SlideShare a Scribd company logo
1 of 36
CIS 329 quiz
For more classes visit
www.snaptutorial.com
Question 1
What are the buttons called in the Windows 8 edge UI that
provide access to common operating system functions such as Search
and Settings?
Question 2
If you are currently running Windows 8 on your computer,
what is the easiest way to upgrade to Windows 8 Professional?
Question 3
Which of the following methods is not a way to close unused
apps that are still running on a Windows 8 computer?
Question 4
Computers running Windows PE will automatically shut down
and reboot after how long?
Question 5
During what phase of the Windows 8 startup process is the
Local Security Authority loaded?
Question 6
Before performing an upgrade to Windows 8, several tasks
should be performed to ensure the procedure goes smoothly. Which of
the following is not one of these tasks?
Question 7
What name is given to a Windows PE installation on a
computer with Windows 8 already installed?
Question 8
Your organization currently uses roaming profiles for all
users. All users use Windows 7 computers. Windows 8 will be
introduced shortly in your organization. Given the information
presented, what issue should you be aware of?
Question 9
You have a small number of Windows XP computers in your
organization. You need to manually move as much data from the user
profile locations for these computers as possible to the new Windows 8
computers these users will be receiving shortly. Where in the file system
would you find the profile information?
Question 10
The User State Migration Tool uses several files to control the
migration process. What is the file format of these files?
Question 11
What should you enter into the Run dialog box to open the
Device Manager console?
Question 12
What is the value of a protected checksum dependent upon?
Question 13
0 out of 2 points On which tab of a driver’s properties dialog box will
you find information about any conflicts the driver may be
experiencing?
Question 14
What Windows 8 feature assigns one of four integrity levels to
running processes?
Question 15
What is the executable file name for the Windows Installer
application on a Windows 8 computer?
Question 16
What Windows 8 feature prevents applications from executing
code in prohibited areas?
Question 17
Using a single Microsoft account, on how many Windows 8
devices can you install a specific Windows app?
Question 18
Which of the following is not an AppLocker rule collection
type available for usage when creating AppLocker rules?
Question 19
What PowerShell cmdlet would you need to use to install a
critical Line of Business (LOB) Windows App that has been created
within your organization?
Question 20
When you click the down arrow next to the Print button on the
IE 10 toolbar, you can choose from all of the following options except
which one?
Question 21
What new standard defines a protocol that allows clients and
servers to exchange data immediately as it becomes available without
the overhead created by HTTP and TCP?
Question 22
By default, IE 10 is granted access to which area of the
computer?
Question 23
Which Hyper-V virtual switch feature provides protection
against a malicious virtual machine attempting to steal IP addresses
from other virtual machines?
Question 24
Snapshot data files are stored using what file format?
Question 25
What PowerShell cmdlet can you use to enable Client Hyper-
V?
********************************************************
CIS 329 Week 4 Quiz 1
For more classes visit
www.snaptutorial.com
• Question 1
When considering an upgrade to Windows 8, several critical
questions must be considered. Which of the following is not one of these
questions to consider?
• Question 2
Which edition of Windows 8 includes Office 2013 installed
already but does not offer a choice of 32-bit or 64-bit versions?
• Question 3
What are the buttons called in the Windows 8 edge UI that
provide access to common operating system functions such as Search
and Settings?
• Question 4
Which of the following should be used to locate hardware
inadequacies in the computer that might prevent a successful upgrade to
Windows 8?
• Question 5
What name is given to a Windows PE installation on a
computer with Windows 8 already installed?
• Question 6
During what phase of the Windows 8 startup process is the
Local Security Authority loaded?
• Question 7
Computers running Windows PE will automatically shut down
and reboot after how long?
• Question 8
What is the name of the USMT application that is used to save
user profile data for a migration?
• Question 9
In the scenario where you are installing Windows 8 on a new
computer and plan to dispose of an old computer running Windows XP,
which Windows Easy Transfer method would be most appropriate to
use?
• Question 10
Your organization currently uses roaming profiles for all
users. All users use Windows 7 computers. Windows 8 will be
introduced shortly in your organization. Given the information
presented, what issue should you be aware of?
• Question 11
To communicate with the operating system running on the
computer, each device also requires a software element known as what?
• Question 12
What is the value of a protected checksum dependent upon?
• Question 13
You have opened the Properties dialog box for an installed
printer on your computer system. On what tab will you find information
that is specific to this piece of installed hardware on your computer
system?
• Question 14
You have PhotoShop Elements installed on your Windows 8
computer. You want PhotoShop Elements to automatically be launched
every time you plug in a memory card that contains photos. What setting
do you need modify?
• Question 15
Windows Installer uses what file format for single package
application installations?
• Question 16
What is the name of the Remote Desktop Services feature that
enables clients to run Remote Desktop server applications within an
individual window?
• Question 17
What PowerShell cmdlet would you need to use to install a
critical Line of Business (LOB) Windows App that has been created
within your organization?
• Question 18
When you create your first new rule in AppLocker, what will
happen if you do not have the default rules in place?
• Question 19
By default, Windows 8 is configured to check for
updates for installed apps _________ and then _________ the needed
updates.
• Question 20
Which of the following is not one of the methods that the
SmartScreen Filter uses to identify potential phishing web sites?
• Question 21
When you click the down arrow next to the Print button on the
IE 10 toolbar, you can choose from all of the following options
exceptwhich one?
• Question 22
What new standard defines a protocol that allows clients and
servers to exchange data immediately as it becomes available without
the overhead created by HTTP and TCP?
• Question 23
What PowerShell cmdlet can you use to enable Client Hyper-
V?
• Question 24
Snapshot data files are stored using what file format?
• Question 25
What Hyper-V feature helps you use physical memory more
efficiently for your VMs?
********************************************************
CIS 329 Week 6 Quiz 2
For more classes visit
www.snaptutorial.com
• Question 1
When considering an upgrade to Windows 8, several critical
questions must be considered. Which of the following is not one of these
questions to consider?
• Question 2
Which edition of Windows 8 includes Office 2013 installed
already but does not offer a choice of 32-bit or 64-bit versions?
• Question 3
What are the buttons called in the Windows 8 edge UI that
provide access to common operating system functions such as Search
and Settings?
• Question 4
Which of the following should be used to locate hardware
inadequacies in the computer that might prevent a successful upgrade to
Windows 8?
• Question 5
What name is given to a Windows PE installation on a
computer with Windows 8 already installed?
• Question 6
During what phase of the Windows 8 startup process is the
Local Security Authority loaded?
• Question 7
Computers running Windows PE will automatically shut down
and reboot after how long?
• Question 8
What is the name of the USMT application that is used to save
user profile data for a migration?
• Question 9
In the scenario where you are installing Windows 8 on a new
computer and plan to dispose of an old computer running Windows XP,
which Windows Easy Transfer method would be most appropriate to
use?
• Question 10
Your organization currently uses roaming profiles for all
users. All users use Windows 7 computers. Windows 8 will be
introduced shortly in your organization. Given the information
presented, what issue should you be aware of?
• Question 11
To communicate with the operating system running on the
computer, each device also requires a software element known as what?
• Question 12
What is the value of a protected checksum dependent upon?
• Question 13
You have opened the Properties dialog box for an installed
printer on your computer system. On what tab will you find information
that is specific to this piece of installed hardware on your computer
system?
• Question 14
You have PhotoShop Elements installed on your Windows 8
computer. You want PhotoShop Elements to automatically be launched
every time you plug in a memory card that contains photos. What setting
do you need modify?
• Question 15
Windows Installer uses what file format for single package
application installations?
• Question 16
What is the name of the Remote Desktop Services feature that
enables clients to run Remote Desktop server applications within an
individual window?
• Question 17
What PowerShell cmdlet would you need to use to install a
critical Line of Business (LOB) Windows App that has been created
within your organization?
• Question 18
When you create your first new rule in AppLocker, what will
happen if you do not have the default rules in place?
• Question 19
By default, Windows 8 is configured to check for updates for
installed apps _________ and then _________ the needed updates.
• Question 20
Which of the following is not one of the methods that the
SmartScreen Filter uses to identify potential phishing web sites?
• Question 21
When you click the down arrow next to the Print button on the
IE 10 toolbar, you can choose from all of the following options except
which one?
• Question 22
What new standard defines a protocol that allows clients and
servers to exchange data immediately as it becomes available without
the overhead created by HTTP and TCP?
• Question 23
What PowerShell cmdlet can you use to enable Client Hyper-
V?
• Question 24
Snapshot data files are stored using what file format?
• Question 25
What Hyper-V feature helps you use physical memory more
efficiently for your VMs?
• Question 1
What is the largest danger that high-capacity removable
storage devices pose to an enterprise network?
• Question 2
0 out of 2 points When none of your configured Software Restriction
Policies are matched, what happens?
• Question 3
When using the Allow/Prevent installation of devices that
match any of these device IDs setting in the Device Installation
Restrictions folder of a GPO, what other setting must you ensure you
also configure to provide the intended results?
• Question 4
In order to use the Custom Classes: Deny read/write access
setting of the Removable Storage Access policy settings, what will you
need to know about each device to which you wish to allow read or write
access?
• Question 5
Software restriction policies can work in three ways, based on
the settings you choose for each of the rules. Which of the following is
not one of the settings to choose from?
• Question 6
The process of applying a header and footer to a data packet
is known as what?
• Question 7
0 out of 2 points
What protocol is responsible for the end-to-end transmission
of a packet, to its final destination on a network?
• Question 8
In the OSI model, which layer is at the bottom and represents
the hardware that forms the network?
********************************************************
CIS 329 Week 6 quiz
For more classes visit
www.snaptutorial.com
• Question 1
What is the largest danger that high-capacity removable
storage devices pose to an enterprise network?
• Question 2
0 out of 2 points When none of your configured Software Restriction
Policies are matched, what happens?
• Question 3
When using the Allow/Prevent installation of devices that
match any of these device IDs setting in the Device Installation
Restrictions folder of a GPO, what other setting must you ensure you
also configure to provide the intended results?
• Question 4
In order to use the Custom Classes: Deny read/write access
setting of the Removable Storage Access policy settings, what will you
need to know about each device to which you wish to allow read or write
access?
• Question 5
Software restriction policies can work in three ways, based on
the settings you choose for each of the rules. Which of the following is
not one of the settings to choose from?
• Question 6
The process of applying a header and footer to a data packet
is known as what?
• Question 7
0 out of 2 points What protocol is responsible for the end-to-end
transmission of a packet, to its final destination on a network?
• Question 8
In the OSI model, which layer is at the bottom and represents
the hardware that forms the network?
• Question 9
0 out of 2 points Most cabled networks today use what type of cabling?
• Question 10
What protocol do most devices currently use at the Network
layer?
• Question 11
0 out of 2 points What type of attack is occurring when attackers gain
access to otherwise restricted network resources, using a wireless
network?
• Question 12
A 2x2 MIMO device has how many total transceivers?
• Question 13
Why should you not deploy a wireless network using WEP for
security?
• Question 14
802.11n wireless networking equipment uses two, three, or
more different frequencies for transmission and the subsequent receiving
of traffic. The sending system splits its data into multiple signals for
transmission, and the receiving device reassembles the signals into a
single data stream. What is the name of this process?
• Question 15
What command can you issue from the command line to view
all configured wireless networks on your Windows 8 computer?
• Question 16
When do data protection technologies such as the Windows 8
Encrypting File System (EFS) and BitLocker protect data?
• Question 17
What term is given to software that includes viruses, Trojan
horses, worms, spyware, and adware?
• Question 18
When using the Windows Firewall with Advanced Security
console, you will see three distinct network locations that impact the
behavior of the Windows Firewall. Which of the following is not one of
these network locations used by the Windows Firewall?
• Question 19
Which of the following is not an item that can be used when
building Windows Firewall rules?
• Question 20
Which of the following items is not found in the Security
section of the Windows 8 Action Center?
• Question 21
Remote Assistance offers several methods to send the
invitation for assistance. Which of the following is not one of those
options?
• Question 22
Remote Assistance requires that access to what port be
available on the requesting client?
• Question 23
What is the name of the feature that enables an administrator,
trainer, or technical specialist at one location to connect to a distant
user’s computer, chat with the user, and either view all the user’s
activities or take complete control of the system?
• Question 24
Why do some snap-ins, such as the Active Directory Domain
Services consoles, not provide a means to redirect the console to
another computer?
• Question 25
What makes connecting to a remote computer by redirecting
an existing console an inefficient method over time?
********************************************************
CIS 329 Week 8 Quiz 3
For more classes visit
www.snaptutorial.com
• Question 1
How do you start the process to modify the default homegroup
sharing configuration?
• Question 2
Which of the following statements is true of Public folder
sharing?
• Question 3
0 out of 2 points For users at home, which file sharing is most likely the
simplest to setup and use?
• Question 4
What is the net effect of the following combination of share
and NTFS permissions when the share is accessed over the network?
• Share permission (Share tab)—Sales group: Full Control
• NTFS permission (Security tab)—Sales group: Read & Execute,
Modify, Write
• Question 5
It is possible to create a share that is invisible to users
browsing the network simply by appending what character to the end of
the share name?
• Question 6
What is the maximum support file name length in the NTFS file
system?
• Question 7
When deciding what your auditing policy should be, there are
some key things to consider to help you decide which computers,
resources, and events you want to audit. Which of the items listed is not
one of the items typically considered?
• Question 8
If you apply a change to a folder to enable EFS for the folder
only, what happens to the files currently in the folder?
• Question 9
0 out of 2 points Regarding NTFS permissions, when you move NTFS
files or folders from one volume to another, which of the following
statements is true?
• Question 10
When using the iacls.exe utility, what flag (e.g., /?) is used to
specify that the command should be executed on all files and subfolders
contained in the starting folder location?
• Question 11
What is the default setting for UAC in Windows 8?
• Question 12
What is the most common method by which phishing attacks
are launched?
• Question 13
What is the intended function of the User Account Control
(UAC) feature in Windows?
• Question 14
How long after you complete the configuration of local
security policies on a computer will it take for those policies to become
effective?
• Question 15
How can you fully disable UAC in Windows 8?
• Question 16
What must you do, at a minimum, before you can manage
domain objects on a Windows 8 workstation
• Question 17
Where are user accounts stored for computers that are in a
workgroup?
• Question 18
Which of the following is not an allowed gesture for a picture
password?
• Question 19
Which of the following items is not supported as a method of
authentication in Windows 8?
• Question 20
Generally speaking, which of the following password
conditions is not considered to be part of a strong password?
• Question 21
If you have Windows 8 Professional workstation clients on
your network, what single BranchCache protocol will they be limited to
using?
• Question 22
When using distributed-cache mode for BranchCache, where
is the cache hosted in the branch office?
• Question 23
You must deploy at least one or more BranchCache-enabled
servers at your main office to enable BranchCache. Which of the
following server types is not an option as a BranchCache-enabled
server?
• Question 24
What is the main difference between BranchCache version 1
and version 2?
• Question 25
What advantage does the usage of SSTP for VPN connections
offer firewall administrators?
********************************************************
CIS 329 Week 10 Assignment 1 Preparing for a
Company-Wide Migration to Windows 8
For more classes visit
www.snaptutorial.com
Assignment 1: Preparing for a Company-Wide Migration to Windows 8
Due Week 10 and worth 160 points
Crescent Manufacturing Inc. (CMI) is a luxury leader in crafted and
customized home furnishings. The corporate headquarters and a
production facility are located in Texas, with additionalmanufacturing
facilities located in Nebraska and Maryland.
There are 250 employees in the Texas location, 175 in Maryland, and 25
in Nebraska. All locations use Windows 7 as the primary client
operating system. The systems at the Maryland location are over five (5)
years old. CMI’s Information Technology (IT) department upgraded the
computer systems with new hardware within the past year at all other
company locations. These upgraded computer systems are capable of
running Windows 8. CMI recently upgraded all of its servers to run
Windows Server 2012 in an Active-Directory-based environment.
The Operations, Marketing, Administration, IT Support, and Finance
departments are located in the Texas location. Nebraska is primarily a
manufacturing location that is staffed by production line employees, a
line supervisor, and a plant manager. The Maryland office also includes
an operations component (i.e., production line employees, line
supervisor, and plant manager), a small IT department, and the
company’s human resources department.
The current IT support staff comprises a seasoned group of individuals
that collectively have over ten (10) years of experience in network
administration and working with Microsoft operating systems. Many of
the IT staff have recently completed training on the Windows 8
operating system and are well-versed in supporting Windows Server
2008 and 2012. The remainder of the company’s employees has only a
basic knowledge of Windows 7 and relies on the company’s help desk to
solve a majority of its computer problems. CMI has a team of 50
salespeople who use laptops and tablets while working from their home
offices. These employees, who travel extensively with their laptops, must
have their systems secured in case of loss or theft. The laptops,
purchased over five (5) years ago, run the Windows 7 operating system.
The tablets, used only by a subset of the sales staff, are iPads running
iOS 7.
The Chief Information Officer (CIO) is concerned about employees
installing non-standard company applications downloaded from the
Windows Store both while at work and when they have their devices at
home. The CIO also wants to ensure that those persons on the IT staff
are the only individuals authorized to update Windows Store apps. The
CIO has an IT support staff of ten (10) employees and does not want to
increase the number of applicationsthat need to be supported via the
company’s help desk. The help desk is currently staffed by three (3)
employees from 8:00 a.m. − 5:00 p.m. (CST).
Hardware and software compatibility issues experienced during the
upgrade to Windows 7 several years earlier resulted in the company
going over budget by several thousands of dollars. The CFO stated that
the reason for going over budget was directly related to problems with
their business critical applications not being fully compatible with
Windows 7. The applications are used by the Operations department to
track inventory, schedule production runs, handle purchase orders, and
track product shipments. Senior management wants to address software
compatibility testing prior to moving the entire company to Windows 8.
They are also concerned about the time it might take to migrate user
settings and applications over to the new Windows 8 operating system,
the time to train employees on using the new interface, the overall
impact on the company’s help desk, and day-to-day operations.
The CIO and Chief Financial Officer (CFO) want more information
before making the decision to upgrade to Windows 8 and have asked you
to write a report that addresses their concerns and also includes your
recommendations on how best to proceed, should the project be
approved.
Write an eight to ten (8-10) page paper in which you:
Develop a SWOT analysis on the viability of upgrading to Windows 8
for the organization as a whole.
Provide a detailed upgrade plan for the organization, including the sales
staff. At a minimum:
Identify the number of systems, by location and / or departments that IT
must replace with new or compatible hardware.
Recommend whether the organization should use a phased-in approach
(i.e., upgrades are sequenced by departments and / or locations) or a
flash-cut approach (i.e., all at once) in order to upgrade to Windows 8.
If a phased-in approach is recommended, identify the departments and /
or locations you would upgrade, and describe the preferred upgrade
sequence. Support your recommendations.
Address the length of time in which the upgrade should occur, and
identify the main issues which could impact the specified time frame.
Describe one (1) approach that IT could use in order to ensure that they
thoroughly test business critical applications.
Describe three (3) best practices for securing the laptops and tablets for
the sales staff after the upgrade is complete.
Examine the pros and cons of configuring AppLocker to standardize the
software used by employees across the organization.
Explain the process and options available for managing application
installations and updates via the Windows Store, and thus addressing
the concerns voiced by the CIO.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Demonstrate the ability to install and configure a client operating
system, applications, and associated updates as well as designing a
client operating system installation strategy.
Validate and successfully install a computer client operating system.
Demonstrate the ability to discuss the migration phases and
considerations in a client operating system installation to include virtual
machines and the cloud infrastructure.
Demonstrate the ability to apply technology tools to monitor and
configure applications and network performance.
Use technology and information resources to research issues in
operating system environments.
Write clearly and concisely about desktop administration and operating
system topics using proper writing mechanics and technical style
conventions.
********************************************************
CIS 329 Week 10 Assignment 1 Preparing for a
Company-Wide Migration to Windows 8
For more classes visit
www.snaptutorial.com
Assignment 1: Preparing for a Company-Wide Migration to Windows 8
Due Week 10 and worth 160 points
Crescent Manufacturing Inc. (CMI) is a luxury leader in crafted and
customized home furnishings. The corporate headquarters and a
production facility are located in Texas, with additionalmanufacturing
facilities located in Nebraska and Maryland.
There are 250 employees in the Texas location, 175 in Maryland, and 25
in Nebraska. All locations use Windows 7 as the primary client
operating system. The systems at the Maryland location are over five (5)
years old. CMI’s Information Technology (IT) department upgraded the
computer systems with new hardware within the past year at all other
company locations. These upgraded computer systems are capable of
running Windows 8. CMI recently upgraded all of its servers to run
Windows Server 2012 in an Active-Directory-based environment.
The Operations, Marketing, Administration, IT Support, and Finance
departments are located in the Texas location. Nebraska is primarily a
manufacturing location that is staffed by production line employees, a
line supervisor, and a plant manager. The Maryland office also includes
an operations component (i.e., production line employees, line
supervisor, and plant manager), a small IT department, and the
company’s human resources department.
The current IT support staff comprises a seasoned group of individuals
that collectively have over ten (10) years of experience in network
administration and working with Microsoft operating systems. Many of
the IT staff have recently completed training on the Windows 8
operating system and are well-versed in supporting Windows Server
2008 and 2012. The remainder of the company’s employees has only a
basic knowledge of Windows 7 and relies on the company’s help desk to
solve a majority of its computer problems. CMI has a team of 50
salespeople who use laptops and tablets while working from their home
offices. These employees, who travel extensively with their laptops, must
have their systems secured in case of loss or theft. The laptops,
purchased over five (5) years ago, run the Windows 7 operating system.
The tablets, used only by a subset of the sales staff, are iPads running
iOS 7.
The Chief Information Officer (CIO) is concerned about employees
installing non-standard company applications downloaded from the
Windows Store both while at work and when they have their devices at
home. The CIO also wants to ensure that those persons on the IT staff
are the only individuals authorized to update Windows Store apps. The
CIO has an IT support staff of ten (10) employees and does not want to
increase the number of applicationsthat need to be supported via the
company’s help desk. The help desk is currently staffed by three (3)
employees from 8:00 a.m. − 5:00 p.m. (CST).
Hardware and software compatibility issues experienced during the
upgrade to Windows 7 several years earlier resulted in the company
going over budget by several thousands of dollars. The CFO stated that
the reason for going over budget was directly related to problems with
their business critical applications not being fully compatible with
Windows 7. The applications are used by the Operations department to
track inventory, schedule production runs, handle purchase orders, and
track product shipments. Senior management wants to address software
compatibility testing prior to moving the entire company to Windows 8.
They are also concerned about the time it might take to migrate user
settings and applications over to the new Windows 8 operating system,
the time to train employees on using the new interface, the overall
impact on the company’s help desk, and day-to-day operations.
The CIO and Chief Financial Officer (CFO) want more information
before making the decision to upgrade to Windows 8 and have asked you
to write a report that addresses their concerns and also includes your
recommendations on how best to proceed, should the project be
approved.
Write an eight to ten (8-10) page paper in which you:
Develop a SWOT analysis on the viability of upgrading to Windows 8
for the organization as a whole.
Provide a detailed upgrade plan for the organization, including the sales
staff. At a minimum:
Identify the number of systems, by location and / or departments that IT
must replace with new or compatible hardware.
Recommend whether the organization should use a phased-in approach
(i.e., upgrades are sequenced by departments and / or locations) or a
flash-cut approach (i.e., all at once) in order to upgrade to Windows 8.
If a phased-in approach is recommended, identify the departments and /
or locations you would upgrade, and describe the preferred upgrade
sequence. Support your recommendations.
Address the length of time in which the upgrade should occur, and
identify the main issues which could impact the specified time frame.
Describe one (1) approach that IT could use in order to ensure that they
thoroughly test business critical applications.
Describe three (3) best practices for securing the laptops and tablets for
the sales staff after the upgrade is complete.
Examine the pros and cons of configuring AppLocker to standardize the
software used by employees across the organization.
Explain the process and options available for managing application
installations and updates via the Windows Store, and thus addressing
the concerns voiced by the CIO.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Demonstrate the ability to install and configure a client operating
system, applications, and associated updates as well as designing a
client operating system installation strategy.
Validate and successfully install a computer client operating system.
Demonstrate the ability to discuss the migration phases and
considerations in a client operating system installation to include virtual
machines and the cloud infrastructure.
Demonstrate the ability to apply technology tools to monitor and
configure applications and network performance.
Use technology and information resources to research issues in
operating system environments.
Write clearly and concisely about desktop administration and operating
system topics using proper writing mechanics and technical style
conventions.
********************************************************
CIS 329 Week 11 Quiz
For more classes visit
www.snaptutorial.com
• Question 1
Which of the following is not an option on the Second screen
menu of Windows 8?
• Question 2
What Windows keyboard combination can you use to project to a
second screen?
• Question 3
Which power plan is not shown by default in the Power Options control
panel?
• Question 4
How does Windows 8 transmit display signals to a network
projector?
• Question 5
When using BitLocker To Go, which of the following that is
typically associated with BitLocker is not required to unlock the drive?
• Question 6
Of the listed BitLocker authentication methods, which is
considered to be the least secure?
• Question 7
What name is given to the user account(s) that have been
authorized to recover BitLocker drives for an organization?
• Question 8
If the Configure Automatic Updates policy is not enabled and
applied to the devices along with other Windows Update settings, what
will happen?
• Question 9
What is the maximum value of the Delay Restart for scheduled
installations policy?
• Question 10
What is the default value of the Delay Restart for scheduled
installations policy?
• Question 11
How many active partitions can a hard disk hold?
• Question 12
What is a limitation of dynamic disks?
• Question 13
What benefit is provided by the new Storage Spaces feature of
Windows 8?
• Question 14
What PowerShell cmdlet can be used to display the Event Logs?
• Question 15 What keyboard combination will directly
open the Task Manager in Windows 8?
• Question 16
You can associate several actions to occur upon a specific event
occurring. Which of the listed actions is not one of the available
options?
• Question 17 What name is given to a set of readings, captured
under normal operating conditions, which you can save and compare to
readings taken at a later time?
• Question 18
To restore the computer from a system image backup, what must
you do?
• Question 19
What is the limitation of using a USB flash drive as the backup
destination when using Windows 7 File Recovery?
• Question 20
In which Control Panel view will you not be able to find the
Windows 7 File Recovery option?
• Question 21
You can use Group Policy to configure how Windows responds
when a user tries to install device drivers that are not digitally signed.
Which of the following options is not available for this configuration?
• Question 22
When a startup failure occurs before the logon user interface
appears, the problem could be hardware related, but it is most likely due
to an issue with one of the drivers or services that the kernel is
attempting to load. To locate the offending driver or service, you must
first attempt to get the computer started by using what?
• Question 23
What organization is responsible for the testing and verification
of compatibility, reliability, and functionality of drivers for hardware
devices?
• Question 24 If File History is enabled, what will be the status
of Windows 7 File Recovery on the computer?
• Question 25
What is the primary method of file recovery for a Windows 8
computer
********************************************************

More Related Content

What's hot

Windows 10 VDI Migration in real life - E2EVC Rome
Windows 10 VDI Migration in real life - E2EVC RomeWindows 10 VDI Migration in real life - E2EVC Rome
Windows 10 VDI Migration in real life - E2EVC RomeSacha Thomet
 
Windows 7 Component Research
Windows 7 Component ResearchWindows 7 Component Research
Windows 7 Component Researchannperry09
 
70-680 Windows 7 configuring
70-680 Windows 7 configuring70-680 Windows 7 configuring
70-680 Windows 7 configuringbiwan
 
Changelog
ChangelogChangelog
Changelogser asd
 

What's hot (7)

Win8 seminar
Win8 seminarWin8 seminar
Win8 seminar
 
Windows 10 VDI Migration in real life - E2EVC Rome
Windows 10 VDI Migration in real life - E2EVC RomeWindows 10 VDI Migration in real life - E2EVC Rome
Windows 10 VDI Migration in real life - E2EVC Rome
 
Windows 7 Component Research
Windows 7 Component ResearchWindows 7 Component Research
Windows 7 Component Research
 
Main file win 8
Main file win 8Main file win 8
Main file win 8
 
70-680 Windows 7 configuring
70-680 Windows 7 configuring70-680 Windows 7 configuring
70-680 Windows 7 configuring
 
Changelog
ChangelogChangelog
Changelog
 
Windows 8
Windows  8Windows  8
Windows 8
 

Similar to CIS 329 quiz questions

Cis 329 week 4 quiz 1
Cis 329 week 4 quiz 1Cis 329 week 4 quiz 1
Cis 329 week 4 quiz 1Laynevine
 
CIS 312 Success Begins / snaptutorial.com
CIS 312 Success Begins / snaptutorial.comCIS 312 Success Begins / snaptutorial.com
CIS 312 Success Begins / snaptutorial.comRobinson068
 
Cisco discovery d homesb module 2 - v.4 in english.
Cisco discovery   d homesb module 2 - v.4 in english.Cisco discovery   d homesb module 2 - v.4 in english.
Cisco discovery d homesb module 2 - v.4 in english.igede tirtanata
 
Windows8.1overviewnetponto
Windows8.1overviewnetpontoWindows8.1overviewnetponto
Windows8.1overviewnetpontoAlexandre Marreiros
 
Cis 329 week 11 quiz 4
Cis 329 week 11 quiz 4Cis 329 week 11 quiz 4
Cis 329 week 11 quiz 4Laynevine
 
An Inside Look at Windows Pro & Enterprise OS.pdf
An Inside Look at  Windows Pro & Enterprise OS.pdfAn Inside Look at  Windows Pro & Enterprise OS.pdf
An Inside Look at Windows Pro & Enterprise OS.pdfTechSoup
 
Cis 329 week 8 quiz 3
Cis 329 week 8 quiz 3Cis 329 week 8 quiz 3
Cis 329 week 8 quiz 3Laynevine
 
Developing for Windows 8 based devices
Developing for Windows 8 based devicesDeveloping for Windows 8 based devices
Developing for Windows 8 based devicesAneeb_Khawar
 
About Windows 8
About Windows 8About Windows 8
About Windows 8VIKAS shaji
 
Cis 329 wk 6 quiz 2
Cis 329 wk 6 quiz 2Cis 329 wk 6 quiz 2
Cis 329 wk 6 quiz 2Laynevine
 
Windows 8 vs windows 7 ppt
Windows 8 vs windows 7 pptWindows 8 vs windows 7 ppt
Windows 8 vs windows 7 pptDiya Mirza
 
Overcoming the application compatibility hurdle in windows 7
Overcoming the application compatibility hurdle in windows 7Overcoming the application compatibility hurdle in windows 7
Overcoming the application compatibility hurdle in windows 7Vijay Raj
 
TLE ICT CSS 10 Cot lesson plan1
TLE ICT CSS 10 Cot lesson plan1TLE ICT CSS 10 Cot lesson plan1
TLE ICT CSS 10 Cot lesson plan1Leonel Rivas
 
Windows 8 Consumer Preview
Windows 8 Consumer PreviewWindows 8 Consumer Preview
Windows 8 Consumer PreviewRence Montanes
 
Windows 8 product guide business english
Windows 8 product guide business englishWindows 8 product guide business english
Windows 8 product guide business englishHeo Gòm
 
How Windows 8 Metro is Revolutionary - Build Conference Highlights 2011
How Windows 8 Metro is Revolutionary - Build Conference Highlights 2011How Windows 8 Metro is Revolutionary - Build Conference Highlights 2011
How Windows 8 Metro is Revolutionary - Build Conference Highlights 2011Perficient, Inc.
 
Build Conference Highlights: How Windows 8 Metro is Revolutionary
Build Conference Highlights: How Windows 8 Metro is RevolutionaryBuild Conference Highlights: How Windows 8 Metro is Revolutionary
Build Conference Highlights: How Windows 8 Metro is RevolutionaryWoodruff Solutions LLC
 
The Pc And Its Operating Systems
The Pc And Its Operating SystemsThe Pc And Its Operating Systems
The Pc And Its Operating SystemsAmber Wheeler
 
To pass ite chapter 5 exam
To pass ite chapter 5 examTo pass ite chapter 5 exam
To pass ite chapter 5 examAhmed Abdullah
 

Similar to CIS 329 quiz questions (20)

Cis 329 week 4 quiz 1
Cis 329 week 4 quiz 1Cis 329 week 4 quiz 1
Cis 329 week 4 quiz 1
 
CIS 312 Success Begins / snaptutorial.com
CIS 312 Success Begins / snaptutorial.comCIS 312 Success Begins / snaptutorial.com
CIS 312 Success Begins / snaptutorial.com
 
Cisco discovery d homesb module 2 - v.4 in english.
Cisco discovery   d homesb module 2 - v.4 in english.Cisco discovery   d homesb module 2 - v.4 in english.
Cisco discovery d homesb module 2 - v.4 in english.
 
Windows8.1overviewnetponto
Windows8.1overviewnetpontoWindows8.1overviewnetponto
Windows8.1overviewnetponto
 
Cis 329 week 11 quiz 4
Cis 329 week 11 quiz 4Cis 329 week 11 quiz 4
Cis 329 week 11 quiz 4
 
An Inside Look at Windows Pro & Enterprise OS.pdf
An Inside Look at  Windows Pro & Enterprise OS.pdfAn Inside Look at  Windows Pro & Enterprise OS.pdf
An Inside Look at Windows Pro & Enterprise OS.pdf
 
Cis 329 week 8 quiz 3
Cis 329 week 8 quiz 3Cis 329 week 8 quiz 3
Cis 329 week 8 quiz 3
 
Developing for Windows 8 based devices
Developing for Windows 8 based devicesDeveloping for Windows 8 based devices
Developing for Windows 8 based devices
 
About Windows 8
About Windows 8About Windows 8
About Windows 8
 
Cis 329 wk 6 quiz 2
Cis 329 wk 6 quiz 2Cis 329 wk 6 quiz 2
Cis 329 wk 6 quiz 2
 
Windows 8 vs windows 7 ppt
Windows 8 vs windows 7 pptWindows 8 vs windows 7 ppt
Windows 8 vs windows 7 ppt
 
Overcoming the application compatibility hurdle in windows 7
Overcoming the application compatibility hurdle in windows 7Overcoming the application compatibility hurdle in windows 7
Overcoming the application compatibility hurdle in windows 7
 
TLE ICT CSS 10 Cot lesson plan1
TLE ICT CSS 10 Cot lesson plan1TLE ICT CSS 10 Cot lesson plan1
TLE ICT CSS 10 Cot lesson plan1
 
Windows 8 Consumer Preview
Windows 8 Consumer PreviewWindows 8 Consumer Preview
Windows 8 Consumer Preview
 
Windows 8 product guide business english
Windows 8 product guide business englishWindows 8 product guide business english
Windows 8 product guide business english
 
Lab 14
Lab 14Lab 14
Lab 14
 
How Windows 8 Metro is Revolutionary - Build Conference Highlights 2011
How Windows 8 Metro is Revolutionary - Build Conference Highlights 2011How Windows 8 Metro is Revolutionary - Build Conference Highlights 2011
How Windows 8 Metro is Revolutionary - Build Conference Highlights 2011
 
Build Conference Highlights: How Windows 8 Metro is Revolutionary
Build Conference Highlights: How Windows 8 Metro is RevolutionaryBuild Conference Highlights: How Windows 8 Metro is Revolutionary
Build Conference Highlights: How Windows 8 Metro is Revolutionary
 
The Pc And Its Operating Systems
The Pc And Its Operating SystemsThe Pc And Its Operating Systems
The Pc And Its Operating Systems
 
To pass ite chapter 5 exam
To pass ite chapter 5 examTo pass ite chapter 5 exam
To pass ite chapter 5 exam
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 

CIS 329 quiz questions

  • 1. CIS 329 quiz For more classes visit www.snaptutorial.com Question 1 What are the buttons called in the Windows 8 edge UI that provide access to common operating system functions such as Search and Settings? Question 2 If you are currently running Windows 8 on your computer, what is the easiest way to upgrade to Windows 8 Professional? Question 3 Which of the following methods is not a way to close unused apps that are still running on a Windows 8 computer? Question 4 Computers running Windows PE will automatically shut down and reboot after how long? Question 5 During what phase of the Windows 8 startup process is the Local Security Authority loaded?
  • 2. Question 6 Before performing an upgrade to Windows 8, several tasks should be performed to ensure the procedure goes smoothly. Which of the following is not one of these tasks? Question 7 What name is given to a Windows PE installation on a computer with Windows 8 already installed? Question 8 Your organization currently uses roaming profiles for all users. All users use Windows 7 computers. Windows 8 will be introduced shortly in your organization. Given the information presented, what issue should you be aware of? Question 9 You have a small number of Windows XP computers in your organization. You need to manually move as much data from the user profile locations for these computers as possible to the new Windows 8 computers these users will be receiving shortly. Where in the file system would you find the profile information? Question 10 The User State Migration Tool uses several files to control the migration process. What is the file format of these files? Question 11 What should you enter into the Run dialog box to open the Device Manager console? Question 12
  • 3. What is the value of a protected checksum dependent upon? Question 13 0 out of 2 points On which tab of a driver’s properties dialog box will you find information about any conflicts the driver may be experiencing? Question 14 What Windows 8 feature assigns one of four integrity levels to running processes? Question 15 What is the executable file name for the Windows Installer application on a Windows 8 computer? Question 16 What Windows 8 feature prevents applications from executing code in prohibited areas? Question 17 Using a single Microsoft account, on how many Windows 8 devices can you install a specific Windows app? Question 18 Which of the following is not an AppLocker rule collection type available for usage when creating AppLocker rules? Question 19 What PowerShell cmdlet would you need to use to install a critical Line of Business (LOB) Windows App that has been created within your organization?
  • 4. Question 20 When you click the down arrow next to the Print button on the IE 10 toolbar, you can choose from all of the following options except which one? Question 21 What new standard defines a protocol that allows clients and servers to exchange data immediately as it becomes available without the overhead created by HTTP and TCP? Question 22 By default, IE 10 is granted access to which area of the computer? Question 23 Which Hyper-V virtual switch feature provides protection against a malicious virtual machine attempting to steal IP addresses from other virtual machines? Question 24 Snapshot data files are stored using what file format? Question 25 What PowerShell cmdlet can you use to enable Client Hyper- V? ********************************************************
  • 5. CIS 329 Week 4 Quiz 1 For more classes visit www.snaptutorial.com • Question 1 When considering an upgrade to Windows 8, several critical questions must be considered. Which of the following is not one of these questions to consider? • Question 2 Which edition of Windows 8 includes Office 2013 installed already but does not offer a choice of 32-bit or 64-bit versions? • Question 3 What are the buttons called in the Windows 8 edge UI that provide access to common operating system functions such as Search and Settings? • Question 4
  • 6. Which of the following should be used to locate hardware inadequacies in the computer that might prevent a successful upgrade to Windows 8? • Question 5 What name is given to a Windows PE installation on a computer with Windows 8 already installed? • Question 6 During what phase of the Windows 8 startup process is the Local Security Authority loaded? • Question 7 Computers running Windows PE will automatically shut down and reboot after how long? • Question 8 What is the name of the USMT application that is used to save user profile data for a migration? • Question 9 In the scenario where you are installing Windows 8 on a new computer and plan to dispose of an old computer running Windows XP, which Windows Easy Transfer method would be most appropriate to use?
  • 7. • Question 10 Your organization currently uses roaming profiles for all users. All users use Windows 7 computers. Windows 8 will be introduced shortly in your organization. Given the information presented, what issue should you be aware of? • Question 11 To communicate with the operating system running on the computer, each device also requires a software element known as what? • Question 12 What is the value of a protected checksum dependent upon? • Question 13 You have opened the Properties dialog box for an installed printer on your computer system. On what tab will you find information that is specific to this piece of installed hardware on your computer system?
  • 8. • Question 14 You have PhotoShop Elements installed on your Windows 8 computer. You want PhotoShop Elements to automatically be launched every time you plug in a memory card that contains photos. What setting do you need modify? • Question 15 Windows Installer uses what file format for single package application installations? • Question 16 What is the name of the Remote Desktop Services feature that enables clients to run Remote Desktop server applications within an individual window? • Question 17 What PowerShell cmdlet would you need to use to install a critical Line of Business (LOB) Windows App that has been created within your organization? • Question 18 When you create your first new rule in AppLocker, what will happen if you do not have the default rules in place? • Question 19
  • 9. By default, Windows 8 is configured to check for updates for installed apps _________ and then _________ the needed updates. • Question 20 Which of the following is not one of the methods that the SmartScreen Filter uses to identify potential phishing web sites? • Question 21 When you click the down arrow next to the Print button on the IE 10 toolbar, you can choose from all of the following options exceptwhich one? • Question 22 What new standard defines a protocol that allows clients and servers to exchange data immediately as it becomes available without the overhead created by HTTP and TCP? • Question 23 What PowerShell cmdlet can you use to enable Client Hyper- V?
  • 10. • Question 24 Snapshot data files are stored using what file format? • Question 25 What Hyper-V feature helps you use physical memory more efficiently for your VMs? ******************************************************** CIS 329 Week 6 Quiz 2 For more classes visit www.snaptutorial.com • Question 1 When considering an upgrade to Windows 8, several critical questions must be considered. Which of the following is not one of these questions to consider?
  • 11. • Question 2 Which edition of Windows 8 includes Office 2013 installed already but does not offer a choice of 32-bit or 64-bit versions? • Question 3 What are the buttons called in the Windows 8 edge UI that provide access to common operating system functions such as Search and Settings? • Question 4 Which of the following should be used to locate hardware inadequacies in the computer that might prevent a successful upgrade to Windows 8? • Question 5 What name is given to a Windows PE installation on a computer with Windows 8 already installed? • Question 6 During what phase of the Windows 8 startup process is the Local Security Authority loaded? • Question 7 Computers running Windows PE will automatically shut down and reboot after how long? • Question 8 What is the name of the USMT application that is used to save user profile data for a migration? • Question 9
  • 12. In the scenario where you are installing Windows 8 on a new computer and plan to dispose of an old computer running Windows XP, which Windows Easy Transfer method would be most appropriate to use? • Question 10 Your organization currently uses roaming profiles for all users. All users use Windows 7 computers. Windows 8 will be introduced shortly in your organization. Given the information presented, what issue should you be aware of? • Question 11 To communicate with the operating system running on the computer, each device also requires a software element known as what? • Question 12 What is the value of a protected checksum dependent upon? • Question 13 You have opened the Properties dialog box for an installed printer on your computer system. On what tab will you find information that is specific to this piece of installed hardware on your computer system? • Question 14 You have PhotoShop Elements installed on your Windows 8 computer. You want PhotoShop Elements to automatically be launched every time you plug in a memory card that contains photos. What setting do you need modify? • Question 15
  • 13. Windows Installer uses what file format for single package application installations? • Question 16 What is the name of the Remote Desktop Services feature that enables clients to run Remote Desktop server applications within an individual window? • Question 17 What PowerShell cmdlet would you need to use to install a critical Line of Business (LOB) Windows App that has been created within your organization? • Question 18 When you create your first new rule in AppLocker, what will happen if you do not have the default rules in place? • Question 19 By default, Windows 8 is configured to check for updates for installed apps _________ and then _________ the needed updates. • Question 20 Which of the following is not one of the methods that the SmartScreen Filter uses to identify potential phishing web sites? • Question 21 When you click the down arrow next to the Print button on the IE 10 toolbar, you can choose from all of the following options except which one? • Question 22
  • 14. What new standard defines a protocol that allows clients and servers to exchange data immediately as it becomes available without the overhead created by HTTP and TCP? • Question 23 What PowerShell cmdlet can you use to enable Client Hyper- V? • Question 24 Snapshot data files are stored using what file format? • Question 25 What Hyper-V feature helps you use physical memory more efficiently for your VMs? • Question 1 What is the largest danger that high-capacity removable storage devices pose to an enterprise network? • Question 2 0 out of 2 points When none of your configured Software Restriction Policies are matched, what happens? • Question 3 When using the Allow/Prevent installation of devices that match any of these device IDs setting in the Device Installation Restrictions folder of a GPO, what other setting must you ensure you also configure to provide the intended results? • Question 4 In order to use the Custom Classes: Deny read/write access setting of the Removable Storage Access policy settings, what will you
  • 15. need to know about each device to which you wish to allow read or write access? • Question 5 Software restriction policies can work in three ways, based on the settings you choose for each of the rules. Which of the following is not one of the settings to choose from? • Question 6 The process of applying a header and footer to a data packet is known as what? • Question 7 0 out of 2 points What protocol is responsible for the end-to-end transmission of a packet, to its final destination on a network? • Question 8 In the OSI model, which layer is at the bottom and represents the hardware that forms the network? ******************************************************** CIS 329 Week 6 quiz For more classes visit
  • 16. www.snaptutorial.com • Question 1 What is the largest danger that high-capacity removable storage devices pose to an enterprise network? • Question 2 0 out of 2 points When none of your configured Software Restriction Policies are matched, what happens? • Question 3 When using the Allow/Prevent installation of devices that match any of these device IDs setting in the Device Installation Restrictions folder of a GPO, what other setting must you ensure you also configure to provide the intended results? • Question 4 In order to use the Custom Classes: Deny read/write access setting of the Removable Storage Access policy settings, what will you need to know about each device to which you wish to allow read or write access? • Question 5 Software restriction policies can work in three ways, based on the settings you choose for each of the rules. Which of the following is not one of the settings to choose from? • Question 6
  • 17. The process of applying a header and footer to a data packet is known as what? • Question 7 0 out of 2 points What protocol is responsible for the end-to-end transmission of a packet, to its final destination on a network? • Question 8 In the OSI model, which layer is at the bottom and represents the hardware that forms the network? • Question 9 0 out of 2 points Most cabled networks today use what type of cabling? • Question 10 What protocol do most devices currently use at the Network layer? • Question 11 0 out of 2 points What type of attack is occurring when attackers gain access to otherwise restricted network resources, using a wireless network? • Question 12 A 2x2 MIMO device has how many total transceivers? • Question 13 Why should you not deploy a wireless network using WEP for security? • Question 14
  • 18. 802.11n wireless networking equipment uses two, three, or more different frequencies for transmission and the subsequent receiving of traffic. The sending system splits its data into multiple signals for transmission, and the receiving device reassembles the signals into a single data stream. What is the name of this process? • Question 15 What command can you issue from the command line to view all configured wireless networks on your Windows 8 computer? • Question 16 When do data protection technologies such as the Windows 8 Encrypting File System (EFS) and BitLocker protect data? • Question 17 What term is given to software that includes viruses, Trojan horses, worms, spyware, and adware? • Question 18 When using the Windows Firewall with Advanced Security console, you will see three distinct network locations that impact the behavior of the Windows Firewall. Which of the following is not one of these network locations used by the Windows Firewall? • Question 19 Which of the following is not an item that can be used when building Windows Firewall rules? • Question 20 Which of the following items is not found in the Security section of the Windows 8 Action Center?
  • 19. • Question 21 Remote Assistance offers several methods to send the invitation for assistance. Which of the following is not one of those options? • Question 22 Remote Assistance requires that access to what port be available on the requesting client? • Question 23 What is the name of the feature that enables an administrator, trainer, or technical specialist at one location to connect to a distant user’s computer, chat with the user, and either view all the user’s activities or take complete control of the system? • Question 24 Why do some snap-ins, such as the Active Directory Domain Services consoles, not provide a means to redirect the console to another computer? • Question 25 What makes connecting to a remote computer by redirecting an existing console an inefficient method over time? ******************************************************** CIS 329 Week 8 Quiz 3
  • 20. For more classes visit www.snaptutorial.com • Question 1 How do you start the process to modify the default homegroup sharing configuration? • Question 2 Which of the following statements is true of Public folder sharing? • Question 3 0 out of 2 points For users at home, which file sharing is most likely the simplest to setup and use? • Question 4 What is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network? • Share permission (Share tab)—Sales group: Full Control • NTFS permission (Security tab)—Sales group: Read & Execute, Modify, Write • Question 5
  • 21. It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end of the share name? • Question 6 What is the maximum support file name length in the NTFS file system? • Question 7 When deciding what your auditing policy should be, there are some key things to consider to help you decide which computers, resources, and events you want to audit. Which of the items listed is not one of the items typically considered? • Question 8 If you apply a change to a folder to enable EFS for the folder only, what happens to the files currently in the folder? • Question 9 0 out of 2 points Regarding NTFS permissions, when you move NTFS files or folders from one volume to another, which of the following statements is true? • Question 10 When using the iacls.exe utility, what flag (e.g., /?) is used to specify that the command should be executed on all files and subfolders contained in the starting folder location? • Question 11 What is the default setting for UAC in Windows 8? • Question 12
  • 22. What is the most common method by which phishing attacks are launched? • Question 13 What is the intended function of the User Account Control (UAC) feature in Windows? • Question 14 How long after you complete the configuration of local security policies on a computer will it take for those policies to become effective? • Question 15 How can you fully disable UAC in Windows 8? • Question 16 What must you do, at a minimum, before you can manage domain objects on a Windows 8 workstation • Question 17 Where are user accounts stored for computers that are in a workgroup? • Question 18 Which of the following is not an allowed gesture for a picture password? • Question 19 Which of the following items is not supported as a method of authentication in Windows 8?
  • 23. • Question 20 Generally speaking, which of the following password conditions is not considered to be part of a strong password? • Question 21 If you have Windows 8 Professional workstation clients on your network, what single BranchCache protocol will they be limited to using? • Question 22 When using distributed-cache mode for BranchCache, where is the cache hosted in the branch office? • Question 23 You must deploy at least one or more BranchCache-enabled servers at your main office to enable BranchCache. Which of the following server types is not an option as a BranchCache-enabled server? • Question 24 What is the main difference between BranchCache version 1 and version 2? • Question 25 What advantage does the usage of SSTP for VPN connections offer firewall administrators? ********************************************************
  • 24. CIS 329 Week 10 Assignment 1 Preparing for a Company-Wide Migration to Windows 8 For more classes visit www.snaptutorial.com Assignment 1: Preparing for a Company-Wide Migration to Windows 8 Due Week 10 and worth 160 points Crescent Manufacturing Inc. (CMI) is a luxury leader in crafted and customized home furnishings. The corporate headquarters and a production facility are located in Texas, with additionalmanufacturing facilities located in Nebraska and Maryland. There are 250 employees in the Texas location, 175 in Maryland, and 25 in Nebraska. All locations use Windows 7 as the primary client operating system. The systems at the Maryland location are over five (5) years old. CMI’s Information Technology (IT) department upgraded the computer systems with new hardware within the past year at all other company locations. These upgraded computer systems are capable of running Windows 8. CMI recently upgraded all of its servers to run Windows Server 2012 in an Active-Directory-based environment. The Operations, Marketing, Administration, IT Support, and Finance departments are located in the Texas location. Nebraska is primarily a manufacturing location that is staffed by production line employees, a
  • 25. line supervisor, and a plant manager. The Maryland office also includes an operations component (i.e., production line employees, line supervisor, and plant manager), a small IT department, and the company’s human resources department. The current IT support staff comprises a seasoned group of individuals that collectively have over ten (10) years of experience in network administration and working with Microsoft operating systems. Many of the IT staff have recently completed training on the Windows 8 operating system and are well-versed in supporting Windows Server 2008 and 2012. The remainder of the company’s employees has only a basic knowledge of Windows 7 and relies on the company’s help desk to solve a majority of its computer problems. CMI has a team of 50 salespeople who use laptops and tablets while working from their home offices. These employees, who travel extensively with their laptops, must have their systems secured in case of loss or theft. The laptops, purchased over five (5) years ago, run the Windows 7 operating system. The tablets, used only by a subset of the sales staff, are iPads running iOS 7. The Chief Information Officer (CIO) is concerned about employees installing non-standard company applications downloaded from the Windows Store both while at work and when they have their devices at home. The CIO also wants to ensure that those persons on the IT staff are the only individuals authorized to update Windows Store apps. The CIO has an IT support staff of ten (10) employees and does not want to increase the number of applicationsthat need to be supported via the company’s help desk. The help desk is currently staffed by three (3) employees from 8:00 a.m. − 5:00 p.m. (CST). Hardware and software compatibility issues experienced during the upgrade to Windows 7 several years earlier resulted in the company going over budget by several thousands of dollars. The CFO stated that the reason for going over budget was directly related to problems with their business critical applications not being fully compatible with
  • 26. Windows 7. The applications are used by the Operations department to track inventory, schedule production runs, handle purchase orders, and track product shipments. Senior management wants to address software compatibility testing prior to moving the entire company to Windows 8. They are also concerned about the time it might take to migrate user settings and applications over to the new Windows 8 operating system, the time to train employees on using the new interface, the overall impact on the company’s help desk, and day-to-day operations. The CIO and Chief Financial Officer (CFO) want more information before making the decision to upgrade to Windows 8 and have asked you to write a report that addresses their concerns and also includes your recommendations on how best to proceed, should the project be approved. Write an eight to ten (8-10) page paper in which you: Develop a SWOT analysis on the viability of upgrading to Windows 8 for the organization as a whole. Provide a detailed upgrade plan for the organization, including the sales staff. At a minimum: Identify the number of systems, by location and / or departments that IT must replace with new or compatible hardware. Recommend whether the organization should use a phased-in approach (i.e., upgrades are sequenced by departments and / or locations) or a flash-cut approach (i.e., all at once) in order to upgrade to Windows 8. If a phased-in approach is recommended, identify the departments and / or locations you would upgrade, and describe the preferred upgrade sequence. Support your recommendations. Address the length of time in which the upgrade should occur, and identify the main issues which could impact the specified time frame.
  • 27. Describe one (1) approach that IT could use in order to ensure that they thoroughly test business critical applications. Describe three (3) best practices for securing the laptops and tablets for the sales staff after the upgrade is complete. Examine the pros and cons of configuring AppLocker to standardize the software used by employees across the organization. Explain the process and options available for managing application installations and updates via the Windows Store, and thus addressing the concerns voiced by the CIO. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Demonstrate the ability to install and configure a client operating system, applications, and associated updates as well as designing a client operating system installation strategy. Validate and successfully install a computer client operating system.
  • 28. Demonstrate the ability to discuss the migration phases and considerations in a client operating system installation to include virtual machines and the cloud infrastructure. Demonstrate the ability to apply technology tools to monitor and configure applications and network performance. Use technology and information resources to research issues in operating system environments. Write clearly and concisely about desktop administration and operating system topics using proper writing mechanics and technical style conventions. ******************************************************** CIS 329 Week 10 Assignment 1 Preparing for a Company-Wide Migration to Windows 8 For more classes visit www.snaptutorial.com
  • 29. Assignment 1: Preparing for a Company-Wide Migration to Windows 8 Due Week 10 and worth 160 points Crescent Manufacturing Inc. (CMI) is a luxury leader in crafted and customized home furnishings. The corporate headquarters and a production facility are located in Texas, with additionalmanufacturing facilities located in Nebraska and Maryland. There are 250 employees in the Texas location, 175 in Maryland, and 25 in Nebraska. All locations use Windows 7 as the primary client operating system. The systems at the Maryland location are over five (5) years old. CMI’s Information Technology (IT) department upgraded the computer systems with new hardware within the past year at all other company locations. These upgraded computer systems are capable of running Windows 8. CMI recently upgraded all of its servers to run Windows Server 2012 in an Active-Directory-based environment. The Operations, Marketing, Administration, IT Support, and Finance departments are located in the Texas location. Nebraska is primarily a manufacturing location that is staffed by production line employees, a line supervisor, and a plant manager. The Maryland office also includes an operations component (i.e., production line employees, line supervisor, and plant manager), a small IT department, and the company’s human resources department. The current IT support staff comprises a seasoned group of individuals that collectively have over ten (10) years of experience in network administration and working with Microsoft operating systems. Many of the IT staff have recently completed training on the Windows 8 operating system and are well-versed in supporting Windows Server 2008 and 2012. The remainder of the company’s employees has only a basic knowledge of Windows 7 and relies on the company’s help desk to solve a majority of its computer problems. CMI has a team of 50
  • 30. salespeople who use laptops and tablets while working from their home offices. These employees, who travel extensively with their laptops, must have their systems secured in case of loss or theft. The laptops, purchased over five (5) years ago, run the Windows 7 operating system. The tablets, used only by a subset of the sales staff, are iPads running iOS 7. The Chief Information Officer (CIO) is concerned about employees installing non-standard company applications downloaded from the Windows Store both while at work and when they have their devices at home. The CIO also wants to ensure that those persons on the IT staff are the only individuals authorized to update Windows Store apps. The CIO has an IT support staff of ten (10) employees and does not want to increase the number of applicationsthat need to be supported via the company’s help desk. The help desk is currently staffed by three (3) employees from 8:00 a.m. − 5:00 p.m. (CST). Hardware and software compatibility issues experienced during the upgrade to Windows 7 several years earlier resulted in the company going over budget by several thousands of dollars. The CFO stated that the reason for going over budget was directly related to problems with their business critical applications not being fully compatible with Windows 7. The applications are used by the Operations department to track inventory, schedule production runs, handle purchase orders, and track product shipments. Senior management wants to address software compatibility testing prior to moving the entire company to Windows 8. They are also concerned about the time it might take to migrate user settings and applications over to the new Windows 8 operating system, the time to train employees on using the new interface, the overall impact on the company’s help desk, and day-to-day operations. The CIO and Chief Financial Officer (CFO) want more information before making the decision to upgrade to Windows 8 and have asked you to write a report that addresses their concerns and also includes your
  • 31. recommendations on how best to proceed, should the project be approved. Write an eight to ten (8-10) page paper in which you: Develop a SWOT analysis on the viability of upgrading to Windows 8 for the organization as a whole. Provide a detailed upgrade plan for the organization, including the sales staff. At a minimum: Identify the number of systems, by location and / or departments that IT must replace with new or compatible hardware. Recommend whether the organization should use a phased-in approach (i.e., upgrades are sequenced by departments and / or locations) or a flash-cut approach (i.e., all at once) in order to upgrade to Windows 8. If a phased-in approach is recommended, identify the departments and / or locations you would upgrade, and describe the preferred upgrade sequence. Support your recommendations. Address the length of time in which the upgrade should occur, and identify the main issues which could impact the specified time frame. Describe one (1) approach that IT could use in order to ensure that they thoroughly test business critical applications. Describe three (3) best practices for securing the laptops and tablets for the sales staff after the upgrade is complete. Examine the pros and cons of configuring AppLocker to standardize the software used by employees across the organization. Explain the process and options available for managing application installations and updates via the Windows Store, and thus addressing the concerns voiced by the CIO.
  • 32. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Demonstrate the ability to install and configure a client operating system, applications, and associated updates as well as designing a client operating system installation strategy. Validate and successfully install a computer client operating system. Demonstrate the ability to discuss the migration phases and considerations in a client operating system installation to include virtual machines and the cloud infrastructure. Demonstrate the ability to apply technology tools to monitor and configure applications and network performance. Use technology and information resources to research issues in operating system environments. Write clearly and concisely about desktop administration and operating system topics using proper writing mechanics and technical style conventions.
  • 33. ******************************************************** CIS 329 Week 11 Quiz For more classes visit www.snaptutorial.com • Question 1 Which of the following is not an option on the Second screen menu of Windows 8? • Question 2 What Windows keyboard combination can you use to project to a second screen? • Question 3 Which power plan is not shown by default in the Power Options control panel? • Question 4
  • 34. How does Windows 8 transmit display signals to a network projector? • Question 5 When using BitLocker To Go, which of the following that is typically associated with BitLocker is not required to unlock the drive? • Question 6 Of the listed BitLocker authentication methods, which is considered to be the least secure? • Question 7 What name is given to the user account(s) that have been authorized to recover BitLocker drives for an organization? • Question 8 If the Configure Automatic Updates policy is not enabled and applied to the devices along with other Windows Update settings, what will happen? • Question 9 What is the maximum value of the Delay Restart for scheduled installations policy? • Question 10 What is the default value of the Delay Restart for scheduled installations policy? • Question 11 How many active partitions can a hard disk hold?
  • 35. • Question 12 What is a limitation of dynamic disks? • Question 13 What benefit is provided by the new Storage Spaces feature of Windows 8? • Question 14 What PowerShell cmdlet can be used to display the Event Logs? • Question 15 What keyboard combination will directly open the Task Manager in Windows 8? • Question 16 You can associate several actions to occur upon a specific event occurring. Which of the listed actions is not one of the available options? • Question 17 What name is given to a set of readings, captured under normal operating conditions, which you can save and compare to readings taken at a later time? • Question 18 To restore the computer from a system image backup, what must you do? • Question 19 What is the limitation of using a USB flash drive as the backup destination when using Windows 7 File Recovery? • Question 20
  • 36. In which Control Panel view will you not be able to find the Windows 7 File Recovery option? • Question 21 You can use Group Policy to configure how Windows responds when a user tries to install device drivers that are not digitally signed. Which of the following options is not available for this configuration? • Question 22 When a startup failure occurs before the logon user interface appears, the problem could be hardware related, but it is most likely due to an issue with one of the drivers or services that the kernel is attempting to load. To locate the offending driver or service, you must first attempt to get the computer started by using what? • Question 23 What organization is responsible for the testing and verification of compatibility, reliability, and functionality of drivers for hardware devices? • Question 24 If File History is enabled, what will be the status of Windows 7 File Recovery on the computer? • Question 25 What is the primary method of file recovery for a Windows 8 computer ********************************************************