You are on page 1of 30

Computer Optimization

962-194

Ali Alif

Final Exam

Group 53

Student ID SINK240601

Name Kunwardeep

Last Name singh

Date: May 8, 2022

Time: 13:00PM To 16:00PM 2 Hours

1
962-194 Computer Optimization
Instructions:

You must have a PC, laptop, or Mac up and run with office 365, a windows 10 pro
installed and Kali Linux on VirtualBox at least with 2 drives and connected to the
internet and you must have access to CSSQ/ CDE Microsoft Teams and Moodle during
the exam to upload and download files, this exam is a closed book.

You must be alone in a quote environment; no cellphone or other devices are permitted
on your desk during the exam accept your PC with monitors only and CSSQ/ CDE
Microsoft teams are allowed to submit your exam paper, and this is an online
environment webcam 100% on during the exam if there is any network issue, please let
me know.

If you are caught, you will be expelled from the evaluation period or receive a score of 0.

The exam will be taken online using Microsoft Teams, and Moodle for file upload.

The examination counts as 60% of the final mark to pass this course you must obtain
59% of the final exam students below 59% have to retake this course.

The duration of this examination is 3 Hours.

Students who make phone calls, "CHAT", transfer information, TALK during the exam
without permission, use unauthorized information or cheat in any way whatsoever, will
be expelled from the evaluation session.

It is not permissible to leave the Teams class during the evaluation period unless you
have permission to do so.

Good luck!!

2
962-194 Computer Optimization
Question 1: 20 multiple choice questions each has 1 point.

1. What is Cloud Computing replacing?


a) Corporate data centers 
b) Expensive personal computing 
c) Expensive software upgrades 
d) All of the above 

2. Question An application that provides for transaction overflow in a reservation system is


an example of
a. cloud servicing
b. cloud provisioning
c. cloud bursting
d. all the mentioned

3. Which of the following is the most refined and restrictive cloud service model?
a. PsaS
b. LaaS
c. SaaS
d. CaaS

4. Which of the following model consists of the service that you can access on a cloud
computing platform?
a) Application
b) Deployment
c) Service
d) None of the mentioned

3
962-194 Computer Optimization
5. As a system expert you should know, which of the command-line utilities listed below
allows to test the reachability of a host across an IP network?
a. PING
b. NETSTAT
c. IPCONFIG
d. TRACERT

6. when we have a windows boot issue, we must run a CHKDSK The /R switch of the CHKDSK
utility: to which of the following it applies (Select all that apply)
a. Displays cleanup messages
b. Locates bad sectors and recovers readable information
c. Uses more system resource to perform a scan as fast as possible
d. Displays the full path and name of every file on the disk
e. Fixes errors on the disk

7. Which of the following commands in Windows can be used to display help information
related to a specific command-line utility? (Select all that apply)
a. [command name] /help
b. man [command name]
c. [command name] info
d. help [command name]
e. [command name] /?

8. Microsoft Windows OS command-line utility for displaying intermediary points on the


packet route is called:
a. TRACERT
b. ROUTE PRINT
c. TASKLIST
d. NETSTAT
e. TRACEROUTE

9. Which of the following Windows command-line utilities allows to terminate tasks by


process id or image name?
a. TASKLIST
b. TASKKILL
c. SHUTDOWN
d. EXIT

4
962-194 Computer Optimization
10. A remote user calls you to report a problem connecting to the corporate network over his
DSL connection. The user can connect to the Internet and browse web pages but can't
connect to the corporate remote access gateway. Which of the following troubleshooting
steps would you perform first?
a. Have the user power cycle the DSL modem and try again.
b. Have the user reconfigure the IP address on his system to oneof the
address ranges used on the internal corporate network,and try
again.
c. Check the corporate remote access gateway to see whether itis running
and operating correctly.
d. Have the user reboot his system.

11. You are troubleshooting a connectivity problem on a workstation that is unable to


connect to the network. You have verified that the physical connectivity of the system is
okay, and you suspect that the problem is related to the bindings of the protocols to the
network cards. You decide to use the local loopback feature of the TCP/IP stack to test the
configuration. Which of the following commands could you use to do this?
a) Ping another workstation on the same segment
b) Ping 127.0.0.1
c) Ping localhost
d) Ping the router

12. The IP address of a workstation is 192.168.20.2. It's connected to a hub with an IP address
of 192.168.20.3. Which of the following will check the connection status between
workstation and hub?
a. Tracert 192.168.20.3
b. Arp 192.168
c. Ping 192.168.20.3
d. Ipconfig/all
13. Antivirus software protects your computer against which types of threats?
a. A program that could remotely control your computer
b. A program that could wipe out your data
c. A program that could transmit your confidential information back out
through the Internet
d. All of the answers are correct

5
962-194 Computer Optimization
14. Which one of the following is considered as the most secure Linux operating system that
also provides anonymity and the incognito option for securing the user's information?
a) Ubuntu
b) Tails
c) Fedora
d) All of the above 

15. What is the name for the Windows tool that support biometric sign-in such as fingerprint
or face recognition?
a. Windows SID
b. Windows Hello
c. Windows VPN
d. Windows ACL

16. What command line command can be used to determine the security identifier (SID) for a
user account?
a) whoami /user
b) show security
c) net user /id
d) show sid

17. Which of the following commands would you use to install the Recovery Console?
a. Start |Run, then type d:\i386\winnt32/cmdcons
b. Start |Run, then type d:\i386\winnt32/rc
c. Start |Run, then type d:\i386\winnt32/cm:command_line
d. Start |Run, then type d:\i386\winnt32/copydir.recovery_console

18. Mark loaded a new video card on his system, but now everything looks very bad.  What
should he do first?
a. Go to Event Viewer and check the log
b. Go to Device Manager
c. Go to the printed manual
d. Call Tech Support

6
962-194 Computer Optimization
19. Which of the following should be your first choice to remove an application that you no
longer need?
a. Delete the program files
b. Use the uninstall program that came with the application
c. Use the Add or Remove Programs Applet
d. Use the Registry Editor to remove references to the
application

20. You've just installed a software update, rebooted, and now your system experiences
random crashes.  Which utility should you use first to try to fix the problem?
a. Automated System Restore
b. Device Manager
c. System Restore
d. Recovery Console

Question 2. 4 Questions write a short answer with bullet points and each question has 5
points.

1. Name the 4 methods when need you to free-up some spaces on a computer
and explain each methos how. Method 1 Uninstall

Answer: There are four ways to free-up space on a computer.


1. Windows Disk Cleanup: Windows comes with some great tools to help you keep your
computer's memory clean. The problem is that not everyone knows where these features are or
what to look for. To access the Disk Cleanup function:

Go to your Computer window (Start -> Computer)


Right-Click your hard-drive and select ‘Properties’
Under the ‘General’ tab, click ‘Disk Cleanup’
Windows will scan your drive and let you know how much space you can save by running Disk
Cleanup
Select the files that you wish to delete form the drive, and hit OK

2. Uninstall Programs: For many computer users, most of the memory is used by applications
and games. If you no longer use certain programs, you can uninstall them and remove them
from your hard drive.

Start -> Control Panel -> Uninstall a program

7
962-194 Computer Optimization
Sort the list of programs by file size by clicking the ‘Size header’. Now you can see which
programs take up the most space on your computer.
Click any program that you wish to remove, and click ‘Uninstall’

3. Remove Duplicate Files: Over time, you may have accumulated duplicate files that are not
needed to operate your computer. Unfortunately, Windows doesn't provide an easy way to find
and remove these duplicate files, so you need third party software.
With Duplicate Sweeper, you can use the settings to automatically select duplicate files to
remove, or you can choose individual files yourself. The app sends duplicate files to the Recycle
Bin or Recycle Bin. Therefore, if you change your mind, you can restore the deleted files to their
original location.

4. Temporary Files: The Disk Cleanup method did not include files saved by external apps such
as Google Chrome or Mozilla Firefox. Your computer may store gigabytes of cookies, web
history, and cache.
In Google Chrome, you can open the settings menu (three dots next to the address bar)> Other
Tools> Clear Browsing Data and From here, select the data you want to delete and click [Clear
Browsing Data].

