Chapter 9 Exercises

Multiple Choice


1. a

2. d

3. b

4. c

5. b



1. console, snap-in

2. Last Known Good Configuration

3. Safe Mode

4. user profiles

5. keys or subtrees, hives

Matching Terms

_g_ / 1. decryption / a. helps debug errors by recording error events to a log file
_f_ / 2. Microsoft Management Console / b. command to access the registry editor
_i_ / 3. Recovery Console / c. process of converting plaintext data into ciphertext
_j_ / 4. disk quota / d. snapshot of the system state that can be used in a System Restore
_e_ / 5. .msc / e. file extension for MMC snap-ins
_b_ / 6. regedit / f. utility for creating customized consoles
_h_ / 7. value / g. process of converting ciphertext data back to its original format
_c_ / 8. encryption / h. the lowest level of the tree in a registry; stores data
_a_ / 9. Dr. Watson / i. command-driven tool that supports commands to troubleshoot your computer
_d_ / 10. restore point / j. limits how much disk space a user can access

Short Answer Questions

  1. List the tools Windows XP provides to help solve problems with the boot process, in the order in which you should try them. Briefly describe each tool.
  2. List and describe the three types of local user accounts available in Windows XP.
  3. What are the five keys in the registry and what types of information does each store? What steps should you take before editing any registry values?
  4. Describe several of the Windows XP update and support tools available on the Microsoft Web site.
  5. Describe several considerations when creating a username and password. List three examples of good, secure passwords and three examples of easily guessed passwords.


1. If Windows XP will not boot and you cannot pinpoint the source of the problem, then you can try using one of the tools listed below:

  • Advanced Options Menu

Last Known Good Configuration

Safe Mode

  • System Restore
  • Windows XP Boot Disk
  • Recovery Console
  • Automated System Recovery
  • Reinstall Windows XP using the Windows XP CD

These tools are listed above in the order you should try them, as each tool is more powerful than the one before it, affecting more of the system, installed hardware and software, and user data.

If Windows XP will not boot, the Advanced Options Menu allows you to boot using the Last Known Good Configuration or Safe Mode. System Restore allows you to restore the system state using a backup of the system settings and configuration. Next, you can try to boot the computer from the Windows XP boot disk. If that does not work, try the Recovery Console, a command-driven operating system that helps repair a damaged registry, system files, or file system on the hard drive. Automated System Recovery (ASR) creates a backup and an ASR floppy disk that can be used to restore the backup of the volume or logical drive holding Windows XP. ASR should be a last resort for system recovery, because you will lose all data prior to the last backup.

2. A local user account enables users to log on to a single, specific computer and the account has access to resources on that computer. Every Windows XP workstation has two built-in user accounts that are set up when the OS is first installed: an administrator account and a guest account.

  • An administrator has rights and permissions to all computer software, data, and hardware resources. Under Windows XP, the administrator can create other user accounts and assign corresponding rights and permissions to individual accounts, to groups of selected accounts, or to all accounts that use the computer.
  • A guest account has very limited privileges and gives someone who does not have a user account access to a computer. The guest account is useful in a business environment where many people use a single computer for limited purposes and it is not practical for all of them to have unique user accounts.
  • A limited account (which is not a built-in account) is created on a local computer and allows a user access to only that one computer. On a stand-alone computer, a limited account is set up by the administrator for each person that uses the computer. A limited account cannot change most settings or delete important files. A limited account is designed for a person who uses a computer that is not connected to a network.

3. The five keys in the registry are:

  • HKEY_CURRENT_USERContains information about the currently logged-on user.
  • HKEY_CLASSES_ROOTContains information about software and the way software is configured. This key points to data stored in HKEY_LOCAL_MACHINE.
  • HKEY_CURRENT_CONFIGContains information about the active hardware configuration, which is extracted from the data stored in the HKEY_LOCAL_ MACHINE subkeys called SOFTWARE and SYSTEM.
  • HKEY_USERSContains information used to build the logon screen and the ID of the currently logged-on user.
  • HKEY_LOCAL_MACHINEContains all configuration data about the computer, including information about device drivers and devices used at startup. The information in this key does not change when different users log on.

Because changes to the registry take effect immediately and are permanent, you should back up the registry before you edit any values, so that you can restore it if something goes wrong. Backing up the system state using the Backup utility is one way to back up the registry.

4. Microsoft provides several online tools to help update and support Windows XP, including:

  • Windows Update, which provides an automated way to update the OS, applications, and device drivers made available on the Microsoft Web site.
  • The Microsoft Help and Support Web site (, which is a valuable source of information to help you find updates and comprehensive resources on technical issues related to Windows XP and other Microsoft products.
  • The Knowledge Base, which allows you to perform powerful searches on a device name , an error message, a Windows utility, a symptom, a software application, an update version number, or key words that lead you to articles about problem and solutions.
  • Windows XP Newsgroups, which are user forums in which you can find other Windows XP users, seek help, or answer questions from other users.

5. A few guidelines for creating usernames and passwords:

  • A user name cannot be identical to any other user or group name on the computer being administered. It can contain up to 20 uppercase or lowercase characters except for the following: " / \ [ ] : ; | = , + * ? < >
  • A user name cannot consist solely of periods (.) or spaces.
  • Passwords can be up to 127 characters.
  • Do not use a password that is easy to guess, such as one consisting of real words, your telephone number, or the name of your pet.
  • The most secure type of password is a combination of letters, numbers, and even non-alphanumeric characters.
  • Use upper and lowercase letters throughout the password (for example, CoFFeeKup2)
  • Use numbers and punctuation in the password at random locations (for example, Co3FfEKup)
  • Longer passwords provide greater security than shorter ones; the password should include letters and numbers and, if possible, be at least eight characters long.
  • Ideally, you should be able to able to type your password without looking at the keyboard.
  • Do not use any word in the dictionary or use two short words together (fluffycat) or separated by a symbol or numbers (surf_wave).
  • Do not use any proper name, such as the name of a geographical location or famous person.
  • Do not use a sequence of letters or numbers from the keyboard (for example, CVBNM or 56789).
  • Do not use personal information in your password, such as your last name, pet’s name, birthday, words related to hobbies you enjoy.
  • Do not post your password near your computer.