Answer IT Essentials II: Network Operating Systems (Ver 3.0) -2

0

1.Which are three reasons a company may choose Linux over Windows as an operating system? (Choose three.)

>>Running on a Linux Server without a GUI will increase efficiency and reliability. This Option is not available in server version

>>After a User has purchased a copy of Linux it can be installed on any number of computers for no additional charge.

By default user must provide a username and password to log into a linux system which improves system security

2. What are three network operating systems? (Choose three.)

>>Win XP

>>Win NT

>>Win 2000

3. What are three important considerations when designing a server? (Choose three.)

memory requirements

CPU Speed

hard disk type

4. Which distribution is one of the oldest and viewed as being one of the most significant?

>>Red Hat

5. When developing a network security plan, what are three factors that should be considered? (Choose three.)

>>type of business conducted by the company and any laws pertaining to confidentiality of data

>>the type of data stored on the company network

>>the management philosophy and how its presented to employees

6. Which two of the following commands can be used to configure security for a Linux system that is acting as a dedicated firewall? (Choose two.)

>>ipchains

>>iptables

7. Which statement accurately describes the Slackware Linux distribution?

>>It is designed for advanced users and user text-based configuration tools

8. An instructor in a small college is putting together systems on which students will practice

installing Windows 2000 Advanced Sewer. The instructor has been given 133 MHz Pentium

computers with 128 MB of RAM, 2 GB hard drive, and a 12X CD-ROM drive. Which

component needs to be upgraded to bring the machines up to the recommended standard

for Windows 2000 Advanced Server?

RAM


9 In Windows 2000 Professional, which of the following functions can a user perform

without administrator rights?

add a mapping to a network printer

10 A technician in a small company has been asked to install Windows 2000 onto a laptop

that belongs to a manager. Which installation option should the technician choose?

portable

11 Which three of the following file systems can be used to format a Windows NOS

partition? (Choose three.)

FAT

FAT32

NTFS

12 What are two ways a Windows client can connect to a shared network printer? (Choose

two.)

Add Printer Wizard

net use command

13 If network users cannot access an FTP server, what are two ways to stop and restart

the FTP service on a Windows 2000 sewer? (Choose two.)

click on the services and applications > services tab in the MMC

select Control Panel > Administrative Tools > Services

14 How can a technician change the IP address of a Windows 2000 system?

right-click on My Network Place > properties and then local area network >

properties > TPC/IP > Properties

15 Which of the following is the most popular type of package manager available for Linux?

RPM

16 Which two of the following statements are true about Linux scripts? (Choose two.)

Scripts are executed in a top down fashion

Scripts can be created using the vi text editor

17 Which mode of the vi text editor will be accessed by typing a colon (:)?

>>last-line

18 What is the name of the standard X Window terminal program?

>>exterm

19 Which of the following, when used with the telinit command, will cause a system to

>>read the/etc/inittab file and implement new changes?

20 Which extension is found on the end of files that have been compressed using the

compress program?

.Z

21 When using Linux, which of the following commands is used to perform a low-level

format?

fdformat

22 Which file system type is recommended for a Linux hard disk partition to be used for

applications and data?

ext3

23 Which two of the following are common Linux super-sewers? (Choose two.)

inetd.d

xinetd.d

24 Which three of the following network configuration parameters can be set during

installation? (Choose three)

IP Address

DNS Server address

subnet mask

25 Which of the following commends would allow a user to switch from a user account to

the root account to execute a program that requires root permissions?

su

26 Which Linux partition generally contains the kernel?

/boot

27 Which three of the following statements correctly describe topologies? (Choose three.)

>>The logical toplogy of a network refers to the path signals travel from a source to a

destination

>>A ring toplogy can refer to either a physical or logical toplogy

>>A physical topology describes the actual layout of network devices

28 A technician is setting up a Windows workstation that has an IP address of

192.168.64.23 to work on a network that contains a Linux file server with the IP address

192.168.64.2. What should the technician do to view the IP configuration on the

workstation?

>>run ipconfig /all on the workstation.