2. Gathering information is always informative before we do some troubleshooting on


an end user’s computer, to identify the problem what are the steps. Step 1: Gather
information

Answer:
a. Gathers information
b. Develop a theory of possible causes.
c. Test the theory to determine the cause.
d. Create an action plan to solve the problem and implement the solution.
e. Check the full functionality of your system and take precautions if necessary
f. Document results, actions, and results.

3. Explain Five essential characteristics of Cloud computing.

8
962-194 Computer Optimization
Answer:
1. On-demand self-service:
Consumers can unilaterally and automatically provision computing features such as server time
and network storage as needed, without the need for human interaction with each service
provider.

2. Broad network access:


Features are available over the network and are invoked through standard mechanisms that
facilitate their use on heterogeneous thin or thick client platforms (cell phones, tablets, laptops,
workstations, etc.).

3. Resource pooling:
The provider's computing resources are pooled to serve multiple consumers using a multi-tenant
model, and various physical and virtual resources are dynamically allocated and reallocated
based on consumer demand. To do. Customers usually don't control or know the exact location
of the deployed resources, so they feel location-independent, but specify a location with a higher
level of abstraction (country, state, data center, etc.). You may be able to do it. Examples of
resources are storage, processing, memory, and network bandwidth.

4. Rapid elasticity:
Features can be flexibly deployed and released, in some cases, automatically to scale out and
scale in quickly based on demand. To consumers, the available delivery options often appear to
be unlimited and can be assigned in any quantity at any time.

5. Measured service:
Cloud systems automatically control and optimize resource usage with specific levels of
abstraction metrics appropriate to the type of service (storage, processing, bandwidth, active user
accounts, and so on). You can monitor, control, and report resource usage, providing
transparency to both the provider and the consumer of the service being used.

4. Troubleshooting an application>> Write the General Steps for Solving an


Application Errors: Step 1: Interview the User and Back Up Data

Answer:

9
962-194 Computer Optimization
Step 1: Interview the User and Back Up Data

Step 2: Analysis and Planning

Step 3: Implementation of a solution

Step 4: Assessment of the effectiveness of the solution

Step 5: Documentation of the incident

Question 3

Lab Tasks 20 points


Introduction
You have installed VirtualBox on your computer do the followings task take the screenshot of each
step and paste it under each step itself to prove your work.

Task 1 - Explore Registry Editor 


10
962-194 Computer Optimization
The registry editor allows you to view, update, and search for Windows registry settings. Windows
registry is a database that contains various Windows configuration settings. Using the Registry
Editor, you can modify, add, or delete settings. However, changes to these settings should be made
with caution. A single wrong edit to the registry can stop the functioning of the computer. 
In this task, you will explore Registry Editor. 
Step 1 
RUN ON YOUR vm 
The desktop is displayed. 
In the Type here to search textbox in the taskbar and type the following command: 
regedit 
Click on the regedit result. 

Step 2 
The Registry Editor window is displayed. It is important to note that other than the system
configuration settings, Windows Registry also stores information, such as installed applications,
security settings, and drivers information. 
Notice that there are various root keys, which are: 
 HKCR (HKEY_CLASSES_ROOT): Contains the information about various
file types, file extensions, and OLE. 
 HKCU (HKEY_CURRENT_USER): Contains information about the currently
logged in user and the settings assigned to the user. 
 HKLM (HKEY_LOCAL_MACHINE): Contains hardware and software
settings that are specific to the system. This is the most used registry key. 
 HKU (HKEY_USERS): Contains information about the users who have
logged on to the system. Both, generic and user-specific, information is contained in this
registry key. 
 HKEY_CURRENT_CONFIG (HKCC): Contains the system hardware
information. 

11
962-194 Computer Optimization
Step 3 
In the left pane, under Computer, select the folder named HKEY_CLASSES_ROOT. 
In the right pane, right-click the (Default) key and select Modify. 

12
962-194 Computer Optimization
Step 4 
The Edit String dialog box appears. 
By filling in the Value data field, a new value can be assigned to the file. 
Note: For this task, you should not make any changes to the registry. Any unwanted change can
cause system issues. 
Close the Edit String dialog box. You are now back on the Registry Editor window. 

 
Step 5 
Right-click in the right-hand pane, select New and then select Key. 
Adding a new key in the registry is simple as long as you are aware of what needs to be added. Any
unwanted key or a key with the wrong value can cause system issues, such as a non-bootable
system. 
Note: For this task, you should not make any changes to the registry. Any unwanted change can
cause system issues. 
Close the Edit String dialog box. You are now back on the Registry Editor window. 

13
962-194 Computer Optimization
Step 6 
Notice that a new key has been added to HKEY_CLASSES_ROOT. You can add a key to any of the
root keys. 
Notice that in the right pane, no value has been set for the (Default) key.

14
962-194 Computer Optimization
Step 7 
You now know how to add or update a key. Deleting a key is also a simple task. Right-click New Key
#1 in the left pane and select Delete. 

Step 8 
In the Confirm Key Delete dialog box, click Yes. 

15
962-194 Computer Optimization
Step 9 
Notice that the key no longer exists. 
Close the Registry Editor window. 

 
 

16
962-194 Computer Optimization
Step 10 
You should have now returned to the desktop. 
 
Task 2 - Use the Services Console 
Several Windows components are dependent on the services that run in the Services console. Many
of the services start when the system boots up. Other services, which are created when applications
are installed, can either start with the system boot up or can be manually started. They can also be
disabled if a specific Windows component is not required at the moment. 
In this task, you will use the Services console. 
Step 1 
RUN ON YOUR vm  
In the Type here to search textbox in the taskbar and type the following command: 
services.msc 
Under the Best Match section, select Services. 

Step 2 
Notice that the Services console is displayed. The services are listed in the alphabetical order. 

17
962-194 Computer Optimization
Step 3 
Right Click Application Information and click Start 

Step 4 

18
962-194 Computer Optimization
You can sort the services according to their status. Click Status. 

Step 5 
Services are now sorted according to their status. 

19
962-194 Computer Optimization
Step 6 
Click Status once again. 
Notice that the services with the Running status are now listed. When you scroll down, you will find
the services with no status are listed. No is shown means that the service is stopped. 
Note: You can use any column heading to sort the services. 

 
 
Step 7 
Let’s attempt to stop a service. 
Select Application information in the Name column, then right-click and select Stop. 
Doing this will cause the service to stop its ongoing execution. 

20
962-194 Computer Optimization
Step 8 
A dialog box showing the progress to stop the service appears for a moment. As soon as the service
is disabled, the dialog box disappears. 
Notice that the service is no longer listed with the Running status. 
Step 9 
Right-click Application Information and select Properties. 

21
962-194 Computer Optimization
Step 10 
In the Application Information Properties (Local Computer) dialog box, notice that
the Service status is set as Stopped. 
Click Start. 

22
962-194 Computer Optimization
Step 11 
Notice that the Service status is now set as Running. 

Step 12 
Move the Application Information Properties (Local Computer) dialog box towards the left to
ensure that the Application Information service is visible in the Services console. 

23
962-194 Computer Optimization
Step 13 
Let’s change the Startup Type for the Application Information service. 
Currently, the service is set to Manual. 

24
962-194 Computer Optimization
Step 14 
Click the Startup type drop-down and select Automatic. 

Step 15 
In the Startup type drop-down, the service is now set to Automatic. 

25
962-194 Computer Optimization
Step 16 
Click the Log On tab. 
A service can be set to either start with the Local System account or with a specific account. For
this task, keep the default settings. 

26
962-194 Computer Optimization
Step 17 
Click the Recovery tab. This tab allows you to trigger an action if the service fails. By default, the
first, second, and subsequent failures are set to Take No Action. 
In this task, you will change this to Restart the Service for the first failure. 
From the First failure drop-down, select Restart the Service. 

Step 18 
The First failure drop-down is now set to Restart the Service. 

27
962-194 Computer Optimization
Step 19 
Click the Dependencies tab. Note that this service depends on two different services. If both / either
of the services fail, this service will not start. 
Click OK to close the Application Information Properties (Local Computer) dialog box. 

28
962-194 Computer Optimization
Step 20 
In the left pane, notice the Services (Local) node. 
This means that the Services console is displaying the services of the local system. However, you
can also see the services running from another system on the network if needed. 

Step 21 
Right-click Services (Local) and select Connect to another computer. 
 

29
962-194 Computer Optimization
30
962-194 Computer Optimization

You might also like