MTA 98-365 chapter 1 Terms

  1. Instructions that control most of the computer's input/output functions, such as communicating with disks, RAM, and the monitor kept in the System ROM chips, are known as the ________.
    BIOS (basic input/ output system).
  2. a __________ is installing the software from scratch on a new drive or on a newly reformatted drive.
    clean installation
  3. One way to install Windows Server 2008 R2 is to use _________________ software such as Norton Ghost or Novell ZENworks. to create an image file, which is a sector-by-sector copy stored in a large file.
    disk cloning
  4. Traditionally, hard _______ are half electronic/half mechanical devices that store magnetic fields on rotating platters.
  5. _____________ is software contained in read-only memory (ROM) chips.
  6. The component that brings all the parts together is the _____________.
  7. Without ___________ a network connection, the server is not able to communicate with other servers or the clients.
    network connections
  8. ____________ are plug sockets that enable you to connect an external device,such as a printer, keyboard, mouse, or external drive to your computer.
  9. ____________ blood of the computer or supply's electricity to the computer.
    power supply
  10. The computer, including servers, are built around one or more integrated chips called the__________.
  11. ______, which stands for random access memory, is the computer's short-term or temporary memory.
  12. A ________ is a computer that is meant to be a dedicated service provider, and a client is a computer that requests services.
  13. _____________ installation provides a minimal environmental with no Windows Explorer shell for running specific server roles and no Start Button. Only the Command prompt is available.
    Server Core
  14. Windows Server 2008 R2 _____________ are software programs that are not directly part of role.
    server features
  15. A ___________is a primary duty that a server performs.
      File services
      Printer services
      Web Services 
      Remote Access
      Application servers
      Email servers
      Database servers
      Monitoring servers
      Threat management servers
    server roles
  16. You run the _____________(Sysprep), which removes the security identifiers and all other user-specific or computer -specific information from the computer before you run the disk cloning software to make the cloned image.
    system preparation tool
  17. An ______________ is an installation that requires little interaction to install.
    unattended installation
  18. In some instances, you will want to take a current system and upgrade from an older version of Windows to Windows Server 2008 R2. You can upgrade (using an __________________) from the preious versions of Windows to Windows Server 2008 R2.
    upgrade installation
  19. Virtual Machines or ____________ technology enables multiple operating systems to run concurrently on a single machine.
    virtual server
  20. Microsoft product activation, including __________________, is an anti-piracy technology designed to verify that software products are legitimately licensed.
    Windows activation
  21. ______________ is a technology from Microsoft for network-bound installation of Windows Operating Systems including Windows XP, Windows Vista, Windows Server 2003, and Windows Server 2008.
    Windows Deployment Services (WDS)
  22. After installing Windows , check whether Microsoft has any _____________ including fixes, pacthes, service packs, and device drivers, and apply them to the Windows system.
    Windows updates
Card Set
MTA 98-365 chapter 1 Terms
MTA 98-365 chapter 1 terms