29 A technician is troubleshooting a Windows machine that is not communicating with the

Network server. The technician verifies that the sewer is not reachable and ipcon6g shows

that the workstation configured properly. What should the technician do next?

ping 172.0.0.1

30 A technician wishes to load Linux onto a new computer system that currently has no

operating system loaded on the single hard drive. The technician wishes to boot from the

installation CD but the message `Media error' keeps appearing. What should the technician

do next?

check the BIOS to make sure the CD-ROM is the first boot device

31 Which of the following commends can be used to specify the user and group ownership

of a file'?

chown

32 If the kill command is used on a computer running Linux without specifying a signal,

which signal used by default?

SIGTERM

33 Which three of the following statements about memory are true? (Choose three.)

RAM is faster than the hard disk of a computer.

Virtual Memory can be used to compensate for a lack of physical memory

A lack of available RAM will impact the performance of a computer.

34 A technician has determined that the reason a Linux system refuses to boot is that the

/etc/fstabfile is corrupt. What should the technician do to try to repair the system?

boot the system using an emergency boot disk floppy and then edit the /etc/fstab file

on the hard drive

35 Which of the following directories contains most of the Linux system log files?

/var/log

36 Which of the following commands will show a listing of all the Linux commands and a

brief description?

man intro

37 Which of the following situations can be addressed by using the fsck command?

A user must repair the file structure after an unexpected power failure causes a

system to abruptly shut down

38 The table shows the users and groups that have permission to access a file and the

permissions they have in a Windows XP system. If User1 is a member of the User group but

not a member of the Administrator group which users can delete the file'?

>>User1 and any member of the Administrator group.

39 Which tool, native to Windows XP, is used to monitor system resources?

Performance Tool

40 While using a non-administrator Windows 2000 account, an administrator is asked to

add a new user to the system. What is the easiest way for the administrator to create a new

user?

The administrator enters administrator tools without changing to the administrator

account then right clicks on computer managements and select run as. After entering

the administrator account password the administrator can create a new user.

41 How can an administrator assist a Windows 2000 user with a forgotten password?

Set a new password for the user in the computer management tool

42 A technician is given a Windows 2000 computer that apparently has an inoperable

modem card. What should the technician do first?

check in device manager to see if there are any icons next to the modem device

43 A user wants to give other network users access to a folder on a Windows 2000 system.

After right-clicking on the folder, which item should the user select?

sharing

44 Which Microsoft option will use the internet to contact a vendor's website in search of

patches, fixes, and updates?

Windows update

45 Which of the following Linux commends is used to create a directory?

mkdir

46 What is the function of the netstat utility?

it displays information about a network such as connection, routing tables and

interfaces

47 Which command is used to change groups after a user has logged into a system?

newgrp

48 A new administrator has discovered that kernel messages are not saved to a log file

when the system is booted. The LILO boot loader is used. What can the administrator do to

correct this?

the line dmesg > /var/log/boot.messages in the /etc/rc.d/rc.local file

49 What are two steps in the creation of a Windows 2000 or Windows XP script? (Choosetwo.)

>>write the script code and save as ASCII text

>>save the script with the appropriate filename extension for the scripting language

used

50 Which two of the following standards are necessary for proper virus protection? (Choose

two.)

Virus protection software should be installed on all workstations and servers.

One person should be responsible for communicating virus alerts to all users.

51 Which two of the following standards describe proper security for usernames and

passwords? (Choose two.)

the level of password control for assigning passwords should match the level of

protection required.

password expiration and lockout rules should be clearly defined and communicated to

network users.

52 What is the name of a free software program that is useful for monitoring security

breaches on Linux servers without enhancing security?

LSAT

53 What allows Linux applications to print to non-PostScript printers?

Ghostscript

54 The Apache web server has been installed on a Linux server and is being configured.

The administrator wishes to change the location of the web pages that will be served to

/home/www and knows that the main configuration file contains this directive. What is the

name of the file that needs to be edited?

httpd.conf

55 Which four parts of a Linux file system are often located in dedicated partitions?

(Choose four.)

/

/boot

/home

swap file

56 Which two of the following devices are most likely to have drivers that are already

compiled into a modern Linux Kernel? (Choose two.)

sound card

USB device

57 Which of the following statements is true of NIS?

Slave servers provide load sharing for the NIS server

58 In Windows 2000, which two categories within Computer Management under System

Tools store logged information? (Choose two.)

Performance Logs and Alerts

Event Viewer

59 Why might the administrator of a small company choose Windows 2000 Sewer instead

of Windows 2000 Professional?

The system is to act as a DNS server

60 After configuring Web services with Windows XP, what two methods can be used to

view the default web page? (Choose two.)

User can view the default web page by submitting the address http:/127.0.0.1/ via a

web browser on the windows XP server

ser can view the default web page by submitting the ip address of the windows XP

server via a web browser on Windows XP server

61 The administrator of a Windows 2000 system believes that the reason for the reduced

performance of the network is due to the condition of the server `s disks. What Windows

2000 tool can the administrator use to get the most complete information regarding the

status of the disks on the server?

Click on Start > Control Panel > Administrative Tools > Computer Management

62 What is the System Monitor tool?

It is a windows 2000 and XP tool that shows graphically the utilization of a number of

system resources over a period of time

63 Which of the following is considered good practice when partitioning a hard disk for a

new OS? (Choose two.}

a third party partition tool that supports the operating systems to be installed should

be used

the partitioning tool that comes with the OS should be used to create the partitions

for that OS, if no other options are available

[+/-] ReadMore...

Answer IT Essentials II: Network Operating Systems (Ver 3.0)

0

1. How can a technician change the IP address of a Windows 2000 system?

run cmd and then enter the command ipconfig

right-click on My Computer and then Properties > Network Connections > TCP Settings

right-click on My Network Places > Properties and then Local Area Network > Properties > TCP/IP >Properties**

left-click on Start > Programs > Accessories > Administrative Tools > Network Settings


2. The table shows the users and groups that have permission to access a file and the permissions they have in a
Windows XP system. If User1 is a member of the User group but not a member of the Administrator group,
which users can delete the file?

administrators only**

any member of the Administrator and User groups

User1 and any member of the Administrator group

any member of the User group only

User1 only




3. A technician in a small company has been asked to install Windows 2000 onto a laptop that belongs to a
manager. Which installation option should the technician choose?

typical

mobile

custom

portable**

compact



4. What is the name of the standard X Window terminal program?

Xterm**

xshell

cli-win

cli-shell




5. When developing a network security plan, what are three factors that should be considered? (Choose three.)

the type of business conducted by the company and any laws pertaining to confidentiality of data**

the type of hardware being used by the company**

the geographic location and industry ranking of the company

the type of data stored on the company network**

the management philosophy and how it is presented to employees



6. Which of the following is the most popular type of package manager available for Linux?

DBM

RPM**

WINZIP

PKZIP




7. The administrator of a Windows 2000 system believes that the reason for the reduced performance of the
network is due to the condition of the server's disks. What Windows 2000 tool can the administrator use to get
the most complete information regarding the status of the disks on the server?

Right-click on My Computer and select Properties.

Click on Start > Control Panel > Administrative Tools > Computer Management.

Click on Run and enter msconfig in the text box.

Click Start > Accessories > System Tools > Disk Management.**



8. Which command is used to change groups after a user has logged into a system?

newgrp

changegrp

switchgrp

sgrp

chgrp**

chgroup




9. Which mode of the vi text editor will be accessed by typing a colon (:)?

edit

entry

command**

last-line



10. Which two of the following commands can be used to configure security for a Linux system that is acting as
a dedicated firewall? (Choose two.)

ipconfig

ipchains**

iptrans

iptables**

ifconfig



11. What are two ways a Windows client can connect to a shared network printer? (Choose two.)

Add Printer Wizard

Net Connection Wizard**

net connect command

net use command**



12. Which of the following Linux commands is used to create a directory?

diradd

mkdir**

dir

touch

makedr


13. What is the function of the netstat utility?

It displays the manufacturer and version of network devices.

It is the part of the SNMP suite, which collects network usage information.

It is a Linux utility for collecting information about other devices that are connected to a network.

It converts an IP address to a MAC address.

It displays information about a network such as connections, routing tables, and interfaces.**



14. Which of the following statements is true of NIS?

The NIS domain name must be the same as the Internet DNS domain name.

Changes to the NIS database can be made on any NIS server and will be replicated throughout the system.

Slave servers provide load sharing for the NIS server.

All NIS configuration changes to an NIS client must be performed in an ASCII text editor.

For security purposes, it is recommended that the yppasswd command be used to set a different NIS user password than the one on the local machine.**




15. A technician is given a Windows 2000 computer that apparently has an inoperable modem card. What should
the technician do first?

take the case off the computer and make sure the modem card is properly seated in the expansion slot**

remove the suspect card and replace it with another one to see if the fault goes away

check in Device Manager to see if there are any icons next to the modem device

left-click on My Computer and then click on Explore to detect any faults within the system

double-click on My Computer and then Dialup Network Connections to determine if Windows
recognizes the modem device



16. Which two of the following are common Linux super-servers? (Choose two.)

inetd.d**

initd.d

inet.d

xinetd.d**

xinit.d

xinitd.d




17. A technician wishes to load Linux onto a new computer system that currently has no operating system loaded
on the single hard drive. The technician wishes to boot from the installation CD but the message 'Media error'
keeps appearing. What should the technician do next?

check the BIOS to make sure the CD-ROM is the first boot device**

make sure the cable to the CD-ROM is inserted correctly

partition the disk using fdisk

boot from a boot floppy

try booting from a different Linux distribution



18. Which file system type is recommended for a Linux hard disk partition to be used for applications and data?

ext2

ext3

reiser**

boot

swap




19. Which of the following, when used with the telinit command, will cause a system to read the /etc/inittab file
and implement new changes?

s

o

q**

z



20. If network users cannot access an FTP server, what are two ways to stop and restart the FTP service on a
Windows 2000 server? (Choose two.)

use the IIS Wizard

click on the Services and Applications > Services tab in the MMC**

enter netstat -halt at the command line

select Control Panel > Administrative Tools > Services**

select IIS Maintenance Console > Services




21. In Windows 2000 Professional, which of the following functions can a user perform without administrator
rights?

add a mapping to a network printer

manage the domain configuration**

assign permissions to a user account

manage security policies



22. Which of the following situations can be addressed by using the fsck command?

A user has been given the job of creating two new partitions on an existing hard drive.

A user must change the permissions on three existing files without changing any existing permissions on the directory where the files are stored.

A user must repair the file structure after an unexpected power failure causes a system to abruptly shut down.**

A user must batch create home directories for seven new users.




23. An instructor in a small college is putting together systems on which students will practice installing Windows 2000 Advanced Server. The instructor has been given 133 MHz Pentium computers with 128 MB of RAM, 2 GB hard drive, and a 12X CD-ROM drive. Which component needs to be upgraded to bring the machines up to the recommended standard for Windows 2000 Advanced Server?

CPU

RAM**

hard drive

CD-ROM drive



24. Which four parts of a Linux file system are often located in dedicated partitions? (Choose four.)

/**

/boot**

/etc/httpd

/home**

/mnt

swap file**




25. A technician has determined that the reason a Linux system refuses to boot is that the /etc/fstab file is corrupt.
What should the technician do to try to repair the system?

use an MS-DOS boot disk to boot the system and then use the MS-DOS edit utility to repair the /etc/fstab file**

boot the system using an emergency boot disk floppy and then edit the /etc/fstab file on the hard drive

boot the system using the emergency repair disk and then run fdisk /mbr

run the Linux installation program from the installation CD and select Repair fstab when it reaches the
disk partitioning step



26. Which Linux partition generally contains the kernel?

/boot**

/

root

swap




27. Which two of the following standards describe proper security for usernames and passwords? (Choose two.)

A complex password convention is less important than having a complex standard regarding usernames.

All passwords should be a short combination of easily remembered letters and numbers so that users will not need to write their passwords down.**

The level of password control for assigning passwords should match the level of protection required.

Both usernames and passwords should periodically expire to ensure maximum security.**

Password expiration and lockout rules should be clearly defined and communicated to network users.



28. What is the System Monitor tool?

It is an MS-DOS utility that displays current CPU usage only.

It is an MS-DOS tool that displays information about the usage of a variety of resources.

It is a tool available in Windows 2000 and XP that will display the current state of a number of system resources in a textual format.

It is a Windows 2000 and XP tool that shows graphically the utilization of a number of system resources over a period of time.**




29. Which of the following commands will show a listing of all the Linux commands and a brief description?

man man

man intro**

man list

man more

man command



30. What are three network operating systems? (Choose three.)

Windows XP**

Windows 98

Windows ME

Windows NT**

Windows 2000**



31. Which of the following commands can be used to specify the user and group ownership of a file?

Chown**

chgrp

usermod

groupmod

filemod

more



32. A technician is setting up a Windows workstation that has an IP address of 192.168.64.23 to work on a
network that contains a Linux file server with the IP address 192.168.64.2. What should the technician do to
view the IP configuration on the workstation?

run ipconfig /all on the workstation**

run ipconfig 192.168.64.23 on the workstation

run ping 192.168.64.2 on the workstation

run ifconfig addr 192.168.64.23 on the server

run ping 192.168.64.23 on the server




33. Which of the following is considered good practice when partitioning a hard disk for a new OS? (Choose two.)

A third party partitioning tool that supports the operating systems to be installed should be used.**

MS-DOS fdisk should be used, as it creates partitions that are compatible with all major operating systems.

The partitioning tool that comes with the OS should be used to create the partitions for that OS, if no other options are available.

Partitions should be as large as the disk will allow to provide room for future expansion.

Partitions should be made as small as possible and FIPS used to adjust them later as necessary.**



34. Which three of the following statements about memory are true? (Choose three.)

RAM is faster than the hard disk of a computer.**

Hard disks normally have smaller storage capacity than RAM.

Virtual memory can be used to compensate for a lack of physical memory.**

Virtual memory must be managed manually.

A lack of available RAM will impact the performance of a computer.**




35. Which are three reasons a company may choose Linux over Windows as an operating system? (Choose three.)

It is difficult to buy a new computer with a server version of Windows pre-installed.

There is more application software available for Linux.**

Running a Linux server without a GUI will increase efficiency and reliability. This option is not available in server versions of Windows.**

After a user has purchased a copy of Linux, it can be installed on any number of computers for no additional charge.

After a user has purchased a copy of Windows, it can be installed on any number of computers for no additional charge.

By default, users must provide a username and password to log into a Linux system, which improves system security.**



36. A user wants to give other network users access to a folder on a Windows 2000 system. After right-clicking on
the folder, which item should the user select?

Sharing**

Rights

Permissions

Properties

Security




37. Which three of the following file systems can be used to format a Windows NOS partition? (Choose three.)

ext2

FAT**

FAT32**

HFS

NTFS**

vfat



38. Which of the following commands would allow a user to switch from a user account to the root account to
execute a program that requires root permissions?

switch

flip

logon

su**

jump




39. Which tool, native to Windows XP, is used to monitor system resources?

SysScan

Performance Tool**

XPMON

XP Benchmark Tool

System Safeguard



40. Why might the administrator of a small company choose Windows 2000 Server instead of Windows 2000 Professional?

The operating system is to run on a dual-processor system.

The system is to act as a DNS server.**

The company needs an intranet based on a small web server.

The server will be accessed by up to ten simultaneous users.




41. How can an administrator assist a Windows 2000 user with a forgotten password?

set a new password for the user in the Computer Management tool**

enter the Computer Management tool, click on the user, and then select Properties > Password to display the password

switch to the user account from the administrator account and select Set Password from the Control Panel

log in as the user using the administrator password, enter Ctrl-Alt-Del, and click on Change Password

delete the user account from the Computer Management tool and create a new user account

e-mail Microsoft to request a new password for the account, which will then be e-mailed directly to the user



42. Which two of the following standards are necessary for proper virus protection? (Choose two.)

Virus protection software should only be installed on client workstations that have Internet access.

Virus protection software should only be installed on servers that can be accessed by remote clients.

Virus protection software should be installed on all workstations and servers.*

All virus warnings should come from at least two network support technicians.

