Match each item with a statement below.

A. software that simulates the hardware of a physical computer
B. the overall structure an OS uses to name, store, and organize files on a volume
C. a utility to copy user data and settings from one computer to another
D. a server automatically installs a new image or OS upgrade to a computer when a user is not likely to be sitting at it
E. a copy of an entire hard drive that includes the Windows OS, drivers, and applications that are standard to all the computers that might use that copy
F. contains instructions for running essential hardware devices before an operating system is started
G. an installation that does not require a technician to respond to prompts by the setup program
H. contains a list of OS commands that are executed as a group
I. a command that provides encryption options and hard link management within USMT
J. used during an unattended installation

A. virtual machine
B. file system
C. Windows Easy Transfer
D. push automation
E. standard image
F. system BIOS
G. unattended installation
H. batch file
I. usmtutils
J. answer file

Computer Science & Information Technology

You might also like to view...

The category of intrusion detection systems that looks for patterns that don't match those of normal use is called anomaly detection

Indicate whether the statement is true or false.

Computer Science & Information Technology

A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.

A. address spoofing exploit B. online intrusion C. brute force attack D. rogue antivirus

Computer Science & Information Technology