Resource
Page CIS 2149 Syllabus
Student Grade Calculator
Chapter Lesson Notes: 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
| 11 | 12 Word Lists
Word Lists for All Chapters
Chapter 2Chapter 3
File Attributes
Folder, File Permissions - these will not be included on the quiz
Chapter 5
General Printer Terms
Types of printers
Printer permissions
File Systems
Chapter 6
Basic disk
Boot partition
Compact Disk File System (CDFS)
Disk Management
Disk quota
Disk Defragmenter
Dynamic disk
El Torito
Extended partition
Last Good Known Configuration
Mirroring
Primary partition
RAID 5
Removable mediaFirewire
Simple volume
Spanned volume
Striped volume
System partition
Universal Serial Bus (USB)
Universal Data Format (UDF)
VGA mode
Chapter 7
Advanced Power Management (APM)
Advanced configuration and Power Interface (ACPI)
Offline folders
Cache Mover (cachemov.exe)
Synchronization Manager
Automatic Caching For Documents
Automatic Caching For Programs
Manual Caching For Documents
Windows Driver Model (WDM)
Driver Signing
Windows Update
Ignore
Warn
Block
Multitasking
Cooperative multitasking
Preemptive multitasking
Kernel
Chapter 8
Ignore
Warn
Block
File Signature Verification tool
Sigverif.exe
Sigverif.txt
System File Checker (SFC)
Sfc.exe
AT command-line program
SchedLog.txt
Baseline
System Monitor
Object
Counter
Instance
Bottleneck
LogicalDisk
PhysicalDisk
Defragmentation
Counter logs
Trace logs
Binary
Binary circular
Text-CSV
Text-TSV
Circular Trace File
Sequential Trace File
Alerts
Set Affinity command
Process priority
Real-Time
High
Normal
Low
Emergency Repair Disk (ERD)
Backup types
Normal
Incremental
Differential
Copy
Daily
Recovery Console
"Blue screen of death"
Chapter 9
User profile
Password options
User Must Chang Password At Next Logon
User Cannot Change Password
Password Never Expires
Account Disabled
Account Locked Out
Security identification number (SID)
Profile properties, General tab:
Profile path
Logon script
Home folder - Local path
Roaming profile
gpedit.msc
Group Policy
Local Computer Policy
Keyboard options:
StickyKeys
FilterKeys
ToggleKeys
SerialKeys
Sound options:
SoundSentry
ShowSounds
Display options:
HighContrast
Magnifier
Narrator
MouseKeys
Chapter 10
ASCII
EBCDIC
Unicode (ISO 10646)
RTL (Right-to-Left) Orientation API
Bidirectional Application Programming Interface
Locales
User Locales
Input Locales
System Locales
Language Group
Input Method Editor (IME)
WinINSTALL Lite
Software Publication
Software Assignment
Chapter 11
TCP/IP (DOD) Model
Application layer
Transport (or Host to Host) layer
Internet (Internetwork) layer
Network Interface layer
Ipconfig
Ping
Tracert
Pathping
Arp
Route
Netstat
Nbtstat
Nslookup
Microsoft Network Monitor
Dynamic Host Configuration Protocol (DHCP)
Dynamic IP addressing
Static IP addressing
Automatic IP Addressing (APIPA)
Class A
Class B
Class C
Class D
Class E
Internet Protocol Security (IPSec)
Kerberos
Encapsulating Security Payload (ESP)
Authentication Header (AH)
Tunnel Mode
Transport Mode
Three built-in security policies:
Client (respond only)
Server (request security)
Secure Server (require security)
Domain Name System (DNS)
HOSTS file
Domain Namespace
Root Domain
Top-Level domains
Second-Level Domains
Fully Qualified Domain Name (FQDN)
DNS Zone
Time To Live (TTL)
Recursive query
Iterative query
Forwarder
Cache
Reverse Lookup
Dynamic DNS (DDNS)
Network Connection Types:
Dial-up to private network
Dial-up to the Internet
Connect to a private network through the Internet
Accept incoming connections
Connect directly to another computer
Virtual Private Network (VPN)
Point-to-Point Tunneling Protocol (PPTP)
Layer Two Tunneling Protocol (L2TP)
Remote Access Server
Serial Line Interface Protocol (SLIP)
Point-to-Point Protocol (PPP)
Extensible Authentication Protocol (EAP)
Remote Authentication Dial-IN User Service (RADIUS)
Multilinking
Bandwidth Allocation Protocol (BAP)
Bandwidth Allocation Control Protocol (BACP)
Internet Connection Sharing (ICS)
Chapter 12
Group Policy
local
site
domain
OU
Local Computer Policy
Group Policy Object
gpedit.msc
Password policy
Enforce passwor history
Maximum password age
Minimum password age
Minimum password length
Passwords must meet complexity requirements
Store password using reversible encryption
Account Lockout Policy
Account lockout duration
Account lockout threshold
Reset account lockout counter after
Audit Policy
Event Viewer
Encrypting File system
Recovery Agent
Cipher command
Local profiles
Nonmandatory Roaming profiles
Mandatory Roaming profiles