One person should be responsible for communicating virus alerts to all users.*




43. What are three important considerations when designing a server? (Choose three.)

monitor screen size

memory requirements**

CPU speed**

speaker quality

hard disk type**

sound card capabilities



44. Which three of the following statements correctly describe topologies? (Choose three.)

The physical topology of a network refers to the path data travels from a source to a destination.**

The logical topology of a network refers to the path signals travel from a source to a destination.**

A ring topology can refer to either a physical or logical topology.

A logical topology refers to the actual map and layout of a network.

A physical topology describes the actual layout of network devices.**




45. Which extension is found on the end of files that have been compressed using the compress program?

.gz**

.Z

.c

.XZ



46. What allows Linux applications to print to non-PostScript printers?

/etc/lpn

Ghostscript**

LPRng

/etc/printcap

printtool




47. The Apache web server has been installed on a Linux server and is being configured. The administrator wishes
to change the location of the web pages that will be served to /home/www and knows that the main
configuration file contains this directive. What is the name of the file that needs to be edited?

access.conf

apache.conf

httpd.conf**

inetd.conf

initd.conf

www.conf



48. After configuring Web services with Windows XP, what two methods can be used to view the default web page? (Choose two.)

Users can view the default web page by using the View Web Page tool found under Administrative Tools in the IIS Manager.

Users can view the default web page by submitting the address http://127.0.0.1 via a web browser on the Windows XP server.**

Users can view the default web page by submitting http://www.localstart.asp in the web browser on the Windows XP server.**

Users can view the default web page by submitting the IP address of the Windows XP server via a web browser on the Windows XP server.




49. What are two steps in the creation of a Windows 2000 or Windows XP script? (Choose two.)

write the script code and save as ASCII text

make sure the first line of the script defines the scripting language used**

compile the script into a bytecode file

compile the script into a binary executable file

save the script with the appropriate filename extension for the scripting language used**



50. Which statement accurately describes the Slackware Linux distribution?

It is designed for Linux novices.

It has a range of user interfaces and uses RPM.

It is designed for advanced users and uses text-based configuration tools.**

It is intended solely for non-profit organizations and uses the Debian package manager.




51. What is the name of a free software program that is useful for monitoring security breaches on Linux servers
without enhancing security?

3DES

LSAT*

PC Guardian

Winzap

PortSentry



52. A new administrator has discovered that kernel messages are not saved to a log file when the system is booted.
The LILO boot loader is used. What can the administrator do to correct this?

put the line dmesg > /var/log/boot.messsages in the /etc/rc.d/rc.local file**

put the line dmesg in the init.conf file

press the F8 button when the system is booted

hold the F6 key down when the system is powered up

put the line messages = /etc/log/boot.messages in lilo.conf




53. Which distribution is one of the oldest and viewed as being one of the most significant?

Caldera

Debian**

SuSE

Red Hat

Slackware



54. While using a non-administrator Windows 2000 account, an administrator is asked to add a new user to the
system. What is the easiest way for the administrator to create a new user?

The administrator enters Administrator Tools and then clicks on Computer Management. The administrator will then be able to create a new user.

The administrator enters Administrator Tools without changing to the Administrator account then right-clicks on Computer Management and selects Run as. After entering the Administrator account password the administrator can create a new user.

The administrator clicks on Start > Switch User. The administrator then chooses the Administrator account to create the new user.

The administrator logs out from the the non-administrator account and then logs in as the administrator. The administrator will then be able to create a new user.**




55. If the kill command is used on a computer running Linux without specifying a signal, which signal is used by
default?

SIGEND

SIGCTRLC

SIGKILL

SIGTERM**

SIGNAL



56. When using Linux, which of the following commands is used to perform a low-level format?

mkfs

format

df

fdformat**

du




57. Which two of the following statements are true about Linux scripts? (Choose two.)

Scripts cannot contain loops.

Scripts are executed in a top down fashion.*

Scripts can be created using the vi text editor.*

Scripts cannot contain commands.

A script is part of the OS.



58. In Windows 2000, which two categories within Computer Management under System Tools store logged
information? (Choose two.)

System Log

Warnings, Errors, and Alerts

Service Log

Performance Logs and Alerts**

Event Viewer**

Network Log




59. Which of the following directories contains most of the Linux system log files?

/etc/log

/etc/sys/log

/var/log**

/var/sys/log



60. Which three of the following network configuration parameters can be set during installation? (Choose
three.)

IP address**

MAC address

file server address

DNS server address**

subnet mask**

network type




61. A technician is troubleshooting a Windows machine that is not communicating with the network server. The
technician verifies that the server is not reachable and ipconfig shows that the workstation is configured
properly. What should the technician do next?

ping the default gateway*

ping 127.0.0.1

check the configuration of the server

tracert to the server



62. Which Microsoft option will use the Internet to contact a vendor's website in search of patches, fixes, and
updates?

Secure Update

Flash Update

Windows Update**

Update Manager

Patch Manager




63. Which two of the following devices are most likely to have drivers that are already compiled into a modern
Linux kernel? (Choose two.)

printer

scanner

sound card**

software modem

USB device

video card**

[+/-] ReadMore...

Microsoft All In 1 Genuine Maker

0


Membuat semua versi Microsoft asli dengan

"Microsoft All In One Genuine Maker"
termasuk :
-windows XP
-Vista
- Juga termasuk membuat Microsoft Ofiice 2007 Genuine



Pass : warezscene.org

[+/-] ReadMore...

Blue Screen Error Message dan Artinya

0

1.
IRQL_NOT_LESS_OR_EQUAL (0X0000000A)
Ini merupakan biangnya biang kerok pada BsOD. Karena umumnya pada BsOD, pesan ini yang paling sering muncul. Pesan kesalahan ini disebabkan umumnya kerena ada ketidakcocokan driver yang terinstall di komputer.

Daftar Penyebab:
? Masalah driver yang bentrok atau tidak cocok
? Masalah Video Card, hal ini mencakup video card yang di overclock melebihi batas atau Anda baru berganti Video card dan Anda belum menguninstall driver Video card lama dari chipset berbeda
? Masalah Audio Card, meliputi kesalahan konfigurasi atau bug dalam driver sound card

2.
NTFS_FILE_SYSTEM atau FAT_FILE_SYSTEM (0X00000024) atau (0X00000023)
Nah, pesan ini setidaknya sudah sedikit “nyambung” memberikan gambaran di mana kerusakan berada, yaitu ada di partisi atau filesystemnya tetapi bukan di harddisknya. Kita bisa melakukan pengecekan dengan memeriksa kabel SATA atau PATA atau bisa mengecek partisi dengan tool chkdsk.

3.
UNEXPECTED_KERNEL_MODE_TRAP (0X0000007F)
Bila Anda mendapatkan pesan seperti ini, dapat disebabkan karena:
? Overclock Hardware yang berlebihan
? Komponen komputer yang kepanasan
? BIOS yang korup
? Memory dan CPU yang cacat

4.
DATA_BUS_ERROR
Pesan ini disebabkan karena adanya kemungkinan bahwa memory atau slot memory di motherboard rusak.

5.
PAGE_FAULT_IN_NONPAGED_AREA
Disebabkan karena adanya kerusakan hardware, termasuk memory utama, memory video card, atau memory di processor (L2 Cache)


6.
INACCESSIBLE_BOOT_DEVICE
Disebabkan karena adanya kesalahan dalam konfigurasi jumper harddisk yang salah, virus boot sector, driver IDE controller yang salah, atau kesalahan driver chipset.

7.
VIDEO_DRIVER_INIT_FAILURE
Kesalahan terjadi pada instalasi driver video card yang kurang sempurna, restart pada saat instalasi atau juga dapat terjadi karena kesalahan dalam instalasi driver.

8.
BAD_POOL_CALLER
Kesalahan ini dapat terjadi karena kesalahan atau driver yang tidak kompatibel. Sering terjadi saat melakukan instalasi XP dari upgrade, atau bukan dari instalasi baru.

9.
PEN_LIST_CORRUPT
Pesan ini disebabkan karena adanya kerusakan RAM

10.
MACHINE_CHECK_EXCEPTION
Disebabkan oleh cacatnya CPU, atau yang di overclock secara agresif, serta power supply yang kekurangan daya atau rusak.


[+/-] ReadMore...