directories on a system. a. User rights are assigned through local policies or active directory group policies. 48. Windows Memory Diagnostics PAGE #104 Tool used to test if you have a faulty RAM or Faulty motherboard. 49. Power Supply The name says it all, but its on page 105 in our book. 50. Hard Disk Tools PAGES #106-108 a. Error checking tool or the chkdsk command at command prompt i. Tools to use to make sure that your hard disk has no errors. b. Disk Cleanup Tool used to reclaim space occupied by unnecessary files, such as temporary files, setup logs, and files in the Recycle Bin. c. Disk Defragmenter rearranges fragmented data so your disks and drives can work more efficiently. i. Fragmentation - makes your hard disk do extra work that can slow down your computer removable storage devices such as USB flash drives can also become fragmented. 51. Device Drivers are programs that control a device. ---PAGE#109 52. Plug and Play (PnP) a technology that allows you to install or connect a device, have the device automatically recognized and configured with the appropriate driver installed. ----PAGE#109 53. Device Manager PAGE #111 provides you with a graphical view of the hardware that is installed on your computer and gives you a way to manage and configure your devices. 54. PAGE#110 Windows assigns the following system resources to the device you are installing so that the devices can operate at the same time as other expansion cards. a. Interrupt request (IRQ) Line Numbers A signal sent by a device to get the attention of the processor when the device is ready to accept or send information. Each device must be assigned a unique IRQ number. b. Direct Memory Access (DMA) channels Memory access that does not involve the processor. c. Input/output (I/O) port addresses A channel through which data is transferred between a device and the processor. The port appears to the processor as one or more memory addresses that it can use to send or receive data. d. Memory address ranges A portion of computer memory that can be allocated to a device and used by a program or the operating system. Devices are usually allocated a range of memory addresses. 55. Boot Process PAGE # 119 (numbers 55 through 58 are all from page 119) a. If the system is running WIN 7, the system will go through the following steps. i. BOOTMGR is loaded and accesses the boot configuration data store to display the boot menu or to boot from a partition or volume 1. BOOTMGR is known as the system partition/volume ii. WINLoad is the operating system boot loader that loads the rest of the operating system. iii. NTOSKERNL.EXE is the main part of Windows, which is responsible for various system services, processes, and memory management iv. Boot-class drivers implement a number of functions that are utilized in different ways by different hardware platforms based on processor and chipset. 56. The partition or volume that contains the windows operating system files (usually the windows folder) is called the boot partition. a. It is common for computer systems to have one drive and one partition/volume, which makes the partition both the system partition and the boot partition. 57. Master Boot Record (MBR) is the first 512-byte boot sector of a partitioned data storage device such as a hard disk. It contains disks primary partition table.

Page |8 WIN 7 Enterprise Mid Term Study Guide


58. Volume Boot Record (VBR) also known as a volume boot sector or a partition boot sector. It is a type of boot sector, stored in a disk volume on a hard disk, floppy disk, or similar data storage device that contains code for booting an operating system such as BOOTMGR 59. PAGE# 119-122 BCD (Boot Configuration Data) is a firmware-independent database for boot time configuration data used by Microsoft windows boot manager. a. To edit the Boot Configuration, you would typically use Bcdedit.exe i. Bcdedit.exe is a command line tool that can be used to add, delete, and edit entries in the BCD store, which contains objects (objects are identified by a GUID (Globally Unique Identifier)) 60. System Configuration (msconfig.exe) is a tool that can help isolate problem startup programs or services that prevent windows from starting correctly. a. When a problem occurs and assuming you can successfully start and log in to windows, you can open System Configuration and disable certain startup programs or services. b. ----PAGES 124-125 61. Windows PE (Pre installation Environment) 3.0 PAGE# 126 a. is a minimal Win32 operating system with limited services, built on the windows 7 kernel. It us used to prepare a computer for windows installation, to copy disk images from a network file server, and to initiate windows setup. b. It is a integral component in recovery technology with windows recovery environment (windows RE). 62. Windows Recovery Environment (WinRE) PAGE# 126 a. Is a set of tools included in the windows vista, 7, server 2008 to help diagnose and recover from serious errors, which may be preventing windows from booting successfully. i. Available Options 1. Startup Repair Automatically finds and fixes boot errors in the windows 7 startup process (including corrupted boot configuration data files) 2. System Recovery- Utilizes the Volume Shadow Copy service to restore the computer to a previous state or restore point. It uses the system restore feature that was first introduced in windows ME. 3. System Image Recovery Restores the complete PC backup disk image 4. Windows Memory Diagnostic Tool Analyzes the computer memory (RAM) for hardware memory problems 5. Command Prompt Gives full command line access to the file system, volumes and files, unlike the recovery console, which was limited in operation. 63. Startup Repair PAGE# 126 a. Which is part of the system recover tools, is capable of fixing almost any startup problem related to boot sectors, MBRs, or the BCD registry file.

Vous aimerez peut-être aussi