Flylib.com
Review
Previous page
Table of content
Next page
[Previous] [Next]
Name three ways that Windows 95 differs from Windows 3.x.
What is Plug and Play? What is required for a component to be Plug and Play-compliant?
Does Windows 95 still require MS-DOS?
Which version of MS-DOS comes with Windows 95?
Is CONFIG.SYS required to install GUI drivers?
Why would you want to set the swap-file size in Windows 95?
What is the main difference between Windows 3.x and Windows 95?
Why can't older versions of disk utilities be used with Windows 95?
After turning on the power to the computer, what is the first step in the boot-up process?
In which directory do you find the external MS-DOS commands?
What is FDISK used for?
Define virtual memory.
The Registry is composed of two binary files. Name them.
What is the difference between an MS-DOS session and MS-DOS mode?
If you are running in MS-DOS mode and the CD-ROM does not run, what must you do to get it running?
Do you need a .PIF file to run an MS-DOS program in Windows 95?
What are the five steps of a Windows 95 installation?
Which version of Windows 95 uses FAT32?
What is safe mode and what is it used for?
What are the three Registry backup tools provided with Windows 95?
Answers
Previous page
Table of content
Next page
Microsoft Corporation - A+ Certification Training Kit
ISBN: N/A
EAN: N/A
Year: 2000
Pages: 127
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Getting Started
Object Types, Predicates, and Basic Constraints
Mapping ORM Models to Logical Database Models
Conceptual Model Reports
Reverse Engineering Physical Schemas to Logical Models
Agile Project Management: Creating Innovative Products (2nd Edition)
Champion Technical Excellence
Phase: Explore
Practice: Get the Right People
Practice: Customer Team-Developer Team Interface
Self-Organization Extensions
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 4.1 Authentication with Public Keys
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
Conclusion
Appendix - Sample sshd_config File
Snort Cookbook
Invisibly Sniffing 100 MB Ethernet
Tapping a Wireless Network
Logging to System Logfiles
Suppressing Rules
Decoding Application Traffic
C & Data Structures (Charles River Media Computer Engineering)
C Operators
Union
Problems in Arrays, Searching, Sorting, Hashing
Problems in Linked Lists
Problems in Trees
Special Edition Using FileMaker 8
Delivering Reports
FileMaker Extra: Building Your Own Next and Previous Page Buttons
About Custom Web Publishing
Installing FileMaker Server
Troubleshooting
